{"id":6496,"date":"2025-03-06T22:48:18","date_gmt":"2025-03-06T21:48:18","guid":{"rendered":"https:\/\/mouillere.com\/universconvergents\/?p=6496"},"modified":"2025-03-19T13:15:15","modified_gmt":"2025-03-19T12:15:15","slug":"cloud-cybersecurite-souverainete","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2025\/03\/06\/cloud-cybersecurite-souverainete\/","title":{"rendered":"Cloud : cybers\u00e9curit\u00e9 &#038; souverainet\u00e9"},"content":{"rendered":"<p>Alors que Microsoft finalise son projet garantissant \u00e0 ses utilisateurs europ\u00e9ens que leurs donn\u00e9es restent localis\u00e9es dans des centres de donn\u00e9es bas\u00e9es dans dans un pays de l&#8217;Union europ\u00e9enne ou au sein d&#8217;un pays membre de l&#8217;association europ\u00e9enne de libre \u00e9change (Suisse, Liechtenstein, Norv\u00e8ge, Islande), ce qui ne devrait pas \u00eatre une option mais une obligation, l&#8217;ANSSI a publi\u00e9 un rapport sur la menace informatique pesant sur le cloud computing.<\/p>\n<p><!--more--><\/p>\n<p>Le cloud offre de nouvelles opportunit\u00e9s d\u2019attaques informatiques pour les organisations disposant de leurs propres environnements Cloud ou faisant appel \u00e0 des fournisseurs (Cloud service provider ou CSP). Les CSP repr\u00e9sentent \u00e0 la fois une cible d\u2019int\u00e9r\u00eat pour la masse de donn\u00e9es qu\u2019ils traitent mais \u00e9galement pour les acc\u00e8s qu\u2019ils peuvent offrir vers leur client. Par ailleurs, l\u2019exploitation de vuln\u00e9rabilit\u00e9s dans des \u00e9quipements de bordure (tels que des \u00e9quipements VPN) constitue un point d\u2019entr\u00e9e privil\u00e9gi\u00e9 par une vaste gamme d\u2019acteurs malveillants. Enfin, une des tendances grandissantes est l\u2019utilisation des services de cloud comme infrastructures d\u2019attaques, qu\u2019il s\u2019agisse de louer de l\u2019infrastructure d\u2019attaque chez des op\u00e9rateurs de cloud, ou d\u2019utiliser des plateformes grand public comme lieu de stockage, d\u2019acc\u00e8s \u00e0 des codes malveillants ou d\u2019exfiltration de donn\u00e9es vol\u00e9es. Ces nouvelles pratiques complexifient la d\u00e9tection en dissimulant les activit\u00e9s malveillantes au sein du trafic l\u00e9gitime des utilisateurs de ces plateformes.<\/p>\n<p>Selon les principes de la responsabilit\u00e9 partag\u00e9e, les clients de services cloud sont en partie d\u00e9pendants du fournisseur pour leur s\u00e9curit\u00e9 mais disposent \u00e9galement de responsabilit\u00e9s importantes concernant la gestion des donn\u00e9es et des identit\u00e9s. Ainsi, des compromissions facilit\u00e9es par un faible cloisonnement entre syst\u00e8mes d\u2019information d\u00fb \u00e0 l\u2019hybridation g\u00e9n\u00e9r\u00e9e par l\u2019usage du cloud ou les manquements dans la supervision des syst\u00e8mes d\u2019informations sont fr\u00e9quemment constat\u00e9es.<\/p>\n<p>A ce titre, le rapport comprend un volet d\u00e9di\u00e9 aux recommandations sur les bonnes pratiques de cybers\u00e9curit\u00e9 adress\u00e9es aux clients de fournisseurs de services cloud, ainsi qu\u2019aux fournisseurs de services cloud eux-m\u00eames.<\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2025%2F03%2F2025-02-190-ANSSI-Cloud-MenaceInformatique.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 630KB)<\/a><\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2025%2F03%2F2025-02-190-ANSSI-Cloud-MenaceInformatique-Matrice.xlsx&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique-Matrice.xlsx\" class=\"gde-link\">T\u00e9l\u00e9charger (XLSX, Inconnu)<\/a><\/p>\n<p><a href=\"https:\/\/www.zdnet.fr\/actualites\/microsoft-apporte-la-touche-finale-a-son-initiative-de-localisation-des-donnees-europeennes-407134.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/www.zdnet.fr\/actualites\/microsoft-apporte-la-touche-finale-a-son-initiative-de-localisation-des-donnees-europeennes-407134.htm<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/privacy\/eudb\/eu-data-boundary-learn\" target=\"_blank\" rel=\"noopener\">https:\/\/learn.microsoft.com\/en-us\/privacy\/eudb\/eu-data-boundary-learn<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/02\/26\/microsoft-completes-landmark-eu-data-boundary-offering-enhanced-data-residency-and-transparency\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/02\/26\/microsoft-completes-landmark-eu-data-boundary-offering-enhanced-data-residency-and-transparency\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alors que Microsoft finalise son projet garantissant \u00e0 ses utilisateurs europ\u00e9ens que leurs donn\u00e9es restent localis\u00e9es dans des centres de donn\u00e9es bas\u00e9es dans dans un pays de l&#8217;Union europ\u00e9enne ou&hellip; <\/p>\n","protected":false},"author":1,"featured_media":6502,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,74],"tags":[],"class_list":["post-6496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-it"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1","jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-1GM","jetpack-related-posts":[{"id":5842,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/22\/chiffrement-et-securite-des-donnees-dans-le-cloud\/","url_meta":{"origin":6496,"position":0},"title":"Chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud","author":"Fred","date":"22 janvier 2024","format":false,"excerpt":"La CNIL vient de publier deux \u00a0fiches sur le chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud. La s\u00e9curit\u00e9 est indispensable pour apporter la confiance dans la gestion des donn\u00e9es personnelles de l\u2019entreprise. En 2022, pr\u00e8s d\u2019un tiers des sanctions de la CNIL visaient des manquements aux obligations de s\u00e9curit\u00e9.