{"id":736810,"date":"2024-01-17T04:14:00","date_gmt":"2024-01-17T03:14:00","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=736810"},"modified":"2025-03-04T06:52:30","modified_gmt":"2025-03-04T05:52:30","slug":"zero-trust-sur-la-voie-de-la-maturite","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","title":{"rendered":"Zero Trust, sur la voie de la maturit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Zero Trust, sur la voie de la maturit\u00e9<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/cg-logo.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Abdembi Miraoui et J\u00e9r\u00f4me Desbonnet <\/h5><h5 class=\"blog-date\">17 janvier 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Le mod\u00e8le de cybers\u00e9curit\u00e9 <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-cybersecurite\/\">Zero Trust<\/a> repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). <\/h2><p class=\"intro-para-content\">Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\" id=\"h-un-modele-indispensable\"><strong>Un mod\u00e8le indispensable<\/strong><\/h3>\n\n\n\n<p>Si le mod\u00e8le Zero Trust a connu une adoption rapide d\u00e8s son introduction, celle-ci a \u00e9t\u00e9 nettement acc\u00e9l\u00e9r\u00e9e par la crise sanitaire&nbsp;: il a en effet facilit\u00e9 le d\u00e9ploiement rapide, s\u00e9curis\u00e9 et \u00e0 grande \u00e9chelle du t\u00e9l\u00e9travail. Ainsi ces derni\u00e8res ann\u00e9es, le mod\u00e8le Zero Trust n\u2019a cess\u00e9 de d\u00e9montrer sa pertinence et son efficacit\u00e9 dans l\u2019environnement technologique et s\u00e9curitaire actuel.<\/p>\n\n\n\n<p>L\u2019essentiel des besoins est aujourd\u2019hui couvert&nbsp;et, devenue l\u2019approche incontournable en mati\u00e8re de cybers\u00e9curit\u00e9, il est d\u00e9sormais mis en \u0153uvre massivement par des acteurs de plus en plus matures sur le sujet&nbsp;: les \u00e9diteurs envisagent dor\u00e9navant la s\u00e9curit\u00e9 sous cet angle et s\u2019unissent pour d\u00e9velopper des standards (OCSF, Open XDR Platform\u2026), les entreprises utilisatrices ne se limitent plus seulement \u00e0 la banque et l\u2019assurance, traditionnellement en pointe sur la s\u00e9curit\u00e9, et les autorit\u00e9s commencent \u00e0 en faire une exigence r\u00e9glementaire (CISA aux \u00c9tats-Unis, NCSC au Royaume-Uni, NIS2 en Europe\u2026).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-une-approche-en-amelioration-continue\"><strong>Une approche en am\u00e9lioration continue<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-la-necessite-de-tout-verifier\">La n\u00e9cessit\u00e9 de tout v\u00e9rifier<\/h4>\n\n\n\n<p>Au-del\u00e0 des cas d\u2019usage usuels, d\u00e9sormais bien couverts, le mod\u00e8le cherche \u00e0 se perfectionner, avec l\u2019objectif notamment de parvenir \u00e0 <em>v\u00e9ritablement<\/em> <em>tout<\/em> <em>v\u00e9rifier<\/em>.<\/p>\n\n\n\n<p>Les solutions disponibles actuellement ne sont en effet pas encore toutes matures puisqu\u2019elles ne permettent pas de v\u00e9rifier les conditions d&#8217;acc\u00e8s post attribution d&#8217;un jeton de session (ou <em>token<\/em>). Ceci est d\u00fb \u00e0 2 raisons principales : les \u00e9diteurs, d\u2019une part, commencent \u00e0 peine \u00e0 se saisir du sujet pour am\u00e9liorer la maturit\u00e9 de leurs solutions. D\u2019autre part, les applications dites &#8220;legacy&#8221; mettent toujours en \u0153uvre d\u2019anciens protocoles d\u2019authentification qui ne permettent pas de s\u2019assurer tout au long de la session que les conditions d\u2019acc\u00e8s de l\u2019utilisateur restent respect\u00e9es.<\/p>\n\n\n\n<p>Tous les environnements ne se pr\u00eatent pas non plus aux m\u00e9thodes pr\u00e9conis\u00e9es par le Zero Trust. Ainsi par exemple, alors que l\u2019authentification multifacteurs (MFA) est l\u2019un des moyens permettant d&#8217;atteindre un premier niveau de maturit\u00e9 Zero Trust, pour certains syst\u00e8mes industriels (OT), les modes de connexion aux machines ne permettent pas toujours de l\u2019appliquer.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-le-besoin-de-parfaire-le-modele\">Le besoin de parfaire le mod\u00e8le<\/h4>\n\n\n\n<p>Avec l\u2019augmentation de la maturit\u00e9 des entit\u00e9s ayant adopt\u00e9 cette approche, des r\u00e9flexions sont ainsi en cours autour des technologies ayant permis l\u2019essor du Zero Trust, pour parfaire le mod\u00e8le.