{"id":2701266,"date":"2023-12-14T11:23:47","date_gmt":"2023-12-14T11:23:47","guid":{"rendered":"https:\/\/pp2.oodrive.com\/?p=2701266"},"modified":"2024-07-23T15:14:53","modified_gmt":"2024-07-23T15:14:53","slug":"security-by-design","status":"publish","type":"post","link":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/","title":{"rendered":"Qu\u2019est-ce que le principe du Security-by-Design ?"},"content":{"rendered":"\n<p>Savez-vous quelle est la troisi\u00e8me \u00e9conomie mondiale ? Ce n\u2019est ni le Japon, ni l\u2019Allemagne, ni le Royaume-Uni et encore moins la France. Mais la cybercriminalit\u00e9.<\/p>\n\n\n\n<p>Selon Cybersecurity Ventures, elle devrait atteindre 10 500 milliards de dollars d&rsquo;ici 2025, avec une croissance annuelle de 148 % pour ses ransomwares. D\u2019ailleurs, plus de la moiti\u00e9 des entreprises ont d\u00e9j\u00e0 subi une attaque.<\/p>\n\n\n\n<p>Dans ces conditions, il semble plus que n\u00e9cessaire de prendre des mesures pour renforcer la s\u00e9curit\u00e9 des donn\u00e9es et limiter ces attaques. C\u2019est justement<strong> l\u2019int\u00e9r\u00eat de l\u2019approche Security-by-Design.<\/strong><\/p>\n\n\n\n<p>Chez Oodrive, nous ne faisons pas de compromis avec la s\u00e9curit\u00e9 nos solutions reposent sur des fondations ultra-s\u00e9curis\u00e9es, pour que vos donn\u00e9es sensibles et vos processus soient prot\u00e9g\u00e9s \u00e0 tout moment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Security-by-Design, la s\u00e9curit\u00e9 d\u00e8s la conception<\/strong><\/h2>\n\n\n\n<p>En d\u00e9veloppant le mod\u00e8le Security-by-Design (ou SbD), les <strong>entreprises prennent en compte&nbsp; le risque cyber d\u00e8s la conception du logiciel, <\/strong>de l\u2019infrastructure ou des autres produits web (notamment<a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/reglementation\/objets-connectes-leurope-se-dote-dun-cadre-de-certificats-de-cybersecurite\/\"> les IoT<\/a>). <\/p>\n\n\n\n<p>Cette nouvelle approche du d\u00e9veloppement web met <strong>la s\u00e9curit\u00e9 au c\u0153ur de la conception logiciel.<\/strong> Les probl\u00e9matiques cyber ne sont plus seulement envisag\u00e9es au milieu ou en fin de processus, mais d\u00e8s le d\u00e9but du codage.<\/p>\n\n\n\n<p>C\u2019est tout un changement de paradigme qui implique de se focaliser sur la <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cybersecurite-top-10-des-cyberattaques-frequentes-en-2024\/\">pr\u00e9vention des attaques cybers <\/a>et la consolidation des donn\u00e9es s\u00e9curis\u00e9es, plut\u00f4t que sur la r\u00e9action \u00e0 ces attaques, comme la r\u00e9solution des probl\u00e8mes ou la restauration des syst\u00e8mes.<\/p>\n\n\n\n<p>Au niveau des processus de d\u00e9veloppement, l\u2019approche Security-by-Design s\u2019inscrit dans le mouvement DevSecOps :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>En phase de conception<\/strong> : les diff\u00e9rentes options de s\u00e9curit\u00e9 sont int\u00e9gr\u00e9es d\u00e8s la phase d\u2019int\u00e9gration et de test continus. Autrement dit, elles sont impl\u00e9ment\u00e9es puis test\u00e9es, afin de ne s\u00e9lectionner que les meilleures solutions de s\u00e9curit\u00e9 pour l\u2019architecture. Ces solutions deviennent en quelque sorte des principes directeurs pour les d\u00e9veloppeurs.<\/li>\n\n\n\n<li><strong>En phase de d\u00e9ploiement<\/strong> : lors du d\u00e9ploiement continu, des tests d\u2019intrusion sont men\u00e9s pour am\u00e9liorer toujours plus le niveau de s\u00e9curit\u00e9 du logiciel.<\/li>\n\n\n\n<li><strong>En phase de livraison<\/strong> : des tests et audits pr\u00e9ventifs continuent d\u2019\u00eatre lanc\u00e9s pour affiner la solution de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n\n\n\n<p>Bon \u00e0 savoir : Dans le cadre du RGPD, l\u2019approche Security-by-Design devient Privacy-by-Design. L\u2019id\u00e9e est toujours la m\u00eame : fournir une protection optimale aux donn\u00e9es personnelles d\u00e8s la conception.