{"id":769739,"date":"2024-11-27T11:26:18","date_gmt":"2024-11-27T10:26:18","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=769739"},"modified":"2025-10-30T16:45:52","modified_gmt":"2025-10-30T15:45:52","slug":"la-securite-des-applications-dans-le-cloud","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","title":{"rendered":"La s\u00e9curit\u00e9 des applications dans le cloud"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>La s\u00e9curit\u00e9 des applications dans le cloud<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/cg-logo-blue.svg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Pierre Gouveia et Abdembi Miraoui<\/h5><h5 class=\"blog-date\">27 novembre 2024<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Zero Trust, la recette de la s\u00e9curit\u00e9 des applications dans le cloud\u00a0<br><\/h2><p class=\"intro-para-content\">La migration vers le cloud fait souvent na\u00eetre des pr\u00e9occupations en mati\u00e8re de cybers\u00e9curit\u00e9 jusqu\u2019\u00e0 en devenir un frein majeur. L&#8217;id\u00e9e d&#8217;abandonner les forteresses de ses data centers pour l&#8217;inconnu du cloud peut sembler risqu\u00e9e.<br><br>Dans cet environnement ouvert du cloud, les menaces peuvent surgir de toutes parts, \u00e0 tous les niveaux et par divers canaux. Transposer des m\u00e9thodes et des dispositifs de s\u00e9curit\u00e9 traditionnels ne suff\u00eet plus. <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-de-confiance-un-echelon-supplementaire-dans-la-securite-it\/\">Une migration ou un d\u00e9veloppement sur le cloud public n\u00e9cessite un renforcement des mesures de s\u00e9curit\u00e9 adapt\u00e9 \u00e0 cet environnement dynamique<\/a>.\u00a0<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Cette vigilance accrue est d&#8217;autant plus indispensable que l&#8217;infrastructure cloud est souvent confi\u00e9e \u00e0 un tiers. M\u00eame si les hyperscalers poss\u00e8dent des ressources in\u00e9gal\u00e9es et des niveaux de s\u00e9curit\u00e9 impressionnants, ils ne sont pas infaillibles.<\/p>\n\n\n\n<p>La s\u00e9curit\u00e9<em> du cloud<\/em>, qui est de la responsabilit\u00e9 de l&#8217;h\u00e9bergeur, ne doit pas \u00eatre dissoci\u00e9e de la s\u00e9curit\u00e9<em> dans le cloud<\/em>, qui incombe au client. Il est crucial de se pr\u00e9munir contre les attaques directes sur les applications et celles visant la plateforme, qui pourraient in fine affecter les utilisateurs\/clients finaux. Cette approche globale et coh\u00e9rente, appel\u00e9e <strong><em>Zero Trust<\/em><\/strong>, instaure une d\u00e9fense en profondeur sur toutes les couches, de l\u2019infrastructure mat\u00e9rielle \u00e0 l\u2019interface utilisateur.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-zero-trust-s-implemente-progressivement-et-avec-pragmatisme\">Zero Trust s\u2019impl\u00e9mente progressivement et avec pragmatisme<\/h2>\n\n\n\n<p>Quand on parle de Zero Trust, les entreprises imaginent souvent des investissements massifs, des projets interminables et des perturbations qui pourraient affaiblir la s\u00e9curit\u00e9 actuelle. Or, <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\">Zero Trust n&#8217;est pas une simple solution technologique, mais une philosophie de cybers\u00e9curit\u00e9<\/a> : il s&#8217;agit de ne faire confiance a priori \u00e0 aucune connexion, \u00e0 aucun appel, et de v\u00e9rifier syst\u00e9matiquement leur s\u00fbret\u00e9 et l\u00e9gitimit\u00e9.<\/p>\n\n\n\n<p>Cela implique l&#8217;implantation de m\u00e9canismes, de proc\u00e9dures et de pratiques de vigilance \u00e0 tous les niveaux. On peut les impl\u00e9menter \u00e0 son rythme, avec pragmatisme, en fonction des risques, des menaces, des enjeux m\u00e9tiers et de la sensibilit\u00e9 des applications et des donn\u00e9es qu&#8217;elles contiennent. Zero Trust est une d\u00e9marche progressive et continue, essentielle pour s\u00e9curiser efficacement les applications dans le cloud, d\u00e8s le d\u00e9but du projet de migration ou construction.&nbsp;<\/p>\n\n\n\n<p>Dans une approche Zero Trust, la priorit\u00e9 absolue est de v\u00e9rifier l&#8217;identit\u00e9 et les autorisations de chaque personne cherchant \u00e0 se connecter \u00e0 l&#8217;application. Une fois connect\u00e9es, elles ne doivent acc\u00e9der qu&#8217;aux informations et actions pour lesquelles elles sont habilit\u00e9es. C&#8217;est pourquoi une gestion robuste des acc\u00e8s et des identit\u00e9s (IAM), combin\u00e9e \u00e0 une authentification multi-facteurs (MFA), est la pierre angulaire du dispositif.