{"id":713145,"date":"2023-03-09T12:03:10","date_gmt":"2023-03-09T11:03:10","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=713145"},"modified":"2025-03-04T07:12:10","modified_gmt":"2025-03-04T06:12:10","slug":"cybersecurite-et-cloud-de-confiance-un-mariage-de-raison","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","title":{"rendered":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg?w=400?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Abdembi Miraoui<\/h5><h5 class=\"blog-date\">9 mars 2023<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est \u00e0 priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le.<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9. Or, un service IaaS, PaaS, CaaS ou SaaS conforme aux exigences SecNumCloud 3.2 et labellis\u00e9 \u00ab&nbsp;cloud de confiance&nbsp;\u00bb apporte sur ces deux aspects un certain nombre de garanties (s\u00e9curit\u00e9 du cloud), mais cela n\u2019exon\u00e8re pas le client de ses responsabilit\u00e9s en la mati\u00e8re (s\u00e9curit\u00e9 dans le cloud). Lorsqu\u2019on envisage de migrer ses donn\u00e9es et ses applications vers un cloud de confiance, il faut donc porter une attention toute particuli\u00e8re aux risques cyber r\u00e9siduels afin de mettre soi-m\u00eame en place les dispositifs appropri\u00e9s au-dessus de ceux fournis par le prestataire.<\/p>\n\n\n\n<p>Avec un cloud de confiance, on reste donc dans un mod\u00e8le classique de responsabilit\u00e9 partag\u00e9e. En revanche, le caract\u00e8re sensible des donn\u00e9es et le niveau \u00e9lev\u00e9 de protection que l\u2019on souhaite mettre en place vont inciter \u00e0 se montrer particuli\u00e8rement vigilant et \u00e0 recourir \u00e0 des approches et des outils tr\u00e8s robustes. Voici quelques-uns des principes et des solutions que nous recommandons d\u2019examiner en priorit\u00e9&nbsp;:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">La gestion des identit\u00e9s et des acc\u00e8s<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/la-gestion-des-identites-move-to-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">La gestion des identit\u00e9s et des acc\u00e8s (<em>Identity and Access Management<\/em>, IAM) est la pierre angulaire de la s\u00e9curit\u00e9 dans le cloud<\/a>. G\u00e9rant \u00e0 la fois l\u2019identit\u00e9, l\u2019authentification &nbsp;et les habilitations, la gestion des identit\u00e9s et des acc\u00e8s permet de garantir que les utilisateurs, humains ou machines, ne peuvent acc\u00e9der qu\u2019aux seules donn\u00e9es et applications qui leur sont autoris\u00e9es. Incontournable et omnipr\u00e9sente, non seulement l\u2019IAM conditionne le niveau de s\u00e9curit\u00e9 dans le cloud, mais elle favorise aussi grandement la fluidit\u00e9 des \u00e9changes, des exp\u00e9riences et des projets. L\u2019IAM est \u00e9galement la cl\u00e9 de vo\u00fbte du mod\u00e8le Zero Trust. Bas\u00e9 sur une v\u00e9rification syst\u00e9matique des identit\u00e9s et des droits avant chaque action, et plus seulement \u00e0 l\u2019entr\u00e9e dans le syst\u00e8me, l\u2019approche Zero Trust requiert une gestion des droits tr\u00e8s fine, largement automatis\u00e9e, et qui n\u2019accorde \u00e0 chaque utilisateur que les autorisations qui lui sont strictement n\u00e9cessaires. De ce fait, le mod\u00e8le Zero Trust peut \u00eatre envisag\u00e9 comme une approche globale pour prot\u00e9ger l\u2019environnement cloud et ses diff\u00e9rentes composantes (identit\u00e9, r\u00e9seau, donn\u00e9es\u2026). &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">La d\u00e9fense en profondeur<\/h2>\n\n\n\n<p>Outre les acc\u00e8s, il convient de s\u00e9curiser sp\u00e9cifiquement chacune des couches de l\u2019infrastructure.