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Les 3 principes de la conception s\u00e9curis\u00e9e<\/strong><\/h2>\n\n\n\n<p>Le concept de Security-by-Design repose sur 3 principes fondateurs<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>La surface d\u2019attaque minimale<\/strong><\/h3>\n\n\n\n<p>La surface d\u2019attaque correspond \u00e0<strong> tous les points de communication entre un syst\u00e8me d\u2019information et l\u2019ext\u00e9rieur<\/strong>. Il peut s\u2019agir de :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Logiciels, en particulier s\u2019ils sont stock\u00e9s sur des espaces de <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/innovation\/cloud-computing-iaas-paas-saas-quelles-differences\/\">cloud computing<\/a>;<\/li>\n\n\n\n<li>R\u00e9seaux avec des ports ouverts, des IP actives, des protocoles utilis\u00e9s,\u2026 ;<\/li>\n\n\n\n<li>Ressources humaines, notamment avec la strat\u00e9gie de phishing ;<\/li>\n\n\n\n<li>Intrusion dans les locaux.<\/li>\n<\/ul>\n\n\n\n<p><strong>Plus la surface d\u2019attaque est \u00e9tendue, plus le syst\u00e8me d\u2019information est vuln\u00e9rable<\/strong> aux attaques. Il sera, en effet, plus difficile de g\u00e9rer l\u2019ensemble de ces points d\u2019entr\u00e9es. Il convient donc de minimiser sa surface d\u2019attaque.<\/p>\n\n\n\n<section class=\"product__section\" id=\"snc-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">Le cloud priv\u00e9 SecNumCloud<\/p><p class=\"product__section-description\">Le r\u00e9f\u00e9rentiel qui garantit le plus haut niveau de s\u00e9curit\u00e9 pour la protection de vos donn\u00e9es sensibles.<\/p><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/bg-banner_work.svg\" class=\"product__section-bg\"\/><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/logo-snc.svg\" class=\"product__section-logo\" alt=\"SecNumCloud - Oodrive\"\/><div class=\"cta\"><a href=\"https:\/\/pp2.oodrive.com\/fr\/secnumcloud\/\">D\u00e9couvrir<\/a><\/div><\/div><\/section>\n\n\n\n<p>Pour cela, il faut d\u2019abord identifier les points de communication entre le SI et l\u2019ext\u00e9rieur. \u00c0 partir de l\u00e0, il est possible d\u2019y impl\u00e9menter des outils de surveillance et des solutions de protection. <\/p>\n\n\n\n<p>Ces derniers permettront \u00e0 l\u2019ing\u00e9nieur DevSecOps de r\u00e9aliser des analyses de s\u00e9curit\u00e9 r\u00e9guli\u00e8res (en particulier pour les points d\u2019entr\u00e9e les plus sensibles).<\/p>\n\n\n\n<p>Et pour <strong>les points de communication peu ou pas utilis\u00e9s<\/strong> par le syst\u00e8me d\u2019information<strong>, il suffit de les fermer<\/strong>. <\/p>\n\n\n\n<p>C\u2019est ce durcissement qui permettra de r\u00e9duire la surface d\u2019attaque et donc de maximiser l\u2019efficacit\u00e9 de l\u2019approche de Security-by-Design.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>Le moindre privil\u00e8ge<\/strong><\/h3>\n\n\n\n<p>Selon le principe du moindre privil\u00e8ge,<strong> un administrateur n\u2019a acc\u00e8s qu\u2019aux ressources dont il a effectivement besoin<\/strong>. Pour toutes les autres, il ne devrait pas pouvoir y acc\u00e9der.<\/p>\n\n\n\n<p>Pour mettre en place ce principe du Security-by-Design, il est indispensable de d\u00e9finir les t\u00e2ches, les r\u00f4les et les droits attribu\u00e9s \u00e0 chaque utilisateur.