<\/p>\n\n\n\n<p>Par exemple, des solutions incontournables comme CASB (Cloud Access Service Broker, service de s\u00e9curit\u00e9 en mode SaaS permettant en priorit\u00e9 de contr\u00f4ler le Shadow IT) ou SASE (Secure Access Service Edge, approche de rapprochement des sujets r\u00e9seau type SD-WAN avec des fonctions de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique en mode SaaS) impliquant d\u2019accorder sa confiance \u00e0 un tiers, vont \u00e0 l\u2019encontre du principe du Zero Trust.<\/p>\n\n\n\n<p>Pouvoir d\u00e9l\u00e9guer sa s\u00e9curit\u00e9 \u00e0 un sp\u00e9cialiste bien pr\u00e9par\u00e9 et bien outill\u00e9 pour un co\u00fbt raisonnable constitue un immense progr\u00e8s, mais cela engendre, en contrepartie, une vuln\u00e9rabilit\u00e9 sur la confidentialit\u00e9 des donn\u00e9es. Dans certains domaines sensibles comme la d\u00e9fense, l\u2019administration ou la sant\u00e9, ce risque r\u00e9siduel, m\u00eame minime, n\u2019est pas toujours acceptable. C\u2019est pourquoi on voit aujourd\u2019hui appara\u00eetre des solutions de surveillance aveugles au contenu (Zero Knowledge Network, permettant par exemple \u00e0 une personne de prouver son identit\u00e9 sans avoir \u00e0 la r\u00e9v\u00e9ler.), compl\u00e9mentaires au Zero Trust et venant le renforcer.<\/p>\n\n\n\n<p>Un autre exemple concerne la prise de conscience de plus en plus importante de la fr\u00e9quente n\u00e9cessit\u00e9 d&#8217;\u00e9tablir un lien entre identit\u00e9 digitale et identit\u00e9 r\u00e9galienne. De nouvelles solutions apparaissent pour combler ce manque, avec le support des entit\u00e9s gouvernementales dans tous les pays.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-une-philosophie-a-adopter-d-urgence\"><strong>Une philosophie \u00e0 adopter d\u2019urgence<\/strong><\/h3>\n\n\n\n<p>Si le mod\u00e8le continue de se perfectionner, il est indispensable que les organisations lancent leurs propres r\u00e9flexions autour du Zero Trust afin de juger de la pertinence du mod\u00e8le au regard de leurs contextes sp\u00e9cifiques. La mise en \u0153uvre de Zero Trust sera ensuite une d\u00e9marche au long cours, jalonn\u00e9e de pauses r\u00e9guli\u00e8res qui permettront de faire le point et d\u2019ajuster si n\u00e9cessaire l\u2019approche en fonction de l\u2019\u00e9volution des technologies et des risques.<\/p>\n\n\n\n<p>Chaque organisation devra \u00e9galement&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Personnaliser son approche&nbsp;: en d\u00e9finissant sa propre taxonomie sur le Zero Trust, et la liste des piliers \u00e0 couvrir (g\u00e9n\u00e9ralement, identit\u00e9, r\u00e9seau, poste de travail)<\/li>\n\n\n\n<li>S\u2019approprier le mod\u00e8le pour l\u2019adapter au mieux \u00e0 son contexte m\u00e9tier et r\u00e9glementaire, \u00e0 ses syst\u00e8mes, ou encore \u00e0 ses usages. Cela passera entre autres par une d\u00e9finition pr\u00e9cise des p\u00e9rim\u00e8tres IT \u00e0 int\u00e9grer dans cette strat\u00e9gie, un maturity assessment, et par la d\u00e9finition d\u2019une roadmap de mise en place du mod\u00e8le avec mont\u00e9e progressive en maturit\u00e9.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteurs <\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg\" alt=\"Abdembi Miraoui\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Abdembi Miraoui<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Co-Head of Service Line \u201cCloud, Endpoint &amp; Infrastructure Security\u201d<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Abdembi est un expert dans le domaine de la cybers\u00e9curit\u00e9, avec une expertise particuli\u00e8re dans les sujets cl\u00e9s tels que le Cloud, les Endpoints et l&#8217;infrastructure. Il est responsable de la service line cybers\u00e9curit\u00e9 &#8220;Cloud, Endpoint &#038; Infrastructure Security&#8221; au sein de l&#8217;entit\u00e9 cybers\u00e9curit\u00e9 du groupe. Gr\u00e2ce \u00e0 ses connaissances pointues et son exp\u00e9rience approfondie acquise depuis plus de 15 ans. Abdembi est capable de fournir des conseils avis\u00e9s sur les enjeux de cybers\u00e9curit\u00e9 les plus complexes. Il est passionn\u00e9 par sa mission de prot\u00e9ger les entreprises contre les cybermenaces et de renforcer la r\u00e9silience de leurs syst\u00e8mes.