{"version":"1.0","provider_name":"RiskInsight","provider_url":"https:\/\/www.riskinsight-wavestone.com\/en\/","title":"Chiffrement : la cl\u00e9 d\u2019un cloud computing s\u00e9curis\u00e9 ?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zLp7yBQCf9\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/chiffrement-la-cle-dun-cloud-computing-securise\/\">Chiffrement : la cl\u00e9 d\u2019un cloud computing s\u00e9curis\u00e9 ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/05\/chiffrement-la-cle-dun-cloud-computing-securise\/embed\/#?secret=zLp7yBQCf9\" width=\"600\" height=\"338\" title=\"&#8220;Chiffrement : la cl\u00e9 d\u2019un cloud computing s\u00e9curis\u00e9 ?&#8221; &#8212; RiskInsight\" data-secret=\"zLp7yBQCf9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.riskinsight-wavestone.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","thumbnail_width":693,"thumbnail_height":693,"description":"Le Cloud computing pose de nombreuses interrogations sur sa s\u00e9curit\u00e9. Puis-je avoir confiance dans mon fournisseur ? Quels sont les capacit\u00e9s des administrateurs \u00e0 acc\u00e9der \u00e0 mes donn\u00e9es ? Est-ce que l\u2019isolation est bien r\u00e9alis\u00e9e entre les clients ? Est-ce que les forces de l\u2019ordre d\u2019autre pays peuvent demander un acc\u00e8s \u00e0 mes donn\u00e9es sans que j\u2019en sois inform\u00e9e ? Derri\u00e8re toutes ces questions se cachent de multiples r\u00e9ponses, variant fortement suivant les services utilis\u00e9s, les fournisseurs et leur niveau de s\u00e9curit\u00e9, ou encore la localisation des serveurs et le statut juridique des offreurs de service. Il n\u2019existe pas de r\u00e9ponse unique aujourd\u2019hui et m\u00eame si des certifications, telles que l\u2019ISO 27001 ou encore SSA16\/ISAE3402, apportent des niveaux de garanties compl\u00e9mentaires, il est difficile d\u2019avoir une certitude forte sur le niveau de s\u00e9curit\u00e9."}