{"id":750452,"date":"2024-04-11T10:52:53","date_gmt":"2024-04-11T08:52:53","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=750452"},"modified":"2025-03-04T06:46:29","modified_gmt":"2025-03-04T05:46:29","slug":"unifier-la-securite-dans-le-cloud-grace-au-cnapp","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","title":{"rendered":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Abdembi Miraoui<\/h5><h5 class=\"blog-date\">11 avril 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Plus le cloud gagne du terrain au sein des entreprises, plus elles y placent des donn\u00e9es et des applications sensibles, ce qui excite in\u00e9vitablement les convoitises. Par ailleurs, cette croissance des environnements les rend aussi plus difficiles \u00e0 contr\u00f4ler car on manque de visibilit\u00e9. Enfin, la politique de s\u00e9curit\u00e9 n\u2019a que rarement suivi cette \u00e9volution acc\u00e9l\u00e9r\u00e9e.<\/h2><p class=\"intro-para-content\">Ceci fait perdurer des pratiques p\u00e9rim\u00e9es et inadapt\u00e9es, qui multiplient les risques de maladresses et de n\u00e9gligences. Or, il suffit d\u2019une mauvaise configuration, d\u2019une mauvaise gestion des fichiers, d\u2019une mauvaise application des r\u00e8gles de s\u00e9curit\u00e9 pour laisser des donn\u00e9es sensibles sans protection. R\u00e9sultat\u202f: <a href=\"https:\/\/www.wiz.io\/blog\/the-top-cloud-security-threats-to-be-aware-of-in-2023\" target=\"_blank\" rel=\"noreferrer noopener\">47 % ont au moins une base de donn\u00e9es ou un espace de stockage expos\u00e9s !\u202f<\/a><\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Pour garantir la s\u00e9curit\u00e9 dans le cloud, les entreprises font donc face \u00e0 un double d\u00e9fi\u202f:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Technique : avec pour principaux enjeux la gestion des identit\u00e9s et des acc\u00e8s, la visibilit\u00e9 sur ce qui se passe dans leur(s) cloud(s), et la pr\u00e9vention des fuites de donn\u00e9es\u202f;<\/li>\n\n\n\n<li>Organisationnel et fonctionnel : avec des questions pressantes concernant la conformit\u00e9 r\u00e9glementaire, la mise \u00e0 jour de la strat\u00e9gie de s\u00e9curit\u00e9, et la p\u00e9nurie de comp\u00e9tences cloud et cyber.<\/li>\n<\/ul>\n\n\n\n<p>Mais par-dessus tout, la principale difficult\u00e9 consiste \u00e0 aborder tous ces sujets ensemble, d\u2019une fa\u00e7on coh\u00e9rente, coordonn\u00e9e et \u00e9volutive, afin de rationaliser les efforts et d\u2019\u00e9viter que n\u2019apparaissent sans cesse de nouvelles br\u00e8ches. Cette approche unifi\u00e9e, le <a href=\"https:\/\/www.gartner.com\/reviews\/market\/cloud-native-application-protection-platforms\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner l\u2019a formalis\u00e9e et baptis\u00e9e CNAPP, Cloud Native Application Protection Platform.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-les-huit-domaines-integres-du-cnapp\"><strong>Les huit domaines int\u00e9gr\u00e9s du CNAPP<\/strong><\/h2>\n\n\n\n<p>Le CNAPP int\u00e8gre huit domaines, qui ne sont pas n\u00e9cessairement tous r\u00e9volutionnaires mais qui \u00e9taient jusqu\u2019ici le plus souvent cloisonn\u00e9s et trait\u00e9s de fa\u00e7on dissoci\u00e9e et h\u00e9t\u00e9rog\u00e8ne\u202f:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>CSPM\u202f(Cloud Security Posture Management)\u202f<\/strong>: la colonne vert\u00e9brale du CNAPP, v\u00e9rifie la conformit\u00e9 et la configuration des syst\u00e8mes, inventorie les ressources, cartographie le r\u00e9seau\u202f;&nbsp;<\/li>\n\n\n\n<li><strong>KSPM (Kubernetes Security Posture Management)\u202f<\/strong>: inventorie les containers et v\u00e9rifie leur s\u00e9curit\u00e9\u202f;&nbsp;<\/li>\n\n\n\n<li><strong>DSPM (Data Security Posture Management)<\/strong>\u202f: localise les donn\u00e9es sensibles\/personnelles et \u00e9value leur niveau d\u2019exposition\u202f;&nbsp;<\/li>\n\n\n\n<li><strong>Cloud Workload Protection<\/strong>\u202f: d\u00e9tecte les vuln\u00e9rabilit\u00e9s, les comportements anormaux, les malwares\u202f;&nbsp;<\/li>\n\n\n\n<li><strong>Cloud Infrastructure Entitlement Management\u202f<\/strong>: apporte de la visibilit\u00e9 sur les droits, sur la gestion des identit\u00e9s et des acc\u00e8s, et sur les risques associ\u00e9s\u202f;&nbsp;<\/li>\n\n\n\n<li><strong>Web Application and API Protection<\/strong>\u202f: inventorie les API, d\u00e9tecte les vuln\u00e9rabilit\u00e9s et les expositions\u202f;&nbsp;<\/li>\n\n\n\n<li><strong>Shift-Left Security<\/strong>\u202f: r\u00e9alise des analyses en amont (images des containers, Infrastructure as Code, registre)\u202f;&nbsp;<\/li>\n\n\n\n<li><strong>Cloud Detection and Response<\/strong>\u202f: g\u00e8re les expositions, analyse les chemins d\u2019attaque, priorise les risques.