{"id":8849,"date":"2016-05-25T15:00:55","date_gmt":"2016-05-25T14:00:55","guid":{"rendered":"https:\/\/www.solucominsight.fr\/?p=8849"},"modified":"2019-12-31T10:20:32","modified_gmt":"2019-12-31T09:20:32","slug":"levolution-modele-de-securite-chateau-fort-a-laeroport","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/","title":{"rendered":"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport"},"content":{"rendered":"<p><em>La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique (le ch\u00e2teau fort) n&#8217;est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s&#8217;adapter \u00e0 ces nouveaux usages. Un nouveau mod\u00e8le de s\u00e9curit\u00e9 bas\u00e9 sur la sensibilit\u00e9 des donn\u00e9es et des traitements (l\u2019a\u00e9roport) doit r\u00e9pondre \u00e0 cette probl\u00e9matique. Il permet l&#8217;ouverture du SI vers l\u2019ext\u00e9rieur pour des besoins m\u00e9tiers tout en prot\u00e9geant les informations au juste niveau \u00a0et en gardant la maitrise des activit\u00e9s gr\u00e2ce \u00e0 des moyens de d\u00e9tection et de r\u00e9action efficace en cas d\u2019attaques cyber.<\/em><\/p>\n<h1>Un mod\u00e8le de s\u00e9curit\u00e9 en ch\u00e2teau fort qui a atteint ses limites<\/h1>\n<p>Historiquement, le syst\u00e8me d&#8217;information a \u00e9t\u00e9 construit de mani\u00e8re \u00e0 \u00eatre isol\u00e9 de l&#8217;ext\u00e9rieur via une muraille constitu\u00e9e des \u00e9quipements de s\u00e9curit\u00e9 (pare-feu, reverse-proxy, DMZ etc.).<strong> Il repose \u00a0sur un espace de confiance quasiment unique<\/strong>, \u00e0 l&#8217;int\u00e9rieur du p\u00e9rim\u00e8tre, avec un acc\u00e8s facile aux ressources de l\u2019entreprise.<\/p>\n<p>Par analogie, <strong><a href=\"https:\/\/www.globalsecuritymag.fr\/Gerome-Billois-SoluCom-Du-chateau,20081208,6438.html\">ce mod\u00e8le historique est associ\u00e9 \u00e0 un ch\u00e2teau-fort<\/a><\/strong> : entour\u00e9 de murs renforc\u00e9s, il dispose d\u2019un seul point d&#8217;entr\u00e9e surveill\u00e9 mais ensuite le circulation est libre dans la la cit\u00e9.<\/p>\n<p>Ce mod\u00e8le ne peut plus accompagner l\u2019\u00e9volution des cyberattaques, plus pr\u00e9cises et pointues. Elles savent viser directement le c\u0153ur du SI en p\u00e9n\u00e9trant directement les ordinateurs des collaborateurs sans \u00eatre arr\u00eat\u00e9es par la muraille, tel le cheval de Troie de la Gr\u00e8ce antique.<\/p>\n<p><strong>Ce mod\u00e8le ne permet pas non plus de tirer tous les fruits de la transformation num\u00e9rique.<\/strong> Celle-ci a amen\u00e9 les entreprises \u00e0 changer fondamentalement leur conception du Syst\u00e8me d&#8217;Information\u00a0: elles sont pass\u00e9es d&#8217;un mod\u00e8le ferm\u00e9 \u00a0vers l&#8217;ext\u00e9rieur \u00e0 ouvert. D&#8217;un point de vue client et partenaires, certaines informations sont directement accessibles via Internet et les applications mobiles.\u00a0 D\u2019un point de vue du SI, l\u2019externalisation est une r\u00e9alit\u00e9 du quotidien, pouss\u00e9 encore plus aujourd\u2019hui par le mouvement vers le cloud.\u00a0D&#8217;un point de vue utilisateur, les collaborateurs utilisent de plus en plus d\u2019outils personnels : BYOD, webmails personnels et applications personnelles sur les smartphones s\u2019invitent dans l\u2019environnement de travail. Toutes ces \u00e9volutions in\u00e9luctables rendent caduque la notion de p\u00e9rim\u00e8tre.<\/p>\n<h1>Place \u00e0 un nouveau mod\u00e8le\u00a0: l\u2019a\u00e9roport<\/h1>\n<p>L&#8217;\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 est donc n\u00e9cessaire. Pour r\u00e9pondre \u00e0 ces nouveaux enjeux, le mod\u00e8le qui est aujourd\u2019hui le plus adapt\u00e9 est celui de l&#8217;a\u00e9roport. Un a\u00e9roport est compos\u00e9 de zones d&#8217;accueil ouvertes au public permettant d\u2019informer les clients ou encore de r\u00e9aliser des ventes avec un niveau de contr\u00f4le minimum et adapt\u00e9 au contexte du pays. L\u2019a\u00e9roport contient aussi des zones beaucoup plus s\u00e9curis\u00e9es et en acc\u00e8s limit\u00e9 comme le tarmac ou les avions. <strong>Les contr\u00f4les sont de plus en plus pouss\u00e9s au fur et \u00e0 mesure que l&#8217;on acc\u00e8de \u00e0 des zones plus sensibles.