{"id":38591,"date":"2023-12-26T17:17:26","date_gmt":"2023-12-26T16:17:26","guid":{"rendered":"https:\/\/www.wallix.com\/?p=38591"},"modified":"2025-11-19T17:11:18","modified_gmt":"2025-11-19T16:11:18","slug":"securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/","title":{"rendered":"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lqmjuwvn-790f6a256ea45da2b7be5eb9fbdbd932 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 66.719242902208%;'><li  class='avia-slideshow-slide av-lqmjuwvn-790f6a256ea45da2b7be5eb9fbdbd932__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-28232 avia-img-lazy-loading-not-28232\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg\" width=\"634\" height=\"423\" title='shahadat-rahman-BfrQnKBulYQ-unsplash(1)' alt='Close-up image of colorful programming code on a computer screen, ideal for software development, coding and cybersecurity content'  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg 2560w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-300x200.jpg 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-1024x683.jpg 1024w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-768x512.jpg 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-1536x1024.jpg 1536w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-2048x1365.jpg 2048w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-380x253.jpg 380w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-760x507.jpg 760w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-320x213.jpg 320w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-640x427.jpg 640w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-480x320.jpg 480w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-960x640.jpg 960w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-38591'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lqmjue05-1eec8a527716cfb2b069bfd1fb474939\">\n#top .av-special-heading.av-lqmjue05-1eec8a527716cfb2b069bfd1fb474939{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lqmjue05-1eec8a527716cfb2b069bfd1fb474939 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lqmjue05-1eec8a527716cfb2b069bfd1fb474939 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lqmjue05-1eec8a527716cfb2b069bfd1fb474939 av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >19 Novembre 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/devops-fr\/\" >DEVOPS<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/gestion-des-acces-a-privileges-fr\/\" >GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lqmjvw5h-c8f30a190a845f71f242f51497f52201 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><em>Avis d&rsquo;expert sign\u00e9 par Stefan Rabben, Directeur des ventes DACH &amp; Europe de l&rsquo;Est, WALLIX.<\/em><\/p>\n<p><strong>Novembre 2022<br \/>\n<\/strong><\/p>\n<p>Dans un contexte o\u00f9 les usages num\u00e9riques \u00e9voluent fortement et o\u00f9 la cybercriminalit\u00e9 est d\u00e9sormais consid\u00e9r\u00e9e comme la troisi\u00e8me force \u00e9conomique mondiale, la n\u00e9cessit\u00e9 de prot\u00e9ger les acc\u00e8s aux infrastructures des organisations est plus que jamais d&rsquo;actualit\u00e9. En s\u00e9curisant les acc\u00e8s, les organisations assurent la continuit\u00e9 de leurs activit\u00e9s, se conforment aux exigences r\u00e9glementaires et, surtout, rendent les donn\u00e9es accessibles \u00e0 tous. Elles facilitent ainsi l&rsquo;innovation et assurent leur comp\u00e9titivit\u00e9 \u00e9conomique.