&nbsp;C\u2019est le principe de la d\u00e9fense en profondeur (<em>Defense in Depth<\/em>, DiD), une doctrine de cybers\u00e9curit\u00e9 qui consiste \u00e0 dresser plusieurs lignes de d\u00e9fense (au niveau mat\u00e9riel, logiciel, r\u00e9seau\u2026) pour prot\u00e9ger les informations. Dans le cadre du cloud de confiance, cette approche stratifi\u00e9e doit s\u2019articuler avec les mesures prises par le cloud provider pour prot\u00e9ger physiquement ses syst\u00e8mes. C\u2019est pourquoi il est souvent pertinent de s\u2019appuyer sur les outils et les services de s\u00e9curit\u00e9 qu\u2019il propose (firewalls, antivirus\u2026). Souvent de bonne qualit\u00e9, ces solutions ont l\u2019avantage d\u2019\u00eatre nativement int\u00e9gr\u00e9es \u00e0 la plateforme, ce qui facilite leur mise en \u0153uvre. Enfin, soulignons ici que les diverses mesures de s\u00e9curit\u00e9 restent malgr\u00e9 tout tributaires de la prudence des utilisateurs (dans les limites des couches plac\u00e9es sous leur responsabilit\u00e9). Leur mise en \u0153uvre doit donc s\u2019accompagner d\u2019un renforcement des pratiques dans le contexte du cloud&nbsp;: destruction des ressources et des donn\u00e9es inutiles, automatisation des mises \u00e0 jour, security by design, DevSecOps\u2026<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le chiffrement<\/h2>\n\n\n\n<p>Pour prot\u00e9ger efficacement ses donn\u00e9es, le chiffrement demeure fondamental. Sa mise en \u0153uvre dans le cadre d\u2019un cloud de confiance, et donc sur des donn\u00e9es des plus sensibles, pr\u00e9sente cependant quelques sp\u00e9cificit\u00e9s. Il faut ainsi s\u2019assurer que les donn\u00e9es resteront bien en permanence dans l\u2019environnement ma\u00eetris\u00e9 du cloud de confiance&nbsp;; par exemple, qu\u2019\u00e0 l\u2019occasion d\u2019un traitement, elles ne soient pas exfiltr\u00e9es en clair vers une plateforme qui ne serait pas qualifi\u00e9e \u00ab&nbsp;cloud de confiance&nbsp;\u00bb o\u00f9 elles ne b\u00e9n\u00e9ficieraient plus des m\u00eames protections juridiques. Pour se pr\u00e9munir de telles fuites, il est indispensable de mettre en place des outils pour surveiller les d\u00e9placements de donn\u00e9es d\u2019un environnement \u00e0 un autre, \u00e0 l\u2019image des solutions de type CASB (<em>Cloud Security Access Broker<\/em>) qui s\u2019interfacent avec les services cloud et contr\u00f4lent les flux de donn\u00e9es tout au long de leur cycle de vie. Notons ici que le choix des outils tiers qui seront amen\u00e9s \u00e0 manipuler les donn\u00e9es doit faire l\u2019objet d\u2019une attention redoubl\u00e9e. On veillera en particulier \u00e0 ce qu\u2019aucune op\u00e9ration ne soit r\u00e9alis\u00e9e en dehors d\u2019un environnement labellis\u00e9 \u00ab&nbsp;cloud de confiance&nbsp;\u00bb car tel est bien l\u2019enjeu&nbsp;: la donn\u00e9e peut circuler entre les syst\u00e8mes mais elle ne doit jamais sortir, m\u00eame tr\u00e8s bri\u00e8vement, de cadre protecteur. Et il est essentiel de sensibiliser toutes les \u00e9quipes \u00e0 cette exigence capitale. Enfin, dernier point de vigilance concernant les donn\u00e9es&nbsp;: veiller \u00e0 ce que les cl\u00e9s de chiffrement ne soient pas stock\u00e9es au m\u00eame endroit que les donn\u00e9es pour qu\u2019il soit impossible d\u2019y acc\u00e9der simultan\u00e9ment, et l\u2019on pourra utiliser pour cela un mat\u00e9riel d\u00e9di\u00e9 (<em>Hardware Security Module<\/em>, HSM).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Assume Breach<\/h2>\n\n\n\n<p>Dans un environnement aussi complexe et mouvant que le cloud, f\u00fbt-il de confiance, et face \u00e0 des assaillants extr\u00eamement comp\u00e9tents, \u00e9quip\u00e9s et d\u00e9termin\u00e9s, la s\u00e9curit\u00e9 absolue n\u2019existe pas. Tel est le principe de la posture \u00ab&nbsp;<em>Assume Breach<\/em>&nbsp;\u00bb, qui invite \u00e0 se montrer r\u00e9aliste et pragmatique. Puisqu\u2019un incident de s\u00e9curit\u00e9 finira toujours par se produire, il faut s\u2019\u00eatre pr\u00e9par\u00e9 de mani\u00e8re \u00e0 pouvoir le d\u00e9tecter et alerter au plus t\u00f4t, r\u00e9agir rapidement et \u00e0 bon escient pour en limiter les cons\u00e9quences, puis en r\u00e9parer les \u00e9ventuels d\u00e9g\u00e2ts et, enfin, en tirer les enseignements. Tout ceci n\u00e9cessite la mise en place d\u2019un outillage, d\u2019une organisation et de processus appropri\u00e9s, que des exercices grandeur nature permettront de tester, valider et optimiser.