{"id":7227,"date":"2021-07-27T16:00:29","date_gmt":"2021-07-27T19:00:29","guid":{"rendered":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/?p=7227"},"modified":"2021-07-27T16:00:29","modified_gmt":"2021-07-27T19:00:29","slug":"por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/","title":{"rendered":"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia"},"content":{"rendered":"<p><span data-contrast=\"none\"><img loading=\"lazy\" decoding=\"async\" class=\"attachment-full size-full webp-format\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2.png\" alt=\"Duas pessoas olhando para um dispositivo dentro de um escrit\u00f3rio\" width=\"1024\" height=\"300\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2.png 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2-300x88.png 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2-768x225.png 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2-330x97.png 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2-800x234.png 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2-400x117.png 400w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_1024x300_2.png\" \/><\/span><\/p>\n<p><span data-contrast=\"none\">Em julho de 2019, Kurt\u00a0DelBene, Milo\u00a0Medin\u00a0e Richard Murray escreveram<\/span><span data-contrast=\"auto\">\u00a0<\/span><i><span data-contrast=\"none\">The Road to Zero Trust (Security)<\/span><\/i><i><span data-contrast=\"none\">\u00a0para o Conselho de Inova\u00e7\u00e3o em Defesa.<\/span><\/i><span data-contrast=\"none\">\u202fNela, afirmavam:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u201c\u2026a\u00a0ciberseguran\u00e7a\u00a0est\u00e1 em um momento cr\u00edtico. Suas redes est\u00e3o crescendo em tamanho e complexidade, exigindo enormes quantidades de transfer\u00eancia r\u00e1pida de dados para manter a consci\u00eancia situacional no campo de batalha digital e f\u00edsico. Esta expans\u00e3o est\u00e1 a esticar os aparelhos de\u00a0ciberseguran\u00e7a\u00a0existentes at\u00e9 chegar a um ponto de ruptura, \u00e0 medida que um n\u00famero cada vez maior de utilizadores e terminais aumenta a superf\u00edcie de ataque da rede. \u201d<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Poucos meses depois, a pandemia do coronav\u00edrus acelerou o inevit\u00e1vel a um ritmo imprevisto, for\u00e7ando as organiza\u00e7\u00f5es a estender seus per\u00edmetros a casas com &#8220;internet suja&#8221; e computadores compartilhados. Acrescente a isso a complexidade dos maus atores do estado-na\u00e7\u00e3o, o crescimento da computa\u00e7\u00e3o de borda do submarino para a \u00f3rbita\u00a0geoss\u00edncrona, o uso de IA e outras tecnologias, e\u202f<\/span><b><span data-contrast=\"none\">\u00e9 evidente que<\/span><\/b><span data-contrast=\"none\">\u202f<\/span><b><span data-contrast=\"none\">deve haver uma mudan\u00e7a revolucion\u00e1ria na ciberseguran\u00e7a \u2013 <a href=\"https:\/\/www.microsoft.com\/pt-br\/security\/business\/zero-trust?rtc=1\" target=\"_blank\" rel=\"noopener\">clique aqui e\u202f<\/a><\/span><\/b><a href=\"https:\/\/www.microsoft.com\/pt-br\/security\/business\/zero-trust?rtc=1\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">entre no Zero Trust<\/span><\/b><b><span data-contrast=\"none\">.<\/span><\/b><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Toda conversa de seguran\u00e7a moderna eventualmente chega ao termo \u201cZero Trust&#8221;. Em nenhum lugar isso \u00e9 mais verdadeiro do que dentro das ag\u00eancias de defesa e intelig\u00eancia. Aqui, a\u00a0ciberseguran\u00e7a\u00a0\u00e9 a base de todas as conversas sobre capacidade de miss\u00e3o, independentemente do ramo de servi\u00e7o ou na\u00e7\u00e3o.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Nossas conversas com l\u00edderes militares, pessoal, civis e parceiros de miss\u00e3o s\u00e3o impulsionadas pela cria\u00e7\u00e3o de uma verdadeira cultura de\u00a0Zero Trust. Como\u00a0Vasu\u00a0Jakkal, CVP da Microsoft para Seguran\u00e7a, Conformidade e Identidade escreveu\u202f<\/span><span data-contrast=\"none\">em seu blog<\/span><span data-contrast=\"none\">, Zero Trust \u00e9 a base para a resili\u00eancia organizacional e o futuro da seguran\u00e7a. Como observa\u00a0Jakkal, a Microsoft tem duas superpot\u00eancias de seguran\u00e7a &#8211; uma abordagem integrada e nossa incr\u00edvel IA e automa\u00e7\u00e3o que cria uma estrutura de seguran\u00e7a \u00fanica na ind\u00fastria. Abordamos a seguran\u00e7a de todos os \u00e2ngulos, tanto de dentro para fora quanto de fora para dentro.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Vamos nos aprofundar no que,\u00a0porque\u00a0e como da\u00a0Zero Trust\u00a0e o que isso significa para nossos clientes de defesa e intelig\u00eancia.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">O que \u00e9 Zero Trust<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:180,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">O Instituto Nacional de Padr\u00f5es e Tecnologia (NIST) define\u00a0Zero Trust\u00a0como o seguinte:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Um conjunto evolutivo de paradigmas de seguran\u00e7a cibern\u00e9tica que movem as defesas de rede de per\u00edmetros est\u00e1ticos baseados em rede para se concentrar em usu\u00e1rios, ativos e recursos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Com base no pressuposto de que n\u00e3o existe confian\u00e7a impl\u00edcita concedida a ativos ou contas de utilizador exclusivamente com base na sua localiza\u00e7\u00e3o f\u00edsica ou de rede.