{"id":37565,"date":"2023-12-14T10:42:16","date_gmt":"2023-12-14T09:42:16","guid":{"rendered":"https:\/\/www.wallix.com\/?p=37565"},"modified":"2025-11-18T10:12:26","modified_gmt":"2025-11-18T09:12:26","slug":"securite-scada-et-la-gestion-des-acces-a-privileges-pam","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/","title":{"rendered":"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM)"},"content":{"rendered":"<div class='flex_column_table av-m6uyp8l7-c8d63b5278b7f36995bd352dc3b6ef9b sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m6uyp8l7-c8d63b5278b7f36995bd352dc3b6ef9b\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m6uyp8l7-c8d63b5278b7f36995bd352dc3b6ef9b{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m6uyp8l7-c8d63b5278b7f36995bd352dc3b6ef9b{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m6uyp8l7-c8d63b5278b7f36995bd352dc3b6ef9b{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m6uyp8l7-c8d63b5278b7f36995bd352dc3b6ef9b av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq50foy1-aed6a1099693499db98716c480141afd\">\n#top .av-special-heading.av-lq50foy1-aed6a1099693499db98716c480141afd{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lq50foy1-aed6a1099693499db98716c480141afd .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lq50foy1-aed6a1099693499db98716c480141afd .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lq50foy1-aed6a1099693499db98716c480141afd av-special-heading-h1 blockquote modern-quote  avia-builder-el-1  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM)<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-2  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >18 Novembre 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/blog-audit-compliance-fr\/\" >AUDIT &amp; COMPLIANCE<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/gestion-des-acces-a-privileges-fr\/\" >GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/industrie-fr\/\" >INDUSTRIE<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lq50h2mo-250cdad884cbfac2a4c96d3aa12b1339 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Les usines industrielles et les fournisseurs des services publics emploient couramment des syst\u00e8mes de contr\u00f4le et d&rsquo;acquisition de donn\u00e9es (SCADA) pour g\u00e9rer leurs syst\u00e8mes de technologie op\u00e9rationnelle (OT). Au cours des derni\u00e8res ann\u00e9es, l&rsquo;exposition aux cybermenaces des syst\u00e8mes SCADA a augment\u00e9 avec l&rsquo;av\u00e8nement d&rsquo;Internet et l\u2019augmentation de connectivit\u00e9 des syst\u00e8mes SCADA traditionnellement isol\u00e9s.<\/p>\n<p>Le framework de cybers\u00e9curit\u00e9 SCADA recommande des contr\u00f4les pour contrer les risques de cyberattaques sur les syst\u00e8mes SCADA, qui peut faire des ravages et m\u00eame entra\u00eener des pertes en vies humaines. Les contr\u00f4les d&rsquo;acc\u00e8s, dont le PAM (Privileged Access Management), figurent en bonne place dans la s\u00e9curit\u00e9 SCADA, prot\u00e9geant les syst\u00e8mes industriels contre les acteurs malveillants.<\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"color: #f4813a;\"><em><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><strong>Le framework de cybers\u00e9curit\u00e9 SCADA est mis en place pour g\u00e9rer et pr\u00e9venir les cyberattaques sur les syst\u00e8mes technologiques op\u00e9rationnels tels que les installations industrielles et les services d&rsquo;\u00e9lectricit\u00e9.<\/strong><\/span><\/em><\/span><\/p>\n<\/blockquote>\n<h3>Qu&rsquo;est-ce qu&rsquo;un syst\u00e8me SCADA ?