{"id":70015,"date":"2023-09-12T19:49:54","date_gmt":"2023-09-12T17:49:54","guid":{"rendered":"https:\/\/www.theagilityeffect.com\/?post_type=web-story&#038;p=70015"},"modified":"2023-09-21T09:41:47","modified_gmt":"2023-09-21T07:41:47","slug":"what-is-zero-trust-architecture","status":"publish","type":"web-story","link":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/","title":{"rendered":"What is Zero Trust Architecture?"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-video-0.1.js\" custom-element=\"amp-video\"><\/script><link href=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_1.mp4\" rel=\"preload\" as=\"video\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-captions span {\n                display: inline-block;\n                margin: 0;\n                padding: 6px 12px;\n                vertical-align: middle;\n                border-radius: 15px;\n                background: rgba(11, 11, 11, 0.6);\n                color: rgba(255, 255, 255, 1);\n                font-family: -apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Oxygen-Sans, Ubuntu, Cantarell, \"Helvetica Neue\", sans-serif;;\n                font-size: calc(4 * var(--story-page-vw));\n                line-height: 1.4;\n                word-break: break-word;\n                word-wrap: break-word;\n                overflow-wrap: break-word;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>What is Zero Trust Architecture?<\/title><link rel=\"canonical\" href=\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"The Agility Effect\" publisher-logo-src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2021\/03\/vinci-energies.png\" title=\"What is Zero Trust Architecture?\" poster-portrait-src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG-640x853.png\"><amp-story-page id=\"603c96dd-8be9-494b-8235-1e4f09e48af2\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bce3da\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-b00e3f3f-2ed7-41a5-b3c2-17db8e7a690c\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_1-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_1-poster.jpeg\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-b00e3f3f-2ed7-41a5-b3c2-17db8e7a690c-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_1.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"a268f430-e7d9-4f89-a649-2960ddb8b8f2\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bce2d9\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-8e8f13b0-2434-400e-9d74-19af47f3f61e\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_2-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_2-poster.jpeg\" title=\"Increased used of the Cloud, teleworking, etc. is multiplying computing vulnerabilities, and cyber threats along with them.\" alt=\"Increased used of the Cloud, teleworking, etc. is multiplying computing vulnerabilities, and cyber threats along with them.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-8e8f13b0-2434-400e-9d74-19af47f3f61e-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_2.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"2db3db9f-81ba-43f4-9424-5168ec85a520\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bbe3db\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-f37314fb-bf25-41d0-8cf3-ca722b31713a\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_3-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_3-poster.jpeg\" title=\"Zero Trust is a network architecture concept that aims to strengthen access security.\" alt=\"Zero Trust is a network architecture concept that aims to strengthen access security.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-f37314fb-bf25-41d0-8cf3-ca722b31713a-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_3.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"c9d1f6c9-9b8d-4935-bd03-6d7d3ca48a96\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bce2da\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-c8499e0b-645b-4d49-a8c3-34da2b72d2c4\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_4-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_4-poster.jpeg\" title=\"The network is assumed to be hostile. Implicit trust in users is removed.\" alt=\"The network is assumed to be hostile. Implicit trust in users is removed.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-c8499e0b-645b-4d49-a8c3-34da2b72d2c4-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_4.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"4c6bb032-ced9-45dc-8c63-739b1790e7a9\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bce3db\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-6a0d3899-fef2-4718-b371-55d2c011ea93\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_5-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_5-poster.jpeg\" title=\"Every access request is verified against an access policy.\" alt=\"Every access request is verified against an access policy.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-6a0d3899-fef2-4718-b371-55d2c011ea93-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_5.