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/10\/Jerome_Desbonnet-square.jpg\" alt=\"J\u00e9r\u00f4me Desbonnet\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/jeromedesbonnet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">J\u00e9r\u00f4me Desbonnet<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>VP &#8211; Cybersecurity CTIO &#8211; Chief cybersecurity Architect CIS GBL&#039;s, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/jeromedesbonnet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">En tant que VP, Cybersecurity CTIO, J\u00e9r\u00f4me\u00a0cr\u00e9e des mod\u00e8les d\u2019architecture de s\u00e9curit\u00e9. J\u00e9r\u00f4me planifie et ex\u00e9cute d\u2019importants programmes de s\u00e9curit\u00e9 afin de garantir que les clients de Capgemini sont bien prot\u00e9g\u00e9s.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 8497d7cb-38a0-4447-91a6-82f5e2539f90\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent \">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 72% 44%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.<\/p>\n","protected":false},"author":640,"featured_media":737296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"83cd07bb-2721-456c-adb2-6f06f75be5f8\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"3c739ed1-9799-49bd-815b-ec77fbb13253\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":"{\"x\":0.51,\"y\":0.49}"},"categories":[3],"tags":[192,17],"brand":[30],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-736810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","tag-cybersecurite","tag-innovation","brand-capgemini","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust, sur la voie de la maturit\u00e9 - Capgemini France<\/title>\n<meta name=\"description\" content=\"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust, sur la voie de la maturit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T03:14:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:52:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/webpreview_zero_trust.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Zero Trust, sur la voie de la maturit\u00e9\",\"datePublished\":\"2024-01-17T03:14:00+00:00\",\"dateModified\":\"2025-03-04T05:52:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\"},\"wordCount\":953,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\",\"Innovation\"],\"articleSection\":[\"Innovation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\",\"name\":\"Zero Trust, sur la voie de la maturit\u00e9 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg\",\"datePublished\":\"2024-01-17T03:14:00+00:00\",\"dateModified\":\"2025-03-04T05:52:30+00:00\",\"description\":\"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg\",\"width\":6386,\"height\":4125},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust, sur la voie de la maturit\u00e9 - Capgemini France","description":"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","og_locale":"fr_FR","og_type":"article","og_title":"Zero Trust, sur la voie de la maturit\u00e9","og_description":"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","og_site_name":"Capgemini France","article_published_time":"2024-01-17T03:14:00+00:00","article_modified_time":"2025-03-04T05:52:30+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/webpreview_zero_trust.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/"},"author":{"name":"","@id":""},"headline":"Zero Trust, sur la voie de la maturit\u00e9","datePublished":"2024-01-17T03:14:00+00:00","dateModified":"2025-03-04T05:52:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/"},"wordCount":953,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg","keywords":["Cybers\u00e9curit\u00e9","Innovation"],"articleSection":["Innovation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","name":"Zero Trust, sur la voie de la maturit\u00e9 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg","datePublished":"2024-01-17T03:14:00+00:00","dateModified":"2025-03-04T05:52:30+00:00","description":"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche, elle insiste particuli\u00e8rement sur l\u2019identit\u00e9, qui permet de se d\u00e9faire de la logique p\u00e9rim\u00e9trique qui pr\u00e9valait autrefois.