{"id":5842,"date":"2024-01-22T22:41:55","date_gmt":"2024-01-22T21:41:55","guid":{"rendered":"https:\/\/mouillere.com\/universconvergents\/?p=5842"},"modified":"2024-01-23T17:58:10","modified_gmt":"2024-01-23T16:58:10","slug":"chiffrement-et-securite-des-donnees-dans-le-cloud","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/22\/chiffrement-et-securite-des-donnees-dans-le-cloud\/","title":{"rendered":"Chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud"},"content":{"rendered":"<p>La CNIL vient de publier deux \u00a0fiches sur le chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud.<\/p>\n<p><!--more--><\/p>\n<p>La s\u00e9curit\u00e9 est indispensable pour apporter la confiance dans la gestion des donn\u00e9es personnelles de l\u2019entreprise. En 2022, pr\u00e8s d\u2019un tiers des sanctions de la CNIL visaient des manquements aux obligations de s\u00e9curit\u00e9.<\/p>\n<p>Dans sa fiche pratique sur le chiffrement, la CNIL propose une analyse d\u00e9taill\u00e9e des diff\u00e9rents types de chiffrement dans le cloud :<\/p>\n<ul>\n<li>Chiffrement au repos;<\/li>\n<li>Chiffrement en transit pour s\u00e9curiser les canaux de communication;<\/li>\n<li>Chiffrement en traitement;<\/li>\n<li>Chiffrement de bout en bout.<\/li>\n<\/ul>\n<p>Dans sa fiche pratique sur les outils de s\u00e9curit\u00e9 et de performance dans le cloud, la CNIL op\u00e8re une distinction entre des fonctionnalit\u00e9s de s\u00e9curit\u00e9 (anti-DDoS, WAF) et des fonctionnalit\u00e9s de performance (CDN, Load balancer).<\/p>\n<p><a href=\"https:\/\/cnil.fr\/fr\/informatique-en-nuage-cloud-la-cnil-publie-deux-fiches-pratiques-sur-le-chiffrement-et-la-securite\" target=\"_blank\" rel=\"noopener\">https:\/\/cnil.fr\/fr\/informatique-en-nuage-cloud-la-cnil-publie-deux-fiches-pratiques-sur-le-chiffrement-et-la-securite<\/a><\/p>\n<p><a href=\"https:\/\/cnil.fr\/fr\/les-pratiques-de-chiffrement-dans-linformatique-en-nuage-cloud-public\" target=\"_blank\" rel=\"noopener\">https:\/\/cnil.fr\/fr\/les-pratiques-de-chiffrement-dans-linformatique-en-nuage-cloud-public<\/a><\/p>\n<p><a href=\"https:\/\/cnil.fr\/fr\/les-outils-de-securisation-dapplications-web-dans-linformatique-en-nuage-cloud\" target=\"_blank\" rel=\"noopener\">https:\/\/cnil.fr\/fr\/les-outils-de-securisation-dapplications-web-dans-linformatique-en-nuage-cloud<\/a><\/p>\n<p><a href=\"https:\/\/cnil.fr\/fr\/cybersecurite\/securite-des-donnees\" target=\"_blank\" rel=\"noopener\">https:\/\/cnil.fr\/fr\/cybersecurite\/securite-des-donnees<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La CNIL vient de publier deux \u00a0fiches sur le chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud.<\/p>\n","protected":false},"author":1,"featured_media":5843,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,74],"tags":[],"class_list":["post-5842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-it"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-1we","jetpack-related-posts":[{"id":2806,"url":"https:\/\/mouillere.com\/universconvergents\/2018\/09\/25\/bilan-des-4-mois-de-rgpd-en-france\/","url_meta":{"origin":5842,"position":0},"title":"Bilan des 4 mois de RGPD en France","author":"Fred","date":"25 septembre 2018","format":false,"excerpt":"La CNIL vient de publier son bilan apr\u00e8s 4 mois de RGPD en France. Parmi ces chiffres, nous pouvons souligner que: 24 500 organismes ont d\u00e9sign\u00e9 un DPO ce qui repr\u00e9sente 13 000 DPO contre 5 000 CIL (correspondants informatique et libert\u00e9s) avant le RGPD ; \u00a0 Plus de 600\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/visuel_actu_11.jpg?fit=975%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/visuel_actu_11.jpg?fit=975%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/visuel_actu_11.jpg?fit=975%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/visuel_actu_11.jpg?fit=975%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2594,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/08\/03\/fonctionnalites-dun-service-de-stockage-conforme-au-rgdp\/","url_meta":{"origin":5842,"position":1},"title":"Fonctionnalit\u00e9s d&#8217;un service de stockage conforme au RGDP","author":"Fred","date":"3 ao\u00fbt 2017","format":false,"excerpt":"LES ECHOS consacre un article relatif aux nouvelles obligations de s\u00e9curit\u00e9 et contractuelles qu'impose le RGDP aux responsables du traitement amen\u00e9es \u00e0 traiter avec des fournisseurs de services cloud et des fournisseurs de technologie de protection des donn\u00e9es (sous-traitants). Les fournisseurs de services cloud doivent apporter des garanties suffisantes