{"id":5492,"date":"2020-09-09T14:50:08","date_gmt":"2020-09-09T14:50:08","guid":{"rendered":"https:\/\/www.lutessa.com\/?p=5492"},"modified":"2020-09-09T14:50:10","modified_gmt":"2020-09-09T14:50:10","slug":"le-framework-de-cybersecurite-nist","status":"publish","type":"post","link":"https:\/\/www.lutessa.com\/?p=5492","title":{"rendered":"Le Framework de cybers\u00e9curit\u00e9 NIST"},"content":{"rendered":"\n<p>Le Framework de cybers\u00e9curit\u00e9 NIST a \u00e9t\u00e9 initi\u00e9 en f\u00e9vrier 2013 par le NIST \u00e0 la demande de la maison blanche afin d\u2019am\u00e9liorer la cybers\u00e9curit\u00e9 des organismes vitaux, le Framework fournit un langage commun pour la compr\u00e9hension, la gestion et l\u2019expression des risques cybers\u00e9curit\u00e9 que ce soit en interne ou en externe. C\u2019est un outil pour identifier et prioriser les actions permettant de r\u00e9duire les risques cybers\u00e9curit\u00e9 et fournit un alignement des politiques et des approches que ce soit m\u00e9tiers ou technologiques pour bien g\u00e9rer ces risques.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Composants du Framework\u00a0:<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"906\" height=\"534\" src=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/framework-NIST.png\" alt=\"\" class=\"wp-image-5493\" srcset=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/framework-NIST.png 906w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/framework-NIST-300x177.png 300w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/framework-NIST-768x453.png 768w\" sizes=\"(max-width: 906px) 100vw, 906px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Framework Core<\/h2>\n\n\n\n<p>Le Framework Core fournit un ensemble d&rsquo;activit\u00e9s pour atteindre des objectifs sp\u00e9cifiques en mati\u00e8re de cybers\u00e9curit\u00e9 et fait r\u00e9f\u00e9rence \u00e0 un ensemble de guides de bonnes pratiques (ISO\/IEC 27001 : 2013, NIST 800-53 Rev4\u2026) pour atteindre ses objectifs.<\/p>\n\n\n\n<p>Le Framework Core est d\u00e9compos\u00e9 en Fonctions, Cat\u00e9gories, Sous-cat\u00e9gories, r\u00e9f\u00e9rentiels.<\/p>\n\n\n\n<p><strong><u>Les Fonctions<\/u><\/strong> : Les cinq Fonctions du NIST permettent d\u2019organiser les activit\u00e9s basiques de cybers\u00e9curit\u00e9 au plus haut niveau et sont les suivantes : identifier, prot\u00e9ger, d\u00e9tecter, r\u00e9pondre et r\u00e9tablir. [Voir plus bas]<\/p>\n\n\n\n<p><strong><u>Les Cat\u00e9gories<\/u><\/strong> : Elles organisent les Fonctions en groupes d\u2019objectifs cybers\u00e9curit\u00e9 \u00e9troitement li\u00e9es \u00e0 des activit\u00e9s particuli\u00e8res.<\/p>\n\n\n\n<p><strong><u>Les Sous-cat\u00e9gories<\/u><\/strong> : Elles divisent davantage les Cat\u00e9gories en des objectifs plus sp\u00e9cifiques li\u00e9s \u00e0 des activit\u00e9s techniques et\/ou de gestion permettant de faciliter l\u2019atteinte des objectifs d\u00e9finis au niveau de chaque Cat\u00e9gorie.<\/p>\n\n\n\n<p><strong><u>Les r\u00e9f\u00e9rentiels<\/u><\/strong> : \u00a0Ils sont constitu\u00e9s de standards, de lignes directrices et de r\u00e9f\u00e9rentiels de bonnes pratiques qui permettent d\u2019atteindre les objectifs associ\u00e9s \u00e0 chaque Sous-cat\u00e9gorie.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Capture-de\u0301cran-2020-09-09-a\u0300-16.47.21-1024x686.png\" alt=\"\" class=\"wp-image-5494\" width=\"843\" height=\"564\" srcset=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Capture-de\u0301cran-2020-09-09-a\u0300-16.47.21-1024x686.png 1024w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Capture-de\u0301cran-2020-09-09-a\u0300-16.47.21-300x201.png 300w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Capture-de\u0301cran-2020-09-09-a\u0300-16.47.21-768x515.png 768w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Capture-de\u0301cran-2020-09-09-a\u0300-16.47.21-1536x1029.png 