{"id":21697,"date":"2019-06-11T10:04:45","date_gmt":"2019-06-11T09:04:45","guid":{"rendered":"https:\/\/www.inovallee.com\/?p=21697"},"modified":"2019-06-11T10:04:45","modified_gmt":"2019-06-11T09:04:45","slug":"10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web","status":"publish","type":"post","link":"https:\/\/www.inovallee.com\/en\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/","title":{"rendered":"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web"},"content":{"rendered":"<figure class=\"wp-block-image\"><img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"538\" src=\"https:\/\/www.inovallee.com\/wp-content\/uploads\/2019\/05\/blog_une_article_myino.png\" alt=\"myino\" class=\"wp-image-21505\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\"><strong><em>Contexte\u00a0: la d\u00e9centralisation des syst\u00e8mes d\u2019information<\/em><\/strong><\/h3>\n\n\n<p>Commen\u00e7ons par un peu de vulgarisation sur les nouvelles\ntechnologies web&nbsp;: jusqu\u2019en 2015, les syst\u00e8mes d\u2019information centralis\u00e9s\ns\u2019ouvraient partiellement et sous contr\u00f4le \u00e0 des terminaux distants\nutilisateurs.<\/p>\n\n\n<p>La r\u00e9volution num\u00e9rique actuelle, la g\u00e9n\u00e9ralisation des services\ncloud, la multiplication des donn\u00e9es h\u00e9t\u00e9rog\u00e8nes provenant de sources diverses\n(personnes, appareils, objets connect\u00e9s \u2026), la digitalisation des services\naccessibles en 1 clic depuis son PC comme de son smartphone \u2026 font aujourd\u2019hui\ndu SI une bulle parmi d\u2019autres interagissant avec son environnement et devant\nma\u00eetriser, \u00e0 distance, des interactions entre des composants d\u00e9centralis\u00e9s. <\/p>\n\n\n<p>Tout cela repose sur des architectures nouvelles et ouvertes, qui\ncombinent le plus souvent&nbsp;:<\/p>\n\n\n<ul class=\"wp-block-list\"><li>Des bases de donn\u00e9es (h\u00e9t\u00e9rog\u00e8nes)<\/li><li>Des fournisseurs de donn\u00e9es alimentant ces\nbases (formulaires en lignes, r\u00e9seaux sociaux, appareils mobiles, objets\nconnect\u00e9s et capteurs \u2026)<\/li><li>Des r\u00e9seaux de communication pour les faire\ntransiter vers un ou plusieurs syst\u00e8mes centraux distants (wifi, Lora, Sigfox,\nfibre \u2026)<\/li><li>Des middlewares, qui r\u00e9cup\u00e8rent, agr\u00e8gent et\nredistribuent de ces donn\u00e9es sur un ou plusieurs canaux (application mobile,\nsiteweb, intranet \u2026)<\/li><li>Le tout via des \u00e9changes r\u00e9alis\u00e9s\nautomatiquement par des APIs, des interfaces de programmation applicative par lesquelles\nun logiciel \u00ab&nbsp;fournisseur&nbsp;\u00bb offre des services \u00e0 d&rsquo;autres logiciels\n\u00ab&nbsp;consommateurs&nbsp;\u00bb<\/li><\/ul>\n\n\n<p>Les failles de s\u00e9curit\u00e9 peuvent se trouver \u00e0 tous niveaux, et il\nn\u2019est pas dans l\u2019ambition de cet article d\u2019en faire un panorama exhaustif, mais\nde rappeler quelques pi\u00e8ges \/ r\u00e8gles pour garantir la s\u00e9curit\u00e9 et la\nconfidentialit\u00e9 des donn\u00e9es dans ce nouveau paysage.<\/p>\n\n\n<h3 class=\"wp-block-heading\"><strong><em>10 Pi\u00e8ges et conseils pour assurer la s\u00e9curit\u00e9 des donn\u00e9es de vos applications<\/em><\/strong><\/h3>\n\n\n<p>N\u00e9anmoins, voici quelques pi\u00e8ges \u00e0 \u00e9viter pour s\u2019assurer\npleinement de la s\u00e9curit\u00e9 des donn\u00e9es dans ces nouvelles architectures&nbsp;:<\/p>\n\n\n<ol class=\"wp-block-list\"><li><strong>Attention\naux solutions applicatives cloud publiques<\/strong>&nbsp;: les solutions applicatives en\nmode Saas sont pratiques et permettent de gagner du temps (clouds Amazon,\nGoogle, Azur \u2026) et proposent des services \u00e0 haute valeur ajout\u00e9e pour d\u00e9ployer\nrapidement et efficacement ses solutions. Attention cependant \u00e0 ces services\npour des donn\u00e9es personnelles identifi\u00e9es comme sensibles ou critiques,\ncompte-tenu de l\u2019h\u00e9bergement externalis\u00e9 par des entreprises \u00e9trang\u00e8res\nsoumises \u00e0 d\u2019autres r\u00e8glementation (ex&nbsp;: les US et le cloud act&nbsp;: <a href=\"https:\/\/www.usine-digitale.fr\/article\/le-cloud-act-un-texte-securitaire-americain-qui-inquiete.N800995\">https:\/\/www.usine-digitale.fr\/article\/le-cloud-act-un-texte-securitaire-americain-qui-inquiete.N800995<\/a>&nbsp; \u2026).