<\/p>\n<p>La pand\u00e9mie a acc\u00e9l\u00e9r\u00e9 le processus de la transformation num\u00e9rique. Le besoin de s\u00e9curiser les acc\u00e8s aux donn\u00e9es des entreprises n&rsquo;a jamais \u00e9t\u00e9 aussi grand. Il suffit de penser \u00e0 la standardisation du t\u00e9l\u00e9travail, \u00e0 la croissance massive des services li\u00e9s au Cloud ou \u00e0 l&rsquo;augmentation consid\u00e9rable du nombre d&rsquo;appareils mobiles. Toutes les applications qui ont permis aux organisations de poursuivre leurs activit\u00e9s pendant les longs mois de confinement ont entra\u00een\u00e9 une augmentation consid\u00e9rable du nombre de points d&rsquo;acc\u00e8s aux infrastructures informatiques. Consid\u00e9rant que ces points d&rsquo;acc\u00e8s sont des portes d&rsquo;entr\u00e9e potentielles pour les pirates, la protection des donn\u00e9es et des applications est devenue une t\u00e2che urgente. Le record de 2021 ne laisse pas de place au doute: 40 milliards de donn\u00e9es personnelles ont \u00e9t\u00e9 pirat\u00e9es, soit environ 10 donn\u00e9es personnelles par individu dans le monde, soit une augmentation de 78% par rapport \u00e0 2020.<\/p>\n<p>Cependant, ce record risque d&rsquo;\u00eatre battu de nombreuses fois car la cybercriminalit\u00e9 conna\u00eet actuellement une sorte d&rsquo;industrialisation qui va consid\u00e9rablement augmenter le risque cyber pesant sur les \u00e9conomies de nombreux pays. Les organisations de hackers op\u00e8rent d\u00e9sormais au plus pr\u00e8s des entreprises. La cybercriminalit\u00e9 est consid\u00e9r\u00e9e comme la troisi\u00e8me plus grande industrie au monde, son co\u00fbt global \u00e9tant pass\u00e9 de 3 000 milliards de dollars en 2015 \u00e0 6 000 milliards de dollars en 2021 et pourrait passer \u00e0 10 500 milliards de dollars en 2025. Ces co\u00fbts comprennent les dommages et la destruction de donn\u00e9es personnelles et\/ou financi\u00e8res, le d\u00e9tournement de fonds, la fraude, le vol de propri\u00e9t\u00e9 intellectuelle et l&rsquo;atteinte \u00e0 la r\u00e9putation. Nous devons \u00e9galement tenir compte des co\u00fbts encourus par les organisations en raison de l&rsquo;interruption des activit\u00e9s &#8211; qui peut parfois durer longtemps apr\u00e8s l&rsquo;attaque &#8211; ainsi que des investissements qu&rsquo;elles doivent r\u00e9aliser pour restaurer les syst\u00e8mes pirat\u00e9s.<\/p>\n<h2><strong>La s\u00e9curit\u00e9 n&rsquo;existe plus, les bonnes mesures de protection si<\/strong><\/h2>\n<p>Nous vivons aujourd&rsquo;hui dans une \u00e8re d\u2019\u00e9volution et de changement o\u00f9 les utilisateurs &#8211; qu&rsquo;il s&rsquo;agisse de personnes ou de machines &#8211; sont de plus en plus mobiles et doivent acc\u00e9der aux donn\u00e9es des organisations \u00e0 tout moment et de n&rsquo;importe o\u00f9.<\/p>\n<p>Les donn\u00e9es elles-m\u00eames deviennent \u00e9ph\u00e9m\u00e8res (stockage sur le cloud, solutions SaaS, automatisation) afin de contr\u00f4ler les co\u00fbts et de gagner en flexibilit\u00e9. Cela s&rsquo;applique \u00e0 tous les secteurs, y compris les plus critiques comme la sant\u00e9, l&rsquo;industrie ou l&rsquo;administration, qui doivent de toute urgence prot\u00e9ger leurs acc\u00e8s pour assurer une continuit\u00e9 p\u00e9renne de leurs activit\u00e9s, la conformit\u00e9 r\u00e9glementaire et, plus important encore, l&rsquo;accessibilit\u00e9 des donn\u00e9es, qui \u00e0 son tour permet l&rsquo;innovation et renforce la comp\u00e9titivit\u00e9 \u00e9conomique.<\/p>\n<p>Pour prot\u00e9ger l&rsquo;acc\u00e8s, les entreprises doivent mettre en \u0153uvre des mesures telles que:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.wallix.com\/fr\/blogpost\/comment-mfa-et-pam-fonctionnent-ensemble\/\">L&rsquo;authentification forte<\/a> ou multifacteur (MFA) pour neutraliser les risques li\u00e9s \u00e0 la compromission des identifiants.<\/li>\n<li>La gestion de l&rsquo;acc\u00e8s \u00e0 distance, bas\u00e9e sur les derni\u00e8res technologies de s\u00e9curit\u00e9, car elle permet de maintenir l&rsquo;acc\u00e8s \u00e0 distance pour les fournisseurs, les employ\u00e9s ou les administrateurs tiers.<\/li>\n<li>La gestion des sessions pour surveiller, contr\u00f4ler et auditer les sessions.<\/li>\n<li>La gestion des mots de passe pour s\u00e9curiser et faire tourner les mots de passe et les cl\u00e9s, et pour supprimer les mots de passe difficiles.