<\/h3>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">SCADA est un cadre technologique qui comprend de nombreux appareils et applications logicielles diff\u00e9rents. Collectivement, les technologies pilot\u00e9es par SCADA forment une sorte de syst\u00e8me nerveux industriel. Ils se trouvent dans les usines, les centrales \u00e9lectriques et les h\u00f4pitaux. Ils exploitent \u00e9galement des syst\u00e8mes de chauffage et de climatisation dans les b\u00e2timents. Combinant des capteurs avec des ordinateurs de supervision et des unit\u00e9s terminales distantes (RTU), ils surveillent et contr\u00f4lent les processus physiques. Par exemple, le syst\u00e8me SCADA d&rsquo;une aci\u00e9rie peut d\u00e9tecter quand l&rsquo;acier fondu est suffisamment chaud pour couler, puis d\u00e9clencher des actionneurs qui font couler l&rsquo;acier dans des moules. Le SCADA englobe \u00e9galement des interfaces pour la g\u00e9n\u00e9ration de rapports et de commandes.<\/span><\/p>\n<h3>S\u00e9curit\u00e9 SCADA a l&rsquo;\u00e8re d&rsquo;Internet<\/h3>\n<p>Traditionnellement, la s\u00e9curit\u00e9 SCADA n&rsquo;\u00e9tait pas une pr\u00e9occupation majeure pour les gestionnaires de syst\u00e8mes SCADA. En utilisant des protocoles de communication exclusifs et en fonctionnant sur des r\u00e9seaux isol\u00e9s, les syst\u00e8mes SCADA \u00e9taient difficiles \u00e0 atteindre et difficiles \u00e0 pirater. Les architectes de s\u00e9curit\u00e9 pourraient consid\u00e9rer le \u00abtrou d&rsquo;air\u00bb, la s\u00e9paration compl\u00e8te des r\u00e9seaux SCADA du monde ext\u00e9rieur, comme une contre-mesure extr\u00eamement robuste aux menaces potentielles.<\/p>\n<p>Cela dit, les impacts potentiels des attaques sur les syst\u00e8mes SCADA sont importants. Ils vont d\u2019inconv\u00e9nients comme une panne de courant \u00e0 des catastrophes directes comme une rupture de barrage, ou la mort ou la blessure de travailleurs industriels. Des possibilit\u00e9s auparavant lointaines, ce genre de cons\u00e9quences potentiellement d\u00e9sastreuses sont maintenant plus probables.<\/p>\n<p>Deux facteurs augmentent les risques des syst\u00e8mes SCADA. Premi\u00e8rement, le \u00ab trou d\u2019air \u00bb n&rsquo;\u00e9tais jamais si efficace comme protection qu\u2019on pensait. Un certain nombre de hacks tr\u00e8s m\u00e9diatis\u00e9s, tels que l&rsquo;attaque de Stuxnet sur les installations nucl\u00e9aires iraniennes, ont r\u00e9v\u00e9l\u00e9 que les pirates peuvent acc\u00e9der \u00e0 des syst\u00e8mes \u00e0 interf\u00e9rence a\u00e9rienne en utilisant l&rsquo;ing\u00e9nierie humaine, les cl\u00e9s USB et des techniques comparables.<\/p>\n<p>Le d\u00e9veloppement le plus important, cependant, est l\u2019activation des technologies SCADA avec Internet Protocol (IP). C&rsquo;est un mouvement tout \u00e0 fait compr\u00e9hensible, \u00e9tant donn\u00e9 que la propri\u00e9t\u00e9 intellectuelle est devenue r\u00e9pandue et pratique. Les syst\u00e8mes SCADA peuvent maintenant \u00eatre enti\u00e8rement accessibles sur Internet, avec toute la flexibilit\u00e9 et la port\u00e9e que cela implique. Pourtant, du point de vue de la s\u00e9curit\u00e9, c&rsquo;est un d\u00e9sastre.<\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"color: #f4813a;\"><em><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><strong>Le passage \u00e0 des syst\u00e8mes SCADA connect\u00e9s offre un nouveau champ de possibilit\u00e9s pour des violations potentiellement catastrophiques.