{"id":1887,"date":"2012-06-07T12:26:03","date_gmt":"2012-06-07T11:26:03","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1887"},"modified":"2019-12-31T12:10:53","modified_gmt":"2019-12-31T11:10:53","slug":"iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/","title":{"rendered":"ISO 27001,  un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ?"},"content":{"rendered":"<p>Google a la semaine pass\u00e9e annonc\u00e9 en grande pompe l\u2019obtention de la certification ISO 27001 pour ses services Google Apps for Business. Mais quels sont donc les b\u00e9n\u00e9fices d\u2019une telle certification pour un fournisseur de service comme Google\u00a0?<\/p>\n<h2><strong>Certifier le management de la s\u00e9curit\u00e9, pas un niveau de s\u00e9curit\u00e9<\/strong><\/h2>\n<p>Tout d\u2019abord, bref retour sur un point majeur trop souvent oubli\u00e9\u00a0: la norme ISO 27001 ne certifie pas un niveau de s\u00e9curit\u00e9, mais son management. Cette norme, qui \u00e9nonce les exigences \u00e0 mettre en \u0153uvre pour l\u2019impl\u00e9mentation d\u2019un Syst\u00e8me de Management de la S\u00e9curit\u00e9 de l\u2019Information (SMSI), vise \u00e0 mettre en place le management de la s\u00e9curit\u00e9 et \u00e0 s\u2019assurer de son am\u00e9lioration continue sur le p\u00e9rim\u00e8tre de la certification.<\/p>\n<p><!--more-->Le choix des mesures et du niveau de s\u00e9curit\u00e9 en place est donc fait en r\u00e9ponse aux risques et exigences identifi\u00e9s par les parties prenantes\u00a0: un choix n\u00e9cessairement valid\u00e9 par le management\u00a0! Contrairement \u00e0 un standard \u00ab\u00a0catalogue\u00a0\u00bb comme PCI-DSS o\u00f9 toutes les mesures doivent \u00eatre impl\u00e9ment\u00e9es pour arriver \u00e0 la certification, l\u2019audit ISO 27001 ne v\u00e9rifiera que les mesures s\u00e9lectionn\u00e9es comme apportant une r\u00e9ponse aux risques. Une diff\u00e9rence de taille, qui pousse vers une s\u00e9curit\u00e9 pragmatique mais en contrepartie n\u00e9cessite une analyse des risques de s\u00e9curit\u00e9 de qualit\u00e9 et une attention particuli\u00e8re de l\u2019auditeur externe.<\/p>\n<h2>U<strong>n p\u00e9rim\u00e8tre solide<\/strong><\/h2>\n<p>De nombreuses entreprises affichent des certifications, mais il est souvent n\u00e9cessaire pour les clients de s\u2019attarder sur la lecture du p\u00e9rim\u00e8tre pour en conna\u00eetre la valeur\u00a0: un p\u00e9rim\u00e8tre tr\u00e8s limit\u00e9 par rapport \u00e0 l\u2019utilisation de leurs donn\u00e9es peut \u00eatre trompeur\u00a0!<\/p>\n<p>Ce n\u2019est pas le cas ici, puisque Google pr\u00e9sente une certification ISO 27001 qui couvre l\u2019ensemble des syst\u00e8mes, collaborateurs, processus et datacenters qui permettent de d\u00e9livrer le service Google Apps. Cela inclut les services \u00a0GMail, Google Talk, Google Calendar, Google Docs (documents, spreadsheets, presentations), Google Sites, Control Panel (CPanel), Google Contacts, Google Video, Google Groups, mais aussi les briques support (Directory Sync, Provisioning API, SAML-Based SSO API, Reporting API, Audit API). C\u2019est un p\u00e9rim\u00e8tre impressionnant au vu de la couverture des services, tant sur le plan fonctionnel que g\u00e9ographique\u00a0!<\/p>\n<h2><strong>D\u00e9velopper la confiance et diminuer le nombre d\u2019audits<\/strong><\/h2>\n<p>A l\u2019heure o\u00f9 de plus en plus d\u2019entreprises se posent la question de l\u2019opportunit\u00e9 d\u2019externaliser les services de bureautiques comme la messagerie, l\u2019\u00e9dition de documents, etc., rassurer les responsables de la s\u00e9curit\u00e9 en garantissant les meilleures pratiques de management de la s\u00e9curit\u00e9 ne peut qu\u2019\u00eatre positif en termes marketing. Au-del\u00e0 de l\u2019apport de confiance, c\u2019est \u00e9galement pour Google la garantie d\u2019une reconnaissance externe, sanctionn\u00e9e par un organisme de certification ind\u00e9pendant, qui pourra diminuer le nombre ou la charge d\u2019audits des clients. Un b\u00e9n\u00e9fice op\u00e9rationnel non n\u00e9gligeable\u00a0&#8211; m\u00eame si Google n\u2019\u00e9tait pas tr\u00e8s enclin \u00e0 se faire auditer !