{"id":744318,"date":"2024-02-29T13:54:54","date_gmt":"2024-02-29T12:54:54","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=744318"},"modified":"2025-03-04T06:48:20","modified_gmt":"2025-03-04T05:48:20","slug":"les-defis-de-la-micro-segmentation-en-datacenter","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/","title":{"rendered":"Les d\u00e9fis de la micro-segmentation en datacenter"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Les d\u00e9fis de la micro-segmentation en datacenter<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/Photo-PW-petite.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Pierre-Charles Wagrez<\/h5><h5 class=\"blog-date\">1 mars 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d&#8217;une charge de travail\u00a0(en g\u00e9n\u00e9ral un serveur, une <em>Virtual Machine<\/em> (VM), un conteneur) ou au maximum d&#8217;un petit groupe de charges de travail. Cette d\u00e9marche peut aller jusqu\u2019\u00e0 la nano-segmentation, un filtrage jusqu\u2019au process au sein de la machine. <\/h2><p class=\"intro-para-content\">Cette technologie mature et int\u00e9gr\u00e9e de base par les Hyperscalers est d\u00e9j\u00e0 pr\u00e9sente chez de nombreux h\u00e9bergeurs, mais beaucoup moins dans les datacenters des entreprises.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-une-technologie-attractive\"><strong>Une technologie attractive<\/strong><\/h2>\n\n\n\n<p>Si le risque principal de la macro-segmentation est celui de la contamination entre serveurs, par d\u00e9placement lat\u00e9ral, la micro-segmentation est assur\u00e9ment une technologie attractive pour les responsables r\u00e9seau et s\u00e9curit\u00e9 des entreprises.<\/p>\n\n\n\n<p>Elle permet d\u2019une part une protection contre le d\u00e9placement lat\u00e9ral en cas de compromission d&#8217;une machine. Ainsi, un cryptolocker ayant touch\u00e9 un serveur ne pourra pas se propager \u00e0 tous les serveurs du m\u00eame <em>Virtual Local Area Network<\/em> (vlan).<\/p>\n\n\n\n<p>D\u2019autre part elle implique une d\u00e9corr\u00e9lation entre la segmentation et l&#8217;architecture logique ou physique du datacenter. Des r\u00e8gles de filtrage peuvent en effet \u00eatre mises en place ind\u00e9pendamment de l&#8217;architecture r\u00e9seau et peuvent \u00e9voluer sans impact sur les infrastructures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-adoption-timide\"><strong>Une adoption timide<\/strong><\/h2>\n\n\n\n<p>Malgr\u00e9 tout, nombre d\u2019entreprises n\u2019ont toujours pas adopt\u00e9 cette technologie pour leurs datacenters. Cette adoption timide s\u2019explique par de multiples raisons, au premier lieu desquels le co\u00fbt associ\u00e9 aux solutions de micro-segmentation. Ceux-ci sont \u00e9lev\u00e9s, et viennent s\u2019ajouter aux co\u00fbts projets, dans un contexte o\u00f9 la plupart des entreprises ne maitrisent pas assez finement les flux de chaque application, ni les co\u00fbts d&#8217;exploitation, les incidents et les demandes concernant ces derniers.<\/p>\n\n\n\n<p>Cette adoption s\u2019av\u00e8re \u00e9galement trop complexe pour nombre d\u2019organisations. D\u2019une part les solutions du march\u00e9 n\u2019offrent pas toute la m\u00eame couverture en termes de charge de travail et la plupart sont plus adapt\u00e9es \u00e0 un type de charge de travail, serveur physique, VM ou conteneur, ce qui rend le choix d\u2019autant plus difficile. &nbsp;<\/p>\n\n\n\n<p>D\u2019autre part appliquer de la micro-segmentation \u00e0 un environnement existant implique une analyse approfondie des flux de chaque application et l&#8217;analyse des d\u00e9pendances entre toutes les applications. Or il est souvent compliqu\u00e9, voire impossible, lorsqu&#8217;une application fonctionne depuis un certain temps, de retrouver la connaissance permettant de d\u00e9cider si un flux est normal ou non.<\/p>\n\n\n\n<p>Enfin, les solutions de micro-segmentation introduisent de nouveaux outils, de nouvelles fa\u00e7ons de faire et un surcroit de travail alors que le gain n\u2019est pas toujours per\u00e7u par les \u00e9quipes d\u2019exploitation, ce qui peut donner lieu \u00e0 une certaine r\u00e9sistance au changement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-les-leviers-pour-faciliter-son-adoption\"><strong>Les leviers pour faciliter son adoption<\/strong><\/h2>\n\n\n\n<p>Des leviers existent pourtant, permettant de r\u00e9pondre aux freins constat\u00e9s. Il faut savoir par exemple que les solutions de micro-segmentation sont parfois int\u00e9gr\u00e9es \u00e0 des solutions techniques d\u00e9j\u00e0 d\u00e9ploy\u00e9es par ailleurs pour d&#8217;autres besoins, ce qui n\u2019implique donc pas d\u2019investissements suppl\u00e9mentaires. Cette technologie est en effet int\u00e9gr\u00e9e de base dans toutes les offres cloud des Hyperscalers, et dans diverses solutions techniques de cloud priv\u00e9 et de conteneurs.<\/p>\n\n\n\n<p>Les solutions du march\u00e9 disposent par ailleurs d\u2019<em>Application Programming Interface<\/em> (API) int\u00e9grables dans des outils d\u2019orchestration et diminuant, par d\u00e9finition, la charge li\u00e9e au d\u00e9ploiement.