{"id":32443,"date":"2019-11-09T18:27:16","date_gmt":"2019-11-09T16:27:16","guid":{"rendered":"https:\/\/www.tessi.eu\/la-cybersecurite-cote-documents-et-echanges-electroniques\/"},"modified":"2020-02-17T19:05:35","modified_gmt":"2020-02-17T17:05:35","slug":"la-cybersecurite-cote-documents-et-echanges-electroniques","status":"publish","type":"post","link":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/","title":{"rendered":"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques"},"content":{"rendered":"<h2><em>Tribune d&rsquo;Arnauld Dubois, CEO de CERTIGNA<\/em><\/h2>\n<p>&nbsp;<\/p>\n<p>La cybers\u00e9curit\u00e9 est un sujet strat\u00e9gique pour l\u2019ensemble des entreprises et des administrations qui d\u00e9ploient une \u00e9nergie consid\u00e9rable pour mettre en \u0153uvre des dispositifs afin de se prot\u00e9ger efficacement. Dans ce contexte, la cybers\u00e9curit\u00e9 rev\u00eat diff\u00e9rents visages en fonction du sujet qu\u2019elle aborde. Dans notre cas, nous allons nous concentrer sur les documents et les \u00e9changes \u00e9lectroniques, en \u00e9voquant trois briques fondamentales qui sont\u00a0 le certificat num\u00e9rique personnel, l\u2019horodatage et le certificat SSL\/TLS.<\/p>\n<h3>Le Certificat num\u00e9rique RGS ou eIDAS pour s\u2019identifier sur le web de fa\u00e7on s\u00e9curis\u00e9e<\/h3>\n<p>Ce certificat personnel est une r\u00e9elle carte d\u2019identit\u00e9 num\u00e9rique universelle. Reconnu dans les logiciels de messagerie, ce certificat permet de certifier ses emails et de lui apporter une valeur juridique. Le destinataire peut en effet v\u00e9rifier l\u2019identit\u00e9 de l\u2019\u00e9metteur (en cliquant sur une enveloppe jointe au mail) ainsi que l\u2019int\u00e9grit\u00e9 du contenu du mail. Il sera \u00e9galement possible de garantir la confidentialit\u00e9 du contenu du mail en utilisant le certificat (de chiffrement) du destinataire du mail. Enfin, ce certificat permet de signer \u00e9lectroniquement des documents et des contrats en attribuant \u00e0 cette signature une valeur\u00a0 l\u00e9gale.<\/p>\n<h3>L\u2019horodatage qualifi\u00e9 pour garantir l\u2019int\u00e9grit\u00e9 et la preuve d\u2019ant\u00e9riorit\u00e9 d\u2019un document<\/h3>\n<p>Pour un document num\u00e9rique, l\u2019horodatage qualifi\u00e9 permet d\u2019apposer une date fiable sur un fichier. Il permet \u00e9galement de v\u00e9rifier l\u2019int\u00e9grit\u00e9 de ce fichier. Ainsi toute alt\u00e9ration volontaire ou involontaire de ce fichier sera d\u00e9tect\u00e9e. Cette notion de date certaine est importante dans le cadre de la signature de contrat, de la r\u00e9ception d\u2019un pli sous forme \u00e9lectronique, de la certification des transactions bancaires ou de l\u2019\u00e9mission de factures.<\/p>\n<h3>Le certificat SSL\/TLS norm\u00e9 pour authentifier un site et s\u00e9curiser les \u00e9changes avec ce site<\/h3>\n<p>Ce certificat permet \u00e0 un site internet de passer de HTTP \u00e0 HTTPS. Avec cette technologie, l\u2019internaute peut v\u00e9rifier l\u2019authenticit\u00e9 du site et rendre confidentielles les donn\u00e9es \u00e9chang\u00e9es avec le site, telles que des mots de passe ou des donn\u00e9es bancaires. En cliquant sur un lien situ\u00e9 dans la barre d\u2019adresse (en g\u00e9n\u00e9ral ce lien est un cadenas), l\u2019internaute acc\u00e8de \u00e0 des informations primordiales comme le nom du propri\u00e9taire du site, l\u2019Autorit\u00e9 de Certification et les dates de validit\u00e9 du certificat. Depuis quelques mois, les grands moteurs de recherche tels que Google privil\u00e9gient le r\u00e9f\u00e9rencement des sites qui sont en HTTPS garantissant ainsi aux internautes une meilleure protection contre le phishing ou les sites frauduleux.<\/p>\n<p>&nbsp;<\/p>\n<p>Les trois technologies expos\u00e9es ci-dessus sont \u00e0 mettre en \u0153uvre dans une d\u00e9marche de s\u00e9curisation de vos documents et de vos \u00e9changes \u00e9lectroniques. Encourag\u00e9s par les pouvoirs publics, voire rendus obligatoires dans certains cas, ces proc\u00e9d\u00e9s vont continuer de se d\u00e9velopper \u00e0 grande \u00e9chelle et ce, notamment gr\u00e2ce \u00e0 l\u2019\u00e9mergence de nombreux nouveaux usages. Une recommandation : faire l\u2019acquisition de ces solutions aupr\u00e8s de Tiers de Confiance agr\u00e9\u00e9s au niveau fran\u00e7ais ou europ\u00e9en.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #005faa;\"><strong><em>Arnauld Dubois, CEO de CERTIGNA<\/em><\/strong><br \/>\nCertigna est la marque commerciale de Dhimyotis &#8211; Groupe Tessi<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tribune d&rsquo;Arnauld Dubois, CEO de CERTIGNA &nbsp; La cybers\u00e9curit\u00e9 est un sujet strat\u00e9gique pour l\u2019ensemble des entreprises et des administrations qui d\u00e9ploient une \u00e9nergie consid\u00e9rable pour mettre en \u0153uvre des dispositifs afin de se prot\u00e9ger efficacement. Dans ce contexte, la cybers\u00e9curit\u00e9 rev\u00eat diff\u00e9rents visages en fonction du sujet qu\u2019elle aborde. Dans notre cas, nous allons [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":32444,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[47],"tags":[],"class_list":["post-32443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques - Tessi International<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques\" \/>\n<meta property=\"og:description\" content=\"Tribune d&rsquo;Arnauld Dubois, CEO de CERTIGNA &nbsp; La cybers\u00e9curit\u00e9 est un sujet strat\u00e9gique pour l\u2019ensemble des entreprises et des administrations qui d\u00e9ploient une \u00e9nergie consid\u00e9rable pour mettre en \u0153uvre des dispositifs afin de se prot\u00e9ger efficacement. Dans ce contexte, la cybers\u00e9curit\u00e9 rev\u00eat diff\u00e9rents visages en fonction du sujet qu\u2019elle aborde. Dans