{"id":9614,"date":"2017-04-20T08:30:45","date_gmt":"2017-04-20T07:30:45","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=9614\/"},"modified":"2019-12-31T10:06:59","modified_gmt":"2019-12-31T09:06:59","slug":"insertion-application-metier-si","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/","title":{"rendered":"De la bonne insertion d\u2019une application m\u00e9tier dans le SI"},"content":{"rendered":"<p>Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des applications. Ce n\u2019est malheureusement pas toujours le cas.<\/p>\n<h2>Un constat pour le moins mitig\u00e9<\/h2>\n<p>Malgr\u00e9 les \u00e9volutions technologiques, il reste toujours difficile d\u2019ins\u00e9rer correctement une application m\u00e9tier dans le syst\u00e8me d\u2019information d\u2019une entreprise. Cela est en partie d\u00fb au fait que les m\u00e9tiers souhaitent souvent aller au-del\u00e0 de leur attribution en ne s\u2019int\u00e9ressant pas uniquement au \u00ab\u00a0Quoi\u00a0?\u00a0\u00bb mais aussi au \u00ab\u00a0Comment\u00a0?\u00a0\u00bb. Cet \u00e9tat de fait provient d\u2019une sorte de \u00ab\u00a0<strong>syndrome du m\u00e9tier roi<\/strong>\u00a0\u00bb, qui peut conduire \u00e0 des extr\u00eames comme la mise en service d\u2019applications sans que la DSI soit pr\u00e9venue (le <em>shadow IT<\/em>). Cela peut notamment \u00eatre le cas lorsque les r\u00e8gles et processus ne sont pas jug\u00e9s pertinents ou trop lents par le m\u00e9tier.<\/p>\n<p>En cons\u00e9quence, de nombreuses sp\u00e9cificit\u00e9s apparaissent et ne sont pas toujours r\u00e9sorb\u00e9es\u00a0: non-respect des normes internes et r\u00e9glementaires, non-utilisation des infrastructures et offres de services pr\u00e9sentes, perp\u00e9tuelle \u00ab\u00a0r\u00e9invention de la roue\u00a0\u00bb \u2026<\/p>\n<p>Ce ph\u00e9nom\u00e8ne implique des <strong>pertes de temps<\/strong> et des <strong>surcouts <\/strong>qui pourraient \u00eatre \u00e9vit\u00e9s. Il implique aussi des <strong>risques pour le bon fonctionnement et la s\u00e9curit\u00e9 du SI<\/strong> car la maitrise des applications est moindre.<\/p>\n<h2>Tout d\u2019abord, cadrer<\/h2>\n<p>La mise en place d\u2019un <strong>cadre clair et coh\u00e9rent<\/strong> d\u00e9crivant le SI est un <strong>pr\u00e9requis fort<\/strong> de la bonne int\u00e9gration des applications m\u00e9tiers dans le SI. Il doit \u00eatre con\u00e7u pour <strong>s\u2019appliquer \u00e9galement aux applications m\u00e9tiers<\/strong> bas\u00e9es sur des composants physiques <strong>industriels<\/strong>.<\/p>\n<p>Ce cadre s\u2019appuie sur la <strong>r\u00e9daction de politiques<\/strong>, que ce soit pour les <strong>infrastructures <\/strong>(positionnement des applications, gestion de la disponibilit\u00e9, piles syst\u00e8mes et logicielles pr\u00e9conis\u00e9es \u2026), pour le <strong>r\u00e9seau <\/strong>(r\u00e8gles de raccordement, gestion du dimensionnement des \u00e9changes \u2026) ou pour la <strong>s\u00e9curit\u00e9 <\/strong>(gestion de la confidentialit\u00e9 et de l\u2019int\u00e9grit\u00e9 des donn\u00e9es, gestion des authentifications et habilitations \u2026), avec en particulier l\u2019analyse des risques associ\u00e9s aux donn\u00e9es et \u00e0 leurs traitements. L\u2019inclusion du cadre r\u00e9glementaire et l\u00e9gal (r\u00e9glementations informatiques et libert\u00e9s, loi de programmation militaire \u2026) est n\u00e9cessaire.<\/p>\n<p>De m\u00eame, toutes les infrastructures et les services qu\u2019elles rendent doivent \u00eatre pr\u00e9sent\u00e9es sous forme d\u2019<strong>offres de services<\/strong>, incluant les contraintes d\u2019acceptation et d\u00e8s que possible, les couts et d\u00e9lais associ\u00e9s \u00e0 leurs utilisations, d\u2019autant plus si le syst\u00e8me s\u2019oriente vers une approche micro-services et repose sur des API.<\/p>\n<p>Tous ces \u00e9l\u00e9ments doivent \u00eatre int\u00e9gr\u00e9s dans le sch\u00e9ma d\u2019urbanisme du SI.