{"id":8555985,"date":"2025-07-15T09:42:32","date_gmt":"2025-07-15T09:42:32","guid":{"rendered":"https:\/\/www.oodrive.com\/?p=8555985"},"modified":"2025-07-15T11:42:00","modified_gmt":"2025-07-15T11:42:00","slug":"etude-gestion-donnees-sensibles","status":"publish","type":"post","link":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/","title":{"rendered":"Etude Oodrive et Le Monde informatique\u00a0: \u00ab\u00a0Gestion des donn\u00e9es sensibles\u00a0: comment les DSI et RSSI rel\u00e8vent le d\u00e9fi\u00a0?\u00a0\u00bb\u00a0"},"content":{"rendered":"\n<p>Les pr\u00e9occupations en mati\u00e8re de gestion des donn\u00e9es sensibles et de cybers\u00e9curit\u00e9 mettent les organisations \u2013 priv\u00e9es comme publiques \u2013 sous tension. L\u2019IA permet une sophistication croissante des menaces. En parall\u00e8le, la pression r\u00e9glementaire relative \u00e0 la protection des donn\u00e9es sensibles s\u2019accro\u00eet (conformit\u00e9 RGPD, <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/reglementation\/conformite\/directive-nis2-tout-comprendre\/\">NIS 2<\/a>, notamment), tout comme les exigences de souverainet\u00e9 en mati\u00e8re d\u2019h\u00e9bergement cloud.<\/p>\n\n\n\n<p>DSI et RSSI doivent composer avec l\u2019ensemble de ces contraintes afin d\u2019assurer efficacement la gestion de leurs donn\u00e9es sensibles. Quelles sont leurs pratiques en la mati\u00e8re&nbsp;? Quelles sont les principales mesures de s\u00e9curit\u00e9 mises en place&nbsp;? Sur quels crit\u00e8res consid\u00e8rent-ils des donn\u00e9es comme \u00ab&nbsp;sensibles&nbsp;\u00bb&nbsp;? \u00c0 quel point la souverainet\u00e9 des donn\u00e9es est-elle importante pour eux&nbsp;?<\/p>\n\n\n\n<p>Afin de r\u00e9pondre \u00e0 l\u2019ensemble de ces questions, Oodrive et Le Monde Informatique ont men\u00e9 une enqu\u00eate aupr\u00e8s de DSI et RSSI fin 2024. Les r\u00e9sultats de cette \u00e9tude apportent un \u00e9clairage in\u00e9dit sur les pratiques des DSI et RSSI en mati\u00e8re de gestion des donn\u00e9es sensibles (mesures de s\u00e9curit\u00e9, exigences en mati\u00e8re d\u2019h\u00e9bergement, conformit\u00e9, etc.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u00e9curiser les donn\u00e9es et les usages des collaborateurs&nbsp;: une priorit\u00e9 op\u00e9rationnelle<\/h2>\n\n\n\n<p>Les entreprises doivent d\u00e9sormais renforcer leurs dispositifs en mati\u00e8re de cybers\u00e9curit\u00e9 afin de prot\u00e9ger efficacement leurs donn\u00e9es sensibles.<\/p>\n\n\n\n<p>L\u2019\u00e9tude men\u00e9e par Oodrive et Le Monde Informatique r\u00e9v\u00e8le que l\u2019authentification multifacteur (MFA) est le m\u00e9canisme de s\u00e9curit\u00e9 le plus r\u00e9pandu dans les entreprises pour prot\u00e9ger les donn\u00e9es sensibles dans le cloud. La MFA est cit\u00e9e par pr\u00e8s des trois quarts des r\u00e9pondants (72&nbsp;%). Viennent ensuite le chiffrement des donn\u00e9es, une mesure adopt\u00e9e par 54&nbsp;% des r\u00e9pondants, puis la sauvegarde de donn\u00e9es ou PCA (37&nbsp;%).<\/p>\n\n\n\n<a href=\"https:\/\/www.oodrive.com\/fr\/centre-ressources\/etude-gestion-et-securite-donnees-sensibles-ou-en-sont-dsi-rssi-en-2025\/\" class=\"product__section ebook\" id=\"snc-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">Gestion et s\u00e9curit\u00e9 des donn\u00e9es sensibles<\/p><p class=\"product__section-description\">D\u00e9couvrez les pratiques et d\u00e9fis des DS\/RSSI en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es sensibles.