{"id":11857,"date":"2021-12-01T13:45:00","date_gmt":"2021-12-01T11:45:00","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=11857"},"modified":"2021-12-22T17:02:01","modified_gmt":"2021-12-22T15:02:01","slug":"quatre-idees-recues-sur-zero-trust","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/","title":{"rendered":"Quatre id\u00e9es re\u00e7ues sur Zero Trust"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Auteur : Nicolas Tondre, Product Marketing Manager<\/strong><\/p>\n\n\n\n<p>Zero Trust est un terme introduit en 2010 par Forrester, puis impos\u00e9 par Gartner, qui reprend le concept de d\u00e9-p\u00e9rim\u00e9trisation datant du d\u00e9but des ann\u00e9es 2000. Malgr\u00e9 un nom qui fait plut\u00f4t penser \u00e0 un <em>buzzword<\/em>\u00a0, et qui a rebut\u00e9 plus d\u2019un responsable de s\u00e9curit\u00e9 informatique, Zero Trust recouvre cependant un ensemble de principes et de pratiques utiles. <\/p>\n\n\n\n<p>Ce concept m\u00e9rite donc qu\u2019on s\u2019y attarde, d\u2019autant plus que le NIST (National Institute of Standards and Technology) a fini par l\u2019imposer au gouvernement f\u00e9d\u00e9ral des \u00c9tats-Unis. Il peut \u00eatre vu comme un ensemble de r\u00e8gles et de pratiques permettant d\u2019am\u00e9liorer la s\u00e9curit\u00e9 du syst\u00e8me d&rsquo;information d\u2019une entreprise ou d\u2019une organisation. Il consiste \u00e0 mettre en \u0153uvre des composants de s\u00e9curit\u00e9 multiples et compl\u00e9mentaires (MFA, SSO, IAM, VPN, minimum privilege, segmentation r\u00e9seau, SIEM, etc.) pour r\u00e9duire les risques d\u2019intrusion et de fuite de donn\u00e9es.<\/p>\n\n\n\n<p>Mais de nombreuses impr\u00e9cisions et confusions persistent \u00e0 son sujet. C\u2019est pourquoi, dans cet article, nous allons tenter de d\u00e9mythifier quatre id\u00e9es re\u00e7ues sur Zero Trust&nbsp;:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Zero Trust remplace l\u2019usage du VPN d\u2019entreprise<\/li><li>Zero Trust ne s\u2019applique que dans le Cloud<\/li><li>Zero Trust dispense des r\u00e8gles d\u2019hygi\u00e8ne pr\u00e9conis\u00e9es par l\u2019ANSSI<\/li><li>Les VPN d\u2019entreprise ne proposent pas de fonctions Zero Trust<\/li><\/ol>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. <strong><strong><strong><strong>Zero Trust remplace l&rsquo;usage d&rsquo;un VPN<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>Dans leur pr\u00e9sentation marketing, certain \u00e9diteurs de solutions de s\u00e9curit\u00e9 opposent Zero Trust et VPN. Or les solutions Zero Trust prennent en charge le chiffrement des communications de bout en bout, la garantie de l\u2019int\u00e9grit\u00e9 des donn\u00e9es, ainsi que l\u2019authentification de l\u2019utilisateur par le serveur et vice versa. Ce sont exactement les service rendus par un VPN.<\/p>\n\n\n\n<p>On voit bien que toutes les solutions Zero Trust comprennent des tunnels VPN, mais au sein d\u2019une architecture comportant de multiples composants de s\u00e9curit\u00e9, avec lesquels le VPN s\u2019int\u00e8gre nativement.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:32% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-1024x683.jpeg\" alt=\"thegreenbow-cas-usage-diffusion-restreinte\" class=\"wp-image-7305 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-1024x683.jpeg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-300x200.jpeg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-768x513.jpeg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-1536x1025.jpeg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-2048x1367.jpeg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-100x67.jpeg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-301x201.jpeg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-343x229.jpeg 343w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-scaled-727x486.jpeg 727w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-scaled-602x402.jpeg 602w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-scaled-686x458.jpeg 686w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Site industriel sensible<\/figcaption><\/figure><div class=\"wp-block-media-text__content\">\n<p>D\u2019autre part, il y a de nombreux cas o\u00f9 Zero Trust n\u2019est pas la solution adapt\u00e9e \u00e0 l\u2019architecture r\u00e9seau en place. Par exemple, pour contr\u00f4ler une centrale nucl\u00e9aire, un acc\u00e8s VPN depuis un poste s\u00e9curis\u00e9 et d\u00e9di\u00e9 \u00e0 un nombre restreint de personnes assurera rigoureusement et simplement le niveau de s\u00e9curit\u00e9 attendu.