<\/p>\n<p>Une fois d\u00e9fini, le cadre est \u00e0 d\u00e9river sous forme de <em>toolkits<\/em> permettant aux m\u00e9tiers d\u2019identifier rapidement leurs besoins, afin d\u2019int\u00e9grer les contraintes associ\u00e9es dans leurs pr\u00e9-\u00e9tudes et leurs appels d\u2019offres.<\/p>\n<h2>Puis, fonctionner en mode processus<\/h2>\n<p>Le cadre mis en place doit s\u2019accompagner d\u2019un ensemble de processus facilitant la conception et la mise en place des applications m\u00e9tiers.<\/p>\n<p>Les <strong>processus <\/strong>accompagnant la <strong>conception applicative<\/strong> sont, de loin, les plus importants, puisqu\u2019ils am\u00e8nent aux architectures applicatives \u00e0 d\u00e9ployer. Ils doivent int\u00e9grer, d\u00e8s les premi\u00e8res phases, l\u2019exploitant ainsi que les \u00e9quipes g\u00e9rant le r\u00e9seau et la s\u00e9curit\u00e9 du SI, qui sont amen\u00e9s \u00e0 faire partie de l\u2019instance de validation des architectures applicatives.<\/p>\n<p>Dans un cycle projet traditionnel, il est pr\u00e9f\u00e9rable de d\u00e9couper l\u2019\u00e9tude et la validation de l\u2019architecture des applications en deux parties.<\/p>\n<p>La <strong>premi\u00e8re partie<\/strong>, doit traiter l\u2019<strong>architecture fonctionnelle<\/strong> uniquement. Celle-ci commence par la fourniture des besoins par le m\u00e9tier\u00a0: population cible, donn\u00e9es utilis\u00e9es et traitements associ\u00e9s. Une \u00e9tude de ces besoins vis-\u00e0-vis du cadre d\u00e9fini permet alors de d\u00e9terminer les contraintes impos\u00e9es \u00e0 l\u2019architecture et les offres de services pouvant r\u00e9pondre au besoin m\u00e9tier. Cette \u00e9tude pass\u00e9e, l\u2019architecture fonctionnelle peut \u00eatre d\u00e9finie par le m\u00e9tier et valid\u00e9e par l\u2019instance de validation des architectures applicatives.<\/p>\n<p>La <strong>seconde partie<\/strong>, qui s\u2019int\u00e9resse \u00e0 l\u2019<strong>architecture technique<\/strong>, favorise l\u2019utilisation des offres identifi\u00e9es pr\u00e9c\u00e9demment. L\u2019architecture propos\u00e9e peut enfin \u00eatre valid\u00e9e en impliquant dans cette d\u00e9cision les responsables des offres de services retenues.<\/p>\n<h2>Et le plus important\u2026 faire appliquer\u00a0!<\/h2>\n<p>La mise en application du cadre et des processus associ\u00e9s est \u00e0 faire \u00e9tape par \u00e9tape.<\/p>\n<p>Il convient, en premier lieu, d\u2019identifier au moins un correspondant m\u00e9tier au sein de la DSI moteur et connaisseur de l\u2019organisation, afin de tester et de r\u00f4der le cadre et les processus. Une fois ce premier test effectu\u00e9, il peut \u00eatre \u00e9tendu au sein de la DSI, en commen\u00e7ant sur une base de volontariat, et ce, avec l\u2019appui du DSI.<\/p>\n<p>La derni\u00e8re phase, l\u2019extension du processus \u00e0 l\u2019ensemble des m\u00e9tiers, est plus complexe en ceci qu\u2019elle n\u00e9cessite un sponsor au sein de la direction g\u00e9n\u00e9rale permettant son application.<\/p>\n<p>Cette mise en application peut \u00eatre facilit\u00e9e par une <strong>communication r\u00e9guli\u00e8re<\/strong> aux diff\u00e9rents interlocuteurs<strong> sur les gains en termes de cout et de d\u00e9lais <\/strong>associ\u00e9s \u00e0 l\u2019application du cadre et des processus et par la <strong>priorisation des projets les appliquant <\/strong>par rapport aux projets r\u00e9ticents (\u00ab\u00a0politique de la carotte et du b\u00e2ton\u00a0\u00bb).<\/p>\n<p>Enfin, tout au long de cette mise en place, il est n\u00e9cessaire de <strong>prendre en compte tr\u00e8s rapidement tout retour<\/strong>.<\/p>\n<h2>Les outils cl\u00e9s<\/h2>\n<p>Afin d\u2019<strong>assurer la r\u00e9ussite du processus<\/strong>, celui-ci doit \u00eatre <strong>accompagn\u00e9 <\/strong>d\u2019un certain nombre d\u2019\u00e9l\u00e9ments.