1536w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Capture-de\u0301cran-2020-09-09-a\u0300-16.47.21-360x240.png 360w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Capture-de\u0301cran-2020-09-09-a\u0300-16.47.21.png 1824w\" sizes=\"(max-width: 843px) 100vw, 843px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Framework Implementation Tiers<\/h2>\n\n\n\n<p>Cette composante permet de s\u2019assurer que la gestion des risques est d\u00e9ploy\u00e9e au sein de l\u2019organisme et qu\u2019elle est partag\u00e9e avec les partenaires externes de l\u2019organisme, avec une progression des niveaux allant du Partial (Tier 1), Risk Informed (Tier 2), Repeatable (Tier 3) vers le niveau le plus \u00e9lev\u00e9 Adaptive (Tier 4).<\/p>\n\n\n\n<p>Le niveau le plus \u00e9lev\u00e9 (Tier 4) indique que le process de gestion de risque est impl\u00e9ment\u00e9 au sein de l\u2019organisme avec une am\u00e9lioration continue et s\u2019adapte afin de mieux r\u00e9pondre \u00e0 un nouveau risque cyber s\u00e9curit\u00e9, l\u2019organisme partage sa vision de risque avec son \u00e9cosyst\u00e8me pour am\u00e9liorer la cyber d\u00e9fense avant qu&rsquo;un \u00e9v\u00e9nement de cybers\u00e9curit\u00e9 ne se produise.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"354\" height=\"328\" src=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Sans-titre-3.png\" alt=\"\" class=\"wp-image-5495\" srcset=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Sans-titre-3.png 354w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Sans-titre-3-300x278.png 300w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Framework Profile<\/h2>\n\n\n\n<p>Le profil cybers\u00e9curit\u00e9 est le produit majeur du Framework. Il permet aux organisations d&rsquo;\u00e9tablir une feuille de route pour r\u00e9duire les risques de cybers\u00e9curit\u00e9 tout en s\u2019alignant avec les objectifs de l\u2019organisation et en prenant en consid\u00e9ration les exigences l\u00e9gales et r\u00e9glementaires ainsi que les meilleures pratiques de l&rsquo;industrie. Il s\u2019agit de l\u2019alignement avec les pr\u00e9conisations du Framework en mati\u00e8re de Cybers\u00e9curit\u00e9 (activit\u00e9s, cat\u00e9gories et sous-cat\u00e9gories) \u00e0 travers la d\u00e9finition du Profil Actuel (\u201cas is\u201d state), l\u2019\u00e9tablissement d\u2019un GAP Analysis, des priorit\u00e9s et des actions \u00e0 entreprendre pour atteindre le Profil Cible (\u201cto be\u201d state), tenant compte notamment des exigences en mati\u00e8re de risques Cybers\u00e9curit\u00e9 identifi\u00e9s.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"248\" src=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Sans-titre-4.png\" alt=\"\" class=\"wp-image-5496\" srcset=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Sans-titre-4.png 636w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/Sans-titre-4-300x117.png 300w\" sizes=\"(max-width: 636px) 100vw, 636px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Framework Profile<\/h2>\n\n\n\n<p>Le profil cybers\u00e9curit\u00e9 est le produit majeur du Framework. Il permet aux organisations d&rsquo;\u00e9tablir une feuille de route pour r\u00e9duire les risques de cybers\u00e9curit\u00e9 tout en s\u2019alignant avec les objectifs de l\u2019organisation et en prenant en consid\u00e9ration les exigences l\u00e9gales et r\u00e9glementaires ainsi que les meilleures pratiques de l&rsquo;industrie. Il s\u2019agit de l\u2019alignement avec les pr\u00e9conisations du Framework en mati\u00e8re de Cybers\u00e9curit\u00e9 (activit\u00e9s, cat\u00e9gories et sous-cat\u00e9gories) \u00e0 travers la d\u00e9finition du Profil Actuel (\u201cas is\u201d state), l\u2019\u00e9tablissement d\u2019un GAP Analysis, des priorit\u00e9s et des actions \u00e0 entreprendre pour atteindre le Profil Cible (\u201cto be\u201d state), tenant compte notamment des exigences en mati\u00e8re de risques Cybers\u00e9curit\u00e9 identifi\u00e9s.