<\/strong><\/span><\/em><\/span><\/p>\n<\/blockquote>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Les syst\u00e8mes SCADA compatibles IP sont maintenant aussi vuln\u00e9rables aux attaques que n&rsquo;importe quel autre p\u00e9riph\u00e9rique sur Internet, sinon plus. Contrairement aux syst\u00e8mes informatiques classiques tels que les serveurs et les bases de donn\u00e9es, SCADA a \u00e9t\u00e9 prot\u00e9g\u00e9 par des lacunes et des barri\u00e8res organisationnelles pendant des d\u00e9cennies. Par contre, l\u2019OT n&rsquo;est pas l&rsquo;IT. SCADA est entr\u00e9 dans l&rsquo;\u00e8re de l&rsquo;Internet plus ou moins pr\u00e9par\u00e9 aux cyberattaques. En revanche, l&rsquo;informatique a connu plusieurs d\u00e9cennies difficiles pour apprendre \u00e0 se d\u00e9fendre contre les pirates informatiques. OT est g\u00e9n\u00e9ralement une organisation distincte de l&rsquo;informatique et n&rsquo;a pas le m\u00eame type de mandat de s\u00e9curit\u00e9 face aux d\u00e9partements informatiques. L&rsquo;industrie a d\u00fb se montrer \u00e0 la hauteur et concevoir des mesures de s\u00e9curit\u00e9 sp\u00e9cifiques aux syst\u00e8mes SCADA IP.<\/span><\/p>\n<h3>Le Framework de s\u00e9curit\u00e9 SCADA<\/h3>\n<p>L&rsquo;industrie utilise la publication sp\u00e9ciale NIST 800-82 comme guide d\u00e9finitif sur la s\u00e9curit\u00e9 SCADA. La r\u00e9vision 2, publi\u00e9e en 2015, contient un \u00ab Guide de s\u00e9curit\u00e9 des syst\u00e8mes de contr\u00f4le industriel (ICS) \u00bb, ainsi que des syst\u00e8mes de contr\u00f4le et d&rsquo;acquisition de donn\u00e9es (SCADA), des syst\u00e8mes de contr\u00f4le distribu\u00e9s (DCS) et d&rsquo;autres configurations de contr\u00f4les comme les contr\u00f4leurs logiques programmables (PLC).<\/p>\n<p>La norme NIST couvre la gestion et l&rsquo;\u00e9valuation des risques ICS, le d\u00e9veloppement et le d\u00e9ploiement de programmes de s\u00e9curit\u00e9 et l&rsquo;architecture de s\u00e9curit\u00e9. Elle offre des conseils d\u00e9taill\u00e9s sur l&rsquo;application des contr\u00f4les de s\u00e9curit\u00e9 \u00e0 ICS. \u00c0 pr\u00e8s de 250 pages, c&rsquo;est au-del\u00e0 de l&rsquo;exhaustivit\u00e9. Une discussion utile et concise de ses contr\u00f4les peut \u00eatre trouv\u00e9e dans un article publi\u00e9 par l&rsquo;ISACA.<\/p>\n<h3>S\u00e9curit\u00e9 PAM et SCADA<\/h3>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Quel est l&rsquo;\u00e9l\u00e9ment le plus important de la norme NIST pour SCADA et ICS? C&rsquo;est difficile \u00e0 dire, bien s\u00fbr. Ils sont tous importants. Pour maintenir un syst\u00e8me SCADA s\u00e9curis\u00e9, les responsables de la s\u00e9curit\u00e9 doivent effectuer les \u00e9valuations et mettre en \u0153uvre les contr\u00f4les recommand\u00e9s dans la norme. Un domaine de contr\u00f4le, cependant, est fondamental pour le succ\u00e8s de pratiquement tous les autres aspects de la norme. C&rsquo;est le contr\u00f4le d&rsquo;acc\u00e8s, en particulier le contr\u00f4le sur des acc\u00e8s \u00e0 privil\u00e8ges.<\/span><\/p>\n<h4>Utilisateurs \u00e0 Privil\u00e8ges<\/h4>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Un utilisateur privil\u00e9gi\u00e9 est une personne (ou une machine) qui peut ex\u00e9cuter des fonctions administratives sur les back-ends des syst\u00e8mes critiques. Ils peuvent configurer, modifier ou supprimer des comptes d&rsquo;utilisateurs. Leurs privil\u00e8ges peuvent inclure la possibilit\u00e9 de configurer des syst\u00e8mes, de mettre \u00e0 jour un logiciel et d&rsquo;acc\u00e9der ou m\u00eame de supprimer des donn\u00e9es.<\/span><\/p>\n<h4>Acc\u00e8s \u00e0 Privil\u00e8ges<\/h4>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">La gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) d\u00e9signe un ensemble de pratiques et d&rsquo;outils permettant aux administrateurs de superviser et de r\u00e9gir l&rsquo;utilisation des comptes d&rsquo;utilisateurs \u00e0 privil\u00e8ges. Une solution PAM est un logiciel con\u00e7u pour contr\u00f4ler et surveiller ces acc\u00e8s \u00e0 privil\u00e8ges. Il enregistre \u00e9galement g\u00e9n\u00e9ralement des sessions de compte privil\u00e9gi\u00e9 \u00e0 utiliser dans les r\u00e9ponses et les enqu\u00eates sur les incidents de s\u00e9curit\u00e9. Dans certains cas, les solutions de PAM \u00e9mettent des alertes en cas de violation de la politique d&rsquo;acc\u00e8s privil\u00e9gi\u00e9.