{"id":977,"date":"2025-01-20T14:05:15","date_gmt":"2025-01-20T14:05:15","guid":{"rendered":"https:\/\/preprod.dataperspective.fr\/?p=977"},"modified":"2025-03-22T14:30:35","modified_gmt":"2025-03-22T14:30:35","slug":"les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud","status":"publish","type":"post","link":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/","title":{"rendered":"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud"},"content":{"rendered":"\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-c41170fa37e8d96e02aaba28d6f6cf61\">En tant que sp\u00e9cialistes du stockage de donn\u00e9es dans le cloud, nous constatons souvent une id\u00e9e re\u00e7ue : beaucoup pensent que les donn\u00e9es dans le cloud sont automatiquement s\u00e9curis\u00e9es. <\/p>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-00099c59f9f5710669542f45be531d24\">Le cloud est effectivement une solution puissante \u2014 il offre flexibilit\u00e9, accessibilit\u00e9 et \u00e9volutivit\u00e9. Cependant, pour tirer pleinement parti de ses avantages, il est essentiel de bien comprendre les responsabilit\u00e9s partag\u00e9es en mati\u00e8re de s\u00e9curit\u00e9 ainsi que les risques potentiels, notamment ceux li\u00e9s aux menaces internes et aux erreurs humaines.<\/p>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-43eb33abbaff0759b50063c1bb033ba1\"><strong>La R\u00e9alit\u00e9 des Menaces Internes<\/strong><br>Lorsque nous parlons de cybers\u00e9curit\u00e9, nous pensons souvent aux hackers, aux logiciels malveillants ou encore aux attaques DDoS. Pourtant, les menaces internes \u2014 qu\u2019elles soient intentionnelles ou accidentelles \u2014 sont tout aussi importantes. Selon le rapport <strong>ENISA Threat Landscape 2024<\/strong>, environ <span style=\"text-decoration: underline;\">13 % des incidents de cybers\u00e9curit\u00e9 en 2023-2024 \u00e9taient li\u00e9s \u00e0 des erreurs humaines<\/span>. Ces erreurs peuvent survenir de diff\u00e9rentes mani\u00e8res : une configuration imparfaite, un fichier sensible envoy\u00e9 par m\u00e9garde ou encore l\u2019utilisation d\u2019un mot de passe trop simple.<\/p>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-2b748041b06fb800ead8042f48213ed6\">De plus, <span style=\"text-decoration: underline;\">Gartner pr\u00e9voit que d\u2019ici 2025, 99 % des failles de s\u00e9curit\u00e9 dans le cloud r\u00e9sulteront d\u2019erreurs humaines ou d\u2019actions des utilisateurs<\/span>, et non par des faiblesses des fournisseurs. Ce constat souligne l\u2019importance de rester vigilants et proactifs face \u00e0 ces risques.<\/p>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-c5ef602f16f270544ac3b41df59550be\"><strong>Pourquoi le Cloud n\u2019est pas Automatiquement S\u00e9curis\u00e9<\/strong><br>Il est compr\u00e9hensible de penser que les fournisseurs de cloud s\u2019occupent de tout. Apr\u00e8s tout, ils mettent en avant leurs infrastructures robustes, leurs certifications et leurs technologies de pointe. Cependant, ces fournisseurs fonctionnent selon un mod\u00e8le de responsabilit\u00e9 partag\u00e9e. Cela signifie qu\u2019ils prot\u00e8gent leur infrastructure, mais que la gestion des acc\u00e8s, des configurations et la sensibilisation des utilisateurs rel\u00e8vent de notre responsabilit\u00e9.<\/p>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-09f9a234818265016abd48bbf21ad71f\">C\u2019est dans ce contexte que les menaces internes jouent un r\u00f4le crucial. Voici quelques exemples courants :<\/p>\n\n\n\n<ul class=\"wp-block-list has-palette-color-4-color has-text-color has-link-color wp-elements-3793d236f410f954847d11b2f26bcd32\">\n<li><strong>Mauvaises Configurations <\/strong>: Des param\u00e8tres mal configur\u00e9s peuvent involontairement rendre les donn\u00e9es accessibles. ENISA rapporte que ces erreurs sont une cause fr\u00e9quente de fuites de donn\u00e9es.<\/li>\n\n\n\n<li><strong>Acc\u00e8s Abusif<\/strong> : Un employ\u00e9 disposant de privil\u00e8ges excessifs peut, m\u00eame involontairement, causer des d\u00e9g\u00e2ts consid\u00e9rables.<\/li>\n\n\n\n<li><strong>Social Engineering<\/strong> : Les cybercriminels exploitent souvent la confiance des utilisateurs pour acc\u00e9der \u00e0 des informations sensibles. Une tentative de phishing bien con\u00e7ue peut suffire.