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Uma resposta \u00e0s tend\u00eancias de rede corporativa que incluem usu\u00e1rios remotos e ativos baseados na nuvem que n\u00e3o est\u00e3o localizados dentro de um limite de rede de propriedade da empresa. A\u00a0Zero Trust\u00a0se concentra em proteger os recursos, n\u00e3o os segmentos de rede, pois a localiza\u00e7\u00e3o da rede n\u00e3o \u00e9 mais vista como o principal componente para a postura de seguran\u00e7a do recurso.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">O uso de uma rede espec\u00edfica n\u00e3o pode mais ser a porta para conceder acesso a todos os sistemas, ativos ou recursos de dados. Uma abordagem moderna da\u00a0ciberseguran\u00e7a\u00a0aproveita esses Princ\u00edpios de\u00a0Zero Trust\u00a0para permitir o acesso condicional.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Esta abordagem inclui:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Verifica\u00e7\u00e3o expl\u00edcita<\/span><\/b><span data-contrast=\"none\">.\u00a0Sempre\u00a0autentica\u00a0e autoriza com base em todos os pontos de dados dispon\u00edveis, incluindo identidade do usu\u00e1rio, localiza\u00e7\u00e3o, integridade do dispositivo, classifica\u00e7\u00e3o de dados e anomalias.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Utilize acesso menos privilegiado.<\/span><\/b><span data-contrast=\"none\">\u202fIsto significa que pol\u00edticas din\u00e2micas e baseadas no risco permitir\u00e3o um acesso suficiente pelo tempo limitado necess\u00e1rio para equilibrar a seguran\u00e7a e a produtividade com base nas necessidades da pessoa que solicita o acesso.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Presuma viola\u00e7\u00f5es.\u202f<\/span><\/b><span data-contrast=\"none\">Isso minimiza o escopo dos danos de viola\u00e7\u00e3o e impede o movimento lateral segmentando o acesso por rede, usu\u00e1rio, dispositivos e aplicativos e aproveita a visibilidade aumentada para conduzir melhores an\u00e1lises de detec\u00e7\u00e3o de amea\u00e7as.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"none\">Por que as ag\u00eancias de defesa e intelig\u00eancia devem se preocupar<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:180,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">As ag\u00eancias de defesa e intelig\u00eancia de hoje precisam de um modelo de seguran\u00e7a que se adapte de forma mais eficaz ao complexo ambiente moderno, abrace a for\u00e7a de trabalho m\u00f3vel e proteja pessoas, dispositivos, aplicativos e dados onde quer que estejam localizados.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Ao implementar uma estrutura de\u00a0Zero Trust, a sua ag\u00eancia pode:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Melhorar a visibilidade da empresa<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Reduzir os custos de TI<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Fornecer prote\u00e7\u00e3o de dados superior e detec\u00e7\u00e3o de\u00a0exfiltra\u00e7\u00e3o<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Reduzir as cargas de trabalho de seguran\u00e7a<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Proporcionar uma experi\u00eancia de usu\u00e1rios superior<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Empregar em conjunto com ou em prepara\u00e7\u00e3o para a migra\u00e7\u00e3o na nuvem<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"none\">Como a Microsoft pode ajudar voc\u00ea<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:180,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Na Microsoft, reconhecemos que a maioria das organiza\u00e7\u00f5es do setor de defesa embarcou em uma jornada de\u00a0Zero Trust. A Microsoft entende o que \u00e9 preciso para avaliar onde voc\u00ea est\u00e1 em sua jornada e acelerar um modelo de seguran\u00e7a de\u00a0Zero Trust, como fizemos em nossa pr\u00f3pria empresa para proteger dados corporativos e de clientes. Nossa implementa\u00e7\u00e3o faseada do Zero Trust se concentra na forte identidade do usu\u00e1rio, na verifica\u00e7\u00e3o da integridade do dispositivo, na valida\u00e7\u00e3o da integridade do aplicativo e no acesso seguro e menos privilegiado aos recursos e servi\u00e7os corporativos.\u202f<\/span><span data-contrast=\"none\">Compartilhamos nossos aprendizados e nossa abordagem com nossos clientes<\/span><span data-contrast=\"none\">, e nossa experi\u00eancia interna nos forneceu insights e produtos exclusivos sobre como\u00a0podemos ajudar nossos clientes a implementar as mesmas estruturas de\u00a0Zero Trust.