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-la-securisation-de-la-migration\">La s\u00e9curisation de la migration<\/h2>\n\n\n\n<p>De m\u00eame qu\u2019\u00e0 l\u2019occasion d\u2019un d\u00e9m\u00e9nagement, on se trouve parfois oblig\u00e9 de laisser des portes grandes ouvertes ou des objets sans surveillance, les op\u00e9rations de migration engendrent des risques importants. Que le point de d\u00e9part ou d\u2019arriv\u00e9e soit un cloud de confiance ne peut que les amplifier en \u00e9veillant des int\u00e9r\u00eats malveillants. M\u00eame si les op\u00e9rations sont similaires \u00e0 celle d\u2019un \u00ab&nbsp;move-to-cloud&nbsp;\u00bb ordinaire, il faut donc proc\u00e9der avec une rigueur accrue en s\u2019appuyant notamment sur le chiffrement. Il ne faudra aussi pas non plus omettre d\u2019effacer les donn\u00e9es de la plateforme d\u2019origine.<\/p>\n\n\n\n<p>Toutes ces solutions et ces bonnes pratiques permettent de doubler les garanties apport\u00e9es par le cloud de confiance d\u2019un dispositif de s\u00e9curit\u00e9 complet et renforc\u00e9. Leur mise en \u0153uvre \u2013 comme d\u2019ailleurs le choix d\u2019un cloud de confiance \u2013 reste toutefois subordonn\u00e9e \u00e0 une appr\u00e9ciation en amont des risques, c\u2019est-\u00e0-dire du rapport entre la gravit\u00e9 et la probabilit\u00e9 des menaces. C\u2019est cette analyse qui permet de d\u00e9terminer le juste niveau de protection \u00e0 mettre en \u0153uvre et la priorit\u00e9 des actions \u00e0 mener en tenant compte de l\u2019ensemble des contraintes et des exigences (r\u00e9glementaires, budg\u00e9taires, op\u00e9rationnelles\u2026).<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteur : <\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg\" alt=\"Abdembi Miraoui\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"subnav-button--form\" href=\"javascript:void(0)\" aria-label=\"Nous contacter\" data-bs-toggle=\"modal\" data-bs-target=\"#WPB58797ddf_f690_4768_92e7_01676861adb9\" data-bs-expert-title=\"1\">\n\t\t\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ico-form\"><\/i>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Abdembi Miraoui<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Co-Head of Service Line \u201cCloud, Endpoint &amp; Infrastructure Security\u201d<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"subnav-button--form\" href=\"javascript:void(0)\" aria-label=\"Nous contacter\" data-bs-toggle=\"modal\" data-bs-target=\"#WPB58797ddf_f690_4768_92e7_01676861adb9\" data-bs-expert-title=\"Abdembi Miraoui\">\n\t\t\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ico-form\"><\/i>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Abdembi est un expert dans le domaine de la cybers\u00e9curit\u00e9, avec une expertise particuli\u00e8re dans les sujets cl\u00e9s tels que le Cloud, les Endpoints et l&#8217;infrastructure. Il est responsable de la service line cybers\u00e9curit\u00e9 &#8220;Cloud, Endpoint &#038; Infrastructure Security&#8221; au sein de l&#8217;entit\u00e9 cybers\u00e9curit\u00e9 du groupe. Gr\u00e2ce \u00e0 ses connaissances pointues et son exp\u00e9rience approfondie acquise depuis plus de 15 ans. Abdembi est capable de fournir des conseils avis\u00e9s sur les enjeux de cybers\u00e9curit\u00e9 les plus complexes. Il est passionn\u00e9 par sa mission de prot\u00e9ger les entreprises contre les cybermenaces et de renforcer la r\u00e9silience de leurs syst\u00e8mes.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"modal\" id=\"WPB58797ddf_f690_4768_92e7_01676861adb9\">\n\t\t\t\t\t<div class=\"modal-dialog modal-dialog-centered modal-lg modal-dialog-scrollable landing-page-modals\">\n\t\t\t\t\t\t<div class=\"modal-content\">\n\t\t\t\t\t\t\t<div class=\"modal-header\">\n\t\t\t\t\t\t\t\t<button type=\"button\" class=\"btn-close\" aria-label=\"fermer\" data-bs-dismiss=\"modal\"><\/button>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"modal-body\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"logo-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/logo.svg\"\n\t\t\t\t\t\t\t\t\t\talt=\"Nous contacter\" class=\"light\" \/>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/logo-white.svg\"\n\t\t\t\t\t\t\t\t\t\talt=\"Nous contacter\" class=\"dark\" \/>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"form-title\">Nous