{"id":7605,"date":"2019-02-11T11:09:48","date_gmt":"2019-02-11T10:09:48","guid":{"rendered":"https:\/\/news.save.ch\/?p=7605"},"modified":"2023-03-14T08:56:49","modified_gmt":"2023-03-14T07:56:49","slug":"fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/","title":{"rendered":"Cinq \u00e9tapes pour une s\u00e9curit\u00e9 \u00e9lev\u00e9e des donn\u00e9es dans le cloud"},"content":{"rendered":"<figure id=\"attachment_7606\" aria-describedby=\"caption-attachment-7606\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7606 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg\" alt=\"S\u00e9curit\u00e9 des donn\u00e9es\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-7606\" class=\"wp-caption-text\">\u00a9 depositphotos, frenta<\/figcaption><\/figure>\n<p>Lorsque les entreprises transf\u00e8rent des processus commerciaux complets vers le cloud, les objectifs commerciaux attendus ne peuvent \u00eatre atteints que si la migration est prot\u00e9g\u00e9e d\u00e8s le d\u00e9part par une strat\u00e9gie de s\u00e9curit\u00e9 informatique compl\u00e8te - dans laquelle la s\u00e9curit\u00e9 des donn\u00e9es joue un r\u00f4le d\u00e9cisif. <a href=\"https:\/\/www.nttsecurity.com\/de-ch\">NTT Security<\/a> concr\u00e9tise les principales activit\u00e9s en cinq \u00e9tapes.<\/p>\n<ol>\n<li><strong> Identifier et classer les donn\u00e9es<\/strong><\/li>\n<\/ol>\n<p>Pour commencer, les entreprises doivent d\u00e9terminer quelles applications et quelles donn\u00e9es doivent \u00eatre transf\u00e9r\u00e9es lors de la migration de leur propre centre informatique vers un fournisseur de cloud. Il faut par exemple d\u00e9terminer de quel type de donn\u00e9es il s'agit et si des donn\u00e9es personnelles sont impliqu\u00e9es, car les r\u00e8gles strictes du RGPD s'appliquent alors. Dans quelles applications les donn\u00e9es sont-elles utilis\u00e9es, par qui et comment ? Sont-elles uniquement lues ou \u00e9galement trait\u00e9es ? Le mod\u00e8le de s\u00e9curit\u00e9 est construit sur la base de ces informations.<\/p>\n<ol start=\"2\">\n<li><strong> D\u00e9finir le niveau de protection pour chaque \u00e9tape du workflow<\/strong><\/li>\n<\/ol>\n<p>Sur la base de la classification et de l'\u00e9valuation des risques des donn\u00e9es, le niveau et la classe de protection doivent \u00eatre d\u00e9finis pour chaque \u00e9tape de la charge de travail. Le cryptage est-il n\u00e9cessaire et si oui, quand : pendant la transmission, lors du stockage, au niveau du champ ? La pseudonymisation ou les cl\u00e9s sont-elles n\u00e9cessaires ? O\u00f9 les cl\u00e9s de chiffrement doivent-elles \u00eatre conserv\u00e9es ? <a href=\"https:\/\/de.wikipedia.org\/wiki\/On_Premises\">Sur site<\/a>, directement chez le fournisseur de cloud ou chez un fournisseur de cloud s\u00e9par\u00e9 ?<\/p>\n<ol start=\"3\">\n<li><strong> D\u00e9finir des r\u00e8gles pour le contr\u00f4le d'acc\u00e8s<\/strong><\/li>\n<\/ol>\n<p>Afin d'atteindre un niveau de protection \u00e9lev\u00e9, les donn\u00e9es ne doivent pas \u00eatre accessibles sans protection \u00e0 tout moment au cours d'un processus d'entreprise. Il faut \u00e9galement s'assurer que les copies des donn\u00e9es stock\u00e9es ou archiv\u00e9es sont aussi prot\u00e9g\u00e9es que les originaux pendant le traitement et que ces copies sont supprim\u00e9es lorsqu'elles ne sont plus n\u00e9cessaires. En fonction des r\u00f4les au sein de l'entreprise, des autorisations d'acc\u00e8s sont attribu\u00e9es et leur respect est contr\u00f4l\u00e9, de sorte que personne de non autoris\u00e9 ne puisse lire, copier, modifier ou supprimer des donn\u00e9es.<\/p>\n<ol start=\"4\">\n<li><strong> Enregistrer tous les acc\u00e8s aux donn\u00e9es dans des fichiers log<\/strong><\/li>\n<\/ol>\n<p>Les entreprises doivent associer les r\u00e8gles d'attribution des droits d'acc\u00e8s \u00e0 une gestion compl\u00e8te des logs. Les journaux d'acc\u00e8s enregistrent et stockent toutes les activit\u00e9s de donn\u00e9es. Ces enregistrements et l'analyse de tous les acc\u00e8s aux donn\u00e9es ainsi que d'autres \u00e9v\u00e9nements li\u00e9s \u00e0 la s\u00e9curit\u00e9 sont la condition pr\u00e9alable \u00e0 un monitoring complet de la s\u00e9curit\u00e9 informatique. L'analyse des fichiers journaux permet d'une part de d\u00e9tecter les \u00e9v\u00e9nements extraordinaires et d'en d\u00e9terminer les causes et, d'autre part, elle aide les entreprises \u00e0 retracer toutes les activit\u00e9s lors des audits de s\u00e9curit\u00e9.<\/p>\n<ol start=\"5\">\n<li><strong> Respecter le cycle de vie des donn\u00e9es<\/strong><\/li>\n<\/ol>\n<p>L'obligation de conserver les donn\u00e9es est r\u00e9glement\u00e9e en d\u00e9tail dans les secteurs des services financiers, de la technologie m\u00e9dicale, de la chimie-pharmacie et autres. La protection des donn\u00e9es \u00e0 caract\u00e8re personnel tout au long de leur cycle de vie est r\u00e9glement\u00e9e par le RGPD, que les donn\u00e9es se trouvent dans le centre de donn\u00e9es de l'entreprise ou dans le cloud. Pour les entreprises, cela signifie qu'elles doivent conserver en permanence un contr\u00f4le total sur les donn\u00e9es \u00e0 caract\u00e8re personnel, de leur collecte \u00e0 leur archivage en passant par leur traitement. Cela vaut pour les applications individuelles et standard, qu'elles se trouvent sur site ou dans le cloud.