{"id":37677,"date":"2023-12-14T15:21:26","date_gmt":"2023-12-14T14:21:26","guid":{"rendered":"https:\/\/www.wallix.com\/?p=37677"},"modified":"2026-02-10T14:05:25","modified_gmt":"2026-02-10T13:05:25","slug":"securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/","title":{"rendered":"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM)"},"content":{"rendered":"<div class='flex_column_table av-m4012ee7-1ca5ed22669b1ac0f46662fa7c8cf6ae sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4012ee7-1ca5ed22669b1ac0f46662fa7c8cf6ae\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4012ee7-1ca5ed22669b1ac0f46662fa7c8cf6ae{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m4012ee7-1ca5ed22669b1ac0f46662fa7c8cf6ae{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4012ee7-1ca5ed22669b1ac0f46662fa7c8cf6ae{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4012ee7-1ca5ed22669b1ac0f46662fa7c8cf6ae av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq5ad6v1-180526a184abb55a8c2ef47733368563\">\n#top .av-special-heading.av-lq5ad6v1-180526a184abb55a8c2ef47733368563{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lq5ad6v1-180526a184abb55a8c2ef47733368563 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lq5ad6v1-180526a184abb55a8c2ef47733368563 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lq5ad6v1-180526a184abb55a8c2ef47733368563 av-special-heading-h1 blockquote modern-quote  avia-builder-el-1  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM)<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-2  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >10 F\u00e9vrier 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/blog-cloud-security-fr\/\" >CLOUD SECURITY<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/devops-fr\/\" >DEVOPS<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/gestion-des-acces-a-privileges-fr\/\" >GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/transformation-digitale-2\/\" >TRANSFORMATION DIGITALE<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq5aghhm-906f11f9efe342941f473243e9d4af4f\">\n#top .av_textblock_section.av-lq5aghhm-906f11f9efe342941f473243e9d4af4f .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-lq5aghhm-906f11f9efe342941f473243e9d4af4f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Un fait d\u2019actualit\u00e9 r\u00e9cent dans le domaine de la cybers\u00e9curit\u00e9 devrait faire r\u00e9fl\u00e9chir toute personne impliqu\u00e9e dans le d\u00e9veloppement logiciel en cloud. Comme l\u2019a rapport\u00e9 CSO, une personne malveillante s\u2019est introduite dans un module Node.js populaire. Apr\u00e8s s\u2019\u00eatre fait passer pour une personne de confiance et avoir obtenu un acc\u00e8s propri\u00e9taire, cet individu a r\u00e9ussi \u00e0 envoyer une version dangereuse qui cachait des informations d\u2019identification de \u00ab hot wallets \u00bb Bitcoin et Ethereum \u00e0 des fins malveillantes dans le code.<\/p>\n<p>Cette anecdote illustre \u00e0 quel point il peut \u00eatre difficile de savoir o\u00f9 placer sa confiance lors d\u2019un projet de d\u00e9veloppement de logiciel en cloud. Les entreprises sont d\u2019autant plus vuln\u00e9rables aux menaces transmises par logiciel lorsqu\u2019elles pratiquent le DevOps en cloud, en raison de son rythme rapide et de sa structure hi\u00e9rarchique souple.<\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"font-size: 16px; color: #f37324;\"><em><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><strong>La souplesse du DevOps en cloud peut rendre les entreprises particuli\u00e8rement vuln\u00e9rables aux menaces logicielles.<\/strong><\/span><\/em><\/span><\/p>\n<\/blockquote>\n<h2>Qu\u2019est-ce que le DevOps en mode cloud ?<\/h2>\n<p style=\"text-align: left;\"><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Le DevOps en mode cloud consiste \u00e0 d\u00e9velopper et \u00e0 diffuser un logiciel sur des plateformes informatiques en cloud gr\u00e2ce au mod\u00e8le DevOps. Comme son nom l\u2019indique, DevOps est le r\u00e9sultat d\u2019un m\u00e9lange entre deux \u00e9quipes et processus auparavant s\u00e9par\u00e9s : le d\u00e9veloppement (dev) et les op\u00e9rations informatiques (ops). Il s\u2019agit d\u2019une nouvelle version des processus de d\u00e9veloppement logiciel traditionnel, o\u00f9 l\u2019\u00e9quipe de d\u00e9veloppement \u00e9tait charg\u00e9e d\u2019\u00e9crire le code et l\u2019\u00e9quipe d\u2019op\u00e9rations se chargeait d\u2019appliquer ce code \u00e0 la production. Les tests constituaient une \u00e9tape interm\u00e9diaire.