<\/li>\n<li>Et enfin, le <a href=\"https:\/\/www.wallix.com\/fr\/blog\/principe-de-moindre-privilege-et-comment-l-implementer\">principe du moindre privil\u00e8ge<\/a> pour accorder les bons privil\u00e8ges au bon utilisateur au bon moment et pour arr\u00eater la propagation des logiciels malveillants en bloquant les mouvements lat\u00e9raux et verticaux.<\/li>\n<\/ul>\n<h2><strong>Des solutions int\u00e9gr\u00e9es pour la meilleure protection possible<\/strong><\/h2>\n<p>WALLIX combine toutes ces mesures dans une solution unique appel\u00e9e WALLIX PAM. Elle aide les entreprises \u00e0 mettre rapidement en \u0153uvre une architecture Z\u00e9ro Trust avec un syst\u00e8me d\u2019authentification forte et un contr\u00f4le d&rsquo;acc\u00e8s adapt\u00e9 aux utilisateurs, en fonction de la t\u00e2che qu&rsquo;ils doivent accomplir et pour une p\u00e9riode donn\u00e9e (Just-In-Time).<\/p>\n<p>Il est \u00e9galement important que les responsables de la s\u00e9curit\u00e9 aient une vue d&rsquo;ensemble constante sur les activit\u00e9s qui se d\u00e9roulent sur le r\u00e9seau de l&rsquo;entreprise afin de pouvoir intervenir rapidement en cas de menaces avanc\u00e9es ou de logiciels malveillants. Les comptes, les cl\u00e9s et les certificats doivent \u00eatre s\u00e9curis\u00e9s, pour l&rsquo;automatisation et les pratiques DevOps. Ces environnements DevOps doivent \u00eatre s\u00e9curis\u00e9s, quel que soit le type de plateforme d&rsquo;automatisation utilis\u00e9e et sans exposer les informations d&rsquo;identification (pas de codage en dur). Les politiques de contr\u00f4le d&rsquo;acc\u00e8s garantissent que les niveaux de privil\u00e8ges appropri\u00e9s sont accord\u00e9s sans perturber les processus de travail internes. Il est donc absolument n\u00e9cessaire de prot\u00e9ger tous les acc\u00e8s, et pas seulement les comptes \u00e0 privil\u00e8ges. Le principe du moindre privil\u00e8ge (Least Privilege) prot\u00e8ge tous les utilisateurs et postes de travail vuln\u00e9rables d&rsquo;une organisation. Tous les employ\u00e9s, \u00e0 un moment donn\u00e9 de leur journ\u00e9e de travail, utilisent une forme de privil\u00e8ge pour acc\u00e9der \u00e0 certaines ressources internes.<\/p>\n<p>Le d\u00e9fi consiste \u00e0 accorder l&rsquo;acc\u00e8s au bon moment avec le bon niveau de privil\u00e8ges pour accomplir la t\u00e2che attendue:<\/p>\n<ul>\n<li>Pour tous les utilisateurs: employ\u00e9s, fournisseurs, partenaires, ou machines, etc.<\/li>\n<li>Pour tous les types de situations.<\/li>\n<li>Sur toutes les ressources strat\u00e9giques de l&rsquo;entreprise.<\/li>\n<li>Sur tous les appareils de l&rsquo;entreprise.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-0a73d8854da5c7c5d5ad87c7877e27c0 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=S%C3%A9curiser%20tous%20les%20acc%C3%A8s%20%3A%20le%20devoir%20incontestable%20de%20toute%20entreprise&#038;url=https:\/\/www.wallix.com\/fr\/?p=38591' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=S%C3%A9curiser%20tous%20les%20acc%C3%A8s%20%3A%20le%20devoir%20incontestable%20de%20toute%20entreprise&#038;url=https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=S%C3%A9curiser%20tous%20les%20acc%C3%A8s%20%3A%20le%20devoir%20incontestable%20de%20toute%20entreprise&#038;body=https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-97d9f49f990ddcfd6e03daaeba0494be\">\n#top .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-97d9f49f990ddcfd6e03daaeba0494be av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenus associ\u00e9s<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-7b60af3a779ac8669615c90b07612884\">\n#top .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-7b60af3a779ac8669615c90b07612884 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >ressources associ\u00e9es <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":28232,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1640,1681,1788],"tags":[],"class_list":["post-38591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-devops-fr","category-gestion-des-acces-a-privileges-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise - WALLIX<\/title>\n<meta name=\"description\" content=\"Dans un contexte o\u00f9 la cybercriminalit\u00e9 \u00e9volue fortement, la n\u00e9cessit\u00e9 de prot\u00e9ger les acc\u00e8s est plus que jamais d&#039;actualit\u00e9...