{"id":2690,"date":"2023-12-19T14:39:42","date_gmt":"2023-12-19T13:39:42","guid":{"rendered":"https:\/\/www.spacesecurity.info\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/"},"modified":"2023-12-19T14:39:42","modified_gmt":"2023-12-19T13:39:42","slug":"reaching-for-the-stars-with-zero-trust-space-domain-applications","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/","title":{"rendered":"Reaching for the Stars with Zero Trust: Space Domain Applications"},"content":{"rendered":"<p>In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and why ?<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2687\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-1024x570.jpg\" alt=\"\" width=\"696\" height=\"387\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-1024x570.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-300x167.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-768x428.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-1536x855.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-696x388.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-1068x595.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-1920x1069.jpg 1920w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain.jpg 1979w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<h2>What is Zero Trust Architecture (ZTA)<\/h2>\n<p>The Zero Trust security model, coined by analyst firm Forrester Research, is a holistic approach to network security that mandates no user or machine should be implicitly trusted, either outside or inside of the network. The concept has evolved as a way to minimize cyber threats and data breaches by not granting automatic trust based on network location.<\/p>\n<p><strong>Understanding Zero Trust Principle and Architecture:<\/strong><\/p>\n<p>Zero Trust operates on the concept &#8220;Never Trust, Always Verify&#8221;. At its core, it&#8217;s designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and including simplified granular user-access control.<\/p>\n<p>In a Zero Trust architecture, security isn\u2019t treated as a one-size-fits-all model. It aims to eliminate uncontrolled access to resources by assuming that a user, system, or device is potentially compromised, regardless of if they are inside or outside of the security perimeter.<\/p>\n<p>Implementing Zero Trust includes but not limited to: Identify Sensitive Data, Micro-segmentation, Multi-factor Authentication (MFA), Real-time Monitoring and Analytics, User Access Control<\/p>\n<p><strong>Application &amp; Scope:<\/strong><\/p>\n<p>Zero Trust can be applied to any IT environment, from on-premises data centers to public clouds, and from network to endpoints. This approach is highly effective in protecting users and data in today\u2019s perimeter-less workplaces, where employees, contractors, and partners need to access applications from various locations, networks, and devices.<\/p>\n<p><strong>Importance &amp; Future of Zero Trust:<\/strong><\/p>\n<p>The increasing complexity and fluidity of modern IT environments make traditional perimeter-based security models obsolete. Evolving security threats, remote workforce, digital transformations, cloud adoptions, and complex supply chains led to an increase in the number of digital touch-points that can serve as entry points for sophisticated cyberattacks.<\/p>\n<p>Zero Trust&#8217;s focus on securing every access point draws a promising future for IT security. It emphasizes understanding the behavior of network users and devices, thereby enabling early detection and mitigation of potential threats. It offers greater visibility into network activities, lowers the risks of security breaches, and improves compliance by implementing granular data control.<\/p>\n<p>From organizations looking to secure their remote workforces to businesses wanting to lock down their supply chains, Zero Trust is poised to become the new normal for cybersecurity. As entities come to grips with a &#8216;trust no one&#8217; model, they will be better positioned to tackle the cybersecurity threats of the future.<\/p>\n<h2>Does Zero Trust apply to the space domain?<\/h2>\n<p>In theory, the Zero Trust model could feasibly be applied to the space domain. The fundamental principles of identity verification, least privilege access and real-time monitoring that define Zero Trust are universally important for any operational technology, including space missions or satellites.<\/p>\n<p>Security in the space domain is critically important. Satellites and other space technology manage a wide range of sensitive data and information, from global positioning data to confidential national security information.<\/p>\n<h2>Why Apply Zero Trust in the Space Domain?<\/h2>\n<p><strong>Protecting Sensitive Information<\/strong>: Considering the increasing cost and strategic importance of space systems, as well as the sensitivity of the data they handle, implementing a robust security posture like the Zero Trust model is crucial.<\/p>\n<p><strong>Remote Accessibility<\/strong>: Like many other systems in the digital age, space platforms are remotely accessed. Zero Trust principles don\u2019t inherently trust any request for access, making it harder for an unauthorized user or a potential hostile actor to gain control.<\/p>\n<p><strong>Increased Cyber Threats<\/strong>: As technology advances, so does the sophistication of cyber threats. Applying Zero Trust principles can help protect against potential cyberattacks targeting space assets.<\/p>\n<h2>Implementing Zero Trust in Space Domain<\/h2>\n<p>For implementing Zero Trust in the space domain, we need to consider several elements:<\/p>\n<p><strong>Authentication<\/strong>: Implement stringent verification measures to corroborate the identities of all users and devices that interact with the system.