<\/p>\n<p>Si Google a largement communiqu\u00e9 sur l\u2019obtention de la certification, la firme de Mountain View n\u2019a pas \u00e9t\u00e9 la premi\u00e8re \u00e0 se lancer dans l\u2019aventure : Amazon web services et Microsoft Office 365 ont d\u00e9j\u00e0 fait l\u2019objet de la mise en place de SMSI certifi\u00e9s. Apr\u00e8s les infog\u00e9rants, l\u2019ISO 27001 serait donc en passe de devenir le standard de r\u00e9f\u00e9rence pour la s\u00e9curit\u00e9 des services dans le Cloud\u00a0: on ne peut que se r\u00e9jouir de ce mouvement qui rassurera les entreprises clientes de ces services. Celles-ci ne doivent cependant pas consid\u00e9rer la certification comme un niveau de s\u00e9curit\u00e9 \u00ab\u00a0garantie\u00a0\u00bb et rester attentive aux p\u00e9rim\u00e8tres et aux mesures mises en place concr\u00e8tement.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google a la semaine pass\u00e9e annonc\u00e9 en grande pompe l\u2019obtention de la certification ISO 27001 pour ses services Google Apps for Business. Mais quels sont donc les b\u00e9n\u00e9fices d\u2019une telle certification pour un fournisseur de service comme Google\u00a0? Certifier le&#8230;<\/p>\n","protected":false},"author":14,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[80,3119,62,63],"coauthors":[782],"class_list":["post-1887","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-cloud","tag-cloud-security","tag-iso-27001","tag-smsi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Google a la semaine pass\u00e9e annonc\u00e9 en grande pompe l\u2019obtention de la certification ISO 27001 pour ses services Google Apps for Business. Mais quels sont donc les b\u00e9n\u00e9fices d\u2019une telle certification pour un fournisseur de service comme Google\u00a0? Certifier le...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-07T11:26:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:10:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marion Couturier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marion Couturier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/\"},\"author\":{\"name\":\"Marion Couturier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\"},\"headline\":\"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ?\",\"datePublished\":\"2012-06-07T11:26:03+00:00\",\"dateModified\":\"2019-12-31T11:10:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/\"},\"wordCount\":660,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"Cloud\",\"Cloud security\",\"ISO 27001\",\"SMSI\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/\",\"name\":\"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2012-06-07T11:26:03+00:00\",\"dateModified\":\"2019-12-31T11:10:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\",\"name\":\"Marion Couturier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/","og_locale":"en_US","og_type":"article","og_title":"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ? - RiskInsight","og_description":"Google a la semaine pass\u00e9e annonc\u00e9 en grande pompe l\u2019obtention de la certification ISO 27001 pour ses services Google Apps for Business. Mais quels sont donc les b\u00e9n\u00e9fices d\u2019une telle certification pour un fournisseur de service comme Google\u00a0? Certifier le...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/","og_site_name":"RiskInsight","article_published_time":"2012-06-07T11:26:03+00:00","article_modified_time":"2019-12-31T11:10:53+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Marion Couturier","twitter_misc":{"Written by":"Marion Couturier","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/"},"author":{"name":"Marion Couturier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92"},"headline":"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ?","datePublished":"2012-06-07T11:26:03+00:00","dateModified":"2019-12-31T11:10:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/"},"wordCount":660,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["Cloud","Cloud security","ISO 27001","SMSI"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/","name":"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2012-06-07T11:26:03+00:00","dateModified":"2019-12-31T11:10:53+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/iso-27001-un-passage-oblige-pour-les-fournisseurs-de-services-dans-le-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"ISO 27001, un passage oblig\u00e9 pour les fournisseurs de services dans le cloud ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92","name":"Marion Couturier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1887"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1887\/revisions"}],"predecessor-version":[{"id":6442,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1887\/revisions\/6442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1887"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}