{"id":7024,"date":"2015-01-30T08:50:11","date_gmt":"2015-01-30T07:50:11","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=7024"},"modified":"2019-12-31T10:42:19","modified_gmt":"2019-12-31T09:42:19","slug":"architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/","title":{"rendered":"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique"},"content":{"rendered":"<p>Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9. Alors que les installations industrielles doivent faire face \u00e0 de nombreux risques, en particulier humains et environnementaux, orchestrer leur ouverture au SI de l\u2019entreprise voire \u00e0 internet les expose \u00e0 des menaces plus nombreuses et virulentes.<\/p>\n<h2>Cloisonnement et segmentation : standards et r\u00e9glementations se mettent d\u2019accord<\/h2>\n<p>Pour traiter ces risques, trois m\u00e9thodologies issues de l\u2019IEC 62443, du NIST SP-800-82 et du guide de l\u2019ANSSI, sont usuellement retenues.<\/p>\n<p>L\u2019IEC 62443 (ISA99) a \u00e9tabli les concepts de \u00ab zones \u00bb et de \u00ab conduits \u00bb avec pour chacun un niveau de s\u00e9curit\u00e9 (Security Level \u2013 SL) et des r\u00e8gles bien sp\u00e9cifiques. Le d\u00e9coupage en zones peut s\u2019\u00e9tablir d\u2019un point de vue physique (b\u00e2timent, atelier) ou logique (r\u00e9partition par processus industriel ou par fonction).<\/p>\n<p>Toutes les zones communiquent entres elles par un conduit et peuvent \u00e9galement \u00eatre imbriqu\u00e9es, dans une logique de d\u00e9fense en profondeur. Selon le niveau de criticit\u00e9 des zones et des conduits, des r\u00e8gles de s\u00e9curit\u00e9 sont d\u00e9finies et peuvent \u00eatre plus ou moins restrictives. La d\u00e9termination du niveau de s\u00e9curit\u00e9 d\u2019une zone (ou d\u2019un conduit) s\u2019effectue au travers d\u2019une analyse de risque. Concr\u00e8tement, il correspond au niveau de robustesse des mesures de s\u00e9curit\u00e9 \u00e0 impl\u00e9menter permettant de faire face \u00e0 des menaces plus ou moins \u00e9volu\u00e9es. Pour l\u2019IEC, il s\u2019agira de segmenter et d\u2019isoler physiquement les SI Industriels des SI de gestion et aussi de cloisonner les syst\u00e8mes critiques (syst\u00e8mes de s\u00fbret\u00e9) des syst\u00e8mes de conduite des proc\u00e9d\u00e9s.<\/p>\n<p>Le NIST, au travers de sa publication sp\u00e9- ciale pour les syst\u00e8mes industriels, expose de bonnes pratiques d\u2019architectures s\u00e9curis\u00e9es sans promouvoir un mod\u00e8le en particulier. Il consacre un chapitre entier au th\u00e8me de la s\u00e9curisation des architectures des SI Industriels. Il met en avant le cloisonnement entre SI de gestion et SI Industriels en proposant des architectures type \u00e0 base de DMZ, de firewall voire de diode. De bonnes pratiques et une matrice de flux type sont m\u00eame propos\u00e9es avec un focus pour des flux plus sp\u00e9cifiques.<\/p>\n<p>En France, l\u2019ANSSI pr\u00e9voit de cat\u00e9goriser les SI Industriels en 3 classes distinctes selon leur criticit\u00e9. Trois niveaux sont d\u00e9finis ; la d\u00e9termination du niveau pour une installation s\u2019effectue au travers de crit\u00e8res tels que connectivit\u00e9, fonctionnalit\u00e9s, niveau d\u2019exposition, attractivit\u00e9 pour un attaquant, vraisemblance et impacts en cas d\u2019attaque. Pour chacune des classes, des r\u00e8gles plus ou moins strictes font \u00e9merger entre autres des principes forts d\u2019architectures s\u00e9curis\u00e9es. Cette d\u00e9marche peut \u00eatre it\u00e9rative. Il est possible de d\u00e9couper l\u2019installation industrielle en plusieurs zones et d\u2019\u00e9tablir pour chacune d\u2019elles son niveau de classe. Cela rejoint l\u2019approche de l\u2019IEC 62443 au d\u00e9tail pr\u00e8s qu\u2019ici, la m\u00e9thodologie de l\u2019ANSSI \u00e9tablit les niveaux de classe en priorit\u00e9 au regard des impacts pour la population, l\u2019environnement et l\u2019\u00e9conomie nationale sans se soucier de l\u2019impact direct pour l\u2019entreprise concern\u00e9e.<\/p>\n<p>Quelle que soit la m\u00e9thodologie mise en \u0153uvre, le constat final reste le m\u00eame : segmentation et cloisonnement constituent des briques essentielles en vue de prot\u00e9ger les SI Industriels. Mais l\u2019exp\u00e9rience montre que segmenter et cloisonner n\u2019est pas toujours simple\u2026<\/p>\n<h2>Besoin m\u00e9tier et s\u00e9curit\u00e9 : la quadrature du cercle ?<\/h2>\n<p>Dans bien des cas, on observe un besoin \u00e9lev\u00e9 de remonter vers le SI de gestion des donn\u00e9es \u00ab proc\u00e9d\u00e9 \u00bb en vue de les analyser. Et ce pour diff\u00e9rentes raisons : calcul d\u2019optimisation, calcul financier, supply chain, Big data\u2026<\/p>\n<p>Selon la m\u00e9thode de l\u2019ANSSI, une installation de classe 3 ne peut communiquer avec le SI de gestion que de fa\u00e7on unidirectionnelle via l\u2019utilisation d\u2019une diode. Mettre en \u0153uvre ce genre de technologie peut parfois relever de l\u2019impossible : impossibilit\u00e9 d\u2019avoir du temps r\u00e9el, incompatibilit\u00e9 des solutions d\u2019historisation des donn\u00e9es proc\u00e9d\u00e9\u2026 Dans ce cas, on d\u00e9coupera l\u2019installation en sous-syst\u00e8mes de fa\u00e7on \u00e0 pouvoir lui attribuer diff\u00e9rents niveaux de classe. Un sous-syst\u00e8me de classe 2 peut communiquer de fa\u00e7on bidirectionnelle avec le SI de gestion, tandis que le sous-syst\u00e8me le plus critique de classe 3 n\u2019est autoris\u00e9 \u00e0 communiquer unidirectionnellement qu\u2019avec ce sous-syst\u00e8me de classe 2. Cette approche peut notamment \u00eatre consid\u00e9r\u00e9e pour les syst\u00e8mes de s\u00fbret\u00e9.