&nbsp; Conseil&nbsp;:\nplus on traite de donn\u00e9es critiques, plus il est (vivement) conseill\u00e9 de monter\nses architectures sur un cloud priv\u00e9, dans un serveur d\u00e9di\u00e9, h\u00e9berg\u00e9 en France\nsans redondance \u00e0 l\u2019\u00e9tranger (dans un data center correctement s\u00e9curis\u00e9,\n\u00e9videmment). <\/li><li><strong>Attention\naux solutions cloud de code h\u00e9berg\u00e9 (type Gitlab)<\/strong>&nbsp;:\nquand on souhaite prot\u00e9ger son code source (qui est la base de la PI d\u2019une\nstartup web \u2026), mieux vaut monter son repository Git sur un serveur \u00ab&nbsp;internalis\u00e9&nbsp;\u00bb<\/li><li><strong>Sanctuariser ses donn\u00e9es<\/strong>&nbsp;:\nles bases de donn\u00e9es doivent \u00eatre h\u00e9berg\u00e9es sur des serveurs diff\u00e9rents des\napplicatifs, avec un acc\u00e8s contr\u00f4l\u00e9 (ex&nbsp;:, acc\u00e8s restreint aux API, et\ntoujours de mani\u00e8re authentifi\u00e9e, etc)<\/li><li><strong>Mettre en\nplace les s\u00e9curit\u00e9s r\u00e9seau<\/strong>&nbsp;: ex&nbsp;: pare-feu, r\u00e9duction du\nnombre de ports, restriction par adresse IP, authentification par mots de passe\nforts (&gt; 13 caract\u00e8res), s\u00e9curiser les communications sensibles (ex VPN)<\/li><li><strong>Mettre en\nplace des solutions de monitoring<\/strong>&nbsp;: exemple serveur Syslog pour\nenregistrer les logs + solutions IDS pour l\u2019analyse<\/li><li><strong>Ne jamais\nlaisser passer en clair des informations critiques<\/strong>, dont les\nmots de passe (exposition par les API, envoi par mail, etc)<\/li><li><strong>S\u00e9curiser\nses APIs<\/strong>&nbsp;: <a href=\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/securite-api\/\">https:\/\/www.riskinsight-wavestone.com\/2017\/06\/securite-api\/<\/a>\n<\/li><li><strong>Choisir\nses outils de d\u00e9veloppement en prenant en compte la s\u00e9curit\u00e9&nbsp;: <\/strong>confronterles b\u00e9n\u00e9fices \/ risques de chaque\nsolution en fonction des besoins et des failles de s\u00e9curit\u00e9 connues. <\/li><li><strong>Ne pas\noublier les postes utilisateurs et d\u00e9veloppement dans les mises en place de\nr\u00e8gles de s\u00e9curit\u00e9<\/strong><\/li><li><strong>Commencer un\nprojet par une analyse des risques (ex&nbsp;: Ebios de l\u2019ANSSI<\/strong>&nbsp;: <a href=\"https:\/\/www.ssi.gouv.fr\/administration\/management-du-risque\/la-methode-ebios-risk-manager\">https:\/\/www.ssi.gouv.fr\/administration\/management-du-risque\/la-methode-ebios-risk-manager<\/a>)<\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>Contexte\u00a0: la d\u00e9centralisation des syst\u00e8mes d\u2019information Commen\u00e7ons par un peu de vulgarisation sur les nouvelles technologies web&nbsp;: jusqu\u2019en 2015, les syst\u00e8mes d\u2019information centralis\u00e9s s\u2019ouvraient partiellement et sous contr\u00f4le \u00e0 des terminaux distants utilisateurs. La r\u00e9volution num\u00e9rique actuelle, la g\u00e9n\u00e9ralisation des services cloud, la multiplication des donn\u00e9es h\u00e9t\u00e9rog\u00e8nes provenant de sources diverses (personnes, appareils, objets connect\u00e9s [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":21505,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41,44],"tags":[],"class_list":["post-21697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-entrepreneur-competences","category-tarmac-incubator"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web - inovall\u00e9e<\/title>\n<meta name=\"description\" content=\"Cybers\u00e9curit\u00e9 : 10 conseils pour s\u00e9curiser ses architectures web\/mobiles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inovallee.com\/en\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web - inovall\u00e9e\" \/>\n<meta property=\"og:description\" content=\"Cybers\u00e9curit\u00e9 : 10 conseils pour s\u00e9curiser ses architectures web\/mobiles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inovallee.com\/en\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/\" \/>\n<meta property=\"og:site_name\" content=\"inovall\u00e9e\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/technopoleinovallee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-11T09:04:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inovallee.com\/wp-content\/uploads\/2019\/05\/blog_une_article_myino.