contacter<\/h4>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"mf_forms__container \">\n\t\t\t\t\t\t\t\t<form id=\"mf_form_113730_3218648079\" class=\"mf_form__form row needs-validation\" action=\"\" method=\"post\" enctype=\"multipart\/form-data\" data-nosnippet>\n\n\t\t\t\t<div class=\"mf-field-wrapper form-floating col-sm-12\"><input type=\"text\" class=\"form-control\" id=\"_mf_113730_4589_3363225568\" name=\"_mf_113730_4589\" placeholder=\"First Name\" required \/><label for=\"_mf_113730_4589_3363225568\" class=\"form-label\">First Name <span class=\"star-required\">*<\/span><\/label><div class=\"invalid-feedback-frm\" role=\"alert\">First Name n&#039;est pas valide<\/div><\/div><div class=\"mf-field-wrapper form-floating col-sm-12\"><input type=\"text\" class=\"form-control\" id=\"_mf_113730_9437_3081143671\" name=\"_mf_113730_9437\" placeholder=\"Last Name\" required \/><label for=\"_mf_113730_9437_3081143671\" class=\"form-label\">Last Name <span class=\"star-required\">*<\/span><\/label><div class=\"invalid-feedback-frm\" role=\"alert\">Last Name n&#039;est pas valide<\/div><\/div><div class=\"mf-field-wrapper form-floating col-sm-12\"><input type=\"text\" class=\"form-control\" id=\"_mf_113730_4072_2234048761\" name=\"_mf_113730_4072\" placeholder=\"Company\" required \/><label for=\"_mf_113730_4072_2234048761\" class=\"form-label\">Company <span class=\"star-required\">*<\/span><\/label><div class=\"invalid-feedback-frm\" role=\"alert\">Company n&#039;est pas valide<\/div><\/div><div class=\"mf-field-wrapper form-floating col-sm-12\"><input type=\"email\" class=\"form-control\" id=\"_mf_113730_340_3444760600\" name=\"_mf_113730_340\" placeholder=\"Email\" required \/><label for=\"_mf_113730_340_3444760600\" class=\"form-label\">Email <span class=\"star-required\">*<\/span><\/label><div class=\"invalid-feedback-frm\" role=\"alert\">Email n&#039;est pas valide<\/div><\/div><div class=\"mf-field-wrapper form-floating col-sm-12\"><input type=\"text\" pattern=\"^[0-9\\-\\+\\s]+$\"  class=\"form-control\" id=\"_mf_113730_3858_4159708760\" name=\"_mf_113730_3858\" oninput=\"validateInput(this)\" maxlength=\"14\" placeholder=\"Phone\"  \/><label for=\"_mf_113730_3858_4159708760\" class=\"form-label\">Phone (Optionnel)<\/label><\/div><div class=\"mf-field-wrapper form-floating col-sm-12\"><textarea type=\"text\" class=\"form-control\" id=\"_mf_113730_636_2066683134\" name=\"_mf_113730_636\" placeholder=\"Your Message\" required><\/textarea><label for=\"_mf_113730_636_2066683134\" class=\"form-label\">Your Message <span class=\"star-required\">*<\/span><\/label><div class=\"invalid-feedback-frm\" role=\"alert\">Your Message n&#039;est pas valide<\/div><\/div><div class=\"mf-field-wrapper  col-sm-12\">\n\t\t<div class=\"form-check checkbox-controls\">\n\n\t\t\t<input type=\"checkbox\" id=\"_mf_113730_7633_2570028805\" class=\"form-check-input\"\n\t\t\t\tname=\"_mf_113730_7633[]\"\n\t\t\t\tvalue=\"1\"\n\t\t\t\trequired\n\t\t\t>\n\n\t\t\t<label for=\"_mf_113730_7633_2570028805\" class=\"form-check-label consent-text\">\n\t\t\t\tEn cochant cette case, je reconnais avoir pris connaissance des <a href=\"https:\/\/www.capgemini.com\/fr-fr\/conditions-dutilisation\/\">Conditions G\u00e9n\u00e9rales d&#8217;Utilisation<\/a> du site ainsi que sa Charte de Donn\u00e9es Personnelles et je les accepte &nbsp;\t\t\t<\/label>\n\n\t\t<\/div>\n\t\t<\/div>\t\t\t<div class=\"mf_field mf_field--recaptcha\">\n\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6Lc3OpIUAAAAADY4ErEHF0HF6Tr7vuknduDU-fbl\"><\/div>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"mf_field mf_field--submit\" >\n\t\t\t\t<div class=\"slide-button-background button-background\">\n\t\t\t\t\t<label for=\"slider-submit-_mf_113730_2004\" class=\"slide-text\">\n\t\t\t\t\t\tSlide to submit\t\t\t\t\t<\/label>\n\t\t\t\t\t<input\n\t\t\t\t\t\tid=\"slider-submit-_mf_113730_2004\"\n\t\t\t\t\t\ttype=\"range\"\n\t\t\t\t\t\tclass=\"mf_field__input slider-frm-btn\"\n\t\t\t\t\t\trel=\"_mf_113730_2004\"\n\t\t\t\t\t\tmin=\"0\"\n\t\t\t\t\t\tmax=\"100\"\n\t\t\t\t\t\tvalue=\"0\"\n\t\t\t\t\t\taria-label=\"Slide to submit\"\n\t\t\t\t\t\taria-describedby=\"slide-instruction-_mf_113730_2004\"\n\t\t\t\t\t\taria-valuenow=\"0\"\n\t\t\t\t\t\taria-valuemin=\"0\"\n\t\t\t\t\t\taria-valuemax=\"100\"\n\t\t\t\t\t\taria-orientation=\"horizontal\"\n\t\t\t\t\t\trole=\"slider\"\n\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\/>\n\t\t\t\t\t<span id=\"slide-instruction-_mf_113730_2004\" class=\"sr-only\">\n\t\t\t\t\t\tUtilisez les fl\u00e8ches droite pour faire d\u00e9filer ou faites glisser vers la droite avec votre doigt. Lorsque vous atteignez 100 %, le formulaire est envoy\u00e9.