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Dans un contexte o\u00f9 la cybercriminalit\u00e9 \u00e9volue fortement, la n\u00e9cessit\u00e9 de prot\u00e9ger les acc\u00e8s est plus que jamais d&#039;actualit\u00e9...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-26T16:17:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T16:11:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise\",\"datePublished\":\"2023-12-26T16:17:26+00:00\",\"dateModified\":\"2025-11-19T16:11:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/\"},\"wordCount\":2813,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg\",\"articleSection\":[\"BLOGPOST\",\"DEVOPS\",\"GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/\",\"name\":\"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg\",\"datePublished\":\"2023-12-26T16:17:26+00:00\",\"dateModified\":\"2025-11-19T16:11:18+00:00\",\"description\":\"Dans un contexte o\u00f9 la cybercriminalit\u00e9 \u00e9volue fortement, la n\u00e9cessit\u00e9 de prot\u00e9ger les acc\u00e8s est plus que jamais d'actualit\u00e9...\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Close-up image of colorful programming code on a computer screen, ideal for software development, coding and cybersecurity content\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise - WALLIX","description":"Dans un contexte o\u00f9 la cybercriminalit\u00e9 \u00e9volue fortement, la n\u00e9cessit\u00e9 de prot\u00e9ger les acc\u00e8s est plus que jamais d'actualit\u00e9...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise - WALLIX","og_description":"Dans un contexte o\u00f9 la cybercriminalit\u00e9 \u00e9volue fortement, la n\u00e9cessit\u00e9 de prot\u00e9ger les acc\u00e8s est plus que jamais d'actualit\u00e9...","og_url":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/","og_site_name":"WALLIX","article_published_time":"2023-12-26T16:17:26+00:00","article_modified_time":"2025-11-19T16:11:18+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"WALLIX","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise","datePublished":"2023-12-26T16:17:26+00:00","dateModified":"2025-11-19T16:11:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/"},"wordCount":2813,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg","articleSection":["BLOGPOST","DEVOPS","GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/","url":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/","name":"S\u00e9curiser tous les acc\u00e8s : le devoir incontestable de toute entreprise - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg","datePublished":"2023-12-26T16:17:26+00:00","dateModified":"2025-11-19T16:11:18+00:00","description":"Dans un contexte o\u00f9 la cybercriminalit\u00e9 \u00e9volue fortement, la n\u00e9cessit\u00e9 de prot\u00e9ger les acc\u00e8s est plus que jamais d'actualit\u00e9...","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/securiser-tous-les-acces-le-devoir-incontestable-de-toute-entreprise-2\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/11\/shahadat-rahman-BfrQnKBulYQ-unsplash1-scaled.jpg","width":2560,"height":1707,"caption":"Close-up image of colorful programming code on a computer screen, ideal for software development, coding and cybersecurity content"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/fr\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=38591"}],"version-history":[{"count":6,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38591\/revisions"}],"predecessor-version":[{"id":81008,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38591\/revisions\/81008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/28232"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=38591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=38591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=38591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}