<\/p>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>L\u2019acc\u00e8s aux donn\u00e9es sensibles ou \u00e0 <a href=\"https:\/\/www.thegreenbow.com\/fr\/cas-dusage-du-vpn\/diffusion-restreinte\/\" target=\"_blank\" rel=\"noreferrer noopener\">Diffusion Restreinte des OIVs<\/a> (op\u00e9rateurs d\u2019importance vitale) et des organismes \u00e9tatiques sont \u00e9galement soumis \u00e0 l\u2019utilisation d\u2019un VPN sur un poste d\u00e9di\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>2. Zero Trust ne s&rsquo;applique que dans le Cloud<\/strong><\/strong><\/h2>\n\n\n\n<p>Le pr\u00e9jug\u00e9 selon lequel Zero Trust ne s\u2019appliquerait qu\u2019au Cloud, a la dent dure.<\/p>\n\n\n\n<p>Lorsqu\u2019on acc\u00e8de \u00e0 des services Cloud, comme Microsoft 365, Google Workspace ou Salesforce, c\u2019est le navigateur web qui assure l\u2019authentification, le chiffrement et l\u2019int\u00e9grit\u00e9 des donn\u00e9es \u00e0 travers des tunnels TLS. La s\u00e9curit\u00e9 des communications est dans ce cas g\u00e9r\u00e9e par l\u2019\u00e9diteur, op\u00e9rateur du service Cloud. C\u2019est lui qui a alors la main sur vos donn\u00e9es, ce qui pose des questions d\u2019ind\u00e9pendance, de confiance et de souverainet\u00e9, mais c\u2019est un autre d\u00e9bat. Il propose souvent des m\u00e9canismes de d\u00e9l\u00e9gation de l\u2019authentification (SSO), de fa\u00e7on \u00e0 r\u00e9duire le nombre de comptes et de mots de passe \u00e0 g\u00e9rer.<\/p>\n\n\n\n<p>Mais c\u2019est \u00e0 l\u2019int\u00e9rieur du r\u00e9seau de l\u2019entreprise ou de l\u2019organisation (\u00ab\u00a0on-premise\u00a0\u00bb, comme disent les anglo-saxons), que Zero Trust prend tout son sens, dans le but de permettre \u00e0 chaque collaborateur d\u2019acc\u00e9der, \u00e0 distance aussi bien que sur place, aux seules informations auxquelles il a droit\u00a0: via le syst\u00e8me d\u2019information local, un Cloud public ou un cloud priv\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Zero Trust dispense des r\u00e8gles d&rsquo;hygi\u00e8ne pr\u00e9conis\u00e9es par l&rsquo;ANSSI<\/h2>\n\n\n\n<p>Zero Trust est en r\u00e9alit\u00e9 un ensemble de r\u00e8gles d\u2019hygi\u00e8ne et de bon sens qu\u2019il convient de suivre pour assurer la s\u00e9curit\u00e9 de son r\u00e9seau et de ses donn\u00e9es.<\/p>\n\n\n\n<p>Ces r\u00e8gles sont en particulier disponibles sur le <a href=\"https:\/\/www.ssi.gouv.fr\/guide\/guide-dhygiene-informatique\/\" target=\"_blank\" rel=\"noreferrer noopener\">site de l\u2019ANSSI<\/a>. Pour rappel, elles consistent, entre autres, \u00e0&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>accorder le minimum de privil\u00e8ges aux utilisateur, centraliser leur identification et la gestion de leurs droits<\/li><li>mettre \u00e0 jour r\u00e9guli\u00e8rement le syst\u00e8me d\u2019exploitation et les logiciels pour \u00e9viter de conserver des failles de s\u00e9curit\u00e9 connues<\/li><li>impl\u00e9menter la v\u00e9rification de la conformit\u00e9 du poste, en passant par exemple par les m\u00e9canismes int\u00e9gr\u00e9s \u00e0 Microsoft Windows GPO<\/li><li>limiter l\u2019acc\u00e8s au SI aux seuls postes manag\u00e9s par la DSI et bloquer toute connexion \u00e0 internet de ces postes en dehors d\u2019un tunnel VPN<\/li><li>utiliser des protocoles robustes pour le chiffrement des donn\u00e9es, \u00e0 savoir IPsec et IKEv2<\/li><li>utiliser de l\u2019authentification forte \u00e0 base de certificats, si possible int\u00e9gr\u00e9s dans des cartes \u00e0 puces, des jetons de s\u00e9curit\u00e9<\/li><li>bloquer le \u00ab\u00a0Split Tunneling\u00a0\u00bb pour emp\u00eacher la fuite de donn\u00e9es hors du SI<\/li><li>utiliser des logiciels et des \u00e9quipements r\u00e9seau b\u00e9n\u00e9ficiant d\u2019un Visa de s\u00e9curit\u00e9 de l\u2019ANSSI<\/li><li>etc.