notre cas, nous allons [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\" \/>\n<meta property=\"og:site_name\" content=\"Tessi International\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-09T16:27:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-17T17:05:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tessi.on-web.fr\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cbonnet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"cbonnet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\"},\"author\":{\"name\":\"cbonnet\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791\"},\"headline\":\"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques\",\"datePublished\":\"2019-11-09T16:27:16+00:00\",\"dateModified\":\"2020-02-17T17:05:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\"},\"wordCount\":568,\"image\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\",\"url\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\",\"name\":\"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques - Tessi International\",\"isPartOf\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png\",\"datePublished\":\"2019-11-09T16:27:16+00:00\",\"dateModified\":\"2020-02-17T17:05:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage\",\"url\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png\",\"contentUrl\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png\",\"width\":1440,\"height\":565,\"caption\":\"bg cybersecurite\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tessi.eu\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#website\",\"url\":\"https:\/\/www.tessi.eu\/fr\/\",\"name\":\"Tessi International\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tessi.eu\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791\",\"name\":\"cbonnet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g\",\"caption\":\"cbonnet\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques - Tessi International","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/","og_locale":"fr_FR","og_type":"article","og_title":"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques","og_description":"Tribune d&rsquo;Arnauld Dubois, CEO de CERTIGNA &nbsp; La cybers\u00e9curit\u00e9 est un sujet strat\u00e9gique pour l\u2019ensemble des entreprises et des administrations qui d\u00e9ploient une \u00e9nergie consid\u00e9rable pour mettre en \u0153uvre des dispositifs afin de se prot\u00e9ger efficacement. Dans ce contexte, la cybers\u00e9curit\u00e9 rev\u00eat diff\u00e9rents visages en fonction du sujet qu\u2019elle aborde. Dans notre cas, nous allons [&hellip;]","og_url":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/","og_site_name":"Tessi International","article_published_time":"2019-11-09T16:27:16+00:00","article_modified_time":"2020-02-17T17:05:35+00:00","og_image":[{"width":1440,"height":565,"url":"https:\/\/tessi.on-web.fr\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png","type":"image\/png"}],"author":"cbonnet","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"cbonnet","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#article","isPartOf":{"@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/"},"author":{"name":"cbonnet","@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791"},"headline":"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques","datePublished":"2019-11-09T16:27:16+00:00","dateModified":"2020-02-17T17:05:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/"},"wordCount":568,"image":{"@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png","articleSection":["News"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/","url":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/","name":"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques - Tessi International","isPartOf":{"@id":"https:\/\/www.tessi.eu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage"},"image":{"@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png","datePublished":"2019-11-09T16:27:16+00:00","dateModified":"2020-02-17T17:05:35+00:00","author":{"@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791"},"breadcrumb":{"@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#primaryimage","url":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png","contentUrl":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png","width":1440,"height":565,"caption":"bg cybersecurite"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tessi.eu\/fr\/"},{"@type":"ListItem","position":2,"name":"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques"}]},{"@type":"WebSite","@id":"https:\/\/www.tessi.eu\/fr\/#website","url":"https:\/\/www.tessi.eu\/fr\/","name":"Tessi International","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tessi.eu\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791","name":"cbonnet","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g","caption":"cbonnet"}}]}},"_links":{"self":[{"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/posts\/32443\/"}],"collection":[{"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/posts\/"}],"about":[{"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/types\/post\/"}],"author":[{"embeddable":true,"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/users\/11\/"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/comments\/?post=32443"}],"version-history":[{"count":0,"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/posts\/32443\/revisions\/"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/media\/32444\/"}],"wp:attachment":[{"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/media\/?parent=32443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/categories\/?post=32443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tessi.eu\/fr\/wp-json\/wp\/v2\/tags\/?post=32443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}