{"id":665,"date":"2024-06-13T13:08:17","date_gmt":"2024-06-13T11:08:17","guid":{"rendered":"https:\/\/techwize.io\/?p=665"},"modified":"2024-06-21T10:06:45","modified_gmt":"2024-06-21T08:06:45","slug":"assurer-une-securite-numerique-360-la-gestion-de-votre-surface-dattaque","status":"publish","type":"post","link":"https:\/\/techwize.io\/fr\/assurer-une-securite-numerique-360-la-gestion-de-votre-surface-dattaque\/","title":{"rendered":"360\u00b0 Digital Security: Managing your attack surface"},"content":{"rendered":"<p class=\"wp-block-paragraph\" style=\"\">In today&#8217;s digital world, every business, whatever its size or sector of activity, faces a multitude of security threats. One of the main concerns must be the company&#8217;s attackable surface, i.e. all the points where an attacker could potentially enter or extract data from the system.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"what-is-a-companys-attack-surface\"><strong>What is a company&#8217;s attack surface?<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">La surface d'attaque repr\u00e9sente l'ensemble des points d'entr\u00e9e potentiels que des cybercriminels peuvent exploiter pour mener des attaques. Elle inclut tous les aspects des syst\u00e8mes informatiques, des r\u00e9seaux, des logiciels et des dispositifs connect\u00e9s qui sont expos\u00e9s et susceptibles d'\u00eatre attaqu\u00e9s. Plus la surface d'attaque est large, plus il y a de possibilit\u00e9s pour les cyber attaquants de trouver et d'exploiter des vuln\u00e9rabilit\u00e9s.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"components-of-the-attack-surface\"><strong>Composants de la Surface d'Attaque<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image aligncenter is-resized\" style=\"\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXeIgB98wSJjZURG6Yn1ysUNWJxXDzjTFbW7YgzFMdnIspFD8N_nrvCEKV1TuyM6qTXDx91LkTLwbgshCA6gqfEi_DQuMKrRQSRI5i2WivTJ5X0K85iFpTzHX_T-mehODUsAckiCN79O831MQkalVyzDdVc?key=O9YeAf_gjNqvV1j2EZPTSQ\" alt=\"\" style=\"width:600px\"><\/figure>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-8f5a1d40e9c579783beb27f2f6da9693\" id=\"applications-and-software\">Applications et Logiciels<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Applications Web,\u00a0 Mobile et autres services en ligne sont des cibles de choix pour les cyber attaquants. Les attaques courantes incluent les injections SQL, le cross-site scripting (XSS), les attaques par d\u00e9ni de service (DDoS) mais \u00e9galement, le vol de donn\u00e9es et l'exploitation de permissions excessives<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Les Logiciels d'Entreprise comme les ERP, CRM et autres applications critiques utilis\u00e9es en interne g\u00e8rent des informations sensibles et des processus essentiels. Les vuln\u00e9rabilit\u00e9s dans ces syst\u00e8mes peuvent \u00e9galement entra\u00eener des fuites de donn\u00e9es, des interruptions op\u00e9rationnelles et des pertes financi\u00e8res.\u00a0<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-2498f1b41b7f4ad6a6cf0015af074ce7\" id=\"network-infrastructure\">Infrastructure R\u00e9seau<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Les serveurs h\u00e9bergent des donn\u00e9es et des applications, ce qui en fait des cibles attractives pour les cyber attaquants. Ils peuvent inclure l'exploitation de vuln\u00e9rabilit\u00e9s logicielles, l'acc\u00e8s non autoris\u00e9 et les attaques DDoS.<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Les Routeurs et Commutateurs contr\u00f4lent le trafic de donn\u00e9es au sein de votre r\u00e9seau. Des configurations incorrectes ou des vuln\u00e9rabilit\u00e9s non corrig\u00e9es peuvent permettre aux attaquants d'intercepter, de rediriger ou de manipuler le trafic.\u00a0<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">IoT (Internet of Things) : Les objets connect\u00e9s, tels que les capteurs industriels et les dispositifs intelligents, pr\u00e9sentent des risques sp\u00e9cifiques en raison de leur nature souvent peu s\u00e9curis\u00e9e.\u00a0<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-72ea1e551be8822c336567b8c2b31a41\" id=\"users\">Utilisateurs<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Employees have access to the company&#8217;s internal systems and may unwittingly introduce risks, for example by clicking on phishing links or using weak passwords. Partners and suppliers can also be a security risk.<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">APIs, databases, backups and data transfer can all be entry points to monitor. Generally speaking, there are a multitude of entry points that are unknown to you. That&#8217;s why you need to analyse this attack surface and understand the associated risks.