{"id":28662,"date":"2017-09-21T00:09:25","date_gmt":"2017-09-20T22:09:25","guid":{"rendered":"http:\/\/e3mag.com\/?p=28662"},"modified":"2022-05-01T09:04:49","modified_gmt":"2022-05-01T07:04:49","slug":"risque-de-securite-lie-a-lexportation-de-donnees","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/sicherheitsrisiko-datenexport\/","title":{"rendered":"Exportation de donn\u00e9es : un risque pour la s\u00e9curit\u00e9"},"content":{"rendered":"<p>Par d\u00e9finition, les donn\u00e9es SAP sont soumises \u00e0 un standard de s\u00e9curit\u00e9 \u00e9lev\u00e9 - du moins tant qu'elles se trouvent au sein du syst\u00e8me SAP. Mais est-ce la r\u00e8gle ou plut\u00f4t l'exception ?<\/p>\n<p>Le fait est que chaque jour, des milliers de donn\u00e9es confidentielles sont export\u00e9es de SAP par des utilisateurs ignorants, des initi\u00e9s criminels ou l'\u00e9change de donn\u00e9es en arri\u00e8re-plan avec des syst\u00e8mes satellites externes.<\/p>\n<p>Cela augmente le risque d'abus de donn\u00e9es, rend plus difficile le respect des obligations de documentation du nouveau r\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es (RGPD) de l'UE et menace l'existence de toute entreprise.<\/p>\n<p>Selon la derni\u00e8re \u00e9tude IDC \"Mobile Security in Germany\", 52% des responsables informatiques estiment que le plus grand risque de s\u00e9curit\u00e9 r\u00e9side chez les utilisateurs eux-m\u00eames. La divulgation accidentelle d'informations par les employ\u00e9s ainsi que les attaques cybercriminelles internes jouent un r\u00f4le.<\/p>\n<p>Selon l'\u00e9tude \"The dark web's increasing influence on insider risk\" de RedOwl et IntSights, le nombre de contacts internes qui proposent d'acheter des donn\u00e9es sensibles d'entreprises sur le dark web a augment\u00e9 de pr\u00e8s de 50 % entre 2015 et 2016.<\/p>\n<p>La destination la plus fr\u00e9quente des exportations est l'univers applicatif de Microsoft Office. Et le risque est \u00e9norme : rien qu'en ins\u00e9rant des donn\u00e9es dans un fichier MS Powerpoint ou en transmettant une exportation MS Excel par e-mail, des donn\u00e9es SAP structur\u00e9es se transforment rapidement et sans que l'on s'en aper\u00e7oive en documents Microsoft Office non structur\u00e9s, qui peuvent \u00eatre distribu\u00e9s \"hors-la-loi\" \u00e0 travers le monde num\u00e9rique sans aucun contr\u00f4le.<\/p>\n<p>Et pourtant, nous ne sommes qu'au d\u00e9but de la transformation num\u00e9rique - avec l'interconnexion croissante et l'introduction g\u00e9n\u00e9ralis\u00e9e de la nouvelle plateforme d'application SAP S\/4 Hana, le nombre d'interfaces va lui aussi consid\u00e9rablement augmenter.<\/p>\n<p>Si l'on veut continuer \u00e0 prot\u00e9ger son informatique \u00e0 l'avenir, il faut r\u00e9fl\u00e9chir d\u00e8s aujourd'hui aux moyens de s\u00e9curiser et de contr\u00f4ler efficacement ces nouvelles failles de s\u00e9curit\u00e9.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Exportation de donn\u00e9es : un risque pour la s\u00e9curit\u00e9\" class=\"aligncenter size-full wp-image-28664\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710.jpg\" alt=\"SAP et Microsoft 1710\" width=\"900\" height=\"401\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710.jpg 900w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710-768x342.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710-100x45.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710-480x214.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710-640x285.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/SAP-und-Microsoft-1710-720x321.jpg 720w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<h3>S\u00e9curiser les donn\u00e9es dans toutes les applications<\/h3>\n<p>La solution de s\u00e9curit\u00e9 informatique Halocore de Secude est la seule solution au monde \u00e0 combiner les concepts de s\u00e9curit\u00e9 de SAP et de Microsoft et permet de prot\u00e9ger les donn\u00e9es sensibles \u00e0 travers les processus et les applications.<\/p>\n<p>Int\u00e9gr\u00e9e dans SAP, la solution audite toutes les exportations de donn\u00e9es SAP qui quittent le syst\u00e8me via des fonctions standard ou par des op\u00e9rations de copier-coller. Gr\u00e2ce \u00e0 une classification contextuelle intelligente, le besoin de protection des donn\u00e9es est automatiquement d\u00e9termin\u00e9 et appliqu\u00e9 aux fichiers d'exportation.<\/p>\n<p>Avant m\u00eame que les fichiers n'arrivent sur un appareil, ils sont crypt\u00e9s et prot\u00e9g\u00e9s \u00e0 l'aide de Microsoft Azure Information Protection (AIP). Seules les personnes autoris\u00e9es ont acc\u00e8s aux documents concern\u00e9s.<\/p>\n<p>La solution emp\u00eache \u00e9galement le t\u00e9l\u00e9chargement de fichiers qui ne doivent pas quitter le syst\u00e8me SAP et permet une surveillance automatis\u00e9e de l'\u00e9change de donn\u00e9es en arri\u00e8re-plan, par exemple par RFC, IDoc ou service web, entre les applications SAP et Microsoft.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/partners\/secude-gmbh\/\"><img loading=\"lazy\" decoding=\"async\" title=\"Exportation de donn\u00e9es : un risque pour la s\u00e9curit\u00e9\" class=\"aligncenter wp-image-11377 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg\" alt=\"https:\/\/e3mag.com\/partners\/secude-gmbh\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SECUDE-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>La plupart des processus d'entreprise ne se limitent pas \u00e0 SAP. De nombreuses donn\u00e9es sensibles sont export\u00e9es par les utilisateurs dans des applications MS-Office - un risque qui est nettement sous-estim\u00e9. <\/p>","protected":false},"author":355,"featured_media":28663,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[17712,17703],"tags":[8477,7622,600,11281,65,5001,369,1790,108,236,30476],"coauthors":[23277],"class_list":["post-28662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coverstory-1710","category-mag-1710","tag-cyberkriminelle","tag-datenschutzgrundverordnung","tag-digitale-transformation","tag-dsgvo","tag-hana","tag-idc-studie","tag-it","tag-it-security","tag-rfc","tag-sap","tag-sap-s-4","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",400,181,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-768x347.jpg",768,347,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-480x217.jpg",480,217,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-640x289.jpg",640,289,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-720x325.jpg",720,325,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-960x434.jpg",960,434,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",1000,452,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",600,271,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626.jpg",600,271,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_703865626-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die meisten Unternehmensprozesse sind nicht auf SAP beschr\u00e4nkt. Viele sensible Daten werden durch die User in MS-Office-Anwen\u00addungen exportiert \u2013 ein Risiko, das deutlich untersch\u00e4tzt wird. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/coverstorys\/coverstory-1710\/\" rel=\"category tag\">Coverstory 17-10<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-1710\/\" rel=\"category tag\">MAG 17-10<\/a>","author_info_v2":{"name":"Holger H\u00fcgel, Secude","url":"https:\/\/e3mag.com\/fr\/author\/holger-huegel\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/28662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/355"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=28662"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/28662\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/28663"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=28662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=28662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=28662"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=28662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}