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"784742c1-a94e-48eb-84fe-7714eb3f455a\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bce3db\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-6ad8f110-7388-4e03-ba03-55d1a99adac1\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_6-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_6-poster.jpeg\" title=\"There is no longer general access to resources on the company network once a user is connected.\" alt=\"There is no longer general access to resources on the company network once a user is connected.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-6ad8f110-7388-4e03-ba03-55d1a99adac1-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_6.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"d515a9a5-3ca9-431e-87d7-bcbbb1418694\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bae1d8\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-f7e09b2c-5493-42e0-8632-3c3c5316495f\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_7-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_7-poster.jpeg\" title=\"Access to resources is allocated based on the user\u2019s needs.\" alt=\"Access to resources is allocated based on the user\u2019s needs.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-f7e09b2c-5493-42e0-8632-3c3c5316495f-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_7.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"3811601e-89ec-4deb-ad95-8b39d2da339e\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bae1d8\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-40fe92e2-a60d-4502-b8a1-b87cd3ee2ce2\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_8-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_8-poster.jpeg\" title=\"Authentications and access authorisations are constantly reassessed.\" alt=\"Authentications and access authorisations are constantly reassessed.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-40fe92e2-a60d-4502-b8a1-b87cd3ee2ce2-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_8.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"a5e26420-7d33-4094-9e85-75a78ee30a4b\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bde1d6\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-bf8c4337-1baf-4be3-a8a9-2f91b3e3df88\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_9-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_9-poster.jpeg\" title=\"Zero Trust ensures secure access to computing resources.\" alt=\"Zero Trust ensures secure access to computing resources.\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-bf8c4337-1baf-4be3-a8a9-2f91b3e3df88-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_9.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"b5c5e8fd-55a4-4b9a-8a0a-2f1ee4ce1dc6\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bbe3db\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-8f6dcc00-15ae-4f64-a7c1-3c436d3cfe68\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-video autoPlay=\"autoplay\" poster=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_10-poster.jpeg\" artwork=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_10-poster.jpeg\" layout=\"fill\" loop=\"loop\" noaudio=\"noaudio\" id=\"el-8f6dcc00-15ae-4f64-a7c1-3c436d3cfe68-media\"><source type=\"video\/mp4\" src=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_10.mp4\"\/><\/amp-video><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\"><\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>METADESCRIPTION<br \/>\nIn the face of increasing cyber threats, the Zero Trust approach aims to reduce the \u201cimplicit trust\u201d placed in users of a network.<\/p>\n","protected":false},"author":17,"featured_media":69948,"template":"","meta":{"_acf_changed":false,"web_stories_publisher_logo":32761,"web_stories_poster":[],"web_stories_products":[],"footnotes":""},"web_story_category":[],"web_story_tag":[],"class_list":["post-70015","web-story","type-web-story","status-publish","has-post-thumbnail","hentry","effect-performance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Zero Trust Architecture?<\/title>\n<meta name=\"description\" content=\"METADESCRIPTION\nIn the face of increasing cyber threats, the Zero Trust approach aims to reduce the \u201cimplicit trust\u201d placed in users of a network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Zero Trust Architecture?\" \/>\n<meta property=\"og:description\" content=\"METADESCRIPTION In the face of increasing cyber threats, the Zero Trust approach aims to reduce the \u201cimplicit trust\u201d placed in users of a network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"The Agility Effect\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/VINCIEnergies\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T07:41:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@VINCIEnergies\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\"},\"author\":{\"name\":\"Sybille Derb\u00e8s\",\"@id\":\"https:\/\/www.theagilityeffect.com\/#\/schema\/person\/9924401bd40d3108976b650151435026\"},\"headline\":\"What is Zero Trust Architecture?