{"id":11590,"date":"2025-02-17T16:25:21","date_gmt":"2025-02-17T21:25:21","guid":{"rendered":"https:\/\/nventive.com\/?p=11590"},"modified":"2025-02-17T16:41:30","modified_gmt":"2025-02-17T21:41:30","slug":"le-role-du-soc-2-pour-une-entreprise-de-developpement","status":"publish","type":"post","link":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/","title":{"rendered":"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11590\" class=\"elementor elementor-11590\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3efd158c e-flex e-con-boxed e-con e-parent\" data-id=\"3efd158c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7497b4bb elementor-widget elementor-widget-text-editor\" data-id=\"7497b4bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Face \u00e0 l\u2019augmentation des menaces de cybers\u00e9curit\u00e9, il est imp\u00e9ratif pour une entreprise de d\u00e9veloppement d\u2019am\u00e9liorer de fa\u00e7on proactive les protocoles internes afin de garantir la confidentialit\u00e9 et la s\u00e9curit\u00e9 des projets clients.<\/b><\/p>\n<p>En plus du comit\u00e9 de s\u00e9curit\u00e9 d\u00e9j\u00e0 \u00e9tabli, nous sommes fiers d\u2019\u00eatre une entreprise conforme au standard SOC\u202f2 Type 2 (\u00ab\u202fSystem and Organization Controls\u202f\u00bb, ou contr\u00f4les des syst\u00e8mes et des organisations), un standard de conformit\u00e9 \u00e9labor\u00e9 par l\u2019American Institute of Certified Public Accountants (AICPA) pour garantir la cybers\u00e9curit\u00e9 de l\u2019entreprise et de nos projets.<\/p>\n<p><strong>Francis Venne<\/strong>, Responsable de la s\u00e9curit\u00e9 informatique chez nventive, nous explique concr\u00e8tement le r\u00f4le du SOC\u202f2 Type 2 dans notre organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d8944f1 e-flex e-con-boxed e-con e-parent\" data-id=\"d8944f1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30ffc27 elementor-widget elementor-widget-heading\" data-id=\"30ffc27\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Les crit\u00e8res de s\u00e9curit\u00e9 du standard SOC\u202f 2 Type 2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e993900 elementor-widget elementor-widget-text-editor\" data-id=\"e993900\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>SOC 2 Type 2 est un standard de conformit\u00e9 que les entreprises peuvent passer afin d\u2019\u00e9tablir des pratiques et des contr\u00f4les organisationnels pour prot\u00e9ger efficacement la confidentialit\u00e9 et la s\u00e9curit\u00e9 des donn\u00e9es clients ainsi que leur organisation.<\/p><p>C\u2019est donc un ensemble de politiques, de proc\u00e9dures et de contr\u00f4les audit\u00e9s par les CPA auditeurs.<\/p><p>Pour mieux comprendre, voici la d\u00e9finition de ces termes\u202f:<\/p><ul><li><strong>Contr\u00f4les\u202f:<\/strong>\u00a0syst\u00e8me ou politique pour mitiger un probl\u00e8me.<\/li><li><strong>Politiques\u202f:<\/strong>\u00a0document \u00e9crit qui d\u00e9crit les choses \u00e0 faire ou \u00e0 ne pas faire.<\/li><li><strong>Proc\u00e9dures\u202f:<\/strong>\u00a0document dictant les \u00e9tapes \u00e0 suivre dans une situation donn\u00e9e.<\/li><\/ul><div>\u00a0<\/div><p>Le standard SOC\u202f2 Type 2 comprend cinq crit\u00e8res qui constituent les \u00ab\u202fTrust Services Criteria\u202f\u00bb (crit\u00e8res des services de confiance)\u202f:<\/p><ul><li><strong>S\u00e9curit\u00e9\u202f:<\/strong>\u00a0prot\u00e9ger les donn\u00e9es et les syst\u00e8mes contre les acc\u00e8s non autoris\u00e9s.<\/li><li><strong>Confidentialit\u00e9\u202f:<\/strong>\u00a0limiter \u00e0 un ensemble sp\u00e9cifique de personnes l\u2019acc\u00e8s et la divulgation des donn\u00e9es.<\/li><li><strong>Int\u00e9grit\u00e9\u202f:<\/strong>\u00a0assurer qu\u2019une donn\u00e9e ou un syst\u00e8me n\u2019a pas \u00e9t\u00e9 modifi\u00e9 ou d\u00e9truit de mani\u00e8re non autoris\u00e9e.<\/li><li><strong>Disponibilit\u00e9\u202f:<\/strong>\u00a0garantir l\u2019accessibilit\u00e9 du syst\u00e8me comme stipul\u00e9 dans un contrat comprenant des crit\u00e8res de s\u00e9curit\u00e9.<\/li><li><strong>Vie priv\u00e9e\u202f:<\/strong>\u00a0prot\u00e9ger tous les renseignements personnels.<\/li><\/ul><div>\u00a0<\/div><p>Afin d\u2019assurer la conformit\u00e9 au SOC\u202f2 Type 2, les auditeurs \u00e9valuent l\u2019efficacit\u00e9 des contr\u00f4les effectu\u00e9s tout au long de l\u2019ann\u00e9e. <span class=\"TextRun Highlight SCXW60182635 BCX0\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW60182635 BCX0\">\u00ab<em>\u202f<\/em><\/span><em><span class=\"NormalTextRun SCXW60182635 BCX0\">Le SOC-2 n\u2019est pas qu\u2019une \u00ab\u202fchecklist\u202f\u00bb, c\u2019est un processus en continu. On modifie des contr\u00f4les, on change les outils et on doit r\u00e9viser les politiques et les proc\u00e9dures. Il est essentiel d\u2019avoir la coop\u00e9ration entre les \u00e9quipes afin de r\u00e9colter les preuves et de documenter un processus qui est viable pour la ligne d\u2019affaire<\/span><\/em><\/span><span class=\"TextRun SCXW60182635 BCX0\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW60182635 BCX0\"><em>\u202f<\/em>\u00bb, explique <strong>Francis Venne<\/strong>, <span class=\"TextRun SCXW24924883 BCX0\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW24924883 BCX0\">Responsable de la s\u00e9curit\u00e9 informatique chez nventive.