<\/p>\n\n\n\n<p>Enfin, des outils de d\u00e9couverte de flux sont int\u00e9gr\u00e9s \u00e0 la solution de micro-segmentation, permettant de simplifier la s\u00e9curisation d\u2019applications en passant par une phase de d\u00e9couverte avant d\u2019activer les r\u00e8gles identifi\u00e9es automatiquement. Les avanc\u00e9es dans l\u2019Intelligence Artificielle pourraient d\u2019ailleurs grandement faciliter \u00e0 l\u2019avenir la mise en \u0153uvre de la micro-segmentation, \u00e0 commencer par la classification des flux d\u00e9couverts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-les-5-clefs-de-la-reussite-d-un-projet-de-micro-segmentation\"><strong>Les 5 clefs de la r\u00e9ussite d\u2019un projet de micro-segmentation<\/strong><\/h2>\n\n\n\n<p>Une fois les premi\u00e8res barri\u00e8res \u00e9cart\u00e9es, toute organisation se lan\u00e7ant dans un projet de micro-segmentation de ses datacenters doit s\u2019assurer de suivre les recommandations suivantes&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Le projet doit faire l\u2019objet d\u2019un sponsorship \u00e0 bon niveau, typiquement DSI ou RSSI, afin de faciliter l\u2019accompagnement au changement<\/li>\n\n\n\n<li>Les acteurs de la s\u00e9curit\u00e9, du r\u00e9seau et les responsables d\u2019applications doivent \u00eatre impliqu\u00e9s d\u00e8s le d\u00e9part<\/li>\n\n\n\n<li>Dans une d\u00e9marche <em>Quick Win<\/em>, les petits p\u00e9rim\u00e8tres ayant des besoins de s\u00e9curit\u00e9 plus \u00e9lev\u00e9s que d\u2019autres, et non encore trait\u00e9s de mani\u00e8re satisfaisante, doivent \u00eatre adress\u00e9s en priorit\u00e9&nbsp;<\/li>\n\n\n\n<li>Un processus acc\u00e9l\u00e9r\u00e9 d\u2019ouverture des \u00e9quipements de s\u00e9curit\u00e9 \u00e0 de nouveaux flux doit \u00eatre mis en place pendant la p\u00e9riode de d\u00e9ploiement, pour \u00e9viter tout impact n\u00e9gatif sur le rythme de mise en place de la solution<\/li>\n\n\n\n<li>Les fonctions annexes et automatis\u00e9es qui apportent un service imm\u00e9diat, comme la d\u00e9couverte des flux et l\u2019historique des communications, doivent \u00eatre mises en \u0153uvre pour acc\u00e9l\u00e9rer le d\u00e9ploiement de la solution.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteur<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/Photo-PW-petite.jpg\" alt=\"Pierre-Charles Wagrez\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/pierre-charles-wagrez-64a47732\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Pierre-Charles Wagrez<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Architecte Entreprise<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/pierre-charles-wagrez-64a47732\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Pierre-Charles Wagrez est Architecte Entreprise chez Capgemini sp\u00e9cialis\u00e9 en architecture des environnements informatiques complexes int\u00e9grant les nouvelles technologies pour de grands comptes dans le domaine bancaire, industriel et informatique.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 64dffa55-5460-4bbe-baa8-9be90a90c97b\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent \">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 77% 39%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d&#8217;une charge de travail\u00a0ou au maximum d&#8217;un petit groupe de charges de travail. <\/p>\n","protected":false},"author":247,"featured_media":744320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"94ca6227-af6f-4a0c-8a62-fa15ac16c4c5\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"c7a2e51f-7764-4a41-acff-16e934fb010a\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[5],"tags":[192],"brand":[30],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-744318","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-cybersecurite","brand-capgemini","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les d\u00e9fis de la micro-segmentation en datacenter - Capgemini France<\/title>\n<meta name=\"description\" content=\"Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d&#039;une charge de travail ou au maximum d&#039;un petit groupe de charges de travail.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les d\u00e9fis de la micro-segmentation en datacenter\" \/>\n<meta property=\"og:description\" content=\"Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d&#039;une charge de travail ou au maximum d&#039;un petit groupe de charges de travail.