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Coordination de l\u2019impl\u00e9mentation du Framework<\/h1>\n\n\n\n<p>La figure ci-dessous d\u00e9crit un flux commun d&rsquo;informations et de d\u00e9cisions au sein d&rsquo;une organisation \u00e0 plusieurs niveaux (niveau ex\u00e9cutif ; niveau m\u00e9tier\/processus ; niveau impl\u00e9mentation\/op\u00e9rationnel) afin de mieux impl\u00e9menter le Framework.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"404\" src=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/framework-se\u0301curite\u0301-nist.png\" alt=\"\" class=\"wp-image-5497\" srcset=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/framework-se\u0301curite\u0301-nist.png 634w, https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/framework-se\u0301curite\u0301-nist-300x191.png 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le Framework de cybers\u00e9curit\u00e9 NIST a \u00e9t\u00e9 initi\u00e9 en f\u00e9vrier 2013 par le NIST \u00e0 la demande de la maison blanche afin d\u2019am\u00e9liorer la cybers\u00e9curit\u00e9 des organismes vitaux, le Framework fournit un langage commun pour la compr\u00e9hension, la gestion et l\u2019expression des risques cybers\u00e9curit\u00e9 que ce soit en interne ou [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5498,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[],"class_list":["post-5492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le Framework de cybers\u00e9curit\u00e9 NIST - Lutessa<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lutessa.com\/?p=5492\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le Framework de cybers\u00e9curit\u00e9 NIST - Lutessa\" \/>\n<meta property=\"og:description\" content=\"Le Framework de cybers\u00e9curit\u00e9 NIST a \u00e9t\u00e9 initi\u00e9 en f\u00e9vrier 2013 par le NIST \u00e0 la demande de la maison blanche afin d\u2019am\u00e9liorer la cybers\u00e9curit\u00e9 des organismes vitaux, le Framework fournit un langage commun pour la compr\u00e9hension, la gestion et l\u2019expression des risques cybers\u00e9curit\u00e9 que ce soit en interne ou [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lutessa.com\/?p=5492\" \/>\n<meta property=\"og:site_name\" content=\"Lutessa\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-09T14:50:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-09T14:50:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"lutessa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"lutessa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lutessa.com\/?p=5492#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lutessa.com\/?p=5492\"},\"author\":{\"name\":\"lutessa\",\"@id\":\"https:\/\/www.lutessa.com\/#\/schema\/person\/5cfe8782a636face4a5a70374d7ba09d\"},\"headline\":\"Le Framework de cybers\u00e9curit\u00e9 NIST\",\"datePublished\":\"2020-09-09T14:50:08+00:00\",\"dateModified\":\"2020-09-09T14:50:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lutessa.com\/?p=5492\"},\"wordCount\":728,\"publisher\":{\"@id\":\"https:\/\/www.lutessa.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lutessa.com\/?p=5492#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg\",\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lutessa.com\/?p=5492\",\"url\":\"https:\/\/www.lutessa.com\/?p=5492\",\"name\":\"Le Framework de cybers\u00e9curit\u00e9 NIST - Lutessa\",\"isPartOf\":{\"@id\":\"https:\/\/www.lutessa.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lutessa.com\/?p=5492#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lutessa.com\/?p=5492#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg\",\"datePublished\":\"2020-09-09T14:50:08+00:00\",\"dateModified\":\"2020-09-09T14:50:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lutessa.com\/?p=5492#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lutessa.com\/?p=5492\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.lutessa.com\/?p=5492#primaryimage\",\"url\":\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg\",\"contentUrl\":\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lutessa.com\/?p=5492#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.lutessa.