<\/p>\n<p>\"Le d\u00e9bat sur l'utilisation des technologies cloud n'est d\u00e9sormais plus domin\u00e9 par des pr\u00e9occupations de s\u00e9curit\u00e9. Aujourd'hui, les entreprises veulent avant tout saisir les opportunit\u00e9s qui en d\u00e9coulent pour acc\u00e9l\u00e9rer leur transformation num\u00e9rique\", explique Franck Braunstedter, Senior Manager Cyber Defense and Cloud Security chez NTT Security Allemagne. Avec un soutien externe, les entreprises sont en mesure de relever les d\u00e9fis de s\u00e9curit\u00e9 informatique sp\u00e9cifiques au cloud \u00e0 toutes les \u00e9tapes d'une migration.<\/p>\n<p><em>Source : NTT Security<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Wenn Unternehmen komplette Gesch\u00e4ftsprozesse in die Cloud verlagern, lassen sich die erwarteten betriebswirtschaftlichen Ziele nur dann erreichen, wenn die Migration von Anfang an durch eine umfassende IT-Security-Strategie abgesichert ist \u2013 bei der die Sicherheit der Daten eine entscheidende Rolle spielt. NTT Security konkretisiert die wichtigsten Aktivit\u00e4ten in f\u00fcnf Schritten. Daten identifizieren und klassifizieren Zu Beginn [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":7606,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[362,62],"class_list":["post-7605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cloud","tag-ict-sicherheit"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Datensicherheit","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud - Save<\/title>\n<meta name=\"description\" content=\"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud - Save\" \/>\n<meta property=\"og:description\" content=\"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-11T10:09:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud\",\"datePublished\":\"2019-02-11T10:09:48+00:00\",\"dateModified\":\"2023-03-14T07:56:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/\"},\"wordCount\":548,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_173338434_m-2015.jpg\",\"keywords\":[\"Cloud\",\"ICT-Sicherheit\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/\",\"name\":\"F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_173338434_m-2015.jpg\",\"datePublished\":\"2019-02-11T10:09:48+00:00\",\"dateModified\":\"2023-03-14T07:56:49+00:00\",\"description\":\"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_173338434_m-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_173338434_m-2015.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos, frenta\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cinq \u00e9tapes pour une s\u00e9curit\u00e9 \u00e9lev\u00e9e des donn\u00e9es dans le cloud - Save","description":"Le transfert de processus commerciaux et d'applications vers le cloud n\u00e9cessite une planification pr\u00e9cise afin de garantir la s\u00e9curit\u00e9 des donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/","og_locale":"fr_FR","og_type":"article","og_title":"F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud - Save","og_description":"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.","og_url":"https:\/\/news.save.ch\/fr\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/","og_site_name":"Save","article_published_time":"2019-02-11T10:09:48+00:00","article_modified_time":"2023-03-14T07:56:49+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud","datePublished":"2019-02-11T10:09:48+00:00","dateModified":"2023-03-14T07:56:49+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/"},"wordCount":548,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg","keywords":["Cloud","ICT-Sicherheit"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/","url":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/","name":"Cinq \u00e9tapes pour une s\u00e9curit\u00e9 \u00e9lev\u00e9e des donn\u00e9es dans le cloud - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg","datePublished":"2019-02-11T10:09:48+00:00","dateModified":"2023-03-14T07:56:49+00:00","description":"Le transfert de processus commerciaux et d'applications vers le cloud n\u00e9cessite une planification pr\u00e9cise afin de garantir la s\u00e9curit\u00e9 des donn\u00e9es.","breadcrumb":{"@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/Depositphotos_173338434_m-2015.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos, frenta"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/fuenf-schritte-fuer-hohe-datensicherheit-in-der-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"F\u00fcnf Schritte f\u00fcr hohe Datensicherheit in der Cloud"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=7605"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7605\/revisions"}],"predecessor-version":[{"id":17410,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7605\/revisions\/17410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/7606"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=7605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=7605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=7605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}