{"id":57126,"date":"2024-11-05T12:21:00","date_gmt":"2024-11-05T11:21:00","guid":{"rendered":"https:\/\/www.codeur.com\/blog\/?p=57126"},"modified":"2025-09-12T15:30:08","modified_gmt":"2025-09-12T13:30:08","slug":"comment-faire-audit-securite-informatique","status":"publish","type":"post","link":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/","title":{"rendered":"Comment faire un audit de s\u00e9curit\u00e9 informatique&nbsp;?"},"content":{"rendered":"<h2>1. Comprendre l&#8217;audit de s\u00e9curit\u00e9&nbsp;: un outil indispensable<\/h2>\n<p>Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l&#8217;audit de s\u00e9curit\u00e9 comme un processus intrusif et stressant. Cependant, cet exercice est capital pour garantir une protection optimale des syst\u00e8mes d&#8217;information.<\/p>\n<p>Un <a href=\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-informatique\/\">audit de s\u00e9curit\u00e9<\/a> est une \u00e9valuation compl\u00e8te visant \u00e0 mesurer la s\u00e9curit\u00e9 d&#8217;un syst\u00e8me selon les meilleures pratiques et les normes r\u00e9glementaires. Il couvre les composants physiques, les applications, les vuln\u00e9rabilit\u00e9s r\u00e9seau et les <a href=\"https:\/\/www.codeur.com\/blog\/securiser-usages-collaborateurs\/\">comportements humains<\/a> li\u00e9s \u00e0 la manipulation des donn\u00e9es sensibles.<\/p>\n<h2>2. D\u00e9ployer l&#8217;IA pour pr\u00e9venir les failles de s\u00e9curit\u00e9<\/h2>\n<p>Face \u00e0 des cyberattaques de plus en plus sophistiqu\u00e9es, l&#8217;intelligence artificielle (IA) \u00e9merge comme une solution proactive pour pr\u00e9venir les failles de s\u00e9curit\u00e9. En analysant continuellement des volumes massifs de donn\u00e9es, l&#8217;IA d\u00e9tecte les anomalies pouvant indiquer des vuln\u00e9rabilit\u00e9s avant qu&#8217;elles ne soient exploit\u00e9es par les cybercriminels.<\/p>\n<p>Un audit initial reste essentiel pour cibler les domaines o\u00f9 l&#8217;IA peut maximiser son impact. Ainsi, adoptez l&#8217;IA non seulement pour pr\u00e9venir les attaques, mais aussi pour instaurer un climat de confiance aupr\u00e8s de vos clients et partenaires.<\/p>\n<h2>3. Red Teaming&nbsp;: incarner les hackers pour renforcer la s\u00e9curit\u00e9<\/h2>\n<p>Le Red Teaming est une m\u00e9thode innovante qui consiste \u00e0 simuler des attaques cybern\u00e9tiques en interne, par vos propres experts en s\u00e9curit\u00e9. Cette approche permet de mettre en lumi\u00e8re des vuln\u00e9rabilit\u00e9s que les \u00e9valuations traditionnelles pourraient ignorer. En pr\u00e9c\u00e9dant par une <a href=\"https:\/\/www.codeur.com\/blog\/audit-systeme-information\/\">\u00e9valuation compl\u00e8te du syst\u00e8me d&#8217;information<\/a>, vous optimisez la strat\u00e9gie de vos &#8220;hackers&#8221; internes pour transformer des faiblesses en forces.<\/p>\n<h2>4. Prot\u00e9ger la cha\u00eene d&#8217;approvisionnement num\u00e9rique<\/h2>\n<p>S\u00e9curiser chaque maillon de votre cha\u00eene d&#8217;approvisionnement num\u00e9rique est fondamental pour \u00e9viter l&#8217;introduction de failles exploitables par des attaquants. Cela implique d&#8217;\u00e9valuer les risques de chaque partenaire et de renforcer la sensibilisation des employ\u00e9s \u00e0 la cybers\u00e9curit\u00e9. Des audits r\u00e9guliers et des outils de surveillance permettent de combler les vuln\u00e9rabilit\u00e9s avant qu&#8217;elles ne soient exploit\u00e9es.<\/p>\n<h2>5. Phishing interne&nbsp;: adoptez l&#8217;attitude du pr\u00e9dateur<\/h2>\n<p>Le phishing interne cible les employ\u00e9s par des impostures de coll\u00e8gues, mena\u00e7ant ainsi la s\u00e9curit\u00e9 de l&#8217;entreprise. En formant vos \u00e9quipes aux risques du phishing et en investissant dans des solutions de cybers\u00e9curit\u00e9, vous transformez vos collaborateurs en d\u00e9fenseurs vigilants, renfor\u00e7ant ainsi votre premi\u00e8re ligne de d\u00e9fense contre ces menaces.<\/p>\n<h2>6. Analyse comportementale pour d\u00e9tecter les anomalies invisibles<\/h2>\n<p>Surveiller et analyser le comportement des donn\u00e9es est essentiel pour d\u00e9tecter des sch\u00e9mas inattendus pouvant indiquer des menaces potentielles. L&#8217;analyse comportementale r\u00e9v\u00e8le ces anomalies et aide \u00e0 prendre des mesures pr\u00e9ventives pour prot\u00e9ger les donn\u00e9es sensibles, tout en optimisant l&#8217;exp\u00e9rience utilisateur gr\u00e2ce \u00e0 une personnalisation accrue.