<\/p><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"https:\/\/www.oodrive.com\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/ebook-snc.svg\" class=\"product__section-logo\" alt=\"oodrive snc\"\/><div class=\"cta\"><span>En savoir plus<\/span><\/div><\/div><\/a>\n\n\n\n<p>La pr\u00e9occupation majeure des responsables IT lors des \u00e9changes de donn\u00e9es sensibles (en interne ou en externe) n\u2019est pas tant le piratage, cit\u00e9 par 9&nbsp;% d\u2019entre eux, que les risques d\u2019atteintes aux donn\u00e9es, sous diff\u00e9rentes formes&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>35\u00a0% des dirigeants IT redoutent les <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/fuite-de-donnees\/\">fuites de donn\u00e9es<\/a>,<\/li>\n\n\n\n<li>8\u00a0% les vols de donn\u00e9es,<\/li>\n\n\n\n<li>7,5\u00a0% les pertes de donn\u00e9es.<\/li>\n<\/ul>\n\n\n\n<p>Ces chiffres r\u00e9v\u00e8lent bien une prise de conscience aigu\u00eb vis-\u00e0-vis de la valeur des donn\u00e9es, qui constituent d\u00e9sormais un patrimoine strat\u00e9gique \u00e0 prot\u00e9ger.<\/p>\n\n\n\n<p>Les m\u00e9canismes de s\u00e9curit\u00e9 ne suffisent cependant pas, \u00e0 eux tout seuls, \u00e0 prot\u00e9ger efficacement les donn\u00e9es sensibles. Il est \u00e9galement n\u00e9cessaire de renforcer le \u00ab\u00a0maillon humain\u00a0\u00bb au sein de la cha\u00eene de s\u00e9curit\u00e9. Les m\u00e9thodes de sensibilisation des \u00e9quipes les plus efficaces pour la <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/securite-donnees-definition-enjeux\/\">s\u00e9curit\u00e9 des donn\u00e9es <\/a>sensibles sont les campagnes de sensibilisation, cit\u00e9es par pr\u00e8s de 60% des r\u00e9pondants, et les formations r\u00e9guli\u00e8res (52\u00a0%).<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"644\" height=\"804\" src=\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/etude_securite_donnees.png\" alt=\"\" class=\"wp-image-8555997\" srcset=\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/etude_securite_donnees.png 644w, https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/etude_securite_donnees-240x300.png 240w, https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/etude_securite_donnees-280x349.png 280w, https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/etude_securite_donnees-333x416.png 333w, https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/etude_securite_donnees-410x512.png 410w, https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/etude_securite_donnees-316x394.png 316w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/figure>\n\n\n\n<p>L\u2019\u00e9tude met en lumi\u00e8re l\u2019enjeu pour les DSI et RSSI de parvenir \u00e0 d\u00e9velopper une approche int\u00e9gr\u00e9e. Celle-ci doit combiner \u00e0 la fois des outils et m\u00e9canismes de s\u00e9curit\u00e9 robustes, et le d\u00e9veloppement d\u2019une culture de s\u00e9curit\u00e9 aupr\u00e8s des \u00e9quipes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">La classification, une n\u00e9cessit\u00e9 pour la protection des donn\u00e9es et la conformit\u00e9<\/h2>\n\n\n\n<p>Les donn\u00e9es personnelles sont consid\u00e9r\u00e9es par les DSI et RSSI comme \u00e9tant les donn\u00e9es les plus sensibles, puisqu\u2019elles sont cit\u00e9es par 50&nbsp;% des r\u00e9pondants. Un chiffre qui refl\u00e8te bien leurs pr\u00e9occupations en mati\u00e8re de conformit\u00e9 RGPD. Viennent ensuite les informations strat\u00e9giques (41&nbsp;%), celles relatives \u00e0 la propri\u00e9t\u00e9 intellectuelle (40&nbsp;%) et \u00e0 la s\u00e9curit\u00e9 informatique (36&nbsp;%).<\/p>\n\n\n\n<p>Les m\u00e9thodes de <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-des-donnees\/classification-donnees-industrie-defense\/\">classification des donn\u00e9es sensibles<\/a> des DSI et RSSI sont variables, mais convergent vers une logique de gestion des risques. La majorit\u00e9 (52%) des dirigeants IT privil\u00e9gie une classification en fonction de l\u2019impact potentiel du risque encouru, ce qui t\u00e9moigne d\u2019une approche pragmatique. Plus d\u2019un tiers des r\u00e9pondants (35\u00a0%) citent le niveau de confidentialit\u00e9 comme crit\u00e8re de classification, et 31\u00a0% le type de donn\u00e9es.