{"id":5175,"date":"2014-03-03T08:29:21","date_gmt":"2014-03-03T07:29:21","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5175"},"modified":"2019-12-31T11:17:31","modified_gmt":"2019-12-31T10:17:31","slug":"si-industriel-et-securite-oser-la-transformation-partie-1","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/","title":{"rendered":"SI industriel et s\u00e9curit\u00e9 : oser la transformation  (partie 1)"},"content":{"rendered":"<p align=\"left\"><em>La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique\u00bb pilotent les outils de production de nombreuses entreprises. Au-del\u00e0 des risques environnementaux et humains, ils repr\u00e9sentent \u00e9galement un enjeu strat\u00e9gique pour les \u00c9tats. La r\u00e9cente multiplication des incidents n\u00e9cessite donc de se mobiliser pour les s\u00e9curiser et d\u2019amorcer une transformation. Mais par o\u00f9 commencer quand la s\u00e9curit\u00e9 a \u00e9t\u00e9 laiss\u00e9e de c\u00f4t\u00e9 pendant de nombreuses ann\u00e9es ?<\/em><\/p>\n<h2 align=\"left\">\u00a0Des syst\u00e8mes bien sp\u00e9cifiques&#8230;<\/h2>\n<p align=\"left\">Les SII permettent d\u2019assurer le pilotage des outils de production (cha\u00eenes de montage, machines-outils, fours, scanners m\u00e9dicaux, climatisations, aiguillages, pipelines, etc.). De plus en plus ouverts, ils deviennent une vraie passerelle entre les processus de production et le Syst\u00e8me d\u2019Information de Gestion (SIG) de l\u2019entreprise.Un SII est souvent mod\u00e9lis\u00e9 en diff\u00e9rentes \u00a0couches. La premi\u00e8re couche concerne le \u00a0proc\u00e9d\u00e9 physique lui-m\u00eame. La seconde regroupe les capteurs, actuateurs, actionneurs et autres composants \u00e9lectroniques intelligents (IED) qui interagissent physiquement avec le proc\u00e9d\u00e9. La troisi\u00e8me couche assure la supervision et le pilotage du proc\u00e9d\u00e9. Elle est compos\u00e9e d\u2019\u00e9l\u00e9ments tels que les SCADA (Supervisory Control and Data Acquisition), des automates ou PLC (Programmable Logic Controller) et des \u00e9quipements distants, les RTU (Remote Terminal Unit). La quatri\u00e8me couche regroupe les fonctions et outils de management des op\u00e9rations de production.<\/p>\n<p align=\"left\">Enfin, la cinqui\u00e8me et derni\u00e8re couche est tourn\u00e9e vers les fonctions avanc\u00e9es de planification, la logistique ou l\u2019approvisionnement, souvent interfac\u00e9e avec les ERP. Initialement d\u00e9velopp\u00e9s pour l\u2019industrie, les \u00a0syst\u00e8mes construits sur le m\u00eame mod\u00e8le se sont largement r\u00e9pandus. Syst\u00e8mes embarqu\u00e9s dans les voitures ou avions, imagerie \u00a0m\u00e9dicale (scanner, IRM, etc.), syst\u00e8mes plus \u00a0\u00e9tendus comme les smart grids, etc. : les SII sont devenus omnipr\u00e9sents !<\/p>\n<h2 align=\"left\">\u00a0&#8230;et des menaces accrues<\/h2>\n<p>\u00c0 l\u2019origine les SII \u00e9taient isol\u00e9s au sein d\u2019un \u00a0site ou d\u2019une usine, mais aujourd\u2019hui ils \u00a0se doivent d\u2019\u00eatre largement interconnect\u00e9s pour accro\u00eetre productivit\u00e9 et comp\u00e9titivit\u00e9.<br \/>\nCette interconnexion permet de nombreux nouveaux usages mais augmente consid\u00e9rablement l\u2019exposition aux cyberattaques. La majorit\u00e9 de ces syst\u00e8mes n\u2019ont en effet pas \u00e9t\u00e9 con\u00e7us pour une ouverture s\u00e9curis\u00e9e et sont d\u2019autant plus vuln\u00e9rables.<\/p>\n<p>Ainsi, depuis plusieurs ann\u00e9es les attaques d\u2019\u00c9tats ou d\u2019individus malveillants se multiplient. Les cons\u00e9quences peuvent \u00eatre consid\u00e9rables pour la s\u00e9curit\u00e9 des biens et des personnes, avec des sc\u00e9narios graves menant par exemple au d\u00e9versement de produits toxiques dans des syst\u00e8mes de gestion des eaux ou l\u2019explosion de pipelines. Des risques de confidentialit\u00e9 sont \u00e9galement pr\u00e9sents : l\u2019acc\u00e8s aux cha\u00eenes de production autorise l\u2019acc\u00e8s \u00e0 des secrets de fabrication industriels et le vol de propri\u00e9t\u00e9 intellectuelle.