{"id":1775,"date":"2021-07-23T19:12:21","date_gmt":"2021-07-23T22:12:21","guid":{"rendered":"https:\/\/tecnologia5.com\/blog\/?p=1775"},"modified":"2021-07-23T19:12:22","modified_gmt":"2021-07-23T22:12:22","slug":"zero-trust","status":"publish","type":"post","link":"https:\/\/tec5.tech\/blog\/zero-trust\/","title":{"rendered":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad?"},"content":{"rendered":"\n<p>La nueva virtualidad y la necesidad de las compa\u00f1\u00edas de estar cada d\u00eda m\u00e1s conectados han hecho que el Zero Trust entre en vigencia<\/p>\n\n\n\n<p>El modelo de confianza cero o Zero Trust tiene un diferencial concreto para la seguridad ya que abandona el concepto de confianza impl\u00edcita, la ubicaci\u00f3n de la red o la direcci\u00f3n IP ya no implican confianza, y en su lugar establece una postura inicial de denegaci\u00f3n predeterminada para todos y para todo.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u00bfQu\u00e9 necesita una compa\u00f1\u00eda para implementar un modelo Zero Trust?<\/h4>\n\n\n\n<p>1. Visibilidad: Es necesario identificar los dispositivos y bienes que deben ser protegidos y monitorearlos. Es indispensable tener visibilidad de todos los recursos que pertenecen a la organizaci\u00f3n o que tienen acceso a la misma.<\/p>\n\n\n\n<p>2. Pol\u00edticas: Se debe implementar controles que permitan que solamente personas espec\u00edficas tengan acceso a entidades espec\u00edficas en condiciones espec\u00edficas. Es decir que se requieren controles minuciosos.<\/p>\n\n\n\n<p>3. Automatizaci\u00f3n: La automatizaci\u00f3n de procesos asegura la correcta aplicaci\u00f3n de las pol\u00edticas y permite la r\u00e1pida aplicaci\u00f3n de medidas frente a posibles desv\u00edos.<\/p>\n\n\n\n<p><a href=\"https:\/\/tecnologia5.com\/home\">En Tecnolog\u00eda 5<\/a> dise\u00f1amos estrategias de seguridad integrales para que nuestros clientes pueda mantener su capacidad de trabajo remoto en un entorno seguro y controlado las 24 hs.<\/p>\n\n\n\n<p>Te invitamos a una meeting para dise\u00f1ar juntos tus escudos de seguridad.<strong><br><\/strong><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La nueva virtualidad y la necesidad de las compa\u00f1\u00edas de estar cada d\u00eda m\u00e1s conectados han hecho que el Zero Trust entre en vigencia El modelo de confianza cero o Zero Trust tiene un diferencial concreto para la seguridad ya que abandona el concepto de confianza impl\u00edcita, la ubicaci\u00f3n de la red o la direcci\u00f3n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1776,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-notas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? - Tec5.Tech<\/title>\n<meta name=\"description\" content=\"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? \u00bfEst\u00e1 lista tu compa\u00f1\u00eda para trabajar bajo los nuevos parametros de seguridad?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tec5.tech\/blog\/zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? - Tec5.Tech\" \/>\n<meta property=\"og:description\" content=\"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? \u00bfEst\u00e1 lista tu compa\u00f1\u00eda para trabajar bajo los nuevos parametros de seguridad?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tec5.tech\/blog\/zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Tec5.Tech\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-23T22:12:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-23T22:12:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1318\" \/>\n\t<meta property=\"og:image:height\" content=\"494\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/72221fa42afb32d8dcdacf7b2cfb39ce\"},\"headline\":\"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad?\",\"datePublished\":\"2021-07-23T22:12:21+00:00\",\"dateModified\":\"2021-07-23T22:12:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/\"},\"wordCount\":238,\"publisher\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg\",\"articleSection\":[\"Notas de Inter\u00e9s\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/\",\"url\":\"https:\/\/tec5.tech\/blog\/zero-trust\/\",\"name\":\"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? - Tec5.Tech\",\"isPartOf\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg\",\"datePublished\":\"2021-07-23T22:12:21+00:00\",\"dateModified\":\"2021-07-23T22:12:22+00:00\",\"description\":\"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? \u00bfEst\u00e1 lista tu compa\u00f1\u00eda para trabajar bajo los nuevos parametros de seguridad?\",\"breadcrumb\":{\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tec5.tech\/blog\/zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage\",\"url\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg\",\"contentUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg\",\"width\":1318,\"height\":494,\"caption\":\"Zero TRUST\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tec5.tech\/blog\/zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/tec5.tech\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tec5.tech\/blog\/#website\",\"url\":\"https:\/\/tec5.tech\/blog\/\",\"name\":\"Tec5.Tech\",\"description\":\"Actualidad y Tecnolog\u00eda\",\"publisher\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tec5.tech\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\",\"name\":\"Tec5.Tech\",\"url\":\"https:\/\/tec5.tech\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg\",\"contentUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg\",\"width\":1200,\"height\":300,\"caption\":\"Tec5.Tech\"},\"image\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/72221fa42afb32d8dcdacf7b2cfb39ce\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1f8fcacb32fa8168eb570b085c9040281086f277a47c46596c0cd8e4af108398?