<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-8516810158fc01c273c6e610d40cb209\" id=\"the-risks-of-the-attack-surface\"><strong>Les risques de la surface d\u2019attaque<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image aligncenter is-resized\" style=\"\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXcsJjMuY_JMQMGsyI1iXNN6NoUx9l9bhOIje_hy4FssBUjsMnxiRILXMmExWeZuekGrirSQRc6PzK8V3HeIa1dQrk83Jw6zAy7qXWr3ED1RgShKC7nRNVGaD8ntkwtakPGU_Qg70SL36ecCWWwj9NCOjBWS?key=O9YeAf_gjNqvV1j2EZPTSQ\" alt=\"\" style=\"width:600px\"><\/figure>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Les attaques contre votre surface d\u2019exposition num\u00e9rique peuvent avoir des cons\u00e9quences d\u00e9vastatrices. Voici quelques-uns des risques associ\u00e9s \u00e0 ces intrusions :<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-a8f22c78fa1893602dce9221256c152e\" id=\"financial-losses\"><strong>Pertes financi\u00e8res<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Les attaques peuvent entra\u00eener des pertes financi\u00e8res directes. Par exemple, le co\u00fbt moyen d\u2019une violation de donn\u00e9es en 2021 \u00e9tait de 4,24 millions de dollars, un record historique. Cela est d\u00fb \u00e0 l\u2019arr\u00eat des op\u00e9rations, au vol de donn\u00e9es financi\u00e8res, et aux co\u00fbts associ\u00e9s \u00e0 la rem\u00e9diation de l\u2019attaque dont les ran\u00e7ons etc.<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-7b2669c969cc2b0cc11ca430dc300052\" id=\"damage-to-reputation\"><strong>Dommages \u00e0 la r\u00e9putation<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Une attaque r\u00e9ussie peut causer des dommages significatifs \u00e0 votre r\u00e9putation. Cela peut entra\u00eener une perte de confiance de la part des clients, des partenaires et du public, ce qui peut avoir un impact \u00e0 long terme sur les affaires. Par exemple, apr\u00e8s une violation de donn\u00e9es, 41% des consommateurs d\u00e9clarent qu\u2019ils ne reviendraient pas faire affaire avec une entreprise.<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-375e549f89b780a180758aa39998284b\" id=\"data-breach\"><strong>Violation de donn\u00e9es<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Attacks can result in the breach of sensitive data, including customers&#8217; personal information, financial details, and trade secrets. This can lead to lawsuits, fines, and other legal consequences. In 2021, there was a 17% increase in data breaches compared to 2020.<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Non-conformit\u00e9 : Si vous \u00eates soumis \u00e0 des r\u00e9glementations de s\u00e9curit\u00e9 sp\u00e9cifiques, une attaque r\u00e9ussie peut entra\u00eener une non-conformit\u00e9, ce qui peut entra\u00eener des amendes et d\u2019autres sanctions. Les amendes pour non-conformit\u00e9 au RGPD peuvent atteindre jusqu\u2019\u00e0 4% du chiffre d\u2019affaires annuel global.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"the-solution-attack-surface-managers\"><strong>La solution : Les gestionnaires de surface d\u2019attaque<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Il est essentiel de disposer d\u2019outils robustes pour prot\u00e9ger vos actifs num\u00e9riques. Heureusement, il existe des solutions innovantes pour aider \u00e0 s\u00e9curiser votre surface d\u2019attaque. notamment des logiciels en tant que service (SaaS) de gestion de la surface d\u2019attaque (ASM).<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">ASM solutions offer a variety of capabilities to help organisations discover, analyse and manage their attack surface. They use advanced technologies, including artificial intelligence and machine learning, to provide complete visibility into an organisation&#8217;s attack surface and help identify and mitigate risks. In addition, they offer intuitive dashboards and detailed reports that enable security teams to quickly understand their security posture and make informed decisions.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"how-does-an-asm-work\"><strong>Comment fonctionne un ASM ?<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image aligncenter is-resized\" style=\"\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXcfy4QRJqOKGNLJsdEEivBGwEIGj3bqLf6JwA1n-_Hl0UP6zAZmIyta4Nd_Uje8U_lIp_rqgAjxsikWSmA67630WIQAJO_cG8uBzHMYa_ghmAnjYaW6OMncow8ts0yyhysRAxBULNYB_ZYsrER7puqPlqgs?key=O9YeAf_gjNqvV1j2EZPTSQ\" alt=\"\" style=\"width:600px\"><\/figure>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Un ASM fonctionne en plusieurs \u00e9tapes pour aider les organisations \u00e0 d\u00e9couvrir, analyser et g\u00e9rer leur surface d\u2019attaque.<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-c34045fe6ecfb38829fa5c17bdd86da1\" id=\"dynamic-mapping\">Cartographie dynamique<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Firstly, ASM dynamically maps the organisation&#8217;s true attack surface and its digital supply chain. This means that it identifies all of the organisation&#8217;s digital assets that are exposed to the Internet, including those that may be hidden or forgotten. This dynamic mapping enables the ASM to maintain an up-to-date picture of the organisation&#8217;s attack surface, even as new assets are added or existing assets are modified.