<\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"color: #f37300;\"><em><strong>DevOps &#8211; le m\u00e9lange du d\u00e9veloppement (dev) et des op\u00e9rations informatiques (ops).<\/strong><\/em><\/span><\/p>\n<div style=\"text-align: right;\"><span style=\"color: #f37300;\"><em><strong>DevOps en mode cloud &#8211; il consiste \u00e0 d\u00e9velopper et \u00e0 diffuser un logiciel sur des plateformes informatiques en cloud.<\/strong><\/em><\/span><\/div>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Ce processus traditionnel de cr\u00e9ation de logiciel pr\u00e9sente certains inconv\u00e9nients en termes de vitesse et d\u2019agilit\u00e9. \u00c0 force de se renvoyer les probl\u00e8mes d\u2019une \u00e9quipe \u00e0 l\u2019autre en se disant qu\u2019ils n\u2019auraient qu\u2019\u00e0 s\u2019en charger, la sortie d\u2019un logiciel en devient un processus lent et compliqu\u00e9. \u00c0 l\u2019inverse, le DevOps combine les \u00e9quipes et les flux d\u2019activit\u00e9 du d\u00e9veloppement et du lancement du logiciel, ce qui correspond tr\u00e8s bien aux m\u00e9thodologies de d\u00e9veloppement actuelles, ax\u00e9es sur l\u2019agilit\u00e9. Le DevOps s\u2019associe \u00e9galement bien avec l\u2019int\u00e9gration continue (CI), qui consiste \u00e0 ins\u00e9rer du code nouveau dans un logiciel en production directe.<\/span><\/p>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Le <a href=\"https:\/\/www.wallix.com\/fr\/produits\/gestion-des-acces-a-privileges\/\" target=\"_blank\" rel=\"noopener\">cloud<\/a> est naturellement adapt\u00e9 au DevOps. Tout va beaucoup plus vite lorsqu\u2019il n\u2019est pas n\u00e9cessaire de mettre en place un environnement de d\u00e9veloppement sur site. Le cloud facilite \u00e9galement la collaboration des \u00e9quipes de DevOps dont les membres viennent de plusieurs entreprises et sont s\u00e9par\u00e9s par de grandes distances. De nouvelles technologies, par exemple les conteneurs et les microservices, tirent \u00e9galement profit de cette combinaison du cloud et du DevOps. C\u2019est tout simplement plus efficace. Mais c\u2019est \u00e9galement moins s\u00e9curis\u00e9.<\/span><\/p>\n<h2><span style=\"font-size: 24px;\">Les risques de s\u00e9curit\u00e9 du Devops en mode cloud<\/span><\/h2>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Les incidents comme celui qui a eu lieu sur Node.js sont \u00e0 voir comme des mises en garde : il est crucial que les responsables informatiques comprennent que le DevOps en cloud est plus dangereux que le DevOps sur site. Gr\u00e2ce au cloud, l\u2019environnement de d\u00e9veloppement et de production est plus mouvant et on peut plus facilement y acc\u00e9der \u00e0 distance. Si des entit\u00e9s ext\u00e9rieures, comme des informaticiens freelance et des prestataires de conception informatique, y participent, la prise de risque en est d\u00e9multipli\u00e9e. On risque notamment :<\/span><\/p>\n<ul>\n<li>L\u2019insertion de code malveillant dans le logiciel de production, c\u2019est un ransomware<\/li>\n<li>L\u2019emploi abusif des environnements de d\u00e9veloppement et de production pour violer la s\u00e9curit\u00e9 des donn\u00e9es ou pour espionner<\/li>\n<li>L\u2019implantation de rootkits sur les serveurs de production<\/li>\n<\/ul>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"font-size: 16px; color: #f37324;\"><em><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><strong>Les infrastructures cloud sont plus mouvantes et on peut plus facilement y acc\u00e9der \u00e0 distance. Chaque point d\u2019acc\u00e8s \u00e0 distance est une source d\u2019intrusion potentielle.<\/strong><\/span><\/em><\/span><\/p>\n<\/blockquote>\n<h3>Le contr\u00f4le des acc\u00e8s comme point \u00e0 risque du DevOps en cloud<\/h3>\n<p><img decoding=\"async\" style=\"width: 300px; float: right; margin: 0px 0px 10px 10px;\" src=\"https:\/\/cdn2.hubspot.net\/hubfs\/514643\/cloud%20devops%20-%20PAM%20-%20access.jpg\" alt=\"cloud devops - PAM - access\" width=\"300\" \/><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Pour s\u00e9curiser le DevOps en cloud, il faut \u00eatre en mesure de r\u00e9pondre aux questions fondamentales que l\u2019on se pose apr\u00e8s un incident de s\u00e9curit\u00e9 : Qui a fait quoi ? Quand ? Dans le cadre d\u2019un processus traditionnel de d\u00e9veloppement de logiciel, il est relativement facile de r\u00e9pondre \u00e0 ces questions. Vous disposez d\u2019un historique des connexions aux environnements de d\u00e9veloppement. Partons du principe que vous avez un syst\u00e8me de gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) en place : vous pouvez contr\u00f4ler toutes les personnes qui acc\u00e8dent \u00e0 des sessions administrateurs sur les serveurs de production. Dans le cloud, tout cela est plus flou.