<\/li>\n<\/ul>\n\n\n\n<p><strong>Pour minimiser les risques, voici quelques pratiques que nous recommandons vivement :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-palette-color-4-color has-text-color has-link-color wp-elements-b9e737a10eec02f609790a641f5c60a9\">\n<li><strong>Sensibiliser les \u00c9quipes<\/strong> : Organisons des formations pour aider les collaborateurs \u00e0 rep\u00e9rer les tentatives de phishing et adopter les meilleures pratiques en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es.<\/li>\n\n\n\n<li><strong>Surveiller en Continu<\/strong> : Investissons dans des outils capables de d\u00e9tecter les activit\u00e9s inhabituelles, comme des tentatives d\u2019acc\u00e8s non autoris\u00e9es.<\/li>\n\n\n\n<li><strong>Appliquer le Principe du Moindre Privil\u00e8ge<\/strong> : Garantissons que chaque utilisateur dispose uniquement des droits n\u00e9cessaires \u00e0 son travail, ce qui limite les risques en cas d\u2019erreur.<\/li>\n\n\n\n<li><strong>Auditer R\u00e9guli\u00e8rement les Configurations<\/strong> : V\u00e9rifions fr\u00e9quemment les param\u00e8tres cloud pour \u00e9viter toute exposition accidentelle des donn\u00e9es.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-ddfd9d59269e62a810f3494a03ccb003\"><strong>Une S\u00e9curit\u00e9 Cloud Partag\u00e9e<\/strong><br>Le cloud est une technologie extraordinaire qui transforme notre mani\u00e8re de travailler et de stocker nos donn\u00e9es. Cependant, il est important de garder \u00e0 l\u2019esprit que sa s\u00e9curit\u00e9 repose sur un \u00e9quilibre entre technologie avanc\u00e9e et bonnes pratiques humaines. En investissant dans la sensibilisation, la surveillance et une gestion rigoureuse, nous pouvons profiter pleinement des avantages du cloud tout en minimisant les risques.<\/p>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-cadf85516e74e633d8d28202d7d2e508\">N\u2019oublions jamais que dans le cloud, comme ailleurs, la s\u00e9curit\u00e9 commence par nous.<\/p>\n\n\n\n<p class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-d019a34bc3f53b7cd346fc4ad6b6f3de\">Voici les sources utilis\u00e9es pour le texte sur l\u2019impact des erreurs humaines en informatique :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-5cdcacfe8741eb1e5909a4eb126be14b\"><strong>95 % des atteintes \u00e0 la cybers\u00e9curit\u00e9 sont dues \u00e0 des erreurs humaines<br><\/strong>Selon une \u00e9tude du World Economic Forum, 95 % des incidents de cybers\u00e9curit\u00e9 r\u00e9sultent d&#8217;erreurs humaines, soulignant l&#8217;importance de la formation et de la sensibilisation.<br><a href=\"https:\/\/www.weforum.org\/publications\/global-risks-report-2022\/\"><span style=\"color: var(--theme-palette-color-1, #00509d);\" class=\"stk-highlight\">Source<\/span><br><\/a><\/li>\n\n\n\n<li class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-5a8fbe84109e40d0e3faa70a6f43b1e5\"><strong>Panne informatique mondiale caus\u00e9e par une mise \u00e0 jour d\u00e9fectueuse de CrowdStrike<br><\/strong>En juillet 2024, une mise \u00e0 jour d\u00e9fectueuse du logiciel Falcon Sensor de CrowdStrike a provoqu\u00e9 une panne mondiale, affectant environ 8,5 millions d&#8217;appareils Windows.<br><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Panne_informatique_mondiale_de_juillet_2024\"><span style=\"color: var(--theme-palette-color-1, #00509d);\" class=\"stk-highlight\">Source<\/span><br><\/a><\/li>\n\n\n\n<li class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-5d343fdd738fe3d6357380dc6750cdfe\"><strong>Les erreurs humaines et les ransomwares dominent les failles de s\u00e9curit\u00e9 en France<br><\/strong>Le rapport DBIR 2024 de Verizon r\u00e9v\u00e8le que les erreurs humaines et les ransomwares sont les principales causes de failles de s\u00e9curit\u00e9 en France.<br><a href=\"https:\/\/www.verizon.com\/business\/fr-fr\/resources\/reports\/dbir\/\"><span style=\"color: var(--theme-palette-color-1, #00509d);\" class=\"stk-highlight\">Source<\/span><br><\/a><\/li>\n\n\n\n<li><strong><strong><span style=\"color: var(--theme-palette-color-4, #28292a);\" class=\"stk-highlight\">Through 2025, 99% of cloud security failures will be the customer\u2019s fault.<\/span><\/strong><\/strong><br><a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/is-the-cloud-secure\">Source<\/a><\/li>\n\n\n\n<li class=\"has-palette-color-4-color has-text-color has-link-color wp-elements-f58529c5951dc37b3d236eca348c734c\"><span style=\"color: var(--theme-palette-color-4, #28292a);\" class=\"stk-highlight\">According to CIRAS, the Cybersecurity Incident Reporting and Analysis System,<strong> 13% of the reported incidents in 2023 and 2024 are \u2018human errors<\/strong>.