\",\"datePublished\":\"2023-09-12T17:49:54+00:00\",\"dateModified\":\"2023-09-21T07:41:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\"},\"wordCount\":10,\"publisher\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png\",\"keywords\":[\"Cloud\",\"Cybersecurity\",\"infrastructure\"],\"articleSection\":[\"ICT\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\",\"url\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\",\"name\":\"What is Zero Trust Architecture?\",\"isPartOf\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png\",\"datePublished\":\"2023-09-12T17:49:54+00:00\",\"dateModified\":\"2023-09-21T07:41:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage\",\"url\":\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png\",\"contentUrl\":\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png\",\"width\":640,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.theagilityeffect.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Zero Trust Architecture?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.theagilityeffect.com\/#website\",\"url\":\"https:\/\/www.theagilityeffect.com\/\",\"name\":\"The Agility Effect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.theagilityeffect.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.theagilityeffect.com\/#organization\",\"name\":\"VINCI Energie\",\"url\":\"https:\/\/www.theagilityeffect.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.theagilityeffect.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2021\/03\/vinci-energies-1.png\",\"contentUrl\":\"https:\/\/www.theagilityeffect.com\/app\/uploads\/2021\/03\/vinci-energies-1.png\",\"width\":441,\"height\":114,\"caption\":\"VINCI Energie\"},\"image\":{\"@id\":\"https:\/\/www.theagilityeffect.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/VINCIEnergies\",\"https:\/\/x.com\/VINCIEnergies\",\"https:\/\/www.linkedin.com\/company\/38236\/\",\"https:\/\/www.youtube.com\/user\/TheVINCIEnergies\",\"https:\/\/fr.wikipedia.org\/wiki\/Vinci_entreprise\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.theagilityeffect.com\/#\/schema\/person\/9924401bd40d3108976b650151435026\",\"name\":\"Sybille Derb\u00e8s\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.theagilityeffect.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8d81b5c4384f1341e9e8bc82ff6cdb7a0f0136737fe6347ce90487dd5e30e80f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8d81b5c4384f1341e9e8bc82ff6cdb7a0f0136737fe6347ce90487dd5e30e80f?s=96&d=mm&r=g\",\"caption\":\"Sybille Derb\u00e8s\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Zero Trust Architecture?","description":"METADESCRIPTION\nIn the face of increasing cyber threats, the Zero Trust approach aims to reduce the \u201cimplicit trust\u201d placed in users of a network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/","og_locale":"fr_FR","og_type":"article","og_title":"What is Zero Trust Architecture?","og_description":"METADESCRIPTION In the face of increasing cyber threats, the Zero Trust approach aims to reduce the \u201cimplicit trust\u201d placed in users of a network.","og_url":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/","og_site_name":"The Agility Effect","article_publisher":"https:\/\/www.facebook.com\/VINCIEnergies","article_modified_time":"2023-09-21T07:41:47+00:00","og_image":[{"width":640,"height":853,"url":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@VINCIEnergies","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#article","isPartOf":{"@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/"},"author":{"name":"Sybille Derb\u00e8s","@id":"https:\/\/www.theagilityeffect.com\/#\/schema\/person\/9924401bd40d3108976b650151435026"},"headline":"What is Zero Trust Architecture?","datePublished":"2023-09-12T17:49:54+00:00","dateModified":"2023-09-21T07:41:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/"},"wordCount":10,"publisher":{"@id":"https:\/\/www.theagilityeffect.com\/#organization"},"image":{"@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png","keywords":["Cloud","Cybersecurity","infrastructure"],"articleSection":["ICT"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/","url":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/","name":"What is Zero Trust Architecture?","isPartOf":{"@id":"https:\/\/www.theagilityeffect.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage"},"image":{"@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png","datePublished":"2023-09-12T17:49:54+00:00","dateModified":"2023-09-21T07:41:47+00:00","breadcrumb":{"@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#primaryimage","url":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png","contentUrl":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG.png","width":640,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.theagilityeffect.com\/en\/stories\/what-is-zero-trust-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.theagilityeffect.com\/fr\/"},{"@type":"ListItem","position":2,"name":"What is Zero Trust Architecture?"}]},{"@type":"WebSite","@id":"https:\/\/www.theagilityeffect.com\/#website","url":"https:\/\/www.theagilityeffect.com\/","name":"The Agility Effect","description":"","publisher":{"@id":"https:\/\/www.theagilityeffect.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.theagilityeffect.