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mettre-fin-aux-pratiques-imprudentes\">Mettre fin aux pratiques imprudentes<\/h2>\n\n\n\n<p>Dans le cloud, il est imp\u00e9ratif de mettre fin aux pratiques imprudentes souvent tol\u00e9r\u00e9es dans les data centers traditionnels. Les acc\u00e8s communs, les mots de passe syst\u00e8me partag\u00e9s au sein d\u2019une \u00e9quipe rarement voire m\u00eame jamais chang\u00e9s ou inscrits en dur dans le code, ne sont plus acceptables. D\u00e9sormais, chaque utilisateur doit disposer d\u2019un acc\u00e8s nominatif, il faut renouveler les mots de passes des syst\u00e8mes r\u00e9guli\u00e8rement en minimisant leurs manipulations par les \u00e9quipes.<\/p>\n\n\n\n<p>La modernisation technique offre l&#8217;opportunit\u00e9 de centraliser et d&#8217;automatiser cette gestion des secrets en utilisant des coffres-forts num\u00e9riques. De plus, diverses techniques de chiffrements et d\u2019authentifications comme les cl\u00e9s et certificats doivent \u00eatre mises en place pour garantir la l\u00e9gitimit\u00e9 des communications entre les diff\u00e9rentes couches applicatives.&nbsp;<\/p>\n\n\n\n<p>Dans une version avanc\u00e9e de Zero Trust, une plateforme globale (Cloud Native Application Protection Platform, CNAPP) devient essentielle pour g\u00e9rer la cybers\u00e9curit\u00e9 des applications cloud. Cette approche permet non seulement d&#8217;\u00e9viter les d\u00e9rives techniques qui pourraient affaiblir la structure, mais aussi de rester inform\u00e9 des m\u00e9thodes des attaquants et des vuln\u00e9rabilit\u00e9s qu&#8217;ils exploitent.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cadre-global-et-deploiement-par-projet\">Cadre global et d\u00e9ploiement par projet<\/h2>\n\n\n\n<p>La mise en \u0153uvre de la d\u00e9marche s&#8217;effectue en cascade. Des experts en cybers\u00e9curit\u00e9 d\u00e9finissent les grands principes de la plateforme et adaptent la politique de s\u00e9curit\u00e9 de l&#8217;entreprise au contexte du cloud. Ces lignes directrices sont ensuite d\u00e9clin\u00e9es au sein de chaque projet par des \u00e9quipes d\u2019architectures comp\u00e9tentes en cybers\u00e9curit\u00e9. Cette adaptation est encadr\u00e9e par des m\u00e9canismes de contr\u00f4le et le cas \u00e9ch\u00e9ant une revue de s\u00e9curit\u00e9 comportant une analyse des risques, permettant de d\u00e9terminer s&#8217;il est n\u00e9cessaire d&#8217;ajouter des r\u00e8gles sp\u00e9cifiques.&nbsp;<\/p>\n\n\n\n<p>Pour industrialiser ce travail, Capgemini a \u00e9labor\u00e9 une m\u00e9thodologie propre fond\u00e9e sur des \u00ab building blocks \u00bb. Il s&#8217;agit de constituer un r\u00e9f\u00e9rentiel de composants d&#8217;architecture dont la s\u00e9curit\u00e9 et la conformit\u00e9 ont \u00e9t\u00e9 valid\u00e9es les diff\u00e9rents experts du client. Chaque architecte peut alors piocher dans ce catalogue avec la certitude d&#8217;utiliser des \u00e9l\u00e9ments s\u00fbrs, compatibles et approuv\u00e9s.<\/p>\n\n\n\n<p>Cette m\u00e9thode fiabilise la migration, l&#8217;acc\u00e9l\u00e8re et permet de passer ais\u00e9ment \u00e0 l&#8217;\u00e9chelle. Elle apporte aussi une certaine souplesse de construction, permettant d&#8217;accompagner la mont\u00e9e en maturit\u00e9 sur l&#8217;approche Zero Trust, et de mettre progressivement en place la gouvernance, les processus et les outils pour d\u00e9velopper, moderniser, surveiller et maintenir des applications cloud s\u00e9curis\u00e9es.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-securite-accrue-apres-la-migration-cloud\">Une s\u00e9curit\u00e9 accrue apr\u00e8s la migration cloud<\/h2>\n\n\n\n<p>La plupart des entreprises reconnaissent que la s\u00e9curit\u00e9 de leurs applications s&#8217;am\u00e9liore apr\u00e8s leur migration cloud. Trois facteurs principaux y contribuent :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>La modernisation de l\u2019application et sa remise \u00e0 niveau technique, corrigeant des failles potentielles.<\/li>\n\n\n\n<li>La mise en place de nouveaux m\u00e9canismes de s\u00e9curit\u00e9 align\u00e9s sur l\u2019approche Zero Trust.<\/li>\n\n\n\n<li>La s\u00e9curit\u00e9 inh\u00e9rente \u00e0 la plateforme cloud. <\/li>\n<\/ul>\n\n\n\n<p>De plus, elles s&#8217;engagent dans un cercle vertueux de renforcement constant de leur s\u00e9curit\u00e9 applicative.