<\/span><\/span><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fb91fa e-flex e-con-boxed e-con e-parent\" data-id=\"1fb91fa\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a0286c elementor-widget elementor-widget-heading\" data-id=\"5a0286c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Une \u00e9quipe d\u2019experts en cybers\u00e9curit\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cfdedb elementor-widget elementor-widget-text-editor\" data-id=\"9cfdedb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019\u00e9quipe Confidentialit\u00e9 et s\u00e9curit\u00e9, compos\u00e9e notamment de <strong>Francis Venne<\/strong>, Responsable de la s\u00e9curit\u00e9 informatique, de nos sp\u00e9cialistes de l\u2019\u00e9quipe TI et de notre direction, est donc une \u00e9quipe pluridisciplinaire solide, qui s\u2019assure que tous les processus\u202fSOC\u202f2 Type 2 sont mis en \u0153uvre au quotidien.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c8e81f e-con-full e-flex e-con e-parent\" data-id=\"4c8e81f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c956b2c elementor-widget elementor-widget-testimonial\" data-id=\"4c956b2c\" data-element_type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\">\u00abC\u2019est important d\u2019avoir plusieurs talents qui ont une exp\u00e9rience et des connaissances diff\u00e9rentes, \u00e7a permet de challenger les id\u00e9es et de voir les probl\u00e8mes (et leurs solutions) sous un angle qui est plus proche de leur secteur d\u2019activit\u00e9s. En effet, une \u00e9quipe de s\u00e9curit\u00e9 ne peut pas \u00eatre efficace si elle ne connait pas la r\u00e9alit\u00e9 des op\u00e9rations.\u202f\u00bb<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Francis Venne<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Responsable de la s\u00e9curit\u00e9 informatique<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43eac877 e-flex e-con-boxed e-con e-parent\" data-id=\"43eac877\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4de7f1b elementor-widget elementor-widget-heading\" data-id=\"4de7f1b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">L\u2019impact de notre certification SOC\u202f2 Type 2 dans nos projets<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40f5ca9a elementor-widget elementor-widget-text-editor\" data-id=\"40f5ca9a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La s\u00e9curit\u00e9 des donn\u00e9es de nos clients est notre priorit\u00e9. \u00c0 cet effet, plusieurs contr\u00f4les sont effectu\u00e9s lors du d\u00e9veloppement mobile et Web. Pour tous nos projets, une analyse de risque approfondie est r\u00e9alis\u00e9e, un plan de r\u00e9cup\u00e9ration en cas de violation est \u00e9tabli et, enfin, une culture de la s\u00e9curit\u00e9 est favoris\u00e9e en utilisant la pratique agile DevSecOps (d\u00e9veloppement, s\u00e9curit\u00e9, op\u00e9rations).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e82a28c e-flex e-con-boxed e-con e-parent\" data-id=\"7e82a28c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3eeda36d elementor-widget elementor-widget-testimonial\" data-id=\"3eeda36d\" data-element_type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\">\u00ab\u202fComme le SOC-2 n\u2019est pas qu\u2019une certification de s\u00e9curit\u00e9, toutes les lignes d\u2019affaires doivent \u00eatre impliqu\u00e9es. Trois ans plus tard, on ressent un changement de la culture d\u2019entreprise. Les gens se posent maintenant la question \u00ab\u202fest-ce que c\u2019est SOC-2?\u202f\u00bb lorsqu\u2019ils op\u00e8rent des processus.\u202f\u00bb<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Francis Venne<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Responsable de la s\u00e9curit\u00e9 informatique\u200b<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3be1655 e-flex e-con-boxed e-con e-parent\" data-id=\"3be1655\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7458ab elementor-widget elementor-widget-heading\" data-id=\"c7458ab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La pratique agile DevSecOps au-del\u00e0 du SOC\u202f2 Type 2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca933c6 elementor-widget elementor-widget-text-editor\" data-id=\"ca933c6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nous conformer au standard SOC\u202f2 Type 2 nous a offert l\u2019occasion de renforcer et d\u2019optimiser nos pratiques en cybers\u00e9curit\u00e9 et selon la pratique DevSecOps.