<\/p>\n<p>Si dans certains cas cela peut sembler r\u00e9aliste, c\u2019est parfois beaucoup plus complexe. L\u2019exemple d\u2019installations s\u2019appuyant sur des SNCC (Syst\u00e8me Num\u00e9rique de Contr\u00f4le Commande) montre que les syst\u00e8mes de s\u00fbret\u00e9, ou Syst\u00e8mes instrument\u00e9s de s\u00e9curit\u00e9 (SIS), peuvent \u00eatre totalement imbriqu\u00e9s avec les syst\u00e8mes de conduite : mutualisation des capteurs pour les automates de conduite et de s\u00fbret\u00e9, automates assurant \u00e0 la fois des fonctions de conduite et de s\u00fbret\u00e9.<\/p>\n<h2>Deux solutions oppos\u00e9es sont possibles<\/h2>\n<p>Deux solutions extr\u00eames sont peut-\u00eatre \u00e0 envisager. La premi\u00e8re consisterait \u00e0 revoir un certain nombre de process supports associ\u00e9s au proc\u00e9d\u00e9 industriel pour permettre un cloisonnement fort des SI Industriels vis-\u00e0-vis des SI de gestion. La deuxi\u00e8me serait de revenir \u00e0 des solutions \u00ab moins connect\u00e9es \u00bb : d\u00e9simbrication totale du SIS, d\u00e9doublement des capteurs, automates \/ contr\u00f4leurs de s\u00fbret\u00e9 d\u00e9di\u00e9s et isol\u00e9s, recours \u00e0 la logique \u00ab c\u00e2bl\u00e9e \u00bb, automates et contr\u00f4leurs non \u00ab modifiables \u00bb. Ces deux solutions peuvent sonner comme un retour en arri\u00e8re. Le meilleur compromis r\u00e9side sans doute dans une approche plus souple, fond\u00e9e sur le bon sens et une gestion r\u00e9aliste du risque.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9. Alors&#8230;<\/p>\n","protected":false},"author":188,"featured_media":7026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3227],"tags":[3300,1260],"coauthors":[1257],"class_list":["post-7024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0","tag-manuf-industry-4-0","tag-si-industriel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique - RiskInsight<\/title>\n<meta name=\"description\" content=\"Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-30T07:50:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:42:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a-56x39.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"56\" \/>\n\t<meta property=\"og:image:height\" content=\"39\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony di Prima\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony di Prima\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/\"},\"author\":{\"name\":\"Anthony di Prima\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\"},\"headline\":\"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique\",\"datePublished\":\"2015-01-30T07:50:11+00:00\",\"dateModified\":\"2019-12-31T09:42:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/\"},\"wordCount\":1023,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg\",\"keywords\":[\"manuf &amp; industry 4.0\",\"SI industriel\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/\",\"name\":\"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg\",\"datePublished\":\"2015-01-30T07:50:11+00:00\",\"dateModified\":\"2019-12-31T09:42:19+00:00\",\"description\":\"Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg\",\"width\":3800,\"height\":2660},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\",\"name\":\"Anthony di Prima\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique - RiskInsight","description":"Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/","og_locale":"en_US","og_type":"article","og_title":"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique - RiskInsight","og_description":"Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/","og_site_name":"RiskInsight","article_published_time":"2015-01-30T07:50:11+00:00","article_modified_time":"2019-12-31T09:42:19+00:00","og_image":[{"width":56,"height":39,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a-56x39.jpg","type":"image\/jpeg"}],"author":"Anthony di Prima","twitter_misc":{"Written by":"Anthony di Prima","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/"},"author":{"name":"Anthony di Prima","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96"},"headline":"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique","datePublished":"2015-01-30T07:50:11+00:00","dateModified":"2019-12-31T09:42:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/"},"wordCount":1023,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg","keywords":["manuf &amp; industry 4.0","SI industriel"],"articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/","name":"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg","datePublished":"2015-01-30T07:50:11+00:00","dateModified":"2019-12-31T09:42:19+00:00","description":"Les architectures des SI Industriels s\u2019alignent souvent sur le mod\u00e8le ISA 95. Si cet alignement est surtout motiv\u00e9 par le besoin d\u2019optimiser en continu les proc\u00e9d\u00e9s industriels, il n\u2019est pas sans risque du point de vue de la s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/\u00a9-Sergey-Nivens-Fotolia.com-a.jpg","width":3800,"height":2660},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/architecture-de-securite-des-si-industriels-de-la-theorie-la-pratique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Architecture de s\u00e9curit\u00e9 des SI Industriels : de la th\u00e9orie \u00e0 la pratique"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96","name":"Anthony di Prima","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=7024"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7024\/revisions"}],"predecessor-version":[{"id":7028,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7024\/revisions\/7028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/7026"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=7024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=7024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=7024"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=7024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}