<\/span><\/p>\n<h3>PAM et la norme NIST<\/h3>\n<p>Le terme \u00ab Gestion des acc\u00e8s \u00e0 privil\u00e8ges \u00bb n&rsquo;appara\u00eet pas dans la norme NIST, mais les principes de PAM sont pr\u00e9sents partout. La section 5.6 de la norme, qui traite de la n\u00e9cessit\u00e9 de \u00ab D\u00e9fense en profondeur \u00bb, recommande aux responsables de la s\u00e9curit\u00e9 d&rsquo;OT de comprendre et de se d\u00e9fendre contre les \u00ab attaques sur les comptes privil\u00e9gi\u00e9s et \/ ou partag\u00e9s \u00bb. La norme inclut une recommandation pour \u00ab restreindre les privil\u00e8ges des utilisateurs ICS uniquement aux t\u00e2ches requises pour effectuer le travail de chaque personne \u00bb (c&rsquo;est-\u00e0-dire, \u00e9tablir un contr\u00f4le d&rsquo;acc\u00e8s bas\u00e9 sur les r\u00f4les et configurer chaque r\u00f4le sur la base du principe du moindre privil\u00e8ge).<\/p>\n<p>Le NIST 800-82 conseille \u00e9galement de restreindre l&rsquo;acc\u00e8s physique au r\u00e9seau et aux dispositifs ICS. Cette recommandation concerne le PAM. Apr\u00e8s tout, il est presque impossible de restreindre l&rsquo;acc\u00e8s aux p\u00e9riph\u00e9riques physiques, tout en leur permettant d&rsquo;\u00eatre administr\u00e9s sans une sorte de couche de protection interm\u00e9diaire comme une solution de PAM.<\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"color: #f37300;\"><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><strong><em>Bien que le terme \u00ab gestion des acc\u00e8s \u00e0 privil\u00e8ges \u00bb ou \u00ab PAM \u00bb n&rsquo;apparaisse pas dans la norme NIST, les principes du PAM s\u2019appliquent partout<\/em><\/strong><\/span>.<\/span><\/p>\n<\/blockquote>\n<h3>Le besoin d&rsquo;une solution de PAM dans SCADA<\/h3>\n<div>\n<p>Les solutions PAM offrent aux responsables de la s\u00e9curit\u00e9 OT les outils dont ils ont besoin pour g\u00e9rer l&rsquo;acc\u00e8s \u00e0 privil\u00e8ges dans un environnement SCADA complexe. La norme inclut des r\u00e9f\u00e9rences aux difficult\u00e9s inh\u00e9rentes \u00e0 l&rsquo;authentification et \u00e0 l&rsquo;autorisation d&rsquo;un grand nombre d&rsquo;utilisateurs de SCADA. Par exemple, la section 5.15 de la norme, qui traite de l&rsquo;authentification et de l&rsquo;autorisation, lit,<\/p>\n<p><em>\u00ab Un ICS peut contenir un grand nombre de syst\u00e8mes, dont chacun doit \u00eatre accessible par une vari\u00e9t\u00e9 d&rsquo;utilisateurs. L&rsquo;authentification et l&rsquo;autorisation de ces utilisateurs constituent un d\u00e9fi pour l&rsquo;ICS. La gestion des comptes de ces utilisateurs peut s&rsquo;av\u00e9rer probl\u00e9matique \u00e0 mesure que les employ\u00e9s sont ajout\u00e9s, supprim\u00e9s et que leurs r\u00f4les changent. \u00c0 mesure que le nombre de syst\u00e8mes et d&rsquo;utilisateurs augmente, le processus de gestion de ces comptes devient plus compliqu\u00e9. \u00bb<\/em><\/p>\n<\/div>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"color: #f4813a;\"><em><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><strong>PAM fournit les outils dont les \u00e9quipes de s\u00e9curit\u00e9 ont besoin pour g\u00e9rer efficacement les acc\u00e8s \u00e0 privil\u00e8ges dans un environnement SCADA complexe<\/strong><\/span>.