{"id":19142,"date":"2024-09-20T08:46:23","date_gmt":"2024-09-20T08:46:23","guid":{"rendered":"https:\/\/www.ignition-technology.com\/fr\/?p=19142"},"modified":"2024-09-20T08:46:23","modified_gmt":"2024-09-20T08:46:23","slug":"elaboration-dune-strategie-de-securite-des-identites","status":"publish","type":"post","link":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/","title":{"rendered":"Elaboration d&#8217;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s"},"content":{"rendered":"<p>Avec la mont\u00e9e du t\u00e9l\u00e9travail et des services cloud, les organisations d\u00e9pendent de plus en plus de la technologie pour mener leurs activit\u00e9s. Plus l&#8217;empreinte num\u00e9rique est grande, plus le risque de violations de donn\u00e9es et de cyberattaques est \u00e9lev\u00e9. Pour att\u00e9nuer ce risque, les organisations doivent investir du temps et des ressources dans l&#8217;\u00e9laboration d&#8217;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s compl\u00e8te. La s\u00e9curit\u00e9 des identit\u00e9s est souvent consid\u00e9r\u00e9e comme la base de la s\u00e9curit\u00e9 informatique. Par cons\u00e9quent, un plan de s\u00e9curit\u00e9 des identit\u00e9s bien con\u00e7u aidera non seulement les organisations \u00e0 prot\u00e9ger leurs actifs critiques et leur infrastructure contre les attaquants malveillants, mais aussi \u00e0 :<\/p>\n<ul>\n<li>s\u00e9curiser les informations sensibles,<\/li>\n<li>pr\u00e9venir la perte de donn\u00e9es,<\/li>\n<li>r\u00e9pondre aux exigences de conformit\u00e9,<\/li>\n<li>att\u00e9nuer les menaces internes,<\/li>\n<li>renforcer la confiance et la cr\u00e9dibilit\u00e9 de l&#8217;organisation.<\/li>\n<\/ul>\n<p>Savoir par o\u00f9 commencer peut \u00eatre accablant. De la navigation dans la complexit\u00e9 des actifs et des exigences de contr\u00f4le d&#8217;acc\u00e8s individuelles \u00e0 la visibilit\u00e9 de toutes les identit\u00e9s associ\u00e9es \u00e0 un r\u00e9seau, il y a beaucoup \u00e0 prendre en compte. Nous avons cr\u00e9\u00e9 ce cadre facile \u00e0 suivre pour simplifier le processus et mettre en \u00e9vidence les domaines cl\u00e9s \u00e0 prendre en compte lors de l&#8217;\u00e9laboration d&#8217;une strat\u00e9gie robuste de s\u00e9curit\u00e9 des identit\u00e9s :<\/p>\n<ol>\n<li><strong>Identifiez vos actifs critiques<\/strong> : La premi\u00e8re \u00e9tape consiste \u00e0 identifier tous les actifs essentiels aux op\u00e9rations de votre organisation. Cela inclut les donn\u00e9es, les applications, les syst\u00e8mes et d&#8217;autres ressources indispensables \u00e0 votre entreprise.<\/li>\n<li><strong>D\u00e9finissez les r\u00f4les et les permissions des utilisateurs<\/strong> : Ensuite, d\u00e9finissez les r\u00f4les et les permissions des utilisateurs en fonction du principe du moindre privil\u00e8ge. Cela signifie que les utilisateurs ne re\u00e7oivent que les acc\u00e8s minimums n\u00e9cessaires pour accomplir leurs fonctions.<\/li>\n<li><strong>Mettez en \u0153uvre une authentification forte<\/strong> : Mettez en place des m\u00e9canismes d&#8217;authentification forts, tels que l&#8217;authentification multi-facteurs (MFA), pour v\u00e9rifier l&#8217;identit\u00e9 des utilisateurs avant de leur accorder l&#8217;acc\u00e8s aux ressources. Cela aide \u00e0 pr\u00e9venir l&#8217;acc\u00e8s non autoris\u00e9 et \u00e0 r\u00e9duire le risque de vol d&#8217;identit\u00e9.<\/li>\n<li><strong>Appliquez des contr\u00f4les d&#8217;acc\u00e8<\/strong>s : Mettez en \u0153uvre des contr\u00f4les d&#8217;acc\u00e8s qui limitent l&#8217;acc\u00e8s aux ressources en fonction de l&#8217;identit\u00e9 et du r\u00f4le de l&#8217;utilisateur. Cela inclut l&#8217;application de contr\u00f4les d&#8217;acc\u00e8s granulaires qui limitent l&#8217;acc\u00e8s \u00e0 des donn\u00e9es ou des applications sp\u00e9cifiques en fonction des fonctions professionnelles de l&#8217;utilisateur.<\/li>\n<li><strong>Surveillez et auditez les acc\u00e8s<\/strong> : Mettez en place des m\u00e9canismes de journalisation et de surveillance pour suivre l&#8217;acc\u00e8s aux ressources critiques. Cela permet de d\u00e9tecter et de r\u00e9pondre aux incidents de s\u00e9curit\u00e9 en temps r\u00e9el.