<\/p>\n<p>Les \u00c9tats r\u00e9agissent pour faire face aux menaces sur ces syst\u00e8mes. Sur le continent nord-Am\u00e9ricain, la conformit\u00e9 au standard NERC-CIP est devenue obligatoire pour les op\u00e9rateurs de r\u00e9seaux \u00e9lectriques. En France, l\u2019ANSSI a d\u00e9j\u00e0 lanc\u00e9 plusieurs initiatives qui visent \u00e0 d\u00e9finir un cadre de protection minimum pour les installations les plus critiques. Les entreprises doivent donc d\u00e8s maintenant se pr\u00e9parer pour \u00eatre en capacit\u00e9 de r\u00e9pondre \u00e0 ces nouvelles exigences.<\/p>\n<h2>\u00a0Penser la s\u00e9curit\u00e9 des SII diff\u00e9remment<\/h2>\n<p>La s\u00e9curisation des SII n\u00e9cessite d\u2019int\u00e9grer de nouvelles contraintes pour d\u00e9finir des solutions adapt\u00e9es. En effet, vouloir appliquer les bonnes pratiques de s\u00e9curit\u00e9 conventionnelles serait une erreur car les SI industriels pr\u00e9sentent des caract\u00e9ristiques diff\u00e9rentes des SI de gestion.<\/p>\n<p><strong>L\u2019\u00e9chelle de temps est bien sp\u00e9cifique.<\/strong> Les lignes de production sont souvent con\u00e7ues pour une dur\u00e9e de vie de l\u2019ordre de 10 \u00e0 15 ans, parfois m\u00eame au-del\u00e0. Par exemple, dans certains secteurs comme celui des r\u00e9seaux \u00e9lectriques, les \u00e9quipements sont cens\u00e9s \u00eatre en place pendant plusieurs dizaines d\u2019ann\u00e9es.<\/p>\n<p><strong>La disponibilit\u00e9 et la s\u00fbret\u00e9 sont au c\u0153ur des attentions<\/strong>. Dans cet univers sp\u00e9cifique, le crit\u00e8re de disponibilit\u00e9 est primordial. De plus, dans les environnements \u00e0 risques (SEVESO, nucl\u00e9aire, etc.) le maintien des fonctions de s\u00fbret\u00e9 qui assurent la protection des hommeset de l\u2019environnement est essentiel.<\/p>\n<p><strong>Les fournisseurs imposent des solutions packag\u00e9es de bout en bout.<\/strong> Et ils sont souvent r\u00e9ticents \u00e0 appliquer les bonnes pratiques de s\u00e9curit\u00e9, m\u00eame lorsque leurs syst\u00e8mes reposent sur des solutions peu s\u00e9curis\u00e9es issues des SI de gestion&#8230; Si des am\u00e9liorations ont d\u00e9j\u00e0 \u00e9t\u00e9 not\u00e9es, le chemin \u00e0 parcourir reste long.<\/p>\n<p><strong>Les contextes d\u2019implantation sont particuliers et rendent le maintien en condition op\u00e9rationnelle de la s\u00e9curit\u00e9 complexe.<\/strong> Il n\u2019est pas rare d\u2019avoir une partie du syst\u00e8me (voire le syst\u00e8me entier) localis\u00e9e des sites distants, parfois inoccup\u00e9s, difficiles d\u2019acc\u00e8s, et o\u00f9 les conditions peuvent \u00eatre \u00ab hostiles \u00bb.<\/p>\n<p>Cela concerne par exemple les SII pr\u00e9sents sur les plates-formes p\u00e9troli\u00e8res, les pipelines gaziers ou p\u00e9troliers, ou encore les r\u00e9seaux d\u2019eau.<\/p>\n<p>Dans ces conditions, comment initier une d\u00e9marche de s\u00e9curisation ? Quelles sont les premi\u00e8res \u00e9tapes ? (\u00e0 suivre).<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique\u00bb pilotent les outils de&#8230;<\/p>\n","protected":false},"author":188,"featured_media":5026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3227],"tags":[3300,926,1260],"coauthors":[1257],"class_list":["post-5175","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0","tag-manuf-industry-4-0","tag-scada","tag-si-industriel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1) - RiskInsight<\/title>\n<meta name=\"description\" content=\"La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique \u00bb pilotent les outils de production de nombreuses entreprises. Au-del\u00e0 des risques environnementaux et humains, ils repr\u00e9sentent \u00e9galement un enjeu strat\u00e9gique pour les \u00c9tats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique \u00bb pilotent les outils de production de nombreuses entreprises. Au-del\u00e0 des risques environnementaux et humains, ils repr\u00e9sentent \u00e9galement un enjeu strat\u00e9gique pour les \u00c9tats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-03T07:29:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:17:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony di Prima\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony di Prima\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/\"},\"author\":{\"name\":\"Anthony di