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg","width":6386,"height":4125},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":17,"name":"Innovation","slug":"innovation"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"ef_editorial_meta":[{"id":108,"name":"First Draft Date","slug":"first-draft-date"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Zero Trust, sur la voie de la maturit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9","innovation"],"dateCreated":"2024-01-17T03:14:00Z","datePublished":"2024-01-17T03:14:00Z","dateModified":"2025-03-04T05:52:30Z"},"rendered":"<meta name=\"parsely-title\" content=\"Zero Trust, sur la voie de la maturit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-01-17T03:14:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9,innovation\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":779182,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-csma-avenir-des-strategies-zero-trust\/","url_meta":{"origin":736810,"position":0},"title":"Cybersecurity Mesh Architecture : l&#8217;avenir des strat\u00e9gies Zero Trust ?\u00a0","author":"Tarek Edde Gomez","date":"April 30, 2025","format":false,"excerpt":"La CSMA est comme un filet qui viendrait relier l\u2019ensemble des outils de s\u00e9curit\u00e9 d\u2019une organisation, leur permettant de communiquer entre eux.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":769739,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","url_meta":{"origin":736810,"position":1},"title":"La s\u00e9curit\u00e9 des applications dans le cloud","author":"Tarek Edde Gomez","date":"November 27, 2024","format":false,"excerpt":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche comme le mod\u00e8le Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":713145,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","url_meta":{"origin":736810,"position":2},"title":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison","author":"","date":"March 9, 2023","format":false,"excerpt":"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est \u00e0 priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":794325,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","url_meta":{"origin":736810,"position":3},"title":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux","author":"anne.gautier@capgemini.com","date":"October 20, 2025","format":false,"excerpt":"Ce que les Assises de la Cybers\u00e9curit\u00e9 2025 r\u00e9v\u00e8lent sur l\u2019avenir du secteur.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":744171,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","url_meta":{"origin":736810,"position":4},"title":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","author":"anne.gautier@capgemini.com","date":"March 7, 2024","format":false,"excerpt":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":722192,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/trois-piliers-de-la-confiance-numerique-secteur-aeronautique\/","url_meta":{"origin":736810,"position":5},"title":"Les trois piliers de la confiance num\u00e9rique dans le secteur a\u00e9ronautique","author":"","date":"June 21, 2023","format":false,"excerpt":"Quoi que nous fassions, la confiance est \u00e0 la base de toutes nos d\u00e9cisions et de toutes nos actions. C\u2019est plus vrai encore lorsque nous montons dans un avion.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/736810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/640"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=736810"}],"version-history":[{"count":13,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/736810\/revisions"}],"predecessor-version":[{"id":776588,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/736810\/revisions\/776588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/737296"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=736810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=736810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=736810"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=736810"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=736810"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=736810"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=736810"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=736810"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=736810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}