<\/p>\n<h2>7. Gamifiez l&#8217;apprentissage de la cybers\u00e9curit\u00e9<\/h2>\n<p>Transformer l&#8217;apprentissage de la cybers\u00e9curit\u00e9 en jeu rend l&#8217;acquisition des comp\u00e9tences plus engageante et efficace. En simulant des attaques de pirates dans un cadre ludique, les employ\u00e9s d\u00e9veloppent une compr\u00e9hension approfondie des attaques de pirates et des d\u00e9fenses appropri\u00e9es, renfor\u00e7ant ainsi la r\u00e9silience globale de l&#8217;entreprise.<\/p>\n<h2>8. Respectez les normes pour \u00e9viter les amendes<\/h2>\n<p>Les entreprises doivent se conformer \u00e0 des r\u00e9glementations strictes en mati\u00e8re de protection des donn\u00e9es pour \u00e9viter des amendes cons\u00e9quentes. En int\u00e9grant d\u00e8s maintenant les pratiques de s\u00e9curit\u00e9 conformes, comme <a href=\"https:\/\/www.codeur.com\/blog\/securiser-serveur\/\">s\u00e9curiser l&#8217;acc\u00e8s physique<\/a> aux infrastructures, vous pr\u00e9venez non seulement les p\u00e9nalit\u00e9s financi\u00e8res mais aussi cr\u00e9ez un avantage concurrentiel robuste.<\/p>\n<p>En mettant en \u0153uvre ces strat\u00e9gies, vous pouvez transformer la s\u00e9curit\u00e9 informatique de votre entreprise, d\u00e9tecter les vuln\u00e9rabilit\u00e9s avant qu&#8217;elles ne soient exploit\u00e9es, et prot\u00e9ger vos actifs num\u00e9riques tout en respectant les r\u00e9glementations en vigueur. Cela vous permet de b\u00e2tir une entreprise r\u00e9siliente et digne de confiance dans un monde num\u00e9rique en constante \u00e9volution.<\/p>\n<p>Pour toute assistance suppl\u00e9mentaire ou pour engager un expert en cybers\u00e9curit\u00e9, envisagez de <a href=\"https:\/\/www.codeur.com\/fonctionnement-codeur\">poster une annonce sur Codeur.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Comprendre l&#8217;audit de s\u00e9curit\u00e9&nbsp;: un outil indispensable Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l&#8217;audit de s\u00e9curit\u00e9 comme un processus intrusif et stressant. Cependant, cet exercice est capital pour garantir une protection optimale des syst\u00e8mes d&#8217;information. Un audit de s\u00e9curit\u00e9 est une \u00e9valuation compl\u00e8te visant \u00e0 mesurer la s\u00e9curit\u00e9 d&#8217;un [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":86443,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[16],"tags":[39],"class_list":["post-57126","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","tag-conseils"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comment faire un audit de s\u00e9curit\u00e9 informatique ?<\/title>\n<meta name=\"description\" content=\"1. Comprendre l&#039;audit de s\u00e9curit\u00e9 : un outil indispensable Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l&#039;audit de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment faire un audit de s\u00e9curit\u00e9 informatique ?\" \/>\n<meta property=\"og:description\" content=\"1. Comprendre l&#039;audit de s\u00e9curit\u00e9 : un outil indispensable Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l&#039;audit de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"Codeur.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/fr-fr.facebook.com\/codeurfreelance\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-05T11:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-12T13:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Lazzaroni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@totolazza\" \/>\n<meta name=\"twitter:site\" content=\"@codeur\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Lazzaroni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/\"},\"author\":{\"name\":\"Thomas Lazzaroni\",\"@id\":\"https:\/\/www.codeur.com\/blog\/#\/schema\/person\/cc3b0a678aeffcae19ecc599eaf679e5\"},\"headline\":\"Comment faire un audit de s\u00e9curit\u00e9 informatique&nbsp;?