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les pr\u00e9occupations en mati\u00e8re de gestion des donn\u00e9es sensibles et de cybers\u00e9curit\u00e9 mettent les organisations \u2013 priv\u00e9es comme publiques \u2013 sous tension. L\u2019IA permet une sophistication croissante des menaces. En parall\u00e8le, la pression r\u00e9glementaire relative \u00e0 la protection des donn\u00e9es sensibles s\u2019accro\u00eet (conformit\u00e9 RGPD, NIS 2, notamment), tout comme les exigences de souverainet\u00e9 en mati\u00e8re [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":8556019,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1229],"class_list":["post-8555985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-donnees"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gestion des donn\u00e9es sensibles \u2013 Oodrive x Le Monde Informatique<\/title>\n<meta name=\"description\" content=\"Les DSI et RSSI ont des exigences de plus en plus \u00e9lev\u00e9es pour la gestion des donn\u00e9es sensibles. Zoom sur la qualification SecNumCloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gestion des donn\u00e9es sensibles \u2013 Oodrive x Le Monde Informatique\" \/>\n<meta property=\"og:description\" content=\"Les DSI et RSSI ont des exigences de plus en plus \u00e9lev\u00e9es pour la gestion des donn\u00e9es sensibles. Zoom sur la qualification SecNumCloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-15T09:42:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T11:42:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1372\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lea Vaquero\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lea Vaquero\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/\"},\"author\":{\"name\":\"Lea Vaquero\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/61f306282ba4aa2dc000f2d1988af315\"},\"headline\":\"Etude Oodrive et Le Monde informatique\u00a0: \u00ab\u00a0Gestion des donn\u00e9es sensibles\u00a0: comment les DSI et RSSI rel\u00e8vent le d\u00e9fi\u00a0?\u00a0\u00bb\u00a0\",\"datePublished\":\"2025-07-15T09:42:32+00:00\",\"dateModified\":\"2025-07-15T11:42:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/\"},\"wordCount\":746,\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg\",\"articleSection\":[\"S\u00e9curit\u00e9 des donn\u00e9es\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/\",\"url\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/\",\"name\":\"Gestion des donn\u00e9es sensibles \u2013 Oodrive x Le Monde Informatique\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg\",\"datePublished\":\"2025-07-15T09:42:32+00:00\",\"dateModified\":\"2025-07-15T11:42:00+00:00\",\"description\":\"Les DSI et RSSI ont des exigences de plus en plus \u00e9lev\u00e9es pour la gestion des donn\u00e9es sensibles. Zoom sur la qualification SecNumCloud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg\",\"width\":1372,\"height\":512,\"caption\":\"Gestion des donn\u00e9es sensibles pour les DSI RRSI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.oodrive.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/securite-donnees\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Etude Oodrive et Le Monde informatique\u00a0: \u00ab\u00a0Gestion des donn\u00e9es sensibles\u00a0: comment les DSI et RSSI rel\u00e8vent le d\u00e9fi\u00a0?\u00a0\u00bb\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oodrive.com\/#website\",\"url\":\"https:\/\/www.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.\",\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/www.