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>4. Les VPN d&rsquo;entreprise ne proposent pas de fonctions Zero Trust<\/strong><\/strong><\/h2>\n\n\n\n<p>Les \u00e9diteurs de VPN d\u2019entreprise n\u2019ont pas attendu que le concept fasse le buzz, pour int\u00e9grer des fonctions permettant d\u2019accompagner la mise en place du concept Zero Trust.<\/p>\n\n\n\n<p>Par exemple, les logs administrateur des Clients VPN TheGreenBow conservent la trace de tous les \u00e9v\u00e8nements li\u00e9s \u00e0 la s\u00e9curit\u00e9, en vue d\u2019\u00eatre trait\u00e9s par des SIEM pour d\u00e9tecter des incoh\u00e9rences pouvant refl\u00e9ter une tentative d\u2019intrusion.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 34%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"592\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-1024x592.jpeg\" alt=\"\" class=\"wp-image-11862 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-1024x592.jpeg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-300x174.jpeg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-768x444.jpeg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-1536x889.jpeg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-100x58.jpeg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite.jpeg 1903w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>La prise en charge des jetons de s\u00e9curit\u00e9s (tokens) USB et des cartes \u00e0 puces permettent \u00e0 nos Clients VPN Windows et Linux de mettre en place une authentification multi facteur (objet physique + code PIN).<\/p>\n\n\n\n<p>Le split tunneling peut facilement \u00eatre bloqu\u00e9 par l\u2019administrateur, pour emp\u00eacher toute fuite de donn\u00e9es en dehors du tunnel s\u00e9curis\u00e9.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Le \u00ab&nbsp;mode GINA&nbsp;\u00bb permet d\u2019ouvrir automatiquement une communication prot\u00e9g\u00e9e avec le SI avant m\u00eame que l\u2019utilisateur n\u2019ait ouvert sa session Windows.<\/p>\n\n\n\n<p>Le mode filtrant du <a href=\"https:\/\/www.thegreenbow.com\/fr\/produits-vpn-thegreenbow\/endpoint-secure-connection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Client VPN Windows Enterprise 6.8<\/a> peut \u00eatre configur\u00e9 pour bloquer les ports et les protocoles non autoris\u00e9s, rendant le poste herm\u00e9tique \u00e0 toute intrusion en dehors du r\u00e9seau de confiance.<\/p>\n\n\n\n<p>Enfin, les Clients VPN TheGreenBow impl\u00e9mentent les protocoles IKEv2 et les algorithmes de chiffrement les plus robustes recommand\u00e9s par l\u2019ANSSI. Les versions 6.52 pour Windows et 1.5 pour Linux b\u00e9n\u00e9ficient de visas de s\u00e9curit\u00e9 de l\u2019ANSSI et de la certification EAL3+.<\/p>\n\n\n\n<p>Chez TheGreenBow, notre cr\u00e9do est de concevoir des logiciels \u00e0 la fois robustes et faciles \u00e0 utiliser, tant il est vrai que plus un syst\u00e8me est complexe \u00e0 mettre en \u0153uvre, plus il est vuln\u00e9rable.<\/p>\n\n\n\n<p>Vous pouvez <a href=\"https:\/\/www.thegreenbow.com\/fr\/produits-vpn-thegreenbow\/telecharger-clients-vpn-thegreenbow\/\">\u00e9valuer gratuitement pendant 30 jours<\/a> l\u2019ensemble des fonctionnalit\u00e9s d\u00e9crites ci-dessus en t\u00e9l\u00e9chargeant nos Clients VPN. Et vous pouvez aussi nous contacter pour un accompagnement dans votre projet de mise en place des concepts Zero Trust.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n  <section  class=\"wp-block-acf-linked-pages  section-content linked-pages-section\"  itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n    <div class=\"grid-container\">\n     <div class=\"grid-x grid-padding-x align-center mobile-slider\">\n                <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/fr\/produits-vpn-thegreenbow\/endpoint-secure-connection\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-727x486.jpeg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-301x201.jpeg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-343x229.jpeg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-1454x972.jpeg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-602x402.jpeg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-686x458.jpeg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"Quatre id\u00e9es re\u00e7ues sur Zero Trust\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">D\u00e9couvrir les Clients VPN