<\/li>\n<li><strong>\u00c9duquez les utilisateurs<\/strong> : Offrez des programmes de formation et de sensibilisation pour \u00e9duquer les utilisateurs sur les meilleures pratiques en mati\u00e8re de s\u00e9curit\u00e9 des identit\u00e9s, y compris les mots de passe, l&#8217;\u00e9vitement des attaques de phishing et le signalement des activit\u00e9s suspectes.<\/li>\n<li><strong>R\u00e9visez et mettez r\u00e9guli\u00e8rement \u00e0 jour votre strat\u00e9gie<\/strong> : Les menaces li\u00e9es \u00e0 la s\u00e9curit\u00e9 des identit\u00e9s \u00e9voluent constamment, il est donc important de revoir et de mettre r\u00e9guli\u00e8rement \u00e0 jour votre strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s pour s&#8217;assurer qu&#8217;elle est en phase avec les derni\u00e8res menaces et les meilleures pratiques.<\/li>\n<\/ol>\n<p>De nombreuses r\u00e9glementations et normes exigent que les organisations mettent en \u0153uvre des mesures de s\u00e9curit\u00e9 des identit\u00e9s robustes, et le non-respect de ces r\u00e9glementations peut entra\u00eener des amendes importantes et d&#8217;autres sanctions. En investissant dans l&#8217;\u00e9laboration d&#8217;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s, les organisations non seulement s\u00e9curiseront leur infrastructure, mais elles respecteront \u00e9galement les exigences r\u00e9glementaires et \u00e9viteront les sanctions pour non-conformit\u00e9.<\/p>\n<p>En r\u00e9sum\u00e9, prendre le temps de construire une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s compl\u00e8te est un investissement judicieux qui peut aider \u00e0 prot\u00e9ger les actifs critiques de votre organisation, \u00e0 se conformer aux r\u00e9glementations et \u00e0 renforcer la confiance et la cr\u00e9dibilit\u00e9.<\/p>\n<p>Pour savoir quelles sont les solutions vous permettant d&#8217;optimiser votre plan de s\u00e9curisation des identit\u00e9s, contactez nous via <a href=\"mailto:contacts@ignition-technology.fr\">contacts@ignition-technology.com<\/a><\/p>\n<p><a href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/\" target=\"_blank\" rel=\"noopener\">EN APPRENDRE PLUS<\/a><\/p>\n<p><strong>Par Ignition Technology<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avec la mont\u00e9e du t\u00e9l\u00e9travail et des services cloud, les organisations d\u00e9pendent de plus en plus de la technologie pour<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":11,"featured_media":18685,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[10],"tags":[],"class_list":["post-19142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Elaboration d&#039;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s - Ignition Technology FR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Elaboration d&#039;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s\" \/>\n<meta property=\"og:description\" content=\"Avec la mont\u00e9e du t\u00e9l\u00e9travail et des services cloud, les organisations d\u00e9pendent de plus en plus de la technologie pour [\u2026]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology FR\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-20T08:46:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ppopihn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ppopihn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/\"},\"author\":{\"name\":\"ppopihn\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/person\\\/d9d7837049da43cee026f249403495db\"},\"headline\":\"Elaboration d&#8217;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s\",\"datePublished\":\"2024-09-20T08:46:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/\"},\"wordCount\":766,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/05\\\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/\",\"name\":\"Elaboration d'une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s - Ignition Technology FR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/05\\\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\",\"datePublished\":\"2024-09-20T08:46:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/05\\\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/05\\\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\",\"width\":1500,\"height\":1500,\"caption\":\"Blog thumbnail of a man pointing to whiteboard with sticky notes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/elaboration-dune-strategie-de-securite-des-identites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Elaboration