<\/p><p>En se fondant sur une m\u00e9thodologie agile et it\u00e9rative, nos experts sont proactifs dans l\u2019identification des risques et la mise en \u0153uvre de processus correctifs pour garantir un environnement s\u00e9curis\u00e9 \u00e0 nos clients.<\/p><p>Un contr\u00f4le est effectu\u00e9 \u00e0 chacune des \u00e9tapes du d\u00e9veloppement logiciel de nos projets\u202f:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-667b81ec e-flex e-con-boxed e-con e-parent\" data-id=\"667b81ec\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fd8a436 elementor-widget elementor-widget-image\" data-id=\"2fd8a436\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1482\" height=\"823\" src=\"https:\/\/nventive.com\/app\/uploads\/devsecops-controle-effectue-a-chacune-etapes-developpement-logiciel-de-projets.webp\" class=\"attachment-full size-full wp-image-11588\" alt=\"DevSecOps: un contr\u00f4le est effectu\u00e9 \u00e0 chacune des \u00e9tapes du d\u00e9veloppement logiciel de projets\" srcset=\"https:\/\/nventive.com\/app\/uploads\/devsecops-controle-effectue-a-chacune-etapes-developpement-logiciel-de-projets.webp 1482w, https:\/\/nventive.com\/app\/uploads\/devsecops-controle-effectue-a-chacune-etapes-developpement-logiciel-de-projets-300x167.webp 300w, https:\/\/nventive.com\/app\/uploads\/devsecops-controle-effectue-a-chacune-etapes-developpement-logiciel-de-projets-1024x569.webp 1024w, https:\/\/nventive.com\/app\/uploads\/devsecops-controle-effectue-a-chacune-etapes-developpement-logiciel-de-projets-768x426.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8141ae8 e-flex e-con-boxed e-con e-parent\" data-id=\"8141ae8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16f0a97 elementor-widget elementor-widget-text-editor\" data-id=\"16f0a97\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Planification\u202f:<\/strong>\u00a0Planifier les t\u00e2ches et \u00e9tablir des mod\u00e8les de menace.<\/li><li><strong>Code\u202f:<\/strong>\u00a0d\u00e9velopper au moyen de pratiques fiables et d\u2019un syst\u00e8me de r\u00e9vision du code.<\/li><li><strong>Cr\u00e9ation\u202f:<\/strong>\u00a0compiler le code source en binaire pour nous assurer qu\u2019il est fonctionnel et tester la qualit\u00e9 du code avant de le diffuser.<\/li><li><strong>Test\u202f:<\/strong>\u00a0effectuer des tests d\u2019assurance qualit\u00e9 (QA) et d\u2019int\u00e9gration.<\/li><li><strong>Sortie\u202f:<\/strong>\u00a0s\u00e9curiser l\u2019infrastructure de l\u2019environnement d\u2019ex\u00e9cution.<\/li><li><strong>D\u00e9ploiement\u202f:<\/strong>\u00a0r\u00e9soudre les probl\u00e8mes de s\u00e9curit\u00e9 qui surviennent uniquement dans le syst\u00e8me de production en direct apr\u00e8s la mise en production.<\/li><li><strong>Op\u00e9rations\u202f:<\/strong>\u00a0d\u00e9ployer des outils d\u2019infrastructure en tant que code pour mettre \u00e0 jour et s\u00e9curiser l\u2019ensemble de l\u2019infrastructure.<\/li><li><strong>Suivi\u202f:<\/strong>\u00a0surveiller en permanence les irr\u00e9gularit\u00e9s de s\u00e9curit\u00e9.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d00d93 e-flex e-con-boxed e-con e-parent\" data-id=\"8d00d93\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d0025b elementor-widget elementor-widget-heading\" data-id=\"7d0025b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00c9tablir une culture de la s\u00e9curit\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8fa8c7 elementor-widget elementor-widget-text-editor\" data-id=\"c8fa8c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les attaquants \u00e9voluent constamment et il est important que les \u00e9quipes de d\u00e9veloppement de logiciels \u00e9voluent elles aussi. C\u2019est la raison pour laquelle l\u2019\u00e9quipe Confidentialit\u00e9 et s\u00e9curit\u00e9 a \u00e9galement le mandat d\u2019am\u00e9liorer en permanence notre culture de la cybers\u00e9curit\u00e9. Pour y arriver, celle-ci offre du soutien et des formations, en plus de diffuser les informations et les nouvelles pratiques avec les \u00e9quipes afin d\u2019offrir un service s\u00e9curis\u00e9 \u00e0 nos clients. Ceci se mat\u00e9rialise par des formations mensuelles en cybers\u00e9curit\u00e9 et des d\u00eeners-causeries (Lunch &amp; Learn) sur des sujets pr\u00e9cis en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p><p><b>\u00ab\u202f<em>Les gens sont plus motiv\u00e9s \u00e0 \u00eatre prudents lorsqu\u2019ils comprennent l\u2019impact qu\u2019ils ont sur la cybers\u00e9curit\u00e9 de l\u2019entreprise. En plus, c\u2019est plus gratifiant d\u2019enseigner des choses \u00e0 des \u00e9quipes que de devoir expliquer apr\u00e8s coup ce qu\u2019elles auraient d\u00fb faire<\/em>\u202f\u00bb, conclut Francis Venne.