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Inovallee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inovallee\" \/>\n<meta name=\"twitter:site\" content=\"@inovallee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inovallee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/\"},\"author\":{\"name\":\"Inovallee\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#\\\/schema\\\/person\\\/a45b15518aad3111b2d61d257a3e023b\"},\"headline\":\"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web\",\"datePublished\":\"2019-06-11T09:04:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/\"},\"wordCount\":723,\"publisher\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inovallee.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/blog_une_article_myino.png\",\"articleSection\":[\"Entreprendre et d\u00e9velopper ses comp\u00e9tences\",\"Tarmac incubator\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/\",\"url\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/\",\"name\":\"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web - inovall\u00e9e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inovallee.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/blog_une_article_myino.png\",\"datePublished\":\"2019-06-11T09:04:45+00:00\",\"description\":\"Cybers\u00e9curit\u00e9 : 10 conseils pour s\u00e9curiser ses architectures web\\\/mobiles.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inovallee.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/blog_une_article_myino.png\",\"contentUrl\":\"https:\\\/\\\/www.inovallee.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/blog_une_article_myino.png\",\"width\":800,\"height\":538,\"caption\":\"myino\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.inovallee.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#website\",\"url\":\"https:\\\/\\\/www.inovallee.com\\\/\",\"name\":\"inovall\u00e9e technopole, Home to software & smart technologies\",\"description\":\"Home to software &amp; smart technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inovallee.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#organization\",\"name\":\"inovall\u00e9e\",\"url\":\"https:\\\/\\\/www.inovallee.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.inovallee.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/inovallee_2022_GrenobleAlpes.png\",\"contentUrl\":\"https:\\\/\\\/www.inovallee.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/inovallee_2022_GrenobleAlpes.png\",\"width\":945,\"height\":369,\"caption\":\"inovall\u00e9e\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/technopoleinovallee\\\/\",\"https:\\\/\\\/x.com\\\/inovallee\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/inovall-e\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/inovallee?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inovallee.com\\\/#\\\/schema\\\/person\\\/a45b15518aad3111b2d61d257a3e023b\",\"name\":\"Inovallee\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web - inovall\u00e9e","description":"Cybers\u00e9curit\u00e9 : 10 conseils pour s\u00e9curiser ses architectures web\/mobiles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inovallee.com\/en\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/","og_locale":"en_GB","og_type":"article","og_title":"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web - inovall\u00e9e","og_description":"Cybers\u00e9curit\u00e9 : 10 conseils pour s\u00e9curiser ses architectures web\/mobiles.","og_url":"https:\/\/www.inovallee.com\/en\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/","og_site_name":"inovall\u00e9e","article_publisher":"https:\/\/www.facebook.com\/technopoleinovallee\/","article_published_time":"2019-06-11T09:04:45+00:00","og_image":[{"width":800,"height":538,"url":"https:\/\/www.inovallee.com\/wp-content\/uploads\/2019\/05\/blog_une_article_myino.png","type":"image\/png"}],"author":"Inovallee","twitter_card":"summary_large_image","twitter_creator":"@inovallee","twitter_site":"@inovallee","twitter_misc":{"Written