d&#8217;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/person\\\/d9d7837049da43cee026f249403495db\",\"name\":\"ppopihn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e96f9c0db6dbcb378a604819bb3fb4684b49df8f451e24091fed7938632f8bb8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e96f9c0db6dbcb378a604819bb3fb4684b49df8f451e24091fed7938632f8bb8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e96f9c0db6dbcb378a604819bb3fb4684b49df8f451e24091fed7938632f8bb8?s=96&d=mm&r=g\",\"caption\":\"ppopihn\"},\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blog\\\/author\\\/ppopihn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Elaboration d'une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s - Ignition Technology FR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/","og_locale":"en_GB","og_type":"article","og_title":"Elaboration d'une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s","og_description":"Avec la mont\u00e9e du t\u00e9l\u00e9travail et des services cloud, les organisations d\u00e9pendent de plus en plus de la technologie pour [\u2026]","og_url":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/","og_site_name":"Ignition Technology FR","article_published_time":"2024-09-20T08:46:23+00:00","og_image":[{"width":1500,"height":1500,"url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","type":"image\/png"}],"author":"ppopihn","twitter_card":"summary_large_image","twitter_creator":"@ignition_tech","twitter_site":"@ignition_tech","twitter_misc":{"Written by":"ppopihn","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#article","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/"},"author":{"name":"ppopihn","@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/person\/d9d7837049da43cee026f249403495db"},"headline":"Elaboration d&#8217;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s","datePublished":"2024-09-20T08:46:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/"},"wordCount":766,"commentCount":0,"publisher":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","articleSection":["Blogs"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/","url":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/","name":"Elaboration d'une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s - Ignition Technology FR","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","datePublished":"2024-09-20T08:46:23+00:00","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","contentUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","width":1500,"height":1500,"caption":"Blog thumbnail of a man pointing to whiteboard with sticky notes"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/fr\/blog\/elaboration-dune-strategie-de-securite-des-identites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Elaboration d&#8217;une strat\u00e9gie de s\u00e9curit\u00e9 des identit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/fr\/#website","url":"https:\/\/www.ignition-technology.com\/fr\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/fr\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]},{"@type":"Person","@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/person\/d9d7837049da43cee026f249403495db","name":"ppopihn","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/e96f9c0db6dbcb378a604819bb3fb4684b49df8f451e24091fed7938632f8bb8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e96f9c0db6dbcb378a604819bb3fb4684b49df8f451e24091fed7938632f8bb8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e96f9c0db6dbcb378a604819bb3fb4684b49df8f451e24091fed7938632f8bb8?s=96&d=mm&r=g","caption":"ppopihn"},"url":"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/ppopihn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/posts\/19142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/comments?post=19142"}],"version-history":[{"count":1,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/posts\/19142\/revisions"}],"predecessor-version":[{"id":19143,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/posts\/19142\/revisions\/19143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/media\/18685"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/media?parent=19142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/categories?post=19142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/tags?post=19142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}