<\/p>\n\n\n\n<p>En<strong> r\u00e9duisant les droits des utilisateurs,<\/strong> cela permet aussi de minimiser la surface d\u2019attaques. Si un intrus vient \u00e0 s\u2019immiscer dans le r\u00e9seau via la strat\u00e9gie du phishing, il n\u2019aura acc\u00e8s qu\u2019\u00e0 un nombre limit\u00e9 de ressources. Ce qui r\u00e9duit consid\u00e9rablement son impact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>La d\u00e9fense en profondeur<\/strong><\/h3>\n\n\n\n<p>C\u2019est une tactique inspir\u00e9e des strat\u00e9gies militaires qui consiste \u00e0 <strong>retarder l\u2019ennemi. <\/strong>Pour cela, les ing\u00e9nieurs DevSecOps doivent exploiter et <strong>combiner plusieurs techniques de s\u00e9curit\u00e9.<\/strong> <\/p>\n\n\n\n<p>La d\u00e9fense contre les \u00e9ventuelles menaces est donc plus efficace, puisqu\u2019elle ne repose plus seulement sur une seule barri\u00e8re, mais plusieurs.<\/p>\n\n\n\n<section class=\"product__section ebook\" id=\"snc-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">Protection des donn\u00e9es sensibles<\/p><p class=\"product__section-description\">Classifiez, prot\u00e9gez et s\u00e9curisez vos donn\u00e9es sensibles gr\u00e2ce au SecNumCloud.<\/p><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/ebook-snc.svg\" class=\"product__section-logo\" alt=\"oodrive snc\"\/><div class=\"cta\"><a href=\"https:\/\/pp2.oodrive.com\/fr\/livre-blanc\/contenus-sensibles-entreprise\/\">T\u00e9l\u00e9charger l&rsquo;ebook<\/a><\/div><\/div><\/section>\n\n\n\n<p>Voici les \u00e9tapes pour impl\u00e9menter une d\u00e9fense en profondeur efficace :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>D\u00e9terminer les objectifs de s\u00e9curit\u00e9 ;<\/li>\n\n\n\n<li>D\u00e9finir l\u2019organisation et l\u2019architecture du <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/comment-renforcer-la-securite-des-systemes-dinformation-les-42-mesures-proposees-par-lanssi\/\">syst\u00e8me d\u2019information<\/a> ;<\/li>\n\n\n\n<li>Identifier les points de contr\u00f4le et les \u00e9valuer ;<\/li>\n\n\n\n<li>\u00c9laborer une politique de d\u00e9fenses (avec le chiffrement des donn\u00e9es, les autorisations, la sauvegarde r\u00e9guli\u00e8re, \u2026) ;<\/li>\n\n\n\n<li>\u00c9valuer la d\u00e9fense en continu gr\u00e2ce \u00e0 des contr\u00f4les et des audits.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Comment choisir sa solution Security-by-Design ?<\/strong><\/h2>\n\n\n\n<p>Une solution Security-by-Design doit respecter les piliers essentiels, \u00e0 savoir :&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>La confidentialit\u00e9 :<\/strong> cela reprend le principe du moindre privil\u00e8ge o\u00f9 seuls les utilisateurs autoris\u00e9s ont acc\u00e8s aux donn\u00e9es dont ils ont besoin.<\/li>\n\n\n\n<li><strong>L\u2019int\u00e9grit\u00e9 : <\/strong>les donn\u00e9es s\u00e9curis\u00e9es n\u2019\u00e9tant pas manipulables par des utilisateurs non autoris\u00e9s, elles doivent rester fiables et qualitatives (aucune falsification ne doit \u00eatre possible).<\/li>\n\n\n\n<li><strong>La disponibilit\u00e9 :<\/strong> si l\u2019acc\u00e8s est restreint, les utilisateurs autoris\u00e9s doivent pouvoir acc\u00e9der facilement aux donn\u00e9es dont ils ont besoin, quand ils en ont besoin.<\/li>\n\n\n\n<li><strong>La tra\u00e7abilit\u00e9 : <\/strong>il s\u2019agit d\u2019analyser toutes les actions relatives aux donn\u00e9es gr\u00e2ce aux journaux d\u2019audit et de monitoring.<\/li>\n<\/ul>\n\n\n\n<p>Au-del\u00e0 de ces piliers, il est important de choisir une solution certifi\u00e9e <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/certification-iso-27001-gage-securite\/\">ISO 27001<\/a>. Cette norme ISO relative \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information s\u2019aligne \u00e0 la d\u00e9marche Security-by-Design, \u00e0 travers plusieurs dispositions. <\/p>\n\n\n\n<p>Notamment l\u2019approche pilot\u00e9e par les risques qui implique une \u00e9valuation syst\u00e9matique des risques cyber.