<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a041d36 e-con-full e-flex e-con e-parent\" data-id=\"a041d36\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a797779 elementor-widget elementor-widget-template\" data-id=\"a797779\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"12184\" class=\"elementor elementor-12184\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d5957e e-flex e-con-boxed e-con e-parent\" data-id=\"40d5957e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b78efbf e-con-full e-flex e-con e-child\" data-id=\"1b78efbf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e14a4ef elementor-widget elementor-widget-heading\" data-id=\"7e14a4ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Articles en vedette<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2902db16 elementor-widget elementor-widget-nv-button\" data-id=\"2902db16\" data-element_type=\"widget\" data-widget_type=\"nv-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                <a\n            class=\"nv-button  nv-button--style--desktop--outline-icon nv-button--style--laptop--outline-icon nv-button--style--tablet--outline-icon nv-button--style--mobile--outline-icon nv-button--theme--desktop--dark nv-button--theme--laptop--dark nv-button--theme--tablet--dark nv-button--theme--mobile--dark\" href=\"https:\/\/nventive.com\/fr\/blogue\/\" aria-label=\"Voir tous les articles\"        >\n            <span class=\"nv-button__text\">Voir tous les articles<\/span>\n            <span class=\"nv-button__icon\">\n                <i aria-hidden=\"true\" class=\"myemoji-icon my-emoji-iconarrow_right_alt\"><\/i>            <\/span>\n        <\/a>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3d033e elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2e3d033e\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:5334,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Face \u00e0 l\u2019augmentation des menaces de cybers\u00e9curit\u00e9, il est imp\u00e9ratif pour une entreprise de d\u00e9veloppement d\u2019am\u00e9liorer de fa\u00e7on proactive les protocoles internes afin de garantir la confidentialit\u00e9 et la s\u00e9curit\u00e9 des projets clients.<\/p>\n","protected":false},"author":21,"featured_media":11586,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26],"tags":[53],"main_article":[],"class_list":["post-11590","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-solutions","tag-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement | nventive<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez pourquoi la certification SOC 2 Type 2 est essentielle pour garantir la s\u00e9curit\u00e9 dans une entreprise de d\u00e9veloppement de logiciels.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement | nventive\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez pourquoi la certification SOC 2 Type 2 est essentielle pour garantir la s\u00e9curit\u00e9 dans une entreprise de d\u00e9veloppement de logiciels.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/\" \/>\n<meta property=\"og:site_name\" content=\"nventive\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-17T21:25:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T21:41:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"505\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Francis Venne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francis Venne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/\"},\"author\":{\"name\":\"Francis Venne\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7\"},\"headline\":\"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement\",\"datePublished\":\"2025-02-17T21:25:21+00:00\",\"dateModified\":\"2025-02-17T21:41:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\/\/nventive.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Solutions\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/\",\"url\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/\",\"name\":\"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement | nventive\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp\",\"datePublished\":\"2025-02-17T21:25:21+00:00\",\"dateModified\":\"2025-02-17T21:41:30+00:00\",\"description\":\"D\u00e9couvrez pourquoi la certification SOC 2 Type 2 est essentielle pour garantir la s\u00e9curit\u00e9 dans une entreprise de d\u00e9veloppement de logiciels.\",\"breadcrumb\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage\",\"url\":\"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp\",\"contentUrl\":\"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp\",\"width\":842,\"height\":505,\"caption\":\"Le r\u00f4le du SOC 2 pour une entreprise de d\u00e9veloppement\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/nventive.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nventive.com\/fr\/#website\",\"url\":\"https:\/\/nventive.com\/fr\/\",\"name\":\"nventive\",\"description\":\"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al\",\"publisher\":{\"@id\":\"https:\/\/nventive.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nventive.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nventive.com\/fr\/#organization\",\"name\":\"nventive\",\"url\":\"https:\/\/nventive.