\",\"datePublished\":\"2024-11-05T11:21:00+00:00\",\"dateModified\":\"2025-09-12T13:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/\"},\"wordCount\":731,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg\",\"keywords\":[\"Conseils\"],\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/\",\"url\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/\",\"name\":\"Comment faire un audit de s\u00e9curit\u00e9 informatique ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg\",\"datePublished\":\"2024-11-05T11:21:00+00:00\",\"dateModified\":\"2025-09-12T13:30:08+00:00\",\"description\":\"1. Comprendre l'audit de s\u00e9curit\u00e9 : un outil indispensable Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l'audit de\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage\",\"url\":\"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg\",\"contentUrl\":\"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg\",\"width\":1024,\"height\":618},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.codeur.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9veloppement\",\"item\":\"https:\/\/www.codeur.com\/blog\/developpement\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/www.codeur.com\/blog\/developpement\/securite\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Comment faire un audit de s\u00e9curit\u00e9 informatique&nbsp;?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codeur.com\/blog\/#website\",\"url\":\"https:\/\/www.codeur.com\/blog\/\",\"name\":\"Codeur.com\",\"description\":\"codeur\",\"publisher\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codeur.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codeur.com\/blog\/#organization\",\"name\":\"Codeur.com\",\"url\":\"https:\/\/www.codeur.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.codeur.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/04\/logo-codeur-com.png\",\"contentUrl\":\"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/04\/logo-codeur-com.png\",\"width\":2560,\"height\":465,\"caption\":\"Codeur.com\"},\"image\":{\"@id\":\"https:\/\/www.codeur.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/fr-fr.facebook.com\/codeurfreelance\/\",\"https:\/\/x.com\/codeur\",\"https:\/\/www.linkedin.com\/company\/codeur\/\",\"https:\/\/www.youtube.com\/channel\/UCgj9ySM9xy3gdL8qBafl9Uw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codeur.com\/blog\/#\/schema\/person\/cc3b0a678aeffcae19ecc599eaf679e5\",\"name\":\"Thomas Lazzaroni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.codeur.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7306fb87b7017ab0955d07c2f2b771ac79e91965a2fca514df0c043f7c087fd2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7306fb87b7017ab0955d07c2f2b771ac79e91965a2fca514df0c043f7c087fd2?s=96&d=mm&r=g\",\"caption\":\"Thomas Lazzaroni\"},\"description\":\"Depuis plus de 10 ans, je contribue \u00e0 faire rayonner nos sites en imaginant des strat\u00e9gies qui renforcent notre visibilit\u00e9 et notre position de r\u00e9f\u00e9rence.\",\"sameAs\":[\"https:\/\/totolazza.com\",\"https:\/\/www.linkedin.com\/in\/thomaslazzaroni\/\",\"https:\/\/x.com\/totolazza\"],\"url\":\"https:\/\/www.codeur.com\/blog\/author\/thomas\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment faire un audit de s\u00e9curit\u00e9 informatique ?","description":"1. Comprendre l'audit de s\u00e9curit\u00e9 : un outil indispensable Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l'audit de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment faire un audit de s\u00e9curit\u00e9 informatique ?","og_description":"1. Comprendre l'audit de s\u00e9curit\u00e9 : un outil indispensable Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l'audit de","og_url":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/","og_site_name":"Codeur.com","article_publisher":"https:\/\/fr-fr.facebook.com\/codeurfreelance\/","article_published_time":"2024-11-05T11:21:00+00:00","article_modified_time":"2025-09-12T13:30:08+00:00","og_image":[{"width":1024,"height":618,"url":"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg","type":"image\/jpeg"}],"author":"Thomas Lazzaroni","twitter_card":"summary_large_image","twitter_creator":"@totolazza","twitter_site":"@codeur","twitter_misc":{"\u00c9crit par":"Thomas Lazzaroni","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#article","isPartOf":{"@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/"},"author":{"name":"Thomas Lazzaroni","@id":"https:\/\/www.codeur.com\/blog\/#\/schema\/person\/cc3b0a678aeffcae19ecc599eaf679e5"},"headline":"Comment faire un audit de s\u00e9curit\u00e9 informatique&nbsp;?","datePublished":"2024-11-05T11:21:00+00:00","dateModified":"2025-09-12T13:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/"},"wordCount":731,"commentCount":0,"publisher":{"@id":"https:\/\/www.codeur.