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1f8fcacb32fa8168eb570b085c9040281086f277a47c46596c0cd8e4af108398?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/tec5.tech\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? - Tec5.Tech","description":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? \u00bfEst\u00e1 lista tu compa\u00f1\u00eda para trabajar bajo los nuevos parametros de seguridad?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tec5.tech\/blog\/zero-trust\/","og_locale":"es_ES","og_type":"article","og_title":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? - Tec5.Tech","og_description":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? \u00bfEst\u00e1 lista tu compa\u00f1\u00eda para trabajar bajo los nuevos parametros de seguridad?","og_url":"https:\/\/tec5.tech\/blog\/zero-trust\/","og_site_name":"Tec5.Tech","article_published_time":"2021-07-23T22:12:21+00:00","article_modified_time":"2021-07-23T22:12:22+00:00","og_image":[{"width":1318,"height":494,"url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tec5.tech\/blog\/zero-trust\/#article","isPartOf":{"@id":"https:\/\/tec5.tech\/blog\/zero-trust\/"},"author":{"name":"admin","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/72221fa42afb32d8dcdacf7b2cfb39ce"},"headline":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad?","datePublished":"2021-07-23T22:12:21+00:00","dateModified":"2021-07-23T22:12:22+00:00","mainEntityOfPage":{"@id":"https:\/\/tec5.tech\/blog\/zero-trust\/"},"wordCount":238,"publisher":{"@id":"https:\/\/tec5.tech\/blog\/#organization"},"image":{"@id":"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg","articleSection":["Notas de Inter\u00e9s"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/tec5.tech\/blog\/zero-trust\/","url":"https:\/\/tec5.tech\/blog\/zero-trust\/","name":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? - Tec5.Tech","isPartOf":{"@id":"https:\/\/tec5.tech\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg","datePublished":"2021-07-23T22:12:21+00:00","dateModified":"2021-07-23T22:12:22+00:00","description":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad? \u00bfEst\u00e1 lista tu compa\u00f1\u00eda para trabajar bajo los nuevos parametros de seguridad?","breadcrumb":{"@id":"https:\/\/tec5.tech\/blog\/zero-trust\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tec5.tech\/blog\/zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/zero-trust\/#primaryimage","url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg","contentUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg","width":1318,"height":494,"caption":"Zero TRUST"},{"@type":"BreadcrumbList","@id":"https:\/\/tec5.tech\/blog\/zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/tec5.tech\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero Trust, \u00bfQu\u00e9 es este modelo de seguridad?"}]},{"@type":"WebSite","@id":"https:\/\/tec5.tech\/blog\/#website","url":"https:\/\/tec5.tech\/blog\/","name":"Tec5.Tech","description":"Actualidad y Tecnolog\u00eda","publisher":{"@id":"https:\/\/tec5.tech\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tec5.tech\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/tec5.tech\/blog\/#organization","name":"Tec5.Tech","url":"https:\/\/tec5.tech\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg","contentUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg","width":1200,"height":300,"caption":"Tec5.Tech"},"image":{"@id":"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/72221fa42afb32d8dcdacf7b2cfb39ce","name":"admin","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1f8fcacb32fa8168eb570b085c9040281086f277a47c46596c0cd8e4af108398?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f8fcacb32fa8168eb570b085c9040281086f277a47c46596c0cd8e4af108398?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/tec5.tech\/blog\/author\/admin\/"}]}},"featured_image_url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/07\/Zero-TRUST.jpg","_links":{"self":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/comments?post=1775"}],"version-history":[{"count":1,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1775\/revisions"}],"predecessor-version":[{"id":1777,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1775\/revisions\/1777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/media\/1776"}],"wp:attachment":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/media?parent=1775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/categories?post=1775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/tags?post=1775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}