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-visibilite-sans-precedent-y-compris-en-multiclouds\"><strong>Une visibilit\u00e9 sans pr\u00e9c\u00e9dent, y compris en multiclouds<\/strong><\/h2>\n\n\n\n<p>En adoptant un prisme r\u00e9solument technique, le CNAPP couvre de fa\u00e7on exhaustive l\u2019ensemble des ressources dans le cloud et donne sur celles-ci, et sur les menaces associ\u00e9es, une visibilit\u00e9 compl\u00e8te et sans pr\u00e9c\u00e9dent. Le CNAPP peut par exemple d\u00e9tecter des chemins d\u2019attaque qui exploiteraient une succession de vuln\u00e9rabilit\u00e9s non critiques et que personne ne pourrait soup\u00e7onner \u00e0 moins de proc\u00e9der \u00e0 d\u2019impossibles rapprochements manuels. De plus, il peut \u00e9valuer le niveau de risque d\u2019une vuln\u00e9rabilit\u00e9 pour l\u2019organisation au regard du contexte et des divers dispositifs mis en place par ailleurs, ce qui contribue \u00e0 limiter le nombre de faux positifs. En ne laissant ni lacune ni zone d\u2019ombre dans l\u2019analyse de s\u00e9curit\u00e9, l\u2019approche globale du CNAPP permet ainsi d\u2019adresser efficacement, et sous l\u2019angle du risque, les sujets de s\u00e9curit\u00e9 transverses comme la gouvernance, la conformit\u00e9, la data, la d\u00e9tection, la continuit\u00e9 d\u2019activit\u00e9 et la r\u00e9silience\u2026<\/p>\n\n\n\n<p>Mieux encore, le CNAPP est fait pour les environnements multiclouds, sur lesquels il permet d\u2019avoir des niveaux de s\u00e9curit\u00e9 et de visibilit\u00e9 homog\u00e8nes, et d\u2019y d\u00e9ployer des r\u00e8gles communes. Enfin, il apporte une aide \u00e0 la r\u00e9solution, qui pourra \u00eatre manuelle ou automatis\u00e9e. Ainsi, le CNAPP ne se destine pas uniquement aux professionnels de la s\u00e9curit\u00e9, mais aussi \u00e0 tous les acteurs (m\u00e9tiers, d\u00e9veloppement, op\u00e9rations\u2026) \u00e0 qui pourront \u00eatre d\u00e9l\u00e9gu\u00e9es les corrections. Cela en fait un outil id\u00e9al pour diffuser la culture de la s\u00e9curit\u00e9 en interne (le fameux Shift Left du DevSecOps) et soulager des \u00e9quipes s\u00e9curit\u00e9 en manque d\u2019effectifs et sur-sollicit\u00e9es. Le CNAPP ne couvre toutefois pas le contr\u00f4le du trafic et la s\u00e9curisation des applications en SaaS, pour lesquels il faut se tourner respectivement vers un CASB (Cloud Access Security Broker) et un SSPM (SaaS Security Posture Management).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-un-marche-atomise-et-des-solutions-encore-jeunes\">Un march\u00e9 atomis\u00e9 et des solutions encore jeunes<\/h2>\n\n\n\n<p>On recense sur le march\u00e9 une vingtaine de solutions affich\u00e9es comme CNAPP. Elles sont propos\u00e9es par des \u00e9diteurs issus de tous les horizons de la cybers\u00e9curit\u00e9\u202f\u2013 CSPM, Workload Protection, cloud provider \u2013 auxquels s\u2019ajoutent quelques pure players d\u2019apparition r\u00e9cente. L\u2019une des principales diff\u00e9rences entre ces solutions, pour la plupart en mode SaaS, r\u00e9side dans leur approche de l\u2019analyse\u202f: avec ou sans agent. La pr\u00e9sence d\u2019un agent permet une analyse plus approfondie ainsi qu\u2019une analyse dite \u00ab\u202fruntime\u202f\u00bb, qui donne une visibilit\u00e9 en direct. Elle permet aussi de proposer des fonctions de rem\u00e9diation imm\u00e9diate (mise en quarantaine, blocage de trafic en cas de comportement anormal\u2026). L\u2019approche sans agent apporte quant \u00e0 elle plus de souplesse et de rapidit\u00e9 de d\u00e9ploiement. Ces deux approches ne sont pas antagonistes. En revanche, la rem\u00e9diation est une action trop sensible pour \u00eatre trait\u00e9e via la plateforme CNAPP, car cela requiert de lui accorder des droits d\u2019\u00e9criture tr\u00e8s \u00e9lev\u00e9s, ce qui expose les clients \u00e0 des attaques de type supply chain.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-deux-regles-d-or-pour-reussir-nbsp\"><strong>Deux r\u00e8gles d\u2019or pour r\u00e9ussir<\/strong>&nbsp;<\/h2>\n\n\n\n<p>En r\u00e8gle g\u00e9n\u00e9rale, un CNAPP se d\u00e9ploie en peu de temps et fournit aussit\u00f4t des r\u00e9sultats probants. M\u00eame les organisations les plus matures en mati\u00e8re de cybers\u00e9curit\u00e9 d\u00e9couvrent dans leur dispositif des failles qu\u2019elles ne soup\u00e7onnaient pas. N\u00e9anmoins, cette rapidit\u00e9 de la mise en \u0153uvre technique ne doit pas laisser oublier l\u2019ampleur v\u00e9ritable du projet, dont la r\u00e9ussite passera par le respect deux grandes r\u00e8gles\u202f:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Premi\u00e8rement, mettre en place une gouvernance, des r\u00f4les et des responsabilit\u00e9s autour de l\u2019outil, et au-del\u00e0 de l\u2019\u00e9quipe cyber, afin de garantir que les vuln\u00e9rabilit\u00e9s d\u00e9tect\u00e9es seront trait\u00e9es.