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Elas incluem:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Microsoft Azure Active\u00a0Directory\u00a0(Premium 2)\u200b<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:180,&quot;335559739&quot;:180,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Azure ATP\u200b<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Acesso condicional<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Prote\u00e7\u00e3o de identidade<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Prote\u00e7\u00e3o de informa\u00e7\u00f5es\/DLP<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Proxy de Aplica\u00e7\u00e3o para Cargas de Trabalho H\u00edbridas<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"none\">Microsoft 365\u200b<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:180,&quot;335559739&quot;:180,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Defensor ATP<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Intune<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Acesso Condicional O365 c\/DLP<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Windows Hello for Business (WHfB)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"none\">Microsoft Consulting Services<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:180,&quot;335559739&quot;:180,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Zero Trust Security<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Cloud Security Planning<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Modern\u00a0Work\u00a0Security<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Enterprise\u00a0Cybersecurity\u00a0Advisory\u00a0Services<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Azure Security\u00a0Modernization<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.microsoft.com\/pt-br\/industry\/government\/defense-and-intelligence?rtc=1#:~:text=Microsoft%20helps%20defense%20and%20intelligence%20agencies%20advance%20their,all%20powered%20by%20our%20extensive%20global%20partner%20ecosystem.\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Obtenha mais informa\u00e7\u00f5es sobre o trabalho da Microsoft com\u202f<\/span><span data-contrast=\"none\">ag\u00eancias de defesa e intelig\u00eancia aqui<\/span><\/a><span data-contrast=\"none\">.\u202fPara uma cobertura mais aprofundada sobre os nossos pilares de\u00a0Zero Trust\u00a0e como podemos ajudar, <a href=\"https:\/\/www.microsoft.com\/pt-br\/security\/business\/zero-trust?rtc=1\" target=\"_blank\" rel=\"noopener\">visite o\u00a0nosso\u00a0<\/a><\/span><a href=\"https:\/\/www.microsoft.com\/pt-br\/security\/business\/zero-trust?rtc=1\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">site de Zero Trust aqui<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/a><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Em julho de 2019, Kurt\u00a0DelBene, Milo\u00a0Medin\u00a0e Richard Murray escreveram\u00a0The Road to Zero Trust (Security)\u00a0para o Conselho de Inova\u00e7\u00e3o em Defesa.\u202fNela, afirmavam:\u00a0<\/p>\n<p>\u201c\u2026a\u00a0ciberseguran\u00e7a\u00a0est\u00e1 em um momento cr\u00edtico. Suas redes est\u00e3o crescendo em tamanho e complexidade, exigindo enormes quantidades de transfer\u00eancia r\u00e1pida de dados para manter a consci\u00eancia situacional no campo de batalha digital e f\u00edsico.<\/p>\n","protected":false},"author":671,"featured_media":7233,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[253],"post_tag":[222,133],"content-type":[],"coauthors":[411,369],"class_list":["post-7227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","tag-acesso","tag-cibersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia - Blogs de ind\u00fastria da Microsoft<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia - Blogs de ind\u00fastria da Microsoft\" \/>\n<meta property=\"og:description\" content=\"Em julho de 2019, Kurt\u00a0DelBene, Milo\u00a0Medin\u00a0e Richard Murray escreveram\u00a0The Road to Zero Trust (Security)\u00a0para o Conselho de Inova\u00e7\u00e3o em Defesa.\u202fNela, afirmavam:\u00a0  \u201c\u2026a\u00a0ciberseguran\u00e7a\u00a0est\u00e1 em um momento cr\u00edtico. Suas redes est\u00e3o crescendo em tamanho e complexidade, exigindo enormes quantidades de transfer\u00eancia r\u00e1pida de dados para manter a consci\u00eancia situacional no campo de batalha digital e f\u00edsico.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs de ind\u00fastria da Microsoft\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-27T19:00:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mitchel Hudson, Mia Reyes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mitchel Hudson, Mia Reyes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/\"},\"author\":[{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/author\\\/mitchel-hudson\\\/\",\"@type\":\"Person\",\"@name\":\"Mitchel Hudson\"},{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/author\\\/mia-reyes\\\/\",\"@type\":\"Person\",\"@name\":\"Mia Reyes\"}],\"headline\":\"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia\",\"datePublished\":\"2021-07-27T19:00:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/\"},\"wordCount\":1090,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2021\\\/07\\\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png\",\"keywords\":[\"Acesso\",\"Cibersecurity\"],\"articleSection\":[\"Governo\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/\",\"name\":\"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia - Blogs de ind\u00fastria da Microsoft\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2021\\\/07\\\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png\",\"datePublished\":\"2021-07-27T19:00:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2021\\\/07\\\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2021\\\/07\\\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png\",\"width\":400,\"height\":200,\"caption\":\"Duas pessoas olhando para um dispositivo dentro de um escrit\u00f3rio\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/government\\\/2021\\\/07\\\/27\\\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/\",\"name\":\"Blogs de ind\u00fastria da Microsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/#organization\",\"name\":\"Blogs de ind\u00fastria da Microsoft - Brazil\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2019\\\/08\\\/Microsoft-Logo.png\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2019\\\/08\\\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Blogs de ind\u00fastria da Microsoft - Brazil\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/pt-br\\\/industry\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia - Blogs de ind\u00fastria da Microsoft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/","og_locale":"en_US","og_type":"article","og_title":"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia - Blogs de ind\u00fastria da Microsoft","og_description":"Em julho de 2019, Kurt\u00a0DelBene, Milo\u00a0Medin\u00a0e Richard Murray escreveram\u00a0The Road to Zero Trust (Security)\u00a0para o Conselho de Inova\u00e7\u00e3o em Defesa.\u202fNela, afirmavam:\u00a0  \u201c\u2026a\u00a0ciberseguran\u00e7a\u00a0est\u00e1 em um momento cr\u00edtico. Suas redes est\u00e3o crescendo em tamanho e complexidade, exigindo enormes quantidades de transfer\u00eancia r\u00e1pida de dados para manter a consci\u00eancia situacional no campo de batalha digital e f\u00edsico.","og_url":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/","og_site_name":"Blogs de ind\u00fastria da Microsoft","article_published_time":"2021-07-27T19:00:29+00:00","og_image":[{"width":400,"height":200,"url":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png","type":"image\/png"}],"author":"Mitchel Hudson, Mia Reyes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mitchel Hudson, Mia Reyes","Est. reading time":"4 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/author\/mitchel-hudson\/","@type":"Person","@name":"Mitchel Hudson"},{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/author\/mia-reyes\/","@type":"Person","@name":"Mia Reyes"}],"headline":"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia","datePublished":"2021-07-27T19:00:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/"},"wordCount":1090,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png","keywords":["Acesso","Cibersecurity"],"articleSection":["Governo"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/","url":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/","name":"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia - Blogs de ind\u00fastria da Microsoft","isPartOf":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png","datePublished":"2021-07-27T19:00:29+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#primaryimage","url":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png","contentUrl":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2021\/07\/INT_FY22_EG_IndustryBlog_BannersForIndustryBlog_GOVERNMENT_400x200_2.png","width":400,"height":200,"caption":"Duas pessoas olhando para um dispositivo dentro de um escrit\u00f3rio"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/government\/2021\/07\/27\/por-que-zero-trust-e-a-mentalidade-certa-para-a-industria-de-defesa-e-inteligencia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Por que Zero Trust \u00e9 a mentalidade certa para a ind\u00fastria de defesa e intelig\u00eancia"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/","name":"Blogs de ind\u00fastria da Microsoft","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/#organization","name":"Blogs de ind\u00fastria da Microsoft - Brazil","url":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-content\/uploads\/sites\/6\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Blogs de ind\u00fastria da Microsoft - Brazil"},"image":{"@id":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/posts\/7227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/users\/671"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/comments?post=7227"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/posts\/7227\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/media\/7233"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/media?parent=7227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/categories?post=7227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=7227"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=7227"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/pt-br\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=7227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}