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-29T12:54:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:48:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/webpreview_blog_micro_segmentation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pierre-Charles Wagrez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"quentinkieken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\"},\"author\":{\"name\":\"quentinkieken\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\"},\"headline\":\"Les d\u00e9fis de la micro-segmentation en datacenter\",\"datePublished\":\"2024-02-29T12:54:54+00:00\",\"dateModified\":\"2025-03-04T05:48:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\"},\"wordCount\":904,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\",\"name\":\"Les d\u00e9fis de la micro-segmentation en datacenter - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg\",\"datePublished\":\"2024-02-29T12:54:54+00:00\",\"dateModified\":\"2025-03-04T05:48:20+00:00\",\"description\":\"Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d'une charge de travail ou au maximum d'un petit groupe de charges de travail.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\",\"name\":\"quentinkieken\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les d\u00e9fis de la micro-segmentation en datacenter - Capgemini France","description":"Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d'une charge de travail ou au maximum d'un petit groupe de charges de travail.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/","og_locale":"fr_FR","og_type":"article","og_title":"Les d\u00e9fis de la micro-segmentation en datacenter","og_description":"Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d'une charge de travail ou au maximum d'un petit groupe de charges de travail.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/","og_site_name":"Capgemini France","article_published_time":"2024-02-29T12:54:54+00:00","article_modified_time":"2025-03-04T05:48:20+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/webpreview_blog_micro_segmentation.png","type":"image\/png"}],"author":"Pierre-Charles Wagrez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"quentinkieken","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/"},"author":{"name":"quentinkieken","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c"},"headline":"Les d\u00e9fis de la micro-segmentation en datacenter","datePublished":"2024-02-29T12:54:54+00:00","dateModified":"2025-03-04T05:48:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/"},"wordCount":904,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/","name":"Les d\u00e9fis de la micro-segmentation en datacenter - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg","datePublished":"2024-02-29T12:54:54+00:00","dateModified":"2025-03-04T05:48:20+00:00","description":"Par opposition \u00e0 la macro-segmentation, qui consiste \u00e0 regrouper un plus ou moins grand nombre de serveurs dans une m\u00eame zone de s\u00e9curit\u00e9, la micro-segmentation applique un filtrage de flux r\u00e9seaux au niveau d'une charge de travail ou au maximum d'un petit groupe de charges de travail.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg","width":2880,"height":1800},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c","name":"quentinkieken","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":5,"name":"Technologies","slug":"technologies"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Les d\u00e9fis de la micro-segmentation en datacenter","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg"},"articleSection":"Technologies","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2024-02-29T12:54:54Z","datePublished":"2024-02-29T12:54:54Z","dateModified":"2025-03-04T05:48:20Z"},"rendered":"<meta name=\"parsely-title\" content=\"Les d\u00e9fis de la micro-segmentation en datacenter\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-micro-segmentation-datacenter\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-02-29T12:54:54Z\" \/>\n<meta name=\"parsely-section\" content=\"Technologies\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":798357,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/retour-experience-coverage-service-domino-e\/","url_meta":{"origin":744318,"position":0},"title":"De la conception \u00e0 l\u2019int\u00e9gration : retour d\u2019exp\u00e9rience sur le Coverage Service dans DOMINO-E","author":"quentinkieken","date":"December 5, 2025","format":false,"excerpt":"DOMINO-E s\u2019inscrit dans la continuit\u00e9 de DOMINO-X, deux projets collaboratifs \u00e0 port\u00e9e nationale et europ\u00e9enne visant \u00e0 concevoir un segment sol d\u2019observation de la Terre modulable et adaptable. DOMINO-X a d\u00e9fini les bases architecturales, fonctionnelles et les interfaces entre composants. DOMINO-E met en \u0153uvre cette vision en d\u00e9veloppant certains modules\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/12\/GettyImages-2151328377.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/12\/GettyImages-2151328377.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/12\/GettyImages-2151328377.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/12\/GettyImages-2151328377.