\t\t\t\t\t<\/span>\n\t\t\t\t\t<!-- Mobile-only submit button fallback -->\n\t\t\t\t\t<button type=\"submit\" class=\"mf-mobile-submit-btn\" disabled>\n\t\t\t\t\t\t<span class=\"sr-only\">Si vous utilisez un lecteur d\u2019\u00e9cran ou VoiceOver, appuyez deux fois sur ce bouton pour envoyer le formulaire.<\/span>\n\t\t\t\t\t\tSlide to submit\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t\t<input type=\"hidden\" name=\"submit_btn_txt\" class=\"submit_btn_txt\" value=\"Slide to submit\"\/>\n\t\t\t\t<input type=\"hidden\" name=\"submitted_state_txt\" class=\"submitted_state_txt\" value=\"Submitted\"\/>\n\t\t\t<\/div>\n\t\t\t\t\t\t<input type=\"hidden\" name=\"form_id\" data-validate=\"number\" class=\"mf_form__id\" value=\"113730\" \/>\n\t\t\t\t<input type=\"hidden\" name=\"form_title\" class=\"mf_form__title\" value=\"expert-connect-form-1563283208\" \/>\n\t\t\t\t<input type=\"hidden\" name=\"wp_rest_nonce\" class=\"mf_form__wp_rest_nonce\" value=\"acfdbc1111\" \/>\n\n\t\t\t\t<input type=\"hidden\" name=\"mf_form_conditional_logic\" class=\"mf_form__title conditional_logic\" value=\"\" \/>\n\t\t\t\t\n\t\t\t\t<input type=\"hidden\" name=\"mf_form_fields_country_dpo_field\" class=\"mf_form__title conditional_logic mf_form_fields_country_dpo_field\" value=\"\" \/>\n\n\t\t\t\t<!-- Anti-spam field -->\n\t\t\t\t<input type=\"text\" \n\t\t\t\t\tname=\"website_url\" \n\t\t\t\t\tclass=\"mf_field__url\" \n\t\t\t\t\tautocomplete=\"off\"\n\t\t\t\t\ttabindex=\"-1\"\n\t\t\t\t\taria-hidden=\"true\"\n\t\t\t\t\tstyle=\"position:absolute;left:-9999px;width:1px;height:1px;opacity:0;pointer-events:none;\" \n\t\t\t\t\/>\n\t\t\t<\/form>\n\n\t\t\t<div class=\"mf_form__success\" tabindex=\"0\" role=\"alert\">\n\t\t\t\tThank you for the submission. We will be in touch with you soon!<\/p>\n\t\t\t<\/div>\n\t\t\t<div class=\"mf_form__errors\">\n\t\t\t\t<p>D\u00e9sol\u00e9, la soumission du formulaire a \u00e9chou\u00e9. Merci de r\u00e9essayer.<\/p>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t<script>\n\t\t\twindow.MF_CONFIG113730 = {\"113730\":{\"errors\":[],\"redirect\":\"\"}};\n\t\t<\/script>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est \u00e0 priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9.<\/p>\n","protected":false},"author":201,"featured_media":713158,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"43c583d6-7d87-4492-bc06-e73de39ac6f2\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"08485ad4-d95c-42ee-84b7-b4a46e806acf\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[5,138],"tags":[188],"brand":[30],"service":[35,47],"industry":[],"partners":[],"blog-topic":[350],"content-group":[],"class_list":["post-713145","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","category-transformation","tag-cloud","brand-capgemini","service-cloud","service-cybersecurite","blog-topic-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison - Capgemini France<\/title>\n<meta name=\"description\" content=\"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est a priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison\" \/>\n<meta property=\"og:description\" content=\"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est a priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-09T11:03:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T06:12:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/cloud-de-confiance-et-cyber-webpreview.