<\/em><\/span><\/p>\n<\/blockquote>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">La norme met \u00e9galement en garde contre une approche distribu\u00e9e de l&rsquo;authentification et de l&rsquo;autorisation, o\u00f9 chaque syst\u00e8me stocke ses propres identifiants utilisateur, \u00ab est probl\u00e9matique en ce sens qu&rsquo;il ne s&rsquo;adapte pas bien \u00e0 mesure que la taille du syst\u00e8me augmente. \u00bb Elle note, \u00ab Par exemple, si un utilisateur quitte l&rsquo;organisation, le compte d&rsquo;utilisateur correspondant doit \u00eatre supprim\u00e9 de chaque syst\u00e8me individuellement. \u00bb Avec un contr\u00f4le centralis\u00e9 des utilisateurs \u00e0 privil\u00e8ges, une solution de PAM peut d\u00e9sactiver l&rsquo;acc\u00e8s des utilisateurs lorsqu\u2019ils quittent l&rsquo;organisation. Le PAM r\u00e9pond au besoin sugg\u00e9r\u00e9 par la norme, qui stipule que \u00ab l&rsquo;autorisation est appliqu\u00e9e par un m\u00e9canisme de contr\u00f4le d&rsquo;acc\u00e8s \u00bb.<\/span><\/p>\n<h3>La solution de PAM de WALLIX Bastion<\/h3>\n<p>Le Bastion de WALLIX donne aux responsables du SCADA un tel m\u00e9canisme. L\u2019Access Manager de WALLIX consiste d\u2019une plateforme d\u2019administration centralis\u00e9e pour tous les acc\u00e8s \u00e0 privil\u00e8ges sur l&rsquo;ensemble de l&rsquo;\u00e9cosyst\u00e8me SCADA. Les utilisateurs privil\u00e9gi\u00e9s se connectent \u00e0 l\u2019Access Manager afin d&rsquo;effectuer des op\u00e9rations li\u00e9es a leur niveau de privileges sur les p\u00e9riph\u00e9riques SCADA. Avec le Password Manager, les utilisateurs privil\u00e9gi\u00e9s n&rsquo;ont pas besoin de conna\u00eetre le mot de passe r\u00e9el du p\u00e9riph\u00e9rique physique. Cela emp\u00eache les utilisateurs d&rsquo;ouvrir une br\u00e8che accidentelle ou malveillante sur un p\u00e9riph\u00e9rique physique utilis\u00e9 dans le contr\u00f4le industriel.<\/p>\n<p>Le Session Manager de WALLIX enregistre les sessions \u00e0 privil\u00e8ges. Il met les journaux et les vid\u00e9os des sessions \u00e0 la disposition des \u00e9quipes des op\u00e9rations de s\u00e9curit\u00e9 (SecOps) en cas d&rsquo;incident de s\u00e9curit\u00e9. Le Session Manager fournit des r\u00e9ponses aux questions les plus urgentes qui se posent au moment donn\u00e9: Qui a fait quoi, quand et \u00e0 quel syst\u00e8me. Sans ce type d&rsquo;enregistrement de session, SecOps peut perdre un temps de r\u00e9ponse pr\u00e9cieux en essayant de comprendre des facteurs de causalit\u00e9 basiques dans une violation ou un acte de sabotage.<\/p>\n<h2>Le PAM est critique dans l&rsquo;application du framework SCADA<\/h2>\n<p>La s\u00e9curit\u00e9 SCADA est un sujet lourd et complexe. Cependant, les enjeux sont \u00e9lev\u00e9s, et le public est \u00e0 risque si les menaces ne sont pas bien att\u00e9nu\u00e9es. Le PAM appara\u00eet comme un \u00e9l\u00e9ment essentiel d&rsquo;une strat\u00e9gie de s\u00e9curit\u00e9 SCADA. Il est directement n\u00e9cessaire de prot\u00e9ger les acc\u00e8s administratifs sensibles aux syst\u00e8mes SCADA. Le PAM est \u00e9galement un support de nombreux contr\u00f4les mandat\u00e9s, dans la norme NIST, par exemple. Le PAM est un facteur de succ\u00e8s cl\u00e9 pour une s\u00e9curit\u00e9 SCADA robuste.<\/p>\n<p>Vous souhaitez en savoir plus sur la mani\u00e8re dont le Bastion WALLIX peut appliquer le framework SCADA \u00e0 l&rsquo;aide de fonctionnalit\u00e9s PAM robustes? Contactez-nous.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-5  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-0a73d8854da5c7c5d5ad87c7877e27c0 av-social-sharing-box-default  avia-builder-el-6  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=S%C3%A9curit%C3%A9%20SCADA%20et%20la%20Gestion%20des%20Acc%C3%A8s%20%C3%A0%20Privil%C3%A8ges%20%28PAM%29&#038;url=https:\/\/www.wallix.com\/fr\/?p=37565' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=S%C3%A9curit%C3%A9%20SCADA%20et%20la%20Gestion%20des%20Acc%C3%A8s%20%C3%A0%20Privil%C3%A8ges%20%28PAM%29&#038;url=https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=S%C3%A9curit%C3%A9%20SCADA%20et%20la%20Gestion%20des%20Acc%C3%A8s%20%C3%A0%20Privil%C3%A8ges%20%28PAM%29&#038;body=https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-7  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-97d9f49f990ddcfd6e03daaeba0494be\">\n#top .