\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":5377,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/02\/14\/rapport-edpb-sur-lutilisation-du-cloud-par-les-services-publics\/","url_meta":{"origin":6496,"position":1},"title":"Rapport EDPB sur l\u2019utilisation du Cloud par les services publics","author":"Fred","date":"14 f\u00e9vrier 2023","format":false,"excerpt":"L'European Data Protection Board (EDPB) a publi\u00e9 son rapport sur l\u2019utilisation du Cloud par les\u00a0services publics et recommande l\u2019analyse des risques, le maintien d\u2019un contr\u00f4le effectif sur le fournisseur et surtout l'\u00e9valuation de l\u2019exposition du fournisseur au droit d\u2019un pays tiers, m\u00eame s\u2019il h\u00e9berge les donn\u00e9es en Europe, pour \u00e9viter\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/02\/2023-01-17-EDPB-Use-of-cloud-based-services-by-the-public-sector-.jpg?fit=1200%2C677&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/02\/2023-01-17-EDPB-Use-of-cloud-based-services-by-the-public-sector-.jpg?fit=1200%2C677&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/02\/2023-01-17-EDPB-Use-of-cloud-based-services-by-the-public-sector-.jpg?fit=1200%2C677&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/02\/2023-01-17-EDPB-Use-of-cloud-based-services-by-the-public-sector-.jpg?fit=1200%2C677&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/02\/2023-01-17-EDPB-Use-of-cloud-based-services-by-the-public-sector-.jpg?fit=1200%2C677&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":523,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/28\/securite-it-un-marche-dynamique-influence-par-le-cloud\/","url_meta":{"origin":6496,"position":2},"title":"S\u00e9curit\u00e9 IT : un march\u00e9 dynamique influenc\u00e9 par le Cloud","author":"Fred","date":"28 juillet 2015","format":false,"excerpt":"Le march\u00e9 de la s\u00e9curit\u00e9 reste dynamique, \u00e0 +10% par an, pratiquement dans tous les pays. Le mod\u00e8le 'Cloud' apporte de nouvelles opportunit\u00e9s de... http:\/\/www.zdnet.fr\/actualites\/securite-it-un-marche-dynamique-influence-par-le-cloud-39823004.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6789,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/11\/04\/souverainete-des-systemes-dinformation-de-letat\/","url_meta":{"origin":6496,"position":3},"title":"Souverainet\u00e9 des syst\u00e8mes d\u2019information de l\u2019\u00c9tat","author":"Fred","date":"4 novembre 2025","format":false,"excerpt":"Le dernier rapport de la Cour des comptes sur la souverainet\u00e9 des syst\u00e8mes d'information civils de l'\u00c9tat met en lumi\u00e8re un d\u00e9calage persistant entre l'ambition affich\u00e9e par la France en mati\u00e8re de souverainet\u00e9 num\u00e9rique et la r\u00e9alit\u00e9 de sa mise en \u0153uvre face \u00e0 la pr\u00e9dominance des g\u00e9ants technologiques am\u00e9ricains,\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":948,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/21\/vos-donnees-sont-elles-plus-en-securite-dans-le-cloud\/","url_meta":{"origin":6496,"position":4},"title":"Vos donn\u00e9es sont-elles plus en s\u00e9curit\u00e9 dans le Cloud ?","author":"Fred","date":"21 septembre 2015","format":false,"excerpt":"La s\u00e9curit\u00e9 des donn\u00e9es reste un frein pour nombre d'entreprises \u00e0 la migration vers le Cloud. Cette crainte est-elle justifi\u00e9e ? Pour les DSI... http:\/\/www.zdnet.fr\/actualites\/vos-donnees-sont-elles-plus-en-securite-dans-le-cloud-39825222.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/cloud-computing.png?fit=920%2C810&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/cloud-computing.png?fit=920%2C810&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/cloud-computing.png?fit=920%2C810&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/cloud-computing.png?fit=920%2C810&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1396,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/11\/16\/etude-mettre-des-donnees-pro-sur-le-cloud-pose-de-nouveaux-problemes-de-securite\/","url_meta":{"origin":6496,"position":5},"title":"Etude : mettre des donn\u00e9es pro sur le cloud pose de nouveaux probl\u00e8mes de s\u00e9curit\u00e9","author":"Fred","date":"16 novembre 2015","format":false,"excerpt":"On vous a dit que mettre des donn\u00e9es sur les services de cloud \u00e9vitait de se prendre la t\u00eate c\u00f4t\u00e9 s\u00e9curit\u00e9 ? Rien n'est moins vrai. Skyhigh... http:\/\/www.zdnet.fr\/actualites\/etude-mettre-des-donnees-pro-sur-le-cloud-pose-de-nouveaux-problemes-de-securite-39828206.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/secu_cloud8.jpg?fit=610%2C261&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/secu_cloud8.jpg?fit=610%2C261&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/secu_cloud8.jpg?fit=610%2C261&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=6496"}],"version-history":[{"count":4,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6496\/revisions"}],"predecessor-version":[{"id":6511,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6496\/revisions\/6511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/6502"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=6496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=6496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=6496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}