{"id":7934,"date":"2019-04-24T17:44:08","date_gmt":"2019-04-24T15:44:08","guid":{"rendered":"https:\/\/news.save.ch\/?p=7934"},"modified":"2023-03-14T08:56:48","modified_gmt":"2023-03-14T07:56:48","slug":"fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/","title":{"rendered":"Cinq bonnes pratiques am\u00e9liorent la s\u00e9curit\u00e9 informatique des installations de production"},"content":{"rendered":"<figure id=\"attachment_7935\" aria-describedby=\"caption-attachment-7935\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7935 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/04\/Depositphotos_19452909_l-2015.jpg\" alt=\"Strat\u00e9gie de s\u00e9curit\u00e9 informatique\" width=\"680\" height=\"452\" \/><figcaption id=\"caption-attachment-7935\" class=\"wp-caption-text\">\u00a9 depositphotos, zhanglianxun<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Dans de nombreux cas, les installations industrielles sont une cible facile pour les pirates. La gestion des vuln\u00e9rabilit\u00e9s est jusqu'\u00e0 pr\u00e9sent largement inconnue dans cet environnement, mais surtout, la conscience de la s\u00e9curit\u00e9 fait \u00e9galement d\u00e9faut. Les entreprises courent donc le plus grand risque d'\u00eatre victimes de cyberattaques auxquelles elles sont expos\u00e9es sans protection. Les attaquants profitent de ce manque de conscience de mani\u00e8re cibl\u00e9e, comme l'a montr\u00e9 le Global Threat Intelligence Report 2018 : En Allemagne, 36 % de toutes les cyberattaques ont concern\u00e9 l'industrie manufacturi\u00e8re. En comparaison, cela repr\u00e9sente nettement plus d'attaques que d'autres secteurs - un indice fort qu'une grande partie a vis\u00e9 les installations de production.<\/p>\n<p>Cinq \u00e9tapes coordonn\u00e9es permettent aux exploitants d'installations de production d'augmenter consid\u00e9rablement la s\u00e9curit\u00e9, comme le montre <a href=\"https:\/\/www.nttsecurity.com\">NTT Security<\/a> souligne.<\/p>\n<ol>\n<li><strong> Faire l'inventaire des composants \u00e0 l'aide d'outils<\/strong><\/li>\n<\/ol>\n<p>L'environnement de production d'une entreprise comporte souvent des milliers de composants OT (Operational Technology) tels que des actionneurs, des stations de travail d'ing\u00e9nierie, des HMI (Human Machine Interfaces), des PLC (Programmable Logic Controller), des capteurs ou des syst\u00e8mes SCADA bas\u00e9s sur des serveurs. L'inventaire assure la transparence et cr\u00e9e les conditions pour des mesures de s\u00e9curit\u00e9 efficaces. Il fournit des r\u00e9ponses aux questions suivantes : quels sont les composants OT pr\u00e9sents dans l'environnement de production ? Qui communique avec qui et par quel protocole ? Quelles sont les connexions de communication avec le monde ext\u00e9rieur, par exemple avec le fabricant ? Lesquelles ne sont pas n\u00e9cessaires ou ne sont pas autoris\u00e9es ? Existe-t-il des canaux de maintenance non contr\u00f4l\u00e9s ?<\/p>\n<ol start=\"2\">\n<li><strong> Rep\u00e9rer les points faibles de la s\u00e9curit\u00e9 des composants OT<\/strong><\/li>\n<\/ol>\n<p>L'\u00e9tape suivante, apr\u00e8s la documentation de l'infrastructure OT existante, consiste \u00e0 d\u00e9tecter les points faibles existants des composants - et ce, sans que cela ne perturbe les processus du r\u00e9seau de production. Les outils correspondants utilisent des proc\u00e9dures de surveillance et d'analyse en temps r\u00e9el, d\u00e9tectent les \u00e9carts par rapport au comportement attendu et signalent les probl\u00e8mes de s\u00e9curit\u00e9 et de processus. Les entreprises obtiennent ainsi une bonne vue d'ensemble de la vuln\u00e9rabilit\u00e9 des composants OT utilis\u00e9s.<\/p>\n<ol start=\"3\">\n<li><strong> Am\u00e9liorer la s\u00e9curit\u00e9 avec la gestion intelligente des vuln\u00e9rabilit\u00e9s<\/strong><\/li>\n<\/ol>\n<p>Le point de d\u00e9part de la gestion des points faibles est l'inventaire des composants OT existants. Il est compl\u00e9t\u00e9 par une \u00e9valuation des risques, car chaque installation et l'ensemble de l'environnement de production pr\u00e9sentent un profil de risque individuel. Les entreprises doivent d\u00e9terminer le risque existant - de pr\u00e9f\u00e9rence avec l'aide d'un sp\u00e9cialiste externe de la s\u00e9curit\u00e9 OT - \u00e0 l'aide d'une classification et d'une \u00e9valuation des donn\u00e9es et des processus \u00e0 prot\u00e9ger. C'est sur cette base que se fondent ensuite toutes les autres mesures dans le cadre d'une strat\u00e9gie globale de gestion des vuln\u00e9rabilit\u00e9s ainsi qu'une planification structur\u00e9e des \u00e9tapes ult\u00e9rieures visant \u00e0 accro\u00eetre la s\u00e9curit\u00e9 OT. Il ne faut pas se faire d'illusions en pensant que tous les composants peuvent maintenant \u00eatre corrig\u00e9s. Souvent, les mesures compensatoires constituent la seule solution pour r\u00e9duire les risques.