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteurs<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Pic-Pierre-Gouveia.NV_.png\" alt=\"Pierre Gouveia\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/pierre-gouveia-a970825\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Pierre Gouveia<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Principal Cloud Architect<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/pierre-gouveia-a970825\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg\" alt=\"Abdembi Miraoui\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Abdembi Miraoui<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Co-Head of Service Line \u201cCloud, Endpoint &amp; Infrastructure Security\u201d<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Abdembi est un expert dans le domaine de la cybers\u00e9curit\u00e9, avec une expertise particuli\u00e8re dans les sujets cl\u00e9s tels que le Cloud, les Endpoints et l&#8217;infrastructure. Il est responsable de la service line cybers\u00e9curit\u00e9 &#8220;Cloud, Endpoint &#038; Infrastructure Security&#8221; au sein de l&#8217;entit\u00e9 cybers\u00e9curit\u00e9 du groupe. Gr\u00e2ce \u00e0 ses connaissances pointues et son exp\u00e9rience approfondie acquise depuis plus de 15 ans. Abdembi est capable de fournir des conseils avis\u00e9s sur les enjeux de cybers\u00e9curit\u00e9 les plus complexes. Il est passionn\u00e9 par sa mission de prot\u00e9ger les entreprises contre les cybermenaces et de renforcer la r\u00e9silience de leurs syst\u00e8mes.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-learn-more updated-new-sample-amal learnMoreBlock\"><div class=\"container\"><div class=\"content-title\"><h2 class=\"learnmore-heading\">Nos autres articles de blog<\/h2><\/div><div class=\"row\"><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/&quot;&gt;Migrations cloud et gouvernance de la s\u00e9curit\u00e9<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\">Migrations cloud et gouvernance de la s\u00e9curit\u00e9<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Le cloud transforme la s\u00e9curit\u00e9, n\u00e9cessitant une approche proactive et une r\u00e9vision des processus, des comp\u00e9tences et de la gouvernance pour r\u00e9ussir la migration.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/&quot;&gt;Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\">Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/&quot;&gt;Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\">Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d&#8217;adaptation face \u00e0 l&#8217;\u00e9volution rapide des menaces et des technologies.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader e6cc1615-c0b9-4fd0-872c-0543b711bd9c\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CLOUD\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CLOUD\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Explorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tExplorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CLOUD\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CLOUD.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 46% 49%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cloud\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCloud\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Acc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tAcc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cloud\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 50% 50%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Webpreview-CYBER.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 47% 49%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche comme le mod\u00e8le Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.