<\/strong><\/p>\n<p>En s\u00e9curit\u00e9 de l\u2019information, cela se traduit par des mesures de s\u00e9curit\u00e9 telles que des contr\u00f4les d&#8217;authentification plus ou moins \u00e9labor\u00e9es (authentification forte, usage de la biom\u00e9trie\u2026), des contr\u00f4les d&#8217;int\u00e9grit\u00e9 et de bons usages (IDS\/IPS, DLP\u2026) afin de maitriser les acc\u00e8s aux zones contenant les informations sensibles de l&#8217;entreprise, et ma\u00eetriser leur manipulation.<\/p>\n<p>Dans le mod\u00e8le de l\u2019a\u00e9roport, en plus des mesures de protection, <strong>il est essentiel de pouvoir d\u00e9tecter les \u00e9ventuelles anomalies ou incidents et d&#8217;\u00eatre en capacit\u00e9 de r\u00e9agir rapidement et efficacement.<\/strong> C\u2019est le r\u00f4le de la tour de contr\u00f4le, qui a pour mission de regarder au plus pr\u00e8s (ce qui se passe dans le p\u00e9rim\u00e8tre de l&#8217;a\u00e9roport) mais aussi au loin (les avions en approche). La tour de contr\u00f4le est capable r\u00e9agir rapidement en cas de probl\u00e8me et d\u2019apporter une r\u00e9ponse adapt\u00e9e, voire d\u2019appeler des renforts si besoin. Dans l\u2019entreprise, ce r\u00f4le de surveillance doit \u00eatre tenu par le SOC (<em>Security Operation Center<\/em>), avec si besoin le d\u2019\u00e9quipes d\u00e9di\u00e9es\u00a0 \u00e0 la gestion de crise cyber.<\/p>\n<p>Pour que ce mod\u00e8le reste viable dans le temps et afin d&#8217;\u00eatre efficace face \u00e0 l&#8217;\u00e9volution de la menace, <strong>la revue r\u00e9guli\u00e8re de ces mesures de s\u00e9curit\u00e9 est essentielle.<\/strong> Les avions avant de d\u00e9coller subissent un contr\u00f4le de leur niveau de s\u00e9curit\u00e9 et les pannes sont anticip\u00e9es avec la maintenance pr\u00e9ventive, il doit en \u00eatre de m\u00eame pour les mesures de s\u00e9curit\u00e9 : habilitations, contr\u00f4les, mise \u00e0 jour doivent \u00eatre en continuelle \u00e9volution.<\/p>\n<h1>Un projet de transformation \u00e0 part enti\u00e8re<\/h1>\n<p>L\u2019enjeu majeur de cette \u00e9volution ne sera par l\u2019acquisition de nouvelles solutions de s\u00e9curit\u00e9, bien souvent les pierres du ch\u00e2teau-fort pourront \u00eatre utilis\u00e9es pour b\u00e2tir l\u2019a\u00e9roport. L\u2019enjeu sera avant tout de structurer un vrai programme de transformation pour la s\u00e9curit\u00e9 du SI.<\/p>\n<p><strong>Programme m\u00ealant des \u00e9volutions technologiques<\/strong> (souvent principalement autour de la d\u00e9tection des attaques), <strong>organisationnelles<\/strong> (responsabilisation des \u00e9quipes en particulier de maitrise d\u2019ouvrage et de d\u00e9veloppement, int\u00e9gration des nouveaux processus de contr\u00f4le\u2026) <strong>mais aussi qui devra diffuser dans tous les projets SI les principes d\u2019\u00e9valuation des risques et d\u2019architectures associ\u00e9s.<\/strong> La tentation est parfois grande de mettre des syst\u00e8mes sensibles mais non s\u00e9curis\u00e9s directement dans le hall de l\u2019a\u00e9roport accessibles \u00e0 tous\u2026<\/p>\n<p>Le pilotage irr\u00e9prochable de ce programme et la d\u00e9monstration de son efficacit\u00e9 par la r\u00e9duction des risques seront les facteur cl\u00e9 de la r\u00e9ussite de cette transformation\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique (le ch\u00e2teau fort) n&#8217;est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s&#8217;adapter \u00e0 ces nouveaux&#8230;<\/p>\n","protected":false},"author":15,"featured_media":9011,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[3302,447,1710],"coauthors":[837],"class_list":["post-8849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-security-architecture","tag-strategie","tag-transformation-numerique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport - RiskInsight<\/title>\n<meta name=\"description\" content=\"La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique n&#039;est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s&#039;adapter \u00e0 ces nouveaux usages.