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le Framework de cybers\u00e9curit\u00e9 NIST\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lutessa.com\/#website\",\"url\":\"https:\/\/www.lutessa.com\/\",\"name\":\"Lutessa\",\"description\":\"Lutessa se veut \u00eatre une structure \u00ab b\u00e2tisseur de carri\u00e8re \u00bb qui vous accompagnera tout au long de votre d\u00e9veloppement personnel et professionnel. Car, Lutessa estime que votre potentiel s\u2019exprimera davantage, si vous r\u00e9ussissez \u00e0 sortir de votre zone de confort, pour \u00e9voluer progressivement vers votre zone d\u2019apprentissage et pourquoi pas jusqu\u2019\u00e0 votre zone magique.\",\"publisher\":{\"@id\":\"https:\/\/www.lutessa.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lutessa.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lutessa.com\/#organization\",\"name\":\"Lutessa\",\"url\":\"https:\/\/www.lutessa.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.lutessa.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/06\/Logo-charte-graphique-2024.png\",\"contentUrl\":\"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/06\/Logo-charte-graphique-2024.png\",\"width\":500,\"height\":500,\"caption\":\"Lutessa\"},\"image\":{\"@id\":\"https:\/\/www.lutessa.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/5004267\/admin\/dashboard\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lutessa.com\/#\/schema\/person\/5cfe8782a636face4a5a70374d7ba09d\",\"name\":\"lutessa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.lutessa.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/461ed76ce5bf14e8748e7acf53732a73fc3a710147dc130321281be210d8eab6?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/461ed76ce5bf14e8748e7acf53732a73fc3a710147dc130321281be210d8eab6?s=96&r=g\",\"caption\":\"lutessa\"},\"sameAs\":[\"https:\/\/www.lutessa.com\"],\"url\":\"https:\/\/www.lutessa.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le Framework de cybers\u00e9curit\u00e9 NIST - Lutessa","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lutessa.com\/?p=5492","og_locale":"fr_FR","og_type":"article","og_title":"Le Framework de cybers\u00e9curit\u00e9 NIST - Lutessa","og_description":"Le Framework de cybers\u00e9curit\u00e9 NIST a \u00e9t\u00e9 initi\u00e9 en f\u00e9vrier 2013 par le NIST \u00e0 la demande de la maison blanche afin d\u2019am\u00e9liorer la cybers\u00e9curit\u00e9 des organismes vitaux, le Framework fournit un langage commun pour la compr\u00e9hension, la gestion et l\u2019expression des risques cybers\u00e9curit\u00e9 que ce soit en interne ou [&hellip;]","og_url":"https:\/\/www.lutessa.com\/?p=5492","og_site_name":"Lutessa","article_published_time":"2020-09-09T14:50:08+00:00","article_modified_time":"2020-09-09T14:50:10+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg","type":"image\/jpeg"}],"author":"lutessa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"lutessa","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lutessa.com\/?p=5492#article","isPartOf":{"@id":"https:\/\/www.lutessa.com\/?p=5492"},"author":{"name":"lutessa","@id":"https:\/\/www.lutessa.com\/#\/schema\/person\/5cfe8782a636face4a5a70374d7ba09d"},"headline":"Le Framework de cybers\u00e9curit\u00e9 NIST","datePublished":"2020-09-09T14:50:08+00:00","dateModified":"2020-09-09T14:50:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lutessa.com\/?p=5492"},"wordCount":728,"publisher":{"@id":"https:\/\/www.lutessa.com\/#organization"},"image":{"@id":"https:\/\/www.lutessa.com\/?p=5492#primaryimage"},"thumbnailUrl":"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg","articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.lutessa.com\/?p=5492","url":"https:\/\/www.lutessa.com\/?p=5492","name":"Le