Prima\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\"},\"headline\":\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1)\",\"datePublished\":\"2014-03-03T07:29:21+00:00\",\"dateModified\":\"2019-12-31T10:17:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/\"},\"wordCount\":931,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"keywords\":[\"manuf &amp; industry 4.0\",\"SCADA\",\"SI industriel\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/\",\"name\":\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"datePublished\":\"2014-03-03T07:29:21+00:00\",\"dateModified\":\"2019-12-31T10:17:31+00:00\",\"description\":\"La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique \u00bb pilotent les outils de production de nombreuses entreprises. Au-del\u00e0 des risques environnementaux et humains, ils repr\u00e9sentent \u00e9galement un enjeu strat\u00e9gique pour les \u00c9tats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"width\":1800,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\",\"name\":\"Anthony di Prima\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1) - RiskInsight","description":"La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique \u00bb pilotent les outils de production de nombreuses entreprises. Au-del\u00e0 des risques environnementaux et humains, ils repr\u00e9sentent \u00e9galement un enjeu strat\u00e9gique pour les \u00c9tats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/","og_locale":"en_US","og_type":"article","og_title":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1) - RiskInsight","og_description":"La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique \u00bb pilotent les outils de production de nombreuses entreprises. Au-del\u00e0 des risques environnementaux et humains, ils repr\u00e9sentent \u00e9galement un enjeu strat\u00e9gique pour les \u00c9tats.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/","og_site_name":"RiskInsight","article_published_time":"2014-03-03T07:29:21+00:00","article_modified_time":"2019-12-31T10:17:31+00:00","og_image":[{"width":1800,"height":1350,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","type":"image\/jpeg"}],"author":"Anthony di Prima","twitter_misc":{"Written by":"Anthony di Prima","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/"},"author":{"name":"Anthony di Prima","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96"},"headline":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1)","datePublished":"2014-03-03T07:29:21+00:00","dateModified":"2019-12-31T10:17:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/"},"wordCount":931,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","keywords":["manuf &amp; industry 4.0","SCADA","SI industriel"],"articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/","name":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","datePublished":"2014-03-03T07:29:21+00:00","dateModified":"2019-12-31T10:17:31+00:00","description":"La s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Informations Industriels (SII) est aujourd\u2019hui au centre des pr\u00e9occupations dans les entreprises concern\u00e9es. Ces syst\u00e8mes qui permettent une action directe dans le monde \u00abphysique\u00bb \u00e0 l\u2019aide d\u2019instructions provenant du monde \u00ab logique \u00bb pilotent les outils de production de nombreuses entreprises. Au-del\u00e0 des risques environnementaux et humains, ils repr\u00e9sentent \u00e9galement un enjeu strat\u00e9gique pour les \u00c9tats.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","width":1800,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/03\/si-industriel-et-securite-oser-la-transformation-partie-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 1)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96","name":"Anthony di Prima","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5175"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5175\/revisions"}],"predecessor-version":[{"id":8121,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5175\/revisions\/8121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/5026"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5175"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}