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison\",\"datePublished\":\"2023-03-09T11:03:10+00:00\",\"dateModified\":\"2025-03-04T06:12:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\"},\"wordCount\":1387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg\",\"keywords\":[\"Cloud\"],\"articleSection\":[\"Technologies\",\"Transformation\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\",\"name\":\"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg\",\"datePublished\":\"2023-03-09T11:03:10+00:00\",\"dateModified\":\"2025-03-04T06:12:10+00:00\",\"description\":\"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est a priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg\",\"width\":6016,\"height\":4000,\"caption\":\"green moss agate (chalcedony crystal with green dendritic inclusion) macro detail. close-up of a textured semi-precious gemstone background. backlight transparency\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison - Capgemini France","description":"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est a priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison","og_description":"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est a priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","og_site_name":"Capgemini France","article_published_time":"2023-03-09T11:03:10+00:00","article_modified_time":"2025-03-04T06:12:10+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/cloud-de-confiance-et-cyber-webpreview.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/"},"author":{"name":"","@id":""},"headline":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison","datePublished":"2023-03-09T11:03:10+00:00","dateModified":"2025-03-04T06:12:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/"},"wordCount":1387,"commentCount":0,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg","keywords":["Cloud"],"articleSection":["Technologies","Transformation"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","name":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg","datePublished":"2023-03-09T11:03:10+00:00","dateModified":"2025-03-04T06:12:10+00:00","description":"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est a priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents confidentiels. Dans tous les cas, la question de la souverainet\u00e9 va n\u00e9cessairement de pair avec une exigence renforc\u00e9e de s\u00e9curit\u00e9.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg","width":6016,"height":4000,"caption":"green moss agate (chalcedony crystal with green dendritic inclusion) macro detail. close-up of a textured semi-precious gemstone background. backlight transparency"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/"}]}},"blog_topic_info":[{"id":350,"name":"Cloud"}],"taxonomy_info":{"category":[{"id":5,"name":"Technologies","slug":"technologies"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":188,"name":"Cloud","slug":"cloud"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":35,"name":"Cloud","slug":"cloud"},{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":350,"name":"Cloud","slug":"cloud"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg"},"articleSection":"Technologies","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cloud"],"dateCreated":"2023-03-09T11:03:10Z","datePublished":"2023-03-09T11:03:10Z","dateModified":"2025-03-04T06:12:10Z"},"rendered":"<meta name=\"parsely-title\" content=\"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-03-09T11:03:10Z\" \/>\n<meta name=\"parsely-section\" content=\"Technologies\" \/>\n<meta name=\"parsely-tags\" content=\"cloud\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":744171,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","url_meta":{"origin":713145,"position":0},"title":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","author":"anne.gautier@capgemini.com","date":"March 7, 2024","format":false,"excerpt":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":750452,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","url_meta":{"origin":713145,"position":1},"title":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP","author":"anne.gautier@capgemini.com","date":"April 11, 2024","format":false,"excerpt":"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":766641,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/innovation-naviguer-en-confiance-dans-un-ecosysteme-multicloud\/","url_meta":{"origin":713145,"position":2},"title":"Comment naviguer en confiance dans un \u00e9cosyst\u00e8me d\u00e9sormais multicloud\u202f?