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-97d9f49f990ddcfd6e03daaeba0494be av-special-heading-h3 blockquote modern-quote  avia-builder-el-8  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenus associ\u00e9s<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-9  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-7b60af3a779ac8669615c90b07612884\">\n#top .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-7b60af3a779ac8669615c90b07612884 av-special-heading-h3 blockquote modern-quote  avia-builder-el-11  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >ressources associ\u00e9es <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":38040,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1645,1640,1788,1748],"tags":[],"class_list":["post-37565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-audit-compliance-fr","category-blogpost","category-gestion-des-acces-a-privileges-fr","category-industrie-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM) - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM) - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T09:42:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T09:12:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM)\",\"datePublished\":\"2023-12-14T09:42:16+00:00\",\"dateModified\":\"2025-11-18T09:12:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/\"},\"wordCount\":3707,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"BLOGPOST\",\"GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES\",\"INDUSTRIE\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/\",\"name\":\"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM) - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"datePublished\":\"2023-12-14T09:42:16+00:00\",\"dateModified\":\"2025-11-18T09:12:26+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM) - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM) - WALLIX","og_url":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/","og_site_name":"WALLIX","article_published_time":"2023-12-14T09:42:16+00:00","article_modified_time":"2025-11-18T09:12:26+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"WALLIX","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM)","datePublished":"2023-12-14T09:42:16+00:00","dateModified":"2025-11-18T09:12:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/"},"wordCount":3707,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","articleSection":["AUDIT &amp; COMPLIANCE","BLOGPOST","GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES","INDUSTRIE"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/","url":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/","name":"S\u00e9curit\u00e9 SCADA et la Gestion des Acc\u00e8s \u00e0 Privil\u00e8ges (PAM) - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","datePublished":"2023-12-14T09:42:16+00:00","dateModified":"2025-11-18T09:12:26+00:00","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securite-scada-et-la-gestion-des-acces-a-privileges-pam\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","width":2560,"height":1440,"caption":"Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/fr\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=37565"}],"version-history":[{"count":6,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37565\/revisions"}],"predecessor-version":[{"id":80638,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37565\/revisions\/80638"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/38040"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=37565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=37565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=37565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}