{"version":"1.0","provider_name":"Capgemini France","provider_url":"https:\/\/www.capgemini.com\/fr-fr","author_name":"Capgemini France","author_url":"https:\/\/www.capgemini.com\/fr-fr","title":"Zero Trust, sur la voie de la maturit\u00e9","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"EdQH2RACPm\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\">Zero Trust, sur la voie de la maturit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/embed\/#?secret=EdQH2RACPm\" width=\"600\" height=\"338\" title=\"&#8220;Zero Trust, sur la voie de la maturit\u00e9&#8221; &#8212; Capgemini France\" data-secret=\"EdQH2RACPm\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.capgemini.com\/fr-fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/webpreview_zero_trust.jpg","thumbnail_width":1200,"thumbnail_height":630,"description":"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois."}