\u00a0\u00a0","author":"","date":"October 23, 2024","format":false,"excerpt":"La notion de confiance dans le cloud est un concept r\u00e9cent apparu \u00e0 mesure que le besoin des organisations de r\u00e9inventer leurs syst\u00e8mes d\u2019informations pour accompagner leur croissance et l\u2019innovation s\u2019est heurt\u00e9 aux probl\u00e9matiques de sensibilit\u00e9 des donn\u00e9es et de souverainet\u00e9.\u00a0","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/10\/CloudEdge-GettyImages-1339619445-2.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/10\/CloudEdge-GettyImages-1339619445-2.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/10\/CloudEdge-GettyImages-1339619445-2.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/10\/CloudEdge-GettyImages-1339619445-2.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":722192,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/trois-piliers-de-la-confiance-numerique-secteur-aeronautique\/","url_meta":{"origin":713145,"position":3},"title":"Les trois piliers de la confiance num\u00e9rique dans le secteur a\u00e9ronautique","author":"","date":"June 21, 2023","format":false,"excerpt":"Quoi que nous fassions, la confiance est \u00e0 la base de toutes nos d\u00e9cisions et de toutes nos actions. C\u2019est plus vrai encore lorsque nous montons dans un avion.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-521351984.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":715301,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/","url_meta":{"origin":713145,"position":4},"title":"Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9","author":"","date":"April 6, 2023","format":false,"excerpt":"Le cloud a amplement d\u00e9montr\u00e9 ses b\u00e9n\u00e9fices en termes d\u2019agilit\u00e9, de rapidit\u00e9 et de capacit\u00e9 d\u2019innovation. Pourtant, certains h\u00e9sitent encore, le plus souvent parce qu\u2019ils craignent pour la confidentialit\u00e9 de leurs donn\u00e9es et de leurs transactions.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":740788,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-pilier-des-echanges-entre-partenaires\/","url_meta":{"origin":713145,"position":5},"title":"Le cloud, pilier des \u00e9changes entre partenaires","author":"","date":"January 25, 2024","format":false,"excerpt":"Comment pr\u00e9server la souverainet\u00e9 des espaces collaboratifs dans les \u00e9changes entre partenaires gr\u00e2ce au cloud","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"Cloud de confiance","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/01\/MicrosoftTeams-image-16.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/01\/MicrosoftTeams-image-16.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/01\/MicrosoftTeams-image-16.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/01\/MicrosoftTeams-image-16.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg","author_title":"Abdembi Miraoui","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg?w=400","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/713145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/201"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=713145"}],"version-history":[{"count":15,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/713145\/revisions"}],"predecessor-version":[{"id":776656,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/713145\/revisions\/776656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/713158"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=713145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=713145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=713145"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=713145"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=713145"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=713145"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=713145"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=713145"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=713145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}