<\/span><\/li>\n\n\n\n<li><a href=\"https:\/\/ciras.enisa.europa.eu\/\">Source<\/a><\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.dataperspective.fr\/index.php\/service\/\">Nos Services<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En tant que sp\u00e9cialistes du stockage de donn\u00e9es dans le cloud, nous constatons souvent une id\u00e9e re\u00e7ue : beaucoup pensent que les donn\u00e9es dans le cloud sont automatiquement s\u00e9curis\u00e9es. Le cloud est effectivement une solution puissante \u2014 il offre flexibilit\u00e9, accessibilit\u00e9 et \u00e9volutivit\u00e9. Cependant, pour tirer pleinement parti de ses avantages, il est essentiel de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_gspb_post_css":"","footnotes":""},"categories":[16],"tags":[17,19,20,18],"class_list":["post-977","post","type-post","status-publish","format-standard","hentry","category-cloud-computing","tag-cloud","tag-donees","tag-nuage","tag-security"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud - Data Perspective<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud - Data Perspective\" \/>\n<meta property=\"og:description\" content=\"En tant que sp\u00e9cialistes du stockage de donn\u00e9es dans le cloud, nous constatons souvent une id\u00e9e re\u00e7ue : beaucoup pensent que les donn\u00e9es dans le cloud sont automatiquement s\u00e9curis\u00e9es. Le cloud est effectivement une solution puissante \u2014 il offre flexibilit\u00e9, accessibilit\u00e9 et \u00e9volutivit\u00e9. Cependant, pour tirer pleinement parti de ses avantages, il est essentiel de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Data Perspective\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T14:05:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-22T14:30:35+00:00\" \/>\n<meta name=\"author\" content=\"pakal98\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pakal98\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/\"},\"author\":{\"name\":\"pakal98\",\"@id\":\"https:\/\/www.dataperspective.fr\/#\/schema\/person\/bf16fe427c6dd537b0592fb83e0709b3\"},\"headline\":\"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud\",\"datePublished\":\"2025-01-20T14:05:15+00:00\",\"dateModified\":\"2025-03-22T14:30:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/\"},\"wordCount\":779,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.dataperspective.fr\/#organization\"},\"keywords\":[\"cloud\",\"don\u00e9es\",\"nuage\",\"security\"],\"articleSection\":[\"Cloud Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/\",\"url\":\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/\",\"name\":\"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud - Data Perspective\",\"isPartOf\":{\"@id\":\"https:\/\/www.dataperspective.fr\/#website\"},\"datePublished\":\"2025-01-20T14:05:15+00:00\",\"dateModified\":\"2025-03-22T14:30:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dataperspective.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dataperspective.fr\/#website\",\"url\":\"https:\/\/www.dataperspective.fr\/\",\"name\":\"Data Perspective\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.dataperspective.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dataperspective.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dataperspective.fr\/#organization\",\"name\":\"Data Perspective\",\"url\":\"https:\/\/www.dataperspective.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dataperspective.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dataperspective.fr\/wp-content\/uploads\/2025\/01\/dp-logo-path-01-1.png\",\"contentUrl\":\"https:\/\/www.dataperspective.fr\/wp-content\/uploads\/2025\/01\/dp-logo-path-01-1.png\",\"width\":2289,\"height\":709,\"caption\":\"Data Perspective\"},\"image\":{\"@id\":\"https:\/\/www.dataperspective.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/charles-levy-dataperspective\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dataperspective.fr\/#\/schema\/person\/bf16fe427c6dd537b0592fb83e0709b3\",\"name\":\"pakal98\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dataperspective.