<\/p>\n<p>Les offres de services doivent donner la <strong>priorit\u00e9 au respect des standards<\/strong> et contraindre le sur-mesure \u00e0 des \u00e9tudes suppl\u00e9mentaires. Chaque \u00ab\u00a0standard\u00a0\u00bb d\u2019une offre de service est \u00e0 associer \u00e0 un <em>template<\/em> de configuration permettant de limiter les couts et d\u00e9lais de pr\u00e9paration des environnements des applications, ainsi que les couts d\u2019exploitation, mais aussi de limiter le risque d\u2019incidents par la maitrise de la configuration. La mise \u00e0 disposition de mod\u00e8les types de supervision des services applicatifs est \u00e9galement un point \u00e0 ne pas n\u00e9gliger.<\/p>\n<p>Le <strong>processus de demande<\/strong> de mise en place d\u2019une architecture valid\u00e9e doit \u00eatre <strong>le plus simple possible pour le m\u00e9tier<\/strong>, le nombre d\u2019informations, minimis\u00e9, et la complexit\u00e9 sous-jacente \u00e0 la demande, masqu\u00e9e. Au besoin, cela passe par la mise en place d\u2019une entit\u00e9 charg\u00e9e de traduire rapidement une demande de mise en place ou d\u2019\u00e9volution de l\u2019existant issue du m\u00e9tier en un ensemble de demandes techniques ciblant les besoins (installation de serveurs, mise en place de machines virtuelles, configuration r\u00e9seau, ouverture de flux, configuration des \u00e9quipements de s\u00e9curit\u00e9 applicative \u2026).<\/p>\n<p>L\u2019objectif est de rendre attractif le suivi de l\u2019offre standard en le rendant plus simple, plus rapide et moins couteux.<\/p>\n<p>Il ne faut par contre <strong>pas bloquer la sp\u00e9cificit\u00e9<\/strong> si elle ne remet pas en cause le bon fonctionnement ou la s\u00e9curit\u00e9 du SI. Elle peut en revanche \u00eatre plus longue et plus couteuse \u00e0 ins\u00e9rer, cela se justifiant par les \u00e9tudes permettant sa bonne int\u00e9gration.<\/p>\n<h2>Cadrer l\u2019historique pour poser les bases du futur<\/h2>\n<p>La bonne gestion de l\u2019insertion d\u2019une application dans un SI passe par un cadre clair et partag\u00e9 de tous, des processus et outils simples et accept\u00e9s, un accompagnement de proximit\u00e9, facilitant la vie des responsables d\u2019applications jouant le jeu des normes propres SI et reportant le cout de toute complexit\u00e9 sur le m\u00e9tier responsable, sans bloquer les sp\u00e9cificit\u00e9s.<\/p>\n<p>Et ce mode de fonctionnement, bien adapt\u00e9 \u00e0 une gestion classique des d\u00e9veloppements applicatifs, peut \u00eatre une base pour entamer des r\u00e9flexions sur le mode agile o\u00f9 la d\u00e9finition d\u2019un cadre et la priorisation de l\u2019utilisation des standards restent de bonnes pratiques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des&#8230;<\/p>\n","protected":false},"author":1277,"featured_media":9615,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[120,669,3302],"coauthors":[2794],"class_list":["post-9614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-architecture-si-2","tag-processus","tag-security-architecture"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>De la bonne insertion d\u2019une application m\u00e9tier dans le SI - RiskInsight<\/title>\n<meta name=\"description\" content=\"Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"De la bonne insertion d\u2019une application m\u00e9tier dans le SI - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-20T07:30:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:06:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me LEFEVRE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me LEFEVRE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me LEFEVRE\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b99be87624f640a7b2d88afd5c115be9\"},\"headline\":\"De la bonne insertion d\u2019une application m\u00e9tier dans le SI\",\"datePublished\":\"2017-04-20T07:30:45+00:00\",\"dateModified\":\"2019-12-31T09:06:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/\"},\"wordCount\":1406,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg\",\"keywords\":[\"architecture Si\",\"processus\",\"security architecture\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/\",\"name\":\"De la bonne insertion d\u2019une application m\u00e9tier dans le SI - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg\",\"datePublished\":\"2017-04-20T07:30:45+00:00\",\"dateModified\":\"2019-12-31T09:06:59+00:00\",\"description\":\"Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des applications.