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/61f306282ba4aa2dc000f2d1988af315\",\"name\":\"Lea Vaquero\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"caption\":\"Lea Vaquero\"},\"description\":\"Responsable Marketing Op\u00e9rationnel\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestion des donn\u00e9es sensibles \u2013 Oodrive x Le Monde Informatique","description":"Les DSI et RSSI ont des exigences de plus en plus \u00e9lev\u00e9es pour la gestion des donn\u00e9es sensibles. Zoom sur la qualification SecNumCloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Gestion des donn\u00e9es sensibles \u2013 Oodrive x Le Monde Informatique","og_description":"Les DSI et RSSI ont des exigences de plus en plus \u00e9lev\u00e9es pour la gestion des donn\u00e9es sensibles. Zoom sur la qualification SecNumCloud.","og_url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/","og_site_name":"Oodrive","article_published_time":"2025-07-15T09:42:32+00:00","article_modified_time":"2025-07-15T11:42:00+00:00","og_image":[{"width":1372,"height":512,"url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg","type":"image\/jpeg"}],"author":"Lea Vaquero","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lea Vaquero","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#article","isPartOf":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/"},"author":{"name":"Lea Vaquero","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/61f306282ba4aa2dc000f2d1988af315"},"headline":"Etude Oodrive et Le Monde informatique\u00a0: \u00ab\u00a0Gestion des donn\u00e9es sensibles\u00a0: comment les DSI et RSSI rel\u00e8vent le d\u00e9fi\u00a0?\u00a0\u00bb\u00a0","datePublished":"2025-07-15T09:42:32+00:00","dateModified":"2025-07-15T11:42:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/"},"wordCount":746,"publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg","articleSection":["S\u00e9curit\u00e9 des donn\u00e9es"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/","url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/","name":"Gestion des donn\u00e9es sensibles \u2013 Oodrive x Le Monde Informatique","isPartOf":{"@id":"https:\/\/www.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg","datePublished":"2025-07-15T09:42:32+00:00","dateModified":"2025-07-15T11:42:00+00:00","description":"Les DSI et RSSI ont des exigences de plus en plus \u00e9lev\u00e9es pour la gestion des donn\u00e9es sensibles. Zoom sur la qualification SecNumCloud.","breadcrumb":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#primaryimage","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/07\/gestion_donnees_sensibles.jpg","width":1372,"height":512,"caption":"Gestion des donn\u00e9es sensibles pour les DSI RRSI"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/etude-gestion-donnees-sensibles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.oodrive.com\/es\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 des donn\u00e9es","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/securite-donnees\/"},{"@type":"ListItem","position":4,"name":"Etude Oodrive et Le Monde informatique\u00a0: \u00ab\u00a0Gestion des donn\u00e9es sensibles\u00a0: comment les DSI et RSSI rel\u00e8vent le d\u00e9fi\u00a0?\u00a0\u00bb\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.oodrive.com\/#website","url":"https:\/\/www.oodrive.com\/","name":"Oodrive","description":"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.","publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/www.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/61f306282ba4aa2dc000f2d1988af315","name":"Lea Vaquero","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","caption":"Lea Vaquero"},"description":"Responsable Marketing Op\u00e9rationnel"}]}},"_links":{"self":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/8555985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=8555985"}],"version-history":[{"count":0,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/8555985\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/8556019"}],"wp:attachment":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=8555985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=8555985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}