<\/p>\n<ol start=\"4\">\n<li><strong> Utiliser un logiciel de protection des syst\u00e8mes d'extr\u00e9mit\u00e9<\/strong><\/li>\n<\/ol>\n<p>L'utilisation d'un logiciel de protection des terminaux sur les stations de travail d'ing\u00e9nierie et les serveurs SCADA est une mesure efficace et rapide \u00e0 mettre en \u0153uvre. Cela permet de prot\u00e9ger efficacement les syst\u00e8mes contre les logiciels malveillants de toutes sortes et les cyber-attaques. Le logiciel surveille toutes les actions qui se d\u00e9roulent sur les ordinateurs et emp\u00eache les situations potentiellement dangereuses. En outre, il permet par exemple de d\u00e9terminer s'il y a des \u00e9v\u00e9nements anormaux dans le trafic r\u00e9seau. Ici aussi, il existe bien s\u00fbr une d\u00e9pendance vis-\u00e0-vis du fabricant de la solution SCADA. Souvent, seuls les produits approuv\u00e9s peuvent \u00eatre utilis\u00e9s.<\/p>\n<ol start=\"5\">\n<li><strong> Int\u00e9grer la s\u00e9curit\u00e9 OT dans une strat\u00e9gie de s\u00e9curit\u00e9 informatique \u00e0 l'\u00e9chelle de l'entreprise<\/strong><\/li>\n<\/ol>\n<p>Les entreprises doivent combler le foss\u00e9 en mati\u00e8re de s\u00e9curit\u00e9 entre le monde de la production et celui de l'informatique classique, qui dispose d'une grande exp\u00e9rience dans la mise en \u0153uvre de la s\u00e9curit\u00e9 informatique. La direction est responsable de la s\u00e9curit\u00e9 globale dans l'entreprise et peut d\u00e9l\u00e9guer la mise en \u0153uvre \u00e0 un Chief Information Security Officer (CISO), par exemple. La responsabilit\u00e9 technique pour les syst\u00e8mes informatiques classiques et les syst\u00e8mes de production doit certes rester dans les d\u00e9partements, mais la responsabilit\u00e9 de la mise en \u0153uvre et du respect de la strat\u00e9gie de s\u00e9curit\u00e9 globale dans l'entreprise doit \u00eatre centralis\u00e9e.<\/p>\n<p><strong>Les fabricants doivent \u00e9galement agir<\/strong><\/p>\n<p>\"Les entreprises sont appel\u00e9es \u00e0 mettre en \u0153uvre des mesures organisationnelles et techniques afin d'augmenter sensiblement la s\u00e9curit\u00e9 dans l'environnement de production. Cela implique la mise en \u0153uvre et le respect d'une strat\u00e9gie de s\u00e9curit\u00e9 globale qui englobe le monde informatique traditionnel et le monde OT\", explique Christian Koch de NTT Security. \"Mais en outre, les fabricants de composants, de capteurs et de machines doivent \u00e9galement agir. Ils doivent soumettre progressivement les produits d\u00e9j\u00e0 en service \u00e0 des tests d'intrusion afin de d\u00e9tecter les points faibles et aider proactivement les clients \u00e0 les \u00e9liminer. Lors du d\u00e9veloppement de nouveaux produits, les fabricants doivent suivre le principe de s\u00e9curit\u00e9 par la conception et faire appel, dans les \u00e9quipes de projet, \u00e0 des sp\u00e9cialistes de la s\u00e9curit\u00e9 et \u00e0 des informaticiens en plus des \u00e9lectrotechniciens et des ing\u00e9nieurs. C'est la seule fa\u00e7on d'augmenter durablement la s\u00e9curit\u00e9 informatique des composants OT \u00e0 long terme\".<\/p>\n<p><em>Source : NTT Security<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; In vielen F\u00e4llen sind Industrieanlagen ein leichtes Ziel f\u00fcr Hacker. Das Schwachstellenmanagement ist in diesem Umfeld bislang weitgehend unbekannt, vor allem aber fehlt auch das Sicherheitsbewusstsein. Unternehmen begeben sich daher in die gr\u00f6sste Gefahr, Opfer von Cyber-Attacken zu werden, denen sie schutzlos ausgeliefert sind. Angreifer nutzen diesen Bewusstseinsmangel gezielt aus, wie der Global Threat [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":7935,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[63,474],"class_list":["post-7934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-it-security","tag-produktionsanlagen"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"IT-Sicherheitsstrategie","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen - Save<\/title>\n<meta name=\"description\" content=\"Mit \u201eBest Practices\u201c k\u00f6nnen Unternehmen zentrale Sicherheitsanforderungen umsetzen und ihre Anlagen wirksam sch\u00fctzen, wie NTT Security schreibt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen - Save\" \/>\n<meta property=\"og:description\" content=\"Mit \u201eBest Practices\u201c k\u00f6nnen Unternehmen zentrale Sicherheitsanforderungen umsetzen und ihre Anlagen wirksam sch\u00fctzen, wie NTT Security schreibt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-24T15:44:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/04\/Depositphotos_19452909_l-2015-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen\",\"datePublished\":\"2019-04-24T15:44:08+00:00\",\"dateModified\":\"2023-03-14T07:56:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/\"},\"wordCount\":709,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Depositphotos_19452909_l-2015-scaled.jpg\",\"keywords\":[\"IT-SECURITY\",\"Produktionsanlagen\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/\",\"name\":\"F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Depositphotos_19452909_l-2015-scaled.jpg\",\"datePublished\":\"2019-04-24T15:44:08+00:00\",\"dateModified\":\"2023-03-14T07:56:48+00:00\",\"description\":\"Mit \u201eBest Practices\u201c k\u00f6nnen Unternehmen zentrale Sicherheitsanforderungen umsetzen und ihre Anlagen wirksam sch\u00fctzen, wie NTT Security schreibt.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Depositphotos_19452909_l-2015-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Depositphotos_19452909_l-2015-scaled.jpg\",\"width\":1400,\"height\":930,\"caption\":\"\u00a9 depositphotos, zhanglianxun\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cinq bonnes pratiques am\u00e9liorent la s\u00e9curit\u00e9 informatique des installations de production - Save","description":"Les \"meilleures pratiques\" permettent aux entreprises de mettre en \u0153uvre des exigences de s\u00e9curit\u00e9 essentielles et de prot\u00e9ger efficacement leurs installations, comme l'\u00e9crit NTT Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/","og_locale":"fr_FR","og_type":"article","og_title":"F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen - Save","og_description":"Mit \u201eBest Practices\u201c k\u00f6nnen Unternehmen zentrale Sicherheitsanforderungen umsetzen und ihre Anlagen wirksam sch\u00fctzen, wie NTT Security schreibt.","og_url":"https:\/\/news.save.ch\/fr\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/","og_site_name":"Save","article_published_time":"2019-04-24T15:44:08+00:00","article_modified_time":"2023-03-14T07:56:48+00:00","og_image":[{"width":1400,"height":930,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/04\/Depositphotos_19452909_l-2015-scaled.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen","datePublished":"2019-04-24T15:44:08+00:00","dateModified":"2023-03-14T07:56:48+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/"},"wordCount":709,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/04\/Depositphotos_19452909_l-2015-scaled.jpg","keywords":["IT-SECURITY","Produktionsanlagen"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/","url":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/","name":"Cinq bonnes pratiques am\u00e9liorent la s\u00e9curit\u00e9 informatique des installations de production - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/04\/Depositphotos_19452909_l-2015-scaled.jpg","datePublished":"2019-04-24T15:44:08+00:00","dateModified":"2023-03-14T07:56:48+00:00","description":"Les \"meilleures pratiques\" permettent aux entreprises de mettre en \u0153uvre des exigences de s\u00e9curit\u00e9 essentielles et de prot\u00e9ger efficacement leurs installations, comme l'\u00e9crit NTT Security.","breadcrumb":{"@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/04\/Depositphotos_19452909_l-2015-scaled.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/04\/Depositphotos_19452909_l-2015-scaled.jpg","width":1400,"height":930,"caption":"\u00a9 depositphotos, zhanglianxun"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/fuenf-best-practices-verbessern-it-sicherheit-von-produktionsanlagen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"F\u00fcnf Best Practices verbessern IT-Sicherheit von Produktionsanlagen"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=7934"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7934\/revisions"}],"predecessor-version":[{"id":17401,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7934\/revisions\/17401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/7935"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=7934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=7934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=7934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}