<\/p>\n\n\n\n<p class=\"has-blue-work-background-color has-background\">Les solutions Oodrive sont justement certifi\u00e9es ISO27001\/701, <a href=\"https:\/\/pp2.oodrive.com\/fr\/secnumcloud\/\">SecNumCloud<\/a> et <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/reglementation\/certification-hds-protection-donnees-sante\/\">HDS<\/a>. L\u2019objectif \u00e9tant de r\u00e9pondre aux plus hauts niveaux d\u2019exigence en mati\u00e8re de s\u00e9curit\u00e9, de confiance et de conformit\u00e9. La s\u00e9curisation et la protection des donn\u00e9es sont au c\u0153ur des pr\u00e9occupations d\u2019Oodrive. Les diff\u00e9rentes \u00e9tapes d\u2019utilisation de nos solutions, et le design de celles-ci, aiguillent l\u2019utilisateur final vers les bonnes pratiques s\u00e9curitaires. Nous b\u00e2tissons la confiance n\u00e9cessaire pour pr\u00e9server l&rsquo;int\u00e9grit\u00e9 et la confidentialit\u00e9 de ce qui rev\u00eat une importance primordiale aux yeux de nos clients et partenaires : id\u00e9es, projets, innovations, talents.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Savez-vous quelle est la troisi\u00e8me \u00e9conomie mondiale ? Ce n\u2019est ni le Japon, ni l\u2019Allemagne, ni le Royaume-Uni et encore moins la France. Mais la cybercriminalit\u00e9. Selon Cybersecurity Ventures, elle devrait atteindre 10 500 milliards de dollars d&rsquo;ici 2025, avec une croissance annuelle de 148 % pour ses ransomwares. D\u2019ailleurs, plus de la moiti\u00e9 des [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":2701623,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[574],"class_list":["post-2701266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security-by-design : s\u00e9curiser son syst\u00e8me d&#039;information | Oodrive<\/title>\n<meta name=\"description\" content=\"Pour s\u00e9curiser son syst\u00e8me d\u2019information, mieux vaut impl\u00e9menter une approche s\u00e9curitaire d\u00e8s la conception. C\u2019est le principe du Security-by-Design.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security-by-design : s\u00e9curiser son syst\u00e8me d&#039;information | Oodrive\" \/>\n<meta property=\"og:description\" content=\"Pour s\u00e9curiser son syst\u00e8me d\u2019information, mieux vaut impl\u00e9menter une approche s\u00e9curitaire d\u00e8s la conception. C\u2019est le principe du Security-by-Design.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T11:23:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-23T15:14:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Maxime Geffray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maxime Geffray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/\"},\"author\":{\"name\":\"Maxime Geffray\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d\"},\"headline\":\"Qu\u2019est-ce que le principe du Security-by-Design ?\",\"datePublished\":\"2023-12-14T11:23:47+00:00\",\"dateModified\":\"2024-07-23T15:14:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/\"},\"wordCount\":1265,\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/\",\"url\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/\",\"name\":\"Security-by-design : s\u00e9curiser son syst\u00e8me d'information | Oodrive\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg\",\"datePublished\":\"2023-12-14T11:23:47+00:00\",\"dateModified\":\"2024-07-23T15:14:53+00:00\",\"description\":\"Pour s\u00e9curiser son syst\u00e8me d\u2019information, mieux vaut impl\u00e9menter une approche s\u00e9curitaire d\u00e8s la conception. C\u2019est le principe du Security-by-Design.\",\"breadcrumb\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Le principe du security-by-design\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pp2.oodrive.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Qu\u2019est-ce que le principe du Security-by-Design ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pp2.oodrive.com\/#website\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...\",\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pp2.