<\/p>\n","protected":false},"author":12386,"featured_media":770002,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"a4a70456-6282-4825-9949-892dc86e2055\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3,5,138],"tags":[188,192],"brand":[30],"service":[35,47],"industry":[],"partners":[],"blog-topic":[350,354],"content-group":[],"class_list":["post-769739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-technologies","category-transformation","tag-cloud","tag-cybersecurite","brand-capgemini","service-cloud","service-cybersecurite","blog-topic-cloud","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La s\u00e9curit\u00e9 des applications dans le cloud - Capgemini France<\/title>\n<meta name=\"description\" content=\"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La s\u00e9curit\u00e9 des applications dans le cloud\" \/>\n<meta property=\"og:description\" content=\"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-27T10:26:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-30T15:45:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/WebPreview-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pierre Gouveia et Abdembi Miraoui\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tarek Edde Gomez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\"},\"author\":{\"name\":\"Tarek Edde Gomez\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\"},\"headline\":\"La s\u00e9curit\u00e9 des applications dans le cloud\",\"datePublished\":\"2024-11-27T10:26:18+00:00\",\"dateModified\":\"2025-10-30T15:45:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\"},\"wordCount\":1159,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg\",\"keywords\":[\"Cloud\",\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Innovation\",\"Technologies\",\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\",\"name\":\"La s\u00e9curit\u00e9 des applications dans le cloud - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg\",\"datePublished\":\"2024-11-27T10:26:18+00:00\",\"dateModified\":\"2025-10-30T15:45:52+00:00\",\"description\":\"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg\",\"width\":4000,\"height\":2664,\"caption\":\"Beautiful clownfish hiding in green sea anemone.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\",\"name\":\"Tarek Edde Gomez\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La s\u00e9curit\u00e9 des applications dans le cloud - Capgemini France","description":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","og_locale":"fr_FR","og_type":"article","og_title":"La s\u00e9curit\u00e9 des applications dans le cloud","og_description":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","og_site_name":"Capgemini France","article_published_time":"2024-11-27T10:26:18+00:00","article_modified_time":"2025-10-30T15:45:52+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/WebPreview-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","type":"image\/jpeg"}],"author":"Pierre Gouveia et Abdembi Miraoui","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tarek Edde Gomez","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/"},"author":{"name":"Tarek Edde Gomez","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa"},"headline":"La s\u00e9curit\u00e9 des applications dans le cloud","datePublished":"2024-11-27T10:26:18+00:00","dateModified":"2025-10-30T15:45:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/"},"wordCount":1159,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","keywords":["Cloud","Cybers\u00e9curit\u00e9"],"articleSection":["Innovation","Technologies","Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","name":"La s\u00e9curit\u00e9 des applications dans le cloud - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","datePublished":"2024-11-27T10:26:18+00:00","dateModified":"2025-10-30T15:45:52+00:00","description":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","width":4000,"height":2664,"caption":"Beautiful clownfish hiding in green sea anemone."},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa","name":"Tarek Edde Gomez","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/"}]}},"blog_topic_info":[{"id":350,"name":"Cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"},{"id":5,"name":"Technologies","slug":"technologies"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":188,"name":"Cloud","slug":"cloud"},{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":35,"name":"Cloud","slug":"cloud"},{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":350,"name":"Cloud","slug":"cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"La s\u00e9curit\u00e9 des applications dans le cloud","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cloud","cybers\u00e9curit\u00e9"],"dateCreated":"2024-11-27T10:26:18Z","datePublished":"2024-11-27T10:26:18Z","dateModified":"2025-10-30T15:45:52Z"},"rendered":"<meta name=\"parsely-title\" content=\"La s\u00e9curit\u00e9 des applications dans le