<\/li>\n\n\n\n<li>Deuxi\u00e8mement, se doter d\u2019une vision \u00e0 moyen, voire long, terme car il faudra du temps pour mettre en \u0153uvre les huit domaines du CNAPP. Si le CSPM est toujours le point de d\u00e9part, la feuille de route d\u00e9pendra ensuite des priorit\u00e9s, des risques et de la maturit\u00e9 sur les diff\u00e9rents domaines.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteur<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg\" alt=\"Abdembi Miraoui\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Abdembi Miraoui<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Co-Head of Service Line \u201cCloud, Endpoint &amp; Infrastructure Security\u201d<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Abdembi est un expert dans le domaine de la cybers\u00e9curit\u00e9, avec une expertise particuli\u00e8re dans les sujets cl\u00e9s tels que le Cloud, les Endpoints et l&#8217;infrastructure. Il est responsable de la service line cybers\u00e9curit\u00e9 &#8220;Cloud, Endpoint &#038; Infrastructure Security&#8221; au sein de l&#8217;entit\u00e9 cybers\u00e9curit\u00e9 du groupe. Gr\u00e2ce \u00e0 ses connaissances pointues et son exp\u00e9rience approfondie acquise depuis plus de 15 ans. Abdembi est capable de fournir des conseils avis\u00e9s sur les enjeux de cybers\u00e9curit\u00e9 les plus complexes. Il est passionn\u00e9 par sa mission de prot\u00e9ger les entreprises contre les cybermenaces et de renforcer la r\u00e9silience de leurs syst\u00e8mes.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-learn-more learnMoreBlock updated-new-sample-amal\"><div class=\"container\"><div class=\"content-title\"><h2 class=\"learnmore-heading\">Nos autres articles de blog<\/h2><\/div><div class=\"row\"><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" target=\"\" aria-label=\"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\">Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9<\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d&#8217;adaptation face \u00e0 l&#8217;\u00e9volution rapide des menaces et des technologies.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/&quot;&gt;Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/\">Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Le cloud a amplement d\u00e9montr\u00e9 ses b\u00e9n\u00e9fices en termes d\u2019agilit\u00e9, de rapidit\u00e9 et de capacit\u00e9 d\u2019innovation.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/&quot;&gt;Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\">Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est \u00e0 priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 0167d4c0-67c8-495f-a88c-4ff8fa696931\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CLOUD\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CLOUD\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Explorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tExplorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CLOUD\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 52% 52%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cloud\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCloud\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Acc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tAcc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cloud\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.<\/p>\n","protected":false},"author":166,"featured_media":750457,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"95d22a2e-b38e-40d3-a782-b05d7412b7dd\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"8b28f2f1-62a7-4885-8317-7a9114f928c7\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[5],"tags":[188,192],"brand":[30],"service":[35,47],"industry":[],"partners":[],"blog-topic":[350,354],"content-group":[],"class_list":["post-750452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-cloud","tag-cybersecurite","brand-capgemini","service-cloud","service-cybersecurite","blog-topic-cloud","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP - Capgemini France<\/title>\n<meta name=\"description\" content=\"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP\" \/>\n<meta property=\"og:description\" content=\"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-11T08:52:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:46:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Webpreview-blog-11Avril-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abdembi Miraoui\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@anne.gautier@capgemini.