<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-d7696e7a86016fee6faabc572924b599\" id=\"identifying-risks\">Identification des risques<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Ensuite, l\u2019ASM identifie automatiquement les connexions les plus risqu\u00e9es et applique une protection active pour pr\u00e9venir les attaques avant qu\u2019elles ne se produisent. Cela peut impliquer l\u2019utilisation de techniques d\u2019intelligence artificielle pour analyser les donn\u00e9es et identifier les vuln\u00e9rabilit\u00e9s. L\u2019ASM peut \u00e9galement utiliser des techniques d\u2019apprentissage automatique pour apprendre des attaques pass\u00e9es et pr\u00e9dire les attaques futures.<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-e1c6f70c6129b391807ad91ad5604ac4\" id=\"assessment-of-attack-paths\">\u00c9valuation des chemins d\u2019attaque<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">ASM also assesses attack paths that pose an immediate risk of attack to the organisation&#8217;s IT infrastructure. This can include assessing assets from the digital supply chain that the organisation does not own or control. By understanding how an attacker could potentially gain access to its systems, an organisation can take steps to block these attack paths.<\/p>\n\n\n<h2 class=\"wp-block-heading has-primary-800-color has-text-color has-link-color has-18-font-size wp-elements-21d5bd786e9600176c23d80e0dd99f8b\" id=\"understanding-the-impact-radius\">Compr\u00e9hension du rayon d\u2019impact<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Enfin, l\u2019ASM permet de comprendre le rayon d\u2019impact et l\u2019impact op\u00e9rationnel en fonction de l\u2019interconnectivit\u00e9 et des d\u00e9pendances de chaque actif. Cela signifie qu\u2019il peut aider une organisation \u00e0 comprendre non seulement quels actifs sont \u00e0 risque, mais aussi comment une attaque contre un actif particulier pourrait affecter le reste de l\u2019organisation.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Pour minimiser les risques de cyberattaques, une approche proactive consiste \u00e0 identifier et \u00e0 s\u00e9curiser efficacement vos points d'entr\u00e9e potentiels dans les syst\u00e8mes et les r\u00e9seaux. En g\u00e9rant rigoureusement la surface d'attaque, vous pouvez d\u00e9tecter rapidement les tentatives d'intrusion, ce qui permet de limiter les dommages potentiels et de prot\u00e9ger ses actifs critiques.<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Avec des solutions comme les ASM, vous pouvez d\u00e9sormais vous prot\u00e9ger contre les attaques sur l'enti\u00e8ret\u00e9 de votre la surface attaquable et s\u00e9curiser vos actifs num\u00e9riques.\u00a0<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Une gestion efficace de la surface d'attaque vous aide \u00e0 vous conformer aux r\u00e9glementations en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es, telles que le RGPD, mais aussi \u00e0 simplifier celles des gouvernance NIS2 et DORA, en mettant en place des mesures de s\u00e9curit\u00e9 appropri\u00e9es pour prot\u00e9ger les syst\u00e8mes et les donn\u00e9es sensibles.<\/p>\n\n\n<p class=\"wp-block-paragraph\" style=\"\">Nos \u00e9quipes restent \u00e0 votre disposition pour toute information suppl\u00e9mentaire.<\/p>","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digital world, every business, whatever its size or sector of activity, faces a multitude of security threats. One of the main concerns must be the company&#8217;s attackable surface, i.e. all the points where an attacker could potentially enter or extract data from the system. What is a company&#8217;s attack surface? The attack surface &hellip;<\/p>","protected":false},"author":2,"featured_media":666,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71],"tags":[],"class_list":["post-665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-asm"],"_links":{"self":[{"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/posts\/665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/comments?post=665"}],"version-history":[{"count":2,"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/posts\/665\/revisions"}],"predecessor-version":[{"id":769,"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/posts\/665\/revisions\/769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/media\/666"}],"wp:attachment":[{"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/media?parent=665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/categories?post=665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techwize.io\/fr\/wp-json\/wp\/v2\/tags?post=665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}