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg","keywords":["Conseils"],"articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/","url":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/","name":"Comment faire un audit de s\u00e9curit\u00e9 informatique ?","isPartOf":{"@id":"https:\/\/www.codeur.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage"},"image":{"@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg","datePublished":"2024-11-05T11:21:00+00:00","dateModified":"2025-09-12T13:30:08+00:00","description":"1. Comprendre l'audit de s\u00e9curit\u00e9 : un outil indispensable Dans le contexte actuel de la cybers\u00e9curit\u00e9, de nombreuses entreprises voient l'audit de","breadcrumb":{"@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#primaryimage","url":"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg","contentUrl":"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/12\/audit-securite-informatique.jpg","width":1024,"height":618},{"@type":"BreadcrumbList","@id":"https:\/\/www.codeur.com\/blog\/comment-faire-audit-securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.codeur.com\/blog\/"},{"@type":"ListItem","position":2,"name":"D\u00e9veloppement","item":"https:\/\/www.codeur.com\/blog\/developpement\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9","item":"https:\/\/www.codeur.com\/blog\/developpement\/securite\/"},{"@type":"ListItem","position":4,"name":"Comment faire un audit de s\u00e9curit\u00e9 informatique&nbsp;?"}]},{"@type":"WebSite","@id":"https:\/\/www.codeur.com\/blog\/#website","url":"https:\/\/www.codeur.com\/blog\/","name":"Codeur.com","description":"codeur","publisher":{"@id":"https:\/\/www.codeur.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codeur.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.codeur.com\/blog\/#organization","name":"Codeur.com","url":"https:\/\/www.codeur.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.codeur.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/04\/logo-codeur-com.png","contentUrl":"https:\/\/www.codeur.com\/blog\/wp-content\/uploads\/2022\/04\/logo-codeur-com.png","width":2560,"height":465,"caption":"Codeur.com"},"image":{"@id":"https:\/\/www.codeur.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr-fr.facebook.com\/codeurfreelance\/","https:\/\/x.com\/codeur","https:\/\/www.linkedin.com\/company\/codeur\/","https:\/\/www.youtube.com\/channel\/UCgj9ySM9xy3gdL8qBafl9Uw"]},{"@type":"Person","@id":"https:\/\/www.codeur.com\/blog\/#\/schema\/person\/cc3b0a678aeffcae19ecc599eaf679e5","name":"Thomas Lazzaroni","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.codeur.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7306fb87b7017ab0955d07c2f2b771ac79e91965a2fca514df0c043f7c087fd2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7306fb87b7017ab0955d07c2f2b771ac79e91965a2fca514df0c043f7c087fd2?s=96&d=mm&r=g","caption":"Thomas Lazzaroni"},"description":"Depuis plus de 10 ans, je contribue \u00e0 faire rayonner nos sites en imaginant des strat\u00e9gies qui renforcent notre visibilit\u00e9 et notre position de r\u00e9f\u00e9rence.","sameAs":["https:\/\/totolazza.com","https:\/\/www.linkedin.com\/in\/thomaslazzaroni\/","https:\/\/x.com\/totolazza"],"url":"https:\/\/www.codeur.com\/blog\/author\/thomas\/"}]}},"_links":{"self":[{"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/posts\/57126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/comments?post=57126"}],"version-history":[{"count":0,"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/posts\/57126\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/media\/86443"}],"wp:attachment":[{"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/media?parent=57126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/categories?post=57126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codeur.com\/blog\/wp-json\/wp\/v2\/tags?post=57126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}