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d\",\"name\":\"Maxime Geffray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"caption\":\"Maxime Geffray\"},\"description\":\"Communication Manager at Oodrive\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security-by-design : s\u00e9curiser son syst\u00e8me d'information | Oodrive","description":"Pour s\u00e9curiser son syst\u00e8me d\u2019information, mieux vaut impl\u00e9menter une approche s\u00e9curitaire d\u00e8s la conception. C\u2019est le principe du Security-by-Design.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Security-by-design : s\u00e9curiser son syst\u00e8me d'information | Oodrive","og_description":"Pour s\u00e9curiser son syst\u00e8me d\u2019information, mieux vaut impl\u00e9menter une approche s\u00e9curitaire d\u00e8s la conception. C\u2019est le principe du Security-by-Design.","og_url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/","og_site_name":"Oodrive","article_published_time":"2023-12-14T11:23:47+00:00","article_modified_time":"2024-07-23T15:14:53+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg","type":"image\/jpeg"}],"author":"Maxime Geffray","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Maxime Geffray","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#article","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/"},"author":{"name":"Maxime Geffray","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d"},"headline":"Qu\u2019est-ce que le principe du Security-by-Design ?","datePublished":"2023-12-14T11:23:47+00:00","dateModified":"2024-07-23T15:14:53+00:00","mainEntityOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/"},"wordCount":1265,"publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/","url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/","name":"Security-by-design : s\u00e9curiser son syst\u00e8me d'information | Oodrive","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg","datePublished":"2023-12-14T11:23:47+00:00","dateModified":"2024-07-23T15:14:53+00:00","description":"Pour s\u00e9curiser son syst\u00e8me d\u2019information, mieux vaut impl\u00e9menter une approche s\u00e9curitaire d\u00e8s la conception. C\u2019est le principe du Security-by-Design.","breadcrumb":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#primaryimage","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2023\/12\/principe_security_by_design-scaled.jpeg","width":2560,"height":1707,"caption":"Le principe du security-by-design"},{"@type":"BreadcrumbList","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/security-by-design\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pp2.oodrive.com\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Qu\u2019est-ce que le principe du Security-by-Design ?"}]},{"@type":"WebSite","@id":"https:\/\/pp2.oodrive.com\/#website","url":"https:\/\/pp2.oodrive.com\/","name":"Oodrive","description":"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...","publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pp2.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pp2.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/pp2.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d","name":"Maxime Geffray","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","caption":"Maxime Geffray"},"description":"Communication Manager at Oodrive"}]}},"_links":{"self":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/2701266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=2701266"}],"version-history":[{"count":0,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/2701266\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/2701623"}],"wp:attachment":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=2701266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=2701266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}