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"De la bonne insertion d\u2019une application m\u00e9tier dans le SI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b99be87624f640a7b2d88afd5c115be9\",\"name\":\"G\u00e9r\u00f4me LEFEVRE\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-lefevre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"De la bonne insertion d\u2019une application m\u00e9tier dans le SI - RiskInsight","description":"Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/","og_locale":"en_US","og_type":"article","og_title":"De la bonne insertion d\u2019une application m\u00e9tier dans le SI - RiskInsight","og_description":"Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des applications.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/","og_site_name":"RiskInsight","article_published_time":"2017-04-20T07:30:45+00:00","article_modified_time":"2019-12-31T09:06:59+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me LEFEVRE","twitter_misc":{"Written by":"G\u00e9r\u00f4me LEFEVRE","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/"},"author":{"name":"G\u00e9r\u00f4me LEFEVRE","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b99be87624f640a7b2d88afd5c115be9"},"headline":"De la bonne insertion d\u2019une application m\u00e9tier dans le SI","datePublished":"2017-04-20T07:30:45+00:00","dateModified":"2019-12-31T09:06:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/"},"wordCount":1406,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg","keywords":["architecture Si","processus","security architecture"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/","name":"De la bonne insertion d\u2019une application m\u00e9tier dans le SI - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg","datePublished":"2017-04-20T07:30:45+00:00","dateModified":"2019-12-31T09:06:59+00:00","description":"Dans un mode projet traditionnel, la g\u00e9n\u00e9ralisation des processus de gestion de la vie des syst\u00e8mes d\u2019information, l\u2019industrialisation des SI, la virtualisation et la mise en place de solutions de s\u00e9curisation standardis\u00e9es devraient permettre un d\u00e9ploiement simple et rapide des applications.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/04\/Fotolia_76275896_Subscription_Monthly_M.jpg","width":1378,"height":1378},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/04\/insertion-application-metier-si\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"De la bonne insertion d\u2019une application m\u00e9tier dans le SI"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b99be87624f640a7b2d88afd5c115be9","name":"G\u00e9r\u00f4me LEFEVRE","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-lefevre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1277"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=9614"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9614\/revisions"}],"predecessor-version":[{"id":9746,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9614\/revisions\/9746"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9615"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=9614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=9614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=9614"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=9614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}