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bff427eaaee563d9126f9f10d36007fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bff427eaaee563d9126f9f10d36007fd?s=96&d=mm&r=g\",\"caption\":\"pakal98\"},\"sameAs\":[\"http:\/\/www.dataperspective.fr\"],\"url\":\"https:\/\/www.dataperspective.fr\/index.php\/author\/pakal98\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud - Data Perspective","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud - Data Perspective","og_description":"En tant que sp\u00e9cialistes du stockage de donn\u00e9es dans le cloud, nous constatons souvent une id\u00e9e re\u00e7ue : beaucoup pensent que les donn\u00e9es dans le cloud sont automatiquement s\u00e9curis\u00e9es. Le cloud est effectivement une solution puissante \u2014 il offre flexibilit\u00e9, accessibilit\u00e9 et \u00e9volutivit\u00e9. Cependant, pour tirer pleinement parti de ses avantages, il est essentiel de [&hellip;]","og_url":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/","og_site_name":"Data Perspective","article_published_time":"2025-01-20T14:05:15+00:00","article_modified_time":"2025-03-22T14:30:35+00:00","author":"pakal98","twitter_card":"summary_large_image","twitter_misc":{"Written by":"pakal98","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#article","isPartOf":{"@id":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/"},"author":{"name":"pakal98","@id":"https:\/\/www.dataperspective.fr\/#\/schema\/person\/bf16fe427c6dd537b0592fb83e0709b3"},"headline":"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud","datePublished":"2025-01-20T14:05:15+00:00","dateModified":"2025-03-22T14:30:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/"},"wordCount":779,"commentCount":0,"publisher":{"@id":"https:\/\/www.dataperspective.fr\/#organization"},"keywords":["cloud","don\u00e9es","nuage","security"],"articleSection":["Cloud Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/","url":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/","name":"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud - Data Perspective","isPartOf":{"@id":"https:\/\/www.dataperspective.fr\/#website"},"datePublished":"2025-01-20T14:05:15+00:00","dateModified":"2025-03-22T14:30:35+00:00","breadcrumb":{"@id":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataperspective.fr\/index.php\/2025\/01\/20\/les-menaces-internes-et-la-fausse-perception-de-la-securite-dans-le-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataperspective.fr\/"},{"@type":"ListItem","position":2,"name":"Les menaces internes et la fausse perception de la s\u00e9curit\u00e9 dans le Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.dataperspective.fr\/#website","url":"https:\/\/www.dataperspective.fr\/","name":"Data Perspective","description":"","publisher":{"@id":"https:\/\/www.dataperspective.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataperspective.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dataperspective.fr\/#organization","name":"Data Perspective","url":"https:\/\/www.dataperspective.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dataperspective.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataperspective.fr\/wp-content\/uploads\/2025\/01\/dp-logo-path-01-1.png","contentUrl":"https:\/\/www.dataperspective.fr\/wp-content\/uploads\/2025\/01\/dp-logo-path-01-1.png","width":2289,"height":709,"caption":"Data Perspective"},"image":{"@id":"https:\/\/www.dataperspective.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/charles-levy-dataperspective\/"]},{"@type":"Person","@id":"https:\/\/www.dataperspective.fr\/#\/schema\/person\/bf16fe427c6dd537b0592fb83e0709b3","name":"pakal98","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dataperspective.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bff427eaaee563d9126f9f10d36007fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bff427eaaee563d9126f9f10d36007fd?s=96&d=mm&r=g","caption":"pakal98"},"sameAs":["http:\/\/www.dataperspective.fr"],"url":"https:\/\/www.dataperspective.fr\/index.php\/author\/pakal98\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/posts\/977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/comments?post=977"}],"version-history":[{"count":16,"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/posts\/977\/revisions"}],"predecessor-version":[{"id":1414,"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/posts\/977\/revisions\/1414"}],"wp:attachment":[{"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/media?parent=977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/categories?post=977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataperspective.fr\/index.php\/wp-json\/wp\/v2\/tags?post=977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}