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anne.gautier@capgemini.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\"},\"author\":{\"name\":\"anne.gautier@capgemini.com\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\"},\"headline\":\"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP\",\"datePublished\":\"2024-04-11T08:52:53+00:00\",\"dateModified\":\"2025-03-04T05:46:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\"},\"wordCount\":1338,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg\",\"keywords\":[\"Cloud\",\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\",\"name\":\"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg\",\"datePublished\":\"2024-04-11T08:52:53+00:00\",\"dateModified\":\"2025-03-04T05:46:29+00:00\",\"description\":\"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg\",\"width\":2298,\"height\":1506,\"caption\":\"Clownfish Hiding in Anemone. Image was taken near the Racha island. Thailand\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\",\"name\":\"anne.gautier@capgemini.com\",\"sameAs\":[\"https:\/\/x.com\/anne.gautier@capgemini.com\",\"anne.gautier@capgemini.com\"],\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP - Capgemini France","description":"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","og_locale":"fr_FR","og_type":"article","og_title":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP","og_description":"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","og_site_name":"Capgemini France","article_published_time":"2024-04-11T08:52:53+00:00","article_modified_time":"2025-03-04T05:46:29+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Webpreview-blog-11Avril-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","type":"image\/jpeg"}],"author":"Abdembi Miraoui","twitter_card":"summary_large_image","twitter_creator":"@anne.gautier@capgemini.com","twitter_misc":{"Written by":"anne.gautier@capgemini.com","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/"},"author":{"name":"anne.gautier@capgemini.com","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e"},"headline":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP","datePublished":"2024-04-11T08:52:53+00:00","dateModified":"2025-03-04T05:46:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/"},"wordCount":1338,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","keywords":["Cloud","Cybers\u00e9curit\u00e9"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","name":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","datePublished":"2024-04-11T08:52:53+00:00","dateModified":"2025-03-04T05:46:29+00:00","description":"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","width":2298,"height":1506,"caption":"Clownfish Hiding in Anemone. Image was taken near the Racha island. Thailand"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e","name":"anne.gautier@capgemini.com","sameAs":["https:\/\/x.com\/anne.gautier@capgemini.com","anne.gautier@capgemini.com"],"url":"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/"}]}},"blog_topic_info":[{"id":350,"name":"Cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":5,"name":"Technologies","slug":"technologies"}],"post_tag":[{"id":188,"name":"Cloud","slug":"cloud"},{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":35,"name":"Cloud","slug":"cloud"},{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":350,"name":"Cloud","slug":"cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg"},"articleSection":"Technologies","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cloud","cybers\u00e9curit\u00e9"],"dateCreated":"2024-04-11T08:52:53Z","datePublished":"2024-04-11T08:52:53Z","dateModified":"2025-03-04T05:46:29Z"},"rendered":"<meta name=\"parsely-title\" content=\"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-04-11T08:52:53Z\" \/>\n<meta name=\"parsely-section\" content=\"Technologies\" \/>\n<meta name=\"parsely-tags\" content=\"cloud,cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":754478,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","url_meta":{"origin":750452,"position":0},"title":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"June 13, 2024","format":false,"excerpt":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9Louis-Xavier Haensler13 juin 2024 FacebookLinkedinBien que cela soit rarement la motivation premi\u00e8re, une migration vers le cloud pr\u00e9sente de nombreux avantages en mati\u00e8re de s\u00e9curit\u00e9. En effet, basculer vers le cloud, c\u2019est b\u00e9n\u00e9ficier