<\/span><\/p>\n<h2>La gestion des acc\u00e8s \u00e0 privil\u00e8ge et le DevOps en mode cloud<\/h2>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Pour assurer la s\u00e9curit\u00e9 du DevOps en cloud, il faut contr\u00f4ler les <a href=\"https:\/\/www.wallix.com\/fr\/produits\/gestion-des-acces-a-privileges\/\" target=\"_blank\" rel=\"noopener\">acc\u00e8s \u00e0 privil\u00e8ges<\/a> du back-end de tous les \u00e9l\u00e9ments du syst\u00e8me bas\u00e9s sur le cloud. Il s\u2019agit notamment des environnements de d\u00e9veloppement et de test, ainsi que les environnements de production. Le DevOps combine les \u00e9quipes et les pratiques, c\u2019est pourquoi on peut consid\u00e9rer que tous les \u00e9l\u00e9ments distincts font partie d\u2019un m\u00eame syst\u00e8me.<\/span><\/p>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Un utilisateur \u00e0 privil\u00e8ges \u00e0 acc\u00e8s au back-end d\u2019un syst\u00e8me en tant qu\u2019administrateur. Avec le DevOps en mode cloud, quasiment tout le monde a un acc\u00e8s avec plus ou moins de privil\u00e8ges. Tout utilisateur n\u2019est pas forc\u00e9ment en mesure de modifier les autres comptes et les configurations du syst\u00e8me, mais s\u2019il peut se connecter et modifier le code de production, il faut le consid\u00e9rer comme un utilisateur \u00e0 privil\u00e8ges. Ces utilisateurs doivent \u00eatre r\u00e9gul\u00e9s gr\u00e2ce aux politiques de contr\u00f4le des acc\u00e8s d\u2019utilisateurs \u00e0 privil\u00e8ges, et sont sujets \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM).<\/span><\/p>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Une solution PAM permet d\u2019atteindre cet objectif. Elle est con\u00e7ue pour garantir que seuls les administrateurs disposant des droits d\u2019acc\u00e8s peuvent se connecter aux syst\u00e8mes de back-end et permet de surveiller et de g\u00e9rer tous les acc\u00e8s des comptes \u00e0 privil\u00e8ges. Cela s\u2019applique aussi bien aux structures en cloud qu\u2019aux syst\u00e8mes locaux. Dans le cas d\u2019un DevOps en cloud, une solution PAM permet de g\u00e9rer de fa\u00e7on s\u00e9curis\u00e9e et optimis\u00e9e les autorisations et les historiques d\u2019activit\u00e9 des utilisateurs qui acc\u00e8dent \u00e0 un \u00e9l\u00e9ment de l\u2019environnement DevOps, quel que soit cet \u00e9l\u00e9ment ou l\u2019endroit o\u00f9 il est h\u00e9berg\u00e9.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"font-size: 16px; color: #f37324;\"><em><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><strong>Une solution PAM permet de g\u00e9rer de fa\u00e7on s\u00e9curis\u00e9e et optimis\u00e9e les autorisations et les historiques d\u2019activit\u00e9 des utilisateurs, ce qui am\u00e9liore la s\u00e9curit\u00e9 des entreprises, aussi bien dans le cadre d\u2019une structure en cloud que pour les syst\u00e8mes locaux.<\/strong><\/span><\/em><\/span><\/p>\n<\/blockquote>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Dans le cadre du DevOps en cloud, la solution PAM permet de centraliser efficacement la gestion des acc\u00e8s des membres de l\u2019\u00e9quipe de d\u00e9veloppement et d\u2019op\u00e9ration informatique sur tous les syst\u00e8mes en cloud auxquels elle est appliqu\u00e9e. Elle met en place des politiques de restriction des utilisateurs pour les emp\u00eacher de contourner les syst\u00e8mes de s\u00e9curit\u00e9. La solution PAM permet d\u2019accorder et de retirer les privil\u00e8ges des d\u00e9veloppeurs et des membres de l\u2019\u00e9quipe d\u2019op\u00e9ration informatique. La PAM r\u00e9duit \u00e9galement les risques que d\u2019anciens membres de l\u2019\u00e9quipe de d\u00e9veloppement ou des individus qui n\u2019en ont plus besoin conservent leur acc\u00e8s aux environnements de DevOps en cloud.<\/span><\/p>\n<h2><span style=\"font-size: 24px;\">Utiliser les outils de PAM pour g\u00e9rer les risques li\u00e9s \u00e0 la maintenance d&rsquo;une application par un tiers<\/span><\/h2>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><a href=\"https:\/\/www.wallix.com\/fr\/produits\/gestion-des-acces-a-privileges\/\">WALLIX PAM<\/a>\u00a0propose une solution PAM compl\u00e8te pour le DevOps en cloud. Il permet un d\u00e9ploiement g\u00e9n\u00e9ralis\u00e9 et durable sur une structure cloud qui prend en charge le DevOps. Pour ce faire, il \u00e9tablit un m\u00eame portail d\u2019acc\u00e8s sur lequel se connectent les membres de l\u2019\u00e9quipe de d\u00e9veloppement et d\u2019op\u00e9rations informatiques. Le Bastion prend en charge les syst\u00e8mes en cloud public, en cloud priv\u00e9, en cloud hybride et les environnements sur site.