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"nventive\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/nventive\/\",\"https:\/\/www.instagram.com\/hellonventive\/\",\"https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7\",\"name\":\"Francis Venne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g\",\"caption\":\"Francis Venne\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement | nventive","description":"D\u00e9couvrez pourquoi la certification SOC 2 Type 2 est essentielle pour garantir la s\u00e9curit\u00e9 dans une entreprise de d\u00e9veloppement de logiciels.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/","og_locale":"fr_FR","og_type":"article","og_title":"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement | nventive","og_description":"D\u00e9couvrez pourquoi la certification SOC 2 Type 2 est essentielle pour garantir la s\u00e9curit\u00e9 dans une entreprise de d\u00e9veloppement de logiciels.","og_url":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/","og_site_name":"nventive","article_published_time":"2025-02-17T21:25:21+00:00","article_modified_time":"2025-02-17T21:41:30+00:00","og_image":[{"width":842,"height":505,"url":"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp","type":"image\/webp"}],"author":"Francis Venne","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Francis Venne","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#article","isPartOf":{"@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/"},"author":{"name":"Francis Venne","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7"},"headline":"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement","datePublished":"2025-02-17T21:25:21+00:00","dateModified":"2025-02-17T21:41:30+00:00","mainEntityOfPage":{"@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/"},"wordCount":1129,"publisher":{"@id":"https:\/\/nventive.com\/fr\/#organization"},"image":{"@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Solutions"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/","url":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/","name":"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement | nventive","isPartOf":{"@id":"https:\/\/nventive.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage"},"image":{"@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp","datePublished":"2025-02-17T21:25:21+00:00","dateModified":"2025-02-17T21:41:30+00:00","description":"D\u00e9couvrez pourquoi la certification SOC 2 Type 2 est essentielle pour garantir la s\u00e9curit\u00e9 dans une entreprise de d\u00e9veloppement de logiciels.","breadcrumb":{"@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#primaryimage","url":"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp","contentUrl":"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp","width":842,"height":505,"caption":"Le r\u00f4le du SOC 2 pour une entreprise de d\u00e9veloppement"},{"@type":"BreadcrumbList","@id":"https:\/\/nventive.com\/fr\/articles\/le-role-du-soc-2-pour-une-entreprise-de-developpement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/nventive.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Le r\u00f4le du SOC\u202f2 Type 2 pour une entreprise de d\u00e9veloppement"}]},{"@type":"WebSite","@id":"https:\/\/nventive.com\/fr\/#website","url":"https:\/\/nventive.com\/fr\/","name":"nventive","description":"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al","publisher":{"@id":"https:\/\/nventive.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nventive.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nventive.com\/fr\/#organization","name":"nventive","url":"https:\/\/nventive.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"nventive"},"image":{"@id":"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/nventive\/","https:\/\/www.instagram.com\/hellonventive\/","https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w"]},{"@type":"Person","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7","name":"Francis Venne","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g","caption":"Francis Venne"}}]}},"jetpack_featured_media_url":"https:\/\/nventive.com\/app\/uploads\/role-du-SOC2\u202f-pour-une-entreprise-de-developpement.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts\/11590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/comments?post=11590"}],"version-history":[{"count":5,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts\/11590\/revisions"}],"predecessor-version":[{"id":14369,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts\/11590\/revisions\/14369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/media\/11586"}],"wp:attachment":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/media?parent=11590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/categories?post=11590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/tags?post=11590"},{"taxonomy":"main_article","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/main_article?post=11590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}