TheGreenBow<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/store.thegreenbow.com\/reu\/fr\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-727x486.jpeg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-301x201.jpeg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-343x229.jpeg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-1454x972.jpeg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-602x402.jpeg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-686x458.jpeg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"Quatre id\u00e9es re\u00e7ues sur Zero Trust\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Voir le store TheGreenBow<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n        \n\t\t<\/div>\n    <\/div>\n  <\/section>\n\n\n\n<p><\/p>\n<\/div>\n","protected":false},"featured_media":11792,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[30],"class_list":["post-11857","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 id\u00e9es re\u00e7ues sur Zero Trust<\/title>\n<meta name=\"description\" content=\"Les fournisseurs de solutions Zero Trust annoncent r\u00e9guli\u00e8rement la fin des VPN. Voici pourquoi ils se trompent.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 id\u00e9es re\u00e7ues sur Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Les fournisseurs de solutions Zero Trust annoncent r\u00e9guli\u00e8rement la fin des VPN. Voici pourquoi ils se trompent.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-22T15:02:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/\",\"name\":\"4 id\u00e9es re\u00e7ues sur Zero Trust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/security.jpg\",\"datePublished\":\"2021-12-01T11:45:00+00:00\",\"dateModified\":\"2021-12-22T15:02:01+00:00\",\"description\":\"Les fournisseurs de solutions Zero Trust annoncent r\u00e9guli\u00e8rement la fin des VPN. Voici pourquoi ils se trompent.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/security.jpg\",\"width\":960,\"height\":600,\"caption\":\"Cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/quatre-idees-recues-sur-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressources\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quatre id\u00e9es re\u00e7ues sur Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 id\u00e9es re\u00e7ues sur Zero Trust","description":"Les fournisseurs de solutions Zero Trust annoncent r\u00e9guli\u00e8rement la fin des VPN. Voici pourquoi ils se trompent.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/","og_locale":"fr_FR","og_type":"article","og_title":"4 id\u00e9es re\u00e7ues sur Zero Trust","og_description":"Les fournisseurs de solutions Zero Trust annoncent r\u00e9guli\u00e8rement la fin des VPN. Voici pourquoi ils se trompent.","og_url":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/","og_site_name":"TheGreenBow","article_modified_time":"2021-12-22T15:02:01+00:00","og_image":[{"width":960,"height":600,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/","url":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/","name":"4 id\u00e9es re\u00e7ues sur Zero Trust","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","datePublished":"2021-12-01T11:45:00+00:00","dateModified":"2021-12-22T15:02:01+00:00","description":"Les fournisseurs de solutions Zero Trust annoncent r\u00e9guli\u00e8rement la fin des VPN. Voici pourquoi ils se trompent.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","width":960,"height":600,"caption":"Cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/quatre-idees-recues-sur-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.thegreenbow.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/fr\/ressources\/blog\/"},{"@type":"ListItem","position":3,"name":"Quatre id\u00e9es re\u00e7ues sur Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/fr\/#website","url":"https:\/\/www.thegreenbow.com\/fr\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/fr\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.thegreenbow.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource\/11857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/media\/11792"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/media?parent=11857"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource_category?post=11857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}