<\/p>\n<p><strong>Encryption<\/strong>: As data travels from Earth to space and back again, it needs to be encrypted to protect against interception.<\/p>\n<p><strong>Monitoring &amp; Analytics<\/strong>: It\u2019s crucial to monitor network behavior and traffic patterns continuously. Anomalies or irregularities can indicate potential threats that require immediate attention.<\/p>\n<p><strong>Limited trust<\/strong>: Only provide access to systems and data that are absolutely necessary for each user or device.<\/p>\n<h2>What are the challenges applying Zero Trust in the Space Domain?<\/h2>\n<p>An interesting challenge here is the vast distance of space and the latency it imposes on operations. The implementation of Zero Trust will have to consider the time delay for authentications as well as a secure and efficient key exchange mechanism for encryption.<\/p>\n<p>Thus, applying the principles of Zero Trust in the space domain offers an exciting opportunity in providing secure and reliable communications. While it presents its unique challenges, given the importance of assets in the space domain, the need for enhanced security measures is undeniable, and a Zero Trust model may be the best way forward.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and why ? What is Zero Trust Architecture (ZTA) The Zero Trust security model, coined by analyst firm Forrester Research, is a holistic approach to network security that mandates no user or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2688,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,39,22,23,28],"tags":[],"class_list":{"0":"post-2690","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-defense-en","9":"category-hacking-en","10":"category-launcher","11":"category-satellite-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Reaching for the Stars with Zero Trust: Space Domain Applications - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reaching for the Stars with Zero Trust: Space Domain Applications - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and why ? What is Zero Trust Architecture (ZTA) The Zero Trust security model, coined by analyst firm Forrester Research, is a holistic approach to network security that mandates no user or [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-19T13:39:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-1024x570.jpg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"Reaching for the Stars with Zero Trust: Space Domain Applications\",\"datePublished\":\"2023-12-19T13:39:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/\"},\"wordCount\":826,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Applying-Zero-Trust-in-Space-Domain.jpg\",\"articleSection\":[\"Cyber\",\"D\u00e9fense\",\"Hacking\",\"Launcher\",\"Satellite\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/\",\"name\":\"Reaching for the Stars with Zero Trust: Space Domain Applications - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Applying-Zero-Trust-in-Space-Domain.jpg\",\"datePublished\":\"2023-12-19T13:39:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Applying-Zero-Trust-in-Space-Domain.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Applying-Zero-Trust-in-Space-Domain.jpg\",\"width\":1979,\"height\":1102},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/reaching-for-the-stars-with-zero-trust-space-domain-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reaching for the Stars with Zero Trust: Space Domain Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reaching for the Stars with Zero Trust: Space Domain Applications - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/","og_locale":"en_US","og_type":"article","og_title":"Reaching for the Stars with Zero Trust: Space Domain Applications - Space &amp; Cybersecurity Info","og_description":"In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and why ? What is Zero Trust Architecture (ZTA) The Zero Trust security model, coined by analyst firm Forrester Research, is a holistic approach to network security that mandates no user or [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2023-12-19T13:39:42+00:00","og_image":[{"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain-1024x570.jpg","type":"","width":"","height":""}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"Reaching for the Stars with Zero Trust: Space Domain Applications","datePublished":"2023-12-19T13:39:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/"},"wordCount":826,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain.jpg","articleSection":["Cyber","D\u00e9fense","Hacking","Launcher","Satellite"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/","url":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/","name":"Reaching for the Stars with Zero Trust: Space Domain Applications - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain.jpg","datePublished":"2023-12-19T13:39:42+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/12\/Applying-Zero-Trust-in-Space-Domain.jpg","width":1979,"height":1102},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/reaching-for-the-stars-with-zero-trust-space-domain-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"Reaching for the Stars with Zero Trust: Space Domain Applications"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2690"}],"version-history":[{"count":0,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2690\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2688"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}