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.theagilityeffect.com\/#organization","name":"VINCI Energie","url":"https:\/\/www.theagilityeffect.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.theagilityeffect.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2021\/03\/vinci-energies-1.png","contentUrl":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2021\/03\/vinci-energies-1.png","width":441,"height":114,"caption":"VINCI Energie"},"image":{"@id":"https:\/\/www.theagilityeffect.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/VINCIEnergies","https:\/\/x.com\/VINCIEnergies","https:\/\/www.linkedin.com\/company\/38236\/","https:\/\/www.youtube.com\/user\/TheVINCIEnergies","https:\/\/fr.wikipedia.org\/wiki\/Vinci_entreprise"]},{"@type":"Person","@id":"https:\/\/www.theagilityeffect.com\/#\/schema\/person\/9924401bd40d3108976b650151435026","name":"Sybille Derb\u00e8s","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.theagilityeffect.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8d81b5c4384f1341e9e8bc82ff6cdb7a0f0136737fe6347ce90487dd5e30e80f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8d81b5c4384f1341e9e8bc82ff6cdb7a0f0136737fe6347ce90487dd5e30e80f?s=96&d=mm&r=g","caption":"Sybille Derb\u00e8s"}}]}},"lang":"en","translations":{"en":70015},"amp_enabled":false,"pll_sync_post":[],"story_data":{"version":47,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"b00e3f3f-2ed7-41a5-b3c2-17db8e7a690c","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bce3da","blurHash":"U7L6IYV@_Mozs.V@M|of?aae9Gj[DkkC.6ay","creationDate":"2023-09-12T17:43:27","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_1.mp4","id":70016,"alt":"FLASH_ZEROTRUST_EN_1080_1920_1","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_1-poster.jpeg","posterId":70086,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":null}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"603c96dd-8be9-494b-8235-1e4f09e48af2","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"890444c0-ced9-4cab-a896-26642e14ed78"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"8e8f13b0-2434-400e-9d74-19af47f3f61e","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bce2d9","blurHash":"U2LiS_ae.mozO[V@jEe.X.WCi_jYQRjstQbb","creationDate":"2023-09-12T17:43:34","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_2.mp4","id":70023,"alt":"FLASH_ZEROTRUST_EN_1080_1920_2","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_2-poster.jpeg","posterId":70095,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"Increased used of the Cloud, teleworking, etc. is multiplying computing vulnerabilities, and cyber threats along with them."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"a268f430-e7d9-4f89-a649-2960ddb8b8f2","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"bcc5d324-eb4e-46a3-a5df-9b8595f996f9"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"f37314fb-bf25-41d0-8cf3-ca722b31713a","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bbe3db","blurHash":"U0LiZCR6%#yC4TMe%zt7DOR6x]oztQayayj[","creationDate":"2023-09-12T17:43:39","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_3.mp4","id":70030,"alt":"FLASH_ZEROTRUST_EN_1080_1920_3","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_3-poster.jpeg","posterId":70094,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"Zero Trust is a network architecture concept that aims to strengthen access security."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"2db3db9f-81ba-43f4-9424-5168ec85a520","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c643d896-5149-431a-8a02-75eaf4b04594"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"c8499e0b-645b-4d49-a8c3-34da2b72d2c4","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bce2da","blurHash":"U2Lr-eaKX:t7?dRjxVozOXaLs+ofD4ayOaae","creationDate":"2023-09-12T17:43:46","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_4.mp4","id":70037,"alt":"FLASH_ZEROTRUST_EN_1080_1920_4","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_4-poster.jpeg","posterId":70092,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"The network is assumed to be hostile. Implicit trust in users is removed."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"c9d1f6c9-9b8d-4935-bd03-6d7d3ca48a96","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c21fb3c2-1131-4645-a224-516309c7d962"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"6a0d3899-fef2-4718-b371-55d2c011ea93","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bce3db","blurHash":"U6LPBRbc.Sr=?wjER6S$?uW?Mxnh00n$%gbI","creationDate":"2023-09-12T17:43:52","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_5.mp4","id":70044,"alt":"FLASH_ZEROTRUST_EN_1080_1920_5","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_5-poster.jpeg","posterId":70093,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"Every access request is verified against an access policy."