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":749807,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/intelligent-industry-renforcer-resilience-supply-chain-tour-de-controle\/","url_meta":{"origin":744318,"position":1},"title":"La tour de contr\u00f4le pour renforcer la r\u00e9silience de la supply chain","author":"cyrille.joseph-lockel@capgemini.com","date":"April 5, 2024","format":false,"excerpt":"Comment les nouveaux usages de la donn\u00e9e permettent d\u2019assurer collectivement la gestion des risques autour de la Supply Chain ?","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":727916,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/les-trois-piliers-chaine-logistique-omnicanale\/","url_meta":{"origin":744318,"position":2},"title":"Les trois piliers d\u2019une cha\u00eene logistique omnicanale","author":"","date":"September 12, 2023","format":false,"excerpt":"L\u2019omnicanalit\u00e9 s\u2019est impos\u00e9e comme l\u2019horizon \u00e0 atteindre pour les acteurs du retail. Mais offrir une v\u00e9ritable exp\u00e9rience client unifi\u00e9e, de bout-en-bout, reste encore un tour de force.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/GettyImages-1371687094.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/GettyImages-1371687094.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/GettyImages-1371687094.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/GettyImages-1371687094.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":743727,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-de-confiance-un-echelon-supplementaire-dans-la-securite-it\/","url_meta":{"origin":744318,"position":3},"title":"Les op\u00e9rations de confiance, un \u00e9chelon suppl\u00e9mentaire dans la s\u00e9curit\u00e9 de votre patrimoine IT","author":"","date":"February 22, 2024","format":false,"excerpt":"Les op\u00e9rations de confiance, un \u00e9chelon suppl\u00e9mentaire dans la s\u00e9curit\u00e9 de votre patrimoine ITSkander Guetari22 f\u00e9vrier 2024 FacebookLinkedinConsistant \u00e0 louer aupr\u00e8s d\u2019un tiers des ressources mat\u00e9rielles et logicielles d\u2019h\u00e9bergement de donn\u00e9es et d\u2019applications, le cloud est une forme d\u2019externalisation, ce qui implique n\u00e9cessairement un certain degr\u00e9 de confiance entre le\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"Cloud de confiance","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":713450,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/retail-la-data-levier-cle-pour-optimiser-les-assortiments\/","url_meta":{"origin":744318,"position":4},"title":"Retail\u00a0: la data, levier-cl\u00e9 pour optimiser les assortiments","author":"","date":"March 14, 2023","format":false,"excerpt":"Comment am\u00e9liorer la performance des points de vente sans augmenter le nombre de r\u00e9f\u00e9rences et sans \u2013 trop \u2013 toucher au prix de vente\u00a0?","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"Data et Retail","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1292406665-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1292406665-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1292406665-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1292406665-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":788600,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/ramp-up-defense\/","url_meta":{"origin":744318,"position":5},"title":"La mont\u00e9e en puissance, un imp\u00e9ratif strat\u00e9gique pour l\u2019industrie de la D\u00e9fense","author":"rashmiadarshshetty","date":"June 13, 2025","format":false,"excerpt":"Explorez les d\u00e9fis auxquels l'industrie de la d\u00e9fense est confront\u00e9e en mati\u00e8re d'industrialisation de masse et de gestion de la production dans le contexte des conflits arm\u00e9s actuels.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Capgemini-Defense-Production-Acceleration-Web-image-2-2880x1800-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Capgemini-Defense-Production-Acceleration-Web-image-2-2880x1800-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Capgemini-Defense-Production-Acceleration-Web-image-2-2880x1800-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Capgemini-Defense-Production-Acceleration-Web-image-2-2880x1800-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/banner_cyber_micro_segmentation.jpg","author_title":"Pierre-Charles Wagrez","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/Photo-PW-petite.jpg?w=400","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/744318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=744318"}],"version-history":[{"count":13,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/744318\/revisions"}],"predecessor-version":[{"id":776573,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/744318\/revisions\/776573"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/744320"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=744318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=744318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=744318"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=744318"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=744318"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=744318"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=744318"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=744318"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=744318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}