by":"Inovallee","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/#article","isPartOf":{"@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/"},"author":{"name":"Inovallee","@id":"https:\/\/www.inovallee.com\/#\/schema\/person\/a45b15518aad3111b2d61d257a3e023b"},"headline":"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web","datePublished":"2019-06-11T09:04:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/"},"wordCount":723,"publisher":{"@id":"https:\/\/www.inovallee.com\/#organization"},"image":{"@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inovallee.com\/wp-content\/uploads\/2019\/05\/blog_une_article_myino.png","articleSection":["Entreprendre et d\u00e9velopper ses comp\u00e9tences","Tarmac incubator"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/","url":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/","name":"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web - inovall\u00e9e","isPartOf":{"@id":"https:\/\/www.inovallee.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/#primaryimage"},"image":{"@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inovallee.com\/wp-content\/uploads\/2019\/05\/blog_une_article_myino.png","datePublished":"2019-06-11T09:04:45+00:00","description":"Cybers\u00e9curit\u00e9 : 10 conseils pour s\u00e9curiser ses architectures web\/mobiles.","breadcrumb":{"@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/#primaryimage","url":"https:\/\/www.inovallee.com\/wp-content\/uploads\/2019\/05\/blog_une_article_myino.png","contentUrl":"https:\/\/www.inovallee.com\/wp-content\/uploads\/2019\/05\/blog_une_article_myino.png","width":800,"height":538,"caption":"myino"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inovallee.com\/10-pieges-a-eviter-pour-la-securite-des-donnees-de-ses-applications-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.inovallee.com\/"},{"@type":"ListItem","position":2,"name":"10 pi\u00e8ges \u00e0 \u00e9viter pour la s\u00e9curit\u00e9 des donn\u00e9es de ses applications web"}]},{"@type":"WebSite","@id":"https:\/\/www.inovallee.com\/#website","url":"https:\/\/www.inovallee.com\/","name":"inovall\u00e9e technopole, Home to software & smart technologies","description":"Home to software &amp; smart technologies","publisher":{"@id":"https:\/\/www.inovallee.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inovallee.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inovallee.com\/#organization","name":"inovall\u00e9e","url":"https:\/\/www.inovallee.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inovallee.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inovallee.com\/wp-content\/uploads\/2023\/08\/inovallee_2022_GrenobleAlpes.png","contentUrl":"https:\/\/www.inovallee.com\/wp-content\/uploads\/2023\/08\/inovallee_2022_GrenobleAlpes.png","width":945,"height":369,"caption":"inovall\u00e9e"},"image":{"@id":"https:\/\/www.inovallee.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/technopoleinovallee\/","https:\/\/x.com\/inovallee","https:\/\/www.linkedin.com\/company\/inovall-e\/","https:\/\/www.youtube.com\/user\/inovallee?reload=9"]},{"@type":"Person","@id":"https:\/\/www.inovallee.com\/#\/schema\/person\/a45b15518aad3111b2d61d257a3e023b","name":"Inovallee"}]}},"_links":{"self":[{"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/posts\/21697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/comments?post=21697"}],"version-history":[{"count":0,"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/posts\/21697\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/media\/21505"}],"wp:attachment":[{"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/media?parent=21697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/categories?post=21697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inovallee.com\/en\/wp-json\/wp\/v2\/tags?post=21697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}