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"4c6bb032-ced9-45dc-8c63-739b1790e7a9","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"2e8458e7-e8eb-4bf6-9dad-a1fff557c1ff"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"6ad8f110-7388-4e03-ba03-55d1a99adac1","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bce3db","blurHash":"U1LY.UV@%zoz?]V@tRj[yCV@ofayDPkBaxj[","creationDate":"2023-09-12T17:43:58","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_6.mp4","id":70051,"alt":"FLASH_ZEROTRUST_EN_1080_1920_6","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_6-poster.jpeg","posterId":70090,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"There is no longer general access to resources on the company network once a user is connected."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"784742c1-a94e-48eb-84fe-7714eb3f455a","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"89f8c103-2f66-4938-b6af-9e7d8e14ef89"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"f7e09b2c-5493-42e0-8632-3c3c5316495f","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bae1d8","blurHash":"U9K{kaof.Roz.lfQMxay.RfkR6ay4TayyCj[","creationDate":"2023-09-12T17:44:04","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_7.mp4","id":70058,"alt":"FLASH_ZEROTRUST_EN_1080_1920_7","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_7-poster.jpeg","posterId":70091,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"Access to resources is allocated based on the user\u2019s needs."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"d515a9a5-3ca9-431e-87d7-bcbbb1418694","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"dc179692-39f6-4d32-89e6-311240695441"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"40fe92e2-a60d-4502-b8a1-b87cd3ee2ce2","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bae1d8","blurHash":"U5L6CHWC.ls.?^WBR5kC?^aeMdbb00bHyDjY","creationDate":"2023-09-12T17:44:12","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_8.mp4","id":70065,"alt":"FLASH_ZEROTRUST_EN_1080_1920_8","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_8-poster.jpeg","posterId":70089,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"Authentications and access authorisations are constantly reassessed."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"3811601e-89ec-4deb-ad95-8b39d2da339e","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"dc4c743b-180e-44a8-a485-eecd58a49a0e"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"bf8c4337-1baf-4be3-a8a9-2f91b3e3df88","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bde1d6","blurHash":"UBLP8FozYRofuPfin3jsp{fkm+f6L#j?Tfaz","creationDate":"2023-09-12T17:44:19","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_9.mp4","id":70072,"alt":"FLASH_ZEROTRUST_EN_1080_1920_9","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_9-poster.jpeg","posterId":70088,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":"Zero Trust ensures secure access to computing resources."}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"a5e26420-7d33-4094-9e85-75a78ee30a4b","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"a972b92e-347e-469d-ac3b-2d452c4939d3"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle"},"isBackground":true,"type":"video","id":"8f6dcc00-15ae-4f64-a7c1-3c436d3cfe68","scale":100,"focalX":50,"focalY":50,"resource":{"type":"video","mimeType":"video\/mp4","width":1080,"height":1920,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bbe3db","blurHash":"U2LiZCx].Rx]jGfkozay?]j[H?af%}ayR6j[","creationDate":"2023-09-12T17:44:25","src":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_10.mp4","id":70079,"alt":"FLASH_ZEROTRUST_EN_1080_1920_10","local":false,"poster":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_EN_1080_1920_10-poster.jpeg","posterId":70087,"isOptimized":false,"length":7,"lengthFormatted":"0:07","isMuted":true,"trimData":{"original":0},"provider":"local"},"tracks":[],"loop":true,"alt":null}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"b5c5e8fd-55a4-4b9a-8a0a-2f1ee4ce1dc6","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"827bd576-755a-48d5-8337-7fbcee1e4d3a"},"animations":[]}],"fonts":[],"autoAdvance":true,"defaultPageDuration":7,"currentStoryStyles":{"colors":[]}},"story_poster":{"id":69948,"url":"https:\/\/www.theagilityeffect.com\/app\/uploads\/2023\/09\/FLASH_ZEROTRUST_PNG-640x853.png","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/web-story\/70015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/www.theagilityeffect.com\/agi-api\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/users\/17"}],"version-history":[{"count":10,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/web-story\/70015\/revisions"}],"predecessor-version":[{"id":71383,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/web-story\/70015\/revisions\/71383"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/media\/69948"}],"wp:attachment":[{"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/media?parent=70015"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/web_story_category?post=70015"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/web_story_tag?post=70015"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/web-story\/70015\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/www.theagilityeffect.com\/agi-api\/web-stories\/v1\/media\/32761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}