d\u2019une infrastructure plus r\u00e9siliente et plus r\u00e9sistante, de l\u2019application imm\u00e9diate des\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":769739,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","url_meta":{"origin":750452,"position":1},"title":"La s\u00e9curit\u00e9 des applications dans le cloud","author":"Tarek Edde Gomez","date":"November 27, 2024","format":false,"excerpt":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche comme le mod\u00e8le Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":743727,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-de-confiance-un-echelon-supplementaire-dans-la-securite-it\/","url_meta":{"origin":750452,"position":2},"title":"Les op\u00e9rations de confiance, un \u00e9chelon suppl\u00e9mentaire dans la s\u00e9curit\u00e9 de votre patrimoine IT","author":"","date":"February 22, 2024","format":false,"excerpt":"Les op\u00e9rations de confiance, un \u00e9chelon suppl\u00e9mentaire dans la s\u00e9curit\u00e9 de votre patrimoine ITSkander Guetari22 f\u00e9vrier 2024 FacebookLinkedinConsistant \u00e0 louer aupr\u00e8s d\u2019un tiers des ressources mat\u00e9rielles et logicielles d\u2019h\u00e9bergement de donn\u00e9es et d\u2019applications, le cloud est une forme d\u2019externalisation, ce qui implique n\u00e9cessairement un certain degr\u00e9 de confiance entre le\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"Cloud de confiance","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":715301,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/","url_meta":{"origin":750452,"position":3},"title":"Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9","author":"","date":"April 6, 2023","format":false,"excerpt":"Le cloud a amplement d\u00e9montr\u00e9 ses b\u00e9n\u00e9fices en termes d\u2019agilit\u00e9, de rapidit\u00e9 et de capacit\u00e9 d\u2019innovation. Pourtant, certains h\u00e9sitent encore, le plus souvent parce qu\u2019ils craignent pour la confidentialit\u00e9 de leurs donn\u00e9es et de leurs transactions.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":715255,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-donnees-dans-environnement-cloud\/","url_meta":{"origin":750452,"position":4},"title":"S\u00e9curiser les donn\u00e9es dans un environnement cloud\u00a0","author":"","date":"April 4, 2023","format":false,"excerpt":"\u00c0 l\u2019\u00e8re du cloud, la data est partout, circulant entre les syst\u00e8mes, se d\u00e9ployant sur d\u2019innombrables terminaux. Elle doit \u00eatre disponible \u00e0 tout moment pour quiconque en a besoin.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":735311,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/le-cloud-accelerateur-de-la-servicisation\/","url_meta":{"origin":750452,"position":5},"title":"Le cloud, incontournable acc\u00e9l\u00e9rateur de la servicisation\u00a0","author":"","date":"November 16, 2023","format":false,"excerpt":"Le cloud \u00e9merge comme l'incontournable acc\u00e9l\u00e9rateur de la servicisation, permettant aux entreprises industrielles de passer \u00e0 l'\u00e9chelle en fournissant des services int\u00e9gr\u00e9s. Gr\u00e2ce \u00e0 sa scalabilit\u00e9, son innovation et sa s\u00e9curit\u00e9, il offre une plateforme essentielle pour collecter, traiter et analyser diverses donn\u00e9es, r\u00e9pondant ainsi \u00e0 la demande croissante des\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Image-Servicisation-blog.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Image-Servicisation-blog.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Image-Servicisation-blog.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Image-Servicisation-blog.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/750452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=750452"}],"version-history":[{"count":18,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/750452\/revisions"}],"predecessor-version":[{"id":776566,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/750452\/revisions\/776566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/750457"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=750452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=750452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=750452"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=750452"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=750452"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=750452"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=750452"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=750452"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=750452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}