Framework de cybers\u00e9curit\u00e9 NIST - Lutessa","isPartOf":{"@id":"https:\/\/www.lutessa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lutessa.com\/?p=5492#primaryimage"},"image":{"@id":"https:\/\/www.lutessa.com\/?p=5492#primaryimage"},"thumbnailUrl":"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg","datePublished":"2020-09-09T14:50:08+00:00","dateModified":"2020-09-09T14:50:10+00:00","breadcrumb":{"@id":"https:\/\/www.lutessa.com\/?p=5492#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lutessa.com\/?p=5492"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.lutessa.com\/?p=5492#primaryimage","url":"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg","contentUrl":"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/09\/cyberse\u0301curite\u0301.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.lutessa.com\/?p=5492#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.lutessa.com\/"},{"@type":"ListItem","position":2,"name":"Le Framework de cybers\u00e9curit\u00e9 NIST"}]},{"@type":"WebSite","@id":"https:\/\/www.lutessa.com\/#website","url":"https:\/\/www.lutessa.com\/","name":"Lutessa","description":"Lutessa se veut \u00eatre une structure \u00ab b\u00e2tisseur de carri\u00e8re \u00bb qui vous accompagnera tout au long de votre d\u00e9veloppement personnel et professionnel. Car, Lutessa estime que votre potentiel s\u2019exprimera davantage, si vous r\u00e9ussissez \u00e0 sortir de votre zone de confort, pour \u00e9voluer progressivement vers votre zone d\u2019apprentissage et pourquoi pas jusqu\u2019\u00e0 votre zone magique.","publisher":{"@id":"https:\/\/www.lutessa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lutessa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.lutessa.com\/#organization","name":"Lutessa","url":"https:\/\/www.lutessa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.lutessa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/06\/Logo-charte-graphique-2024.png","contentUrl":"https:\/\/www.lutessa.com\/wp-content\/uploads\/2020\/06\/Logo-charte-graphique-2024.png","width":500,"height":500,"caption":"Lutessa"},"image":{"@id":"https:\/\/www.lutessa.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/5004267\/admin\/dashboard\/"]},{"@type":"Person","@id":"https:\/\/www.lutessa.com\/#\/schema\/person\/5cfe8782a636face4a5a70374d7ba09d","name":"lutessa","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.lutessa.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/461ed76ce5bf14e8748e7acf53732a73fc3a710147dc130321281be210d8eab6?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/461ed76ce5bf14e8748e7acf53732a73fc3a710147dc130321281be210d8eab6?s=96&r=g","caption":"lutessa"},"sameAs":["https:\/\/www.lutessa.com"],"url":"https:\/\/www.lutessa.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/www.lutessa.com\/index.php?rest_route=\/wp\/v2\/posts\/5492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lutessa.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lutessa.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lutessa.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lutessa.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5492"}],"version-history":[{"count":1,"href":"https:\/\/www.lutessa.com\/index.php?rest_route=\/wp\/v2\/posts\/5492\/revisions"}],"predecessor-version":[{"id":5499,"href":"https:\/\/www.lutessa.com\/index.php?rest_route=\/wp\/v2\/posts\/5492\/revisions\/5499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lutessa.com\/index.php?rest_route=\/wp\/v2\/media\/5498"}],"wp:attachment":[{"href":"https:\/\/www.lutessa.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lutessa.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lutessa.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}