cloud\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-11-27T10:26:18Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cloud,cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":743727,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-de-confiance-un-echelon-supplementaire-dans-la-securite-it\/","url_meta":{"origin":769739,"position":0},"title":"Les op\u00e9rations de confiance, un \u00e9chelon suppl\u00e9mentaire dans la s\u00e9curit\u00e9 de votre patrimoine IT","author":"","date":"February 22, 2024","format":false,"excerpt":"Les op\u00e9rations de confiance, un \u00e9chelon suppl\u00e9mentaire dans la s\u00e9curit\u00e9 de votre patrimoine ITSkander Guetari22 f\u00e9vrier 2024 FacebookLinkedinConsistant \u00e0 louer aupr\u00e8s d\u2019un tiers des ressources mat\u00e9rielles et logicielles d\u2019h\u00e9bergement de donn\u00e9es et d\u2019applications, le cloud est une forme d\u2019externalisation, ce qui implique n\u00e9cessairement un certain degr\u00e9 de confiance entre le\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"Cloud de confiance","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-1306180063.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":750452,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","url_meta":{"origin":769739,"position":1},"title":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP","author":"anne.gautier@capgemini.com","date":"April 11, 2024","format":false,"excerpt":"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":719405,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/benefices-couts-cloud-de-confiance\/","url_meta":{"origin":769739,"position":2},"title":"B\u00e9n\u00e9fices et co\u00fbts du cloud de confiance","author":"","date":"May 25, 2023","format":false,"excerpt":"Le Cloud de Confiance offre une alternative aux services de Cloud public pour les entreprises et services publics confront\u00e9s \u00e0 des contraintes r\u00e9glementaires et\/ou de souverainet\u00e9.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":715255,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-donnees-dans-environnement-cloud\/","url_meta":{"origin":769739,"position":3},"title":"S\u00e9curiser les donn\u00e9es dans un environnement cloud\u00a0","author":"","date":"April 4, 2023","format":false,"excerpt":"\u00c0 l\u2019\u00e8re du cloud, la data est partout, circulant entre les syst\u00e8mes, se d\u00e9ployant sur d\u2019innombrables terminaux. Elle doit \u00eatre disponible \u00e0 tout moment pour quiconque en a besoin.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":754478,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","url_meta":{"origin":769739,"position":4},"title":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"June 13, 2024","format":false,"excerpt":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9Louis-Xavier Haensler13 juin 2024 FacebookLinkedinBien que cela soit rarement la motivation premi\u00e8re, une migration vers le cloud pr\u00e9sente de nombreux avantages en mati\u00e8re de s\u00e9curit\u00e9. En effet, basculer vers le cloud, c\u2019est b\u00e9n\u00e9ficier d\u2019une infrastructure plus r\u00e9siliente et plus r\u00e9sistante, de l\u2019application imm\u00e9diate des\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":744171,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","url_meta":{"origin":769739,"position":5},"title":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","author":"anne.gautier@capgemini.com","date":"March 7, 2024","format":false,"excerpt":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/769739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=769739"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/769739\/revisions"}],"predecessor-version":[{"id":795662,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/769739\/revisions\/795662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/770002"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=769739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=769739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=769739"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=769739"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=769739"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=769739"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=769739"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=769739"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=769739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}