{"id":71374,"date":"2025-01-20T19:01:34","date_gmt":"2025-01-20T17:01:34","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=71374"},"modified":"2026-05-04T14:57:16","modified_gmt":"2026-05-04T12:57:16","slug":"top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/","title":{"rendered":"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i (et comment les \u00e9viter)"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h3 class=\"\" style=\"text-align: center; margin-top: 10px; margin-bottom: 20px; font-size: 15px; --fontsize: 15; line-height: 1.3; --minfontsize: 15;\" data-fontsize=\"15\" data-lineheight=\"19.5px\">par Michel Mouchon<\/h3>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-margin-top:20px;--awb-margin-bottom:0px;\"><p>M\u00eame si IBM i est r\u00e9put\u00e9 pour sa fiabilit\u00e9 et sa robustesse, il reste vuln\u00e9rable \u00e0 certaines failles de s\u00e9curit\u00e9. Avec l\u2019\u00e9volution des cybermenaces, certaines vuln\u00e9rabilit\u00e9s passent souvent inaper\u00e7ues, mettant ainsi en danger les syst\u00e8mes et les donn\u00e9es sensibles.<\/p>\n<p>Voici les <strong>5 principales vuln