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique n&#039;est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s&#039;adapter \u00e0 ces nouveaux usages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-25T14:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:20:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport\",\"datePublished\":\"2016-05-25T14:00:55+00:00\",\"dateModified\":\"2019-12-31T09:20:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/\"},\"wordCount\":1030,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg\",\"keywords\":[\"security architecture\",\"strat\u00e9gie\",\"transformation num\u00e9rique\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/\",\"name\":\"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg\",\"datePublished\":\"2016-05-25T14:00:55+00:00\",\"dateModified\":\"2019-12-31T09:20:32+00:00\",\"description\":\"La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique n'est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s'adapter \u00e0 ces nouveaux usages.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378,\"caption\":\"Passengers passes x-ray check at airport. Airport transport security scan tape portal. Officer computer monitoring baggage. Airport control\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport - RiskInsight","description":"La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique n'est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s'adapter \u00e0 ces nouveaux usages.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/","og_locale":"en_US","og_type":"article","og_title":"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport - RiskInsight","og_description":"La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique n'est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s'adapter \u00e0 ces nouveaux usages.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/","og_site_name":"RiskInsight","article_published_time":"2016-05-25T14:00:55+00:00","article_modified_time":"2019-12-31T09:20:32+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport","datePublished":"2016-05-25T14:00:55+00:00","dateModified":"2019-12-31T09:20:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg","keywords":["security architecture","strat\u00e9gie","transformation num\u00e9rique"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/","name":"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg","datePublished":"2016-05-25T14:00:55+00:00","dateModified":"2019-12-31T09:20:32+00:00","description":"La transformation num\u00e9rique bouleverse les usages et la conception de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information. Le mod\u00e8le de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique historique n'est donc plus viable et la mani\u00e8re de g\u00e9rer la s\u00e9curit\u00e9 doit s'adapter \u00e0 ces nouveaux usages.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/05\/Fotolia_101639992_Subscription_Monthly_M.jpg","width":1378,"height":1378,"caption":"Passengers passes x-ray check at airport. Airport transport security scan tape portal. Officer computer monitoring baggage. Airport control"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/05\/levolution-modele-de-securite-chateau-fort-a-laeroport\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"L\u2019\u00e9volution du mod\u00e8le de s\u00e9curit\u00e9 : du ch\u00e2teau-fort \u00e0 l\u2019a\u00e9roport"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8849"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8849\/revisions"}],"predecessor-version":[{"id":9015,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8849\/revisions\/9015"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9011"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8849"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}