pour\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2965,"url":"https:\/\/mouillere.com\/universconvergents\/2019\/05\/14\/kit-de-bonnes-pratiques-de-la-cnil-a-destination-des-developpeurs\/","url_meta":{"origin":5842,"position":2},"title":"Kit de bonnes pratiques de la CNIL \u00e0 destination des d\u00e9veloppeurs","author":"Fred","date":"14 mai 2019","format":false,"excerpt":"La CNIL vient de publier un kit des bonnes pratiques \u00e0 appliquer d\u00e8s la conception d\u2019une solution IT (Code, SDK, biblioth\u00e8ques, etc.) selon le principe GDPR de Privacy by Design afin d\u2019am\u00e9liorer la gestion des donn\u00e9es et s\u00e9curiser les projets. https:\/\/www.cnil.fr\/fr\/kit-developpeur Les premi\u00e8res recommandations visent le choix des outils de\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/6640564215_b3dc3f033d.jpg?fit=450%2C287&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6672,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/07\/23\/cnil-developpement-de-lia-conforme-au-rgpd\/","url_meta":{"origin":5842,"position":3},"title":"CNIL : d\u00e9veloppement de l&#8217;IA conforme au RGPD","author":"Fred","date":"23 juillet 2025","format":false,"excerpt":"Les recommandations de la CNIL ont pour objectif de d\u00e9crire et documenter l\u2019analyse des mod\u00e8les IA pour d\u00e9terminer s\u2019ils sont soumis et conformes au RGPD en mati\u00e8re de traitement des donn\u00e9es personnelles, de s\u00e9curit\u00e9 et d\u2019annotation des donn\u00e9es d\u2019entra\u00eenement en d\u00e9taillant les risques et mesures \u00e0 prendre en compte lors\u2026","rel":"","context":"Dans &quot;IA&quot;","block_context":{"text":"IA","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/ia\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/07\/IA-Developpement-Deploiement-scaled.png?fit=1200%2C435&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/07\/IA-Developpement-Deploiement-scaled.png?fit=1200%2C435&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/07\/IA-Developpement-Deploiement-scaled.png?fit=1200%2C435&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/07\/IA-Developpement-Deploiement-scaled.png?fit=1200%2C435&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/07\/IA-Developpement-Deploiement-scaled.png?fit=1200%2C435&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1065,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/05\/une-charte-avec-les-fai-francais-pour-le-chiffrement-des-flux-emails\/","url_meta":{"origin":5842,"position":4},"title":"Une charte avec les FAI fran\u00e7ais pour le chiffrement des flux emails","author":"Fred","date":"5 octobre 2015","format":false,"excerpt":"Axelle Lemaire vient d\u2018annoncer en milieu de matin\u00e9e \u00ab la signature d\u2019une charte entre les op\u00e9rateurs fran\u00e7ais pour le cryptage des boites email \u00bb. Cependant, l\u2019engagement qui concerne le transport des messages, ne devrait pas contrarier les interceptions l\u00e9gales, selon les v\u0153ux de l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1658,"url":"https:\/\/mouillere.com\/universconvergents\/2016\/01\/22\/loi-numerique-la-cnil-pourra-infliger-des-amendes-de-20-millions-deuros\/","url_meta":{"origin":5842,"position":5},"title":"Loi Num\u00e9rique : la CNIL pourra infliger des amendes de 20 millions d\u2019euros","author":"Fred","date":"22 janvier 2016","format":false,"excerpt":"Conform\u00e9ment \u00e0 ce que souhaitait l\u2019institution, les d\u00e9put\u00e9s ont augment\u00e9 de mani\u00e8re consid\u00e9rable le montant maximum des amendes pouvant \u00eatre prononc\u00e9es par la Commission nationale de l\u2019informatique et des libert\u00e9s (CNIL) : jusqu\u2019\u00e0 20 millions d\u2019euros ou, pour les entreprises, 4 % de leur chiffre d\u2019affaires annuel mondial http:\/\/www.nextinpact.com\/news\/98192-loi-numerique-cnil-pourra-infliger-amendes-20-millions-d-euros.htm http:\/\/www.assemblee-nationale.fr\/14\/amendements\/3399\/AN\/867.pdf\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/6640564215_b3dc3f033d.jpg?fit=450%2C287&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=5842"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5842\/revisions"}],"predecessor-version":[{"id":5844,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5842\/revisions\/5844"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/5843"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=5842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=5842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=5842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}