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" style=\"width: 345px;\" src=\"https:\/\/cdn2.hubspot.net\/hubfs\/514643\/cloud%20devops%20-%20PAM%20-%20secure.jpeg\" alt=\"cloud devops - PAM - secure\" width=\"5000\" height=\"207\" \/><\/p>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">WALLIX propose plusieurs \u00e9l\u00e9ments qui ont chacun leur utilit\u00e9 afin de g\u00e9rer les risques li\u00e9s au contr\u00f4le des acc\u00e8s du DevOps en mode cloud. Le gestionnaire d\u2019acc\u00e8s autorise les utilisateurs \u00e0 se connecter aux ressources d\u2019un seul clic et depuis n\u2019importe quel appareil, sans avoir \u00e0 installer un outil de contr\u00f4le \u00e0 distance. Ceux qui travaillent en DevOps en cloud \u00e0 l\u2019heure actuelle sont g\u00e9n\u00e9ralement mobiles, c\u2019est pourquoi ce point est un avantage en ce qui concerne la conformit\u00e9 PAM. Tous les mots de passe sont stock\u00e9s dans un coffre \u00e0 mots de passe s\u00e9curis\u00e9 et certifi\u00e9.<\/span><\/p>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Le Session Manager WALLIX surveille l\u2019activit\u00e9 des sessions d\u2019utilisateurs de DevOps en cloud \u00e0 privil\u00e8ges en temps r\u00e9el. Il cr\u00e9e une piste d\u2019audit compl\u00e8te. Cet outil peut \u00eatre configur\u00e9 afin qu\u2019il intervienne automatiquement lorsque les politiques d\u2019acc\u00e8s au DevOps en cloud ne sont pas respect\u00e9es. Chaque acc\u00e8s est attribu\u00e9 \u00e0 une identit\u00e9 r\u00e9elle, ce qui permet au Session Manager de Bastion d\u2019assurer que tous les utilisateurs sont tenus responsables de leurs actions. Le WALLIX PAM permet ensuite de d\u00e9terminer plus vite ce qu\u2019il s\u2019est pass\u00e9 en cas d\u2019incident.<\/span><\/p>\n<div style=\"text-align: right;\"><span style=\"color: #f37300;\"><strong><em>Le Bastion WALLIX comprend des fonctions robustes de gestion des acc\u00e8s,<\/em><\/strong><\/span><\/div>\n<div style=\"text-align: right;\"><span style=\"color: #f37300;\"><strong><em>des sessions et des mots de passe.<\/em><\/strong><\/span><\/div>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">La solution WALLIX propose une architecture sans agent. Gr\u00e2ce \u00e0 cette approche, il n\u2019est pas n\u00e9cessaire de remanier compl\u00e8tement la solution PAM en cas de changements dans les syst\u00e8mes prot\u00e9g\u00e9s. Contrairement \u00e0 la solution WALLIX, de nombreuses solutions PAM n\u00e9cessitent un logiciel d\u00e9di\u00e9 install\u00e9 sur chaque appareil ou poste administr\u00e9. L\u2019utilisation d\u2019agents d\u00e9di\u00e9s peut ralentir l\u2019impl\u00e9mentation de la solution PAM et cr\u00e9e des difficult\u00e9s lorsque les applications sont mises \u00e0 jour.<\/span><\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-5  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-0a73d8854da5c7c5d5ad87c7877e27c0 av-social-sharing-box-default  avia-builder-el-6  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=S%C3%A9curiser%20le%20DevOps%20en%20mode%20cloud%20gr%C3%A2ce%20%C3%A0%20la%20gestion%20des%20acc%C3%A8s%20%C3%A0%20privil%C3%A8ges%20%28PAM%29&#038;url=https:\/\/www.wallix.com\/fr\/?p=37677' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=S%C3%A9curiser%20le%20DevOps%20en%20mode%20cloud%20gr%C3%A2ce%20%C3%A0%20la%20gestion%20des%20acc%C3%A8s%20%C3%A0%20privil%C3%A8ges%20%28PAM%29&#038;url=https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=S%C3%A9curiser%20le%20DevOps%20en%20mode%20cloud%20gr%C3%A2ce%20%C3%A0%20la%20gestion%20des%20acc%C3%A8s%20%C3%A0%20privil%C3%A8ges%20%28PAM%29&#038;body=https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-7  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-97d9f49f990ddcfd6e03daaeba0494be\">\n#top .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-97d9f49f990ddcfd6e03daaeba0494be av-special-heading-h3 blockquote modern-quote  avia-builder-el-8  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenus associ\u00e9s<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-9  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-7b60af3a779ac8669615c90b07612884\">\n#top .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-7b60af3a779ac8669615c90b07612884 av-special-heading-h3 blockquote modern-quote  avia-builder-el-11  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >ressources associ\u00e9es <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":70021,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1640,1648,1681,1788,1685],"tags":[],"class_list":["post-37677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-blog-cloud-security-fr","category-devops-fr","category-gestion-des-acces-a-privileges-fr","category-transformation-digitale-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T14:21:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T13:05:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/devops-security-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1463\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM)\",\"datePublished\":\"2023-12-14T14:21:26+00:00\",\"dateModified\":\"2026-02-10T13:05:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/\"},\"wordCount\":3346,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/devops-security-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"CLOUD SECURITY\",\"DEVOPS\",\"GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES\",\"TRANSFORMATION DIGITALE\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/\",\"name\":\"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/devops-security-scaled.jpeg\",\"datePublished\":\"2023-12-14T14:21:26+00:00\",\"dateModified\":\"2026-02-10T13:05:25+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/devops-security-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/devops-security-scaled.jpeg\",\"width\":2560,\"height\":1463,\"caption\":\"Illustration of DevOps Security, representing Wallix\u2019s commitment to embedding privileged access control into the software delivery pipeline. The image aligns with Wallix\u2019s strategy for securing CI\\\/CD environments by protecting service accounts, automating credential rotation, and monitoring build\u2011time activities.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) - WALLIX","og_url":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/","og_site_name":"WALLIX","article_published_time":"2023-12-14T14:21:26+00:00","article_modified_time":"2026-02-10T13:05:25+00:00","og_image":[{"width":2560,"height":1463,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/devops-security-scaled.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"WALLIX","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM)","datePublished":"2023-12-14T14:21:26+00:00","dateModified":"2026-02-10T13:05:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/"},"wordCount":3346,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/devops-security-scaled.jpeg","articleSection":["BLOGPOST","CLOUD SECURITY","DEVOPS","GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES","TRANSFORMATION DIGITALE"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/","url":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/","name":"S\u00e9curiser le DevOps en mode cloud gr\u00e2ce \u00e0 la gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM) - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/devops-security-scaled.jpeg","datePublished":"2023-12-14T14:21:26+00:00","dateModified":"2026-02-10T13:05:25+00:00","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-le-devops-en-mode-cloud-grace-a-la-gestion-des-acces-a-privileges-pam\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/devops-security-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/devops-security-scaled.jpeg","width":2560,"height":1463,"caption":"Illustration of DevOps Security, representing Wallix\u2019s commitment to embedding privileged access control into the software delivery pipeline. The image aligns with Wallix\u2019s strategy for securing CI\/CD environments by protecting service accounts, automating credential rotation, and monitoring build\u2011time activities."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/fr\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=37677"}],"version-history":[{"count":13,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37677\/revisions"}],"predecessor-version":[{"id":84159,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/37677\/revisions\/84159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/70021"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=37677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=37677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=37677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}