The design of secure architectures of information systems has evolved considerably over the past few decades, keeping pace with ever-increasing interconnection needs and ever more dangerous threats to the business continuity of public and private entities. This article, co-authored by five agents of the National Information Systems Security Agency and originally published in the journal Techniques de l'ingénieur, looks at new defense concepts such as the Zero Trust Network and how they articulate with historical models of protection of information systems such as defense in depth.

While these new defense concepts can sometimes claim to replace historical models, they revisit proven security principles (principle of least privilege) by placing them in new contexts (hybrid IS) and complement a robust in-depth defense of the IS. New technical means made available to these entities (cloud, automation of infrastructure deployments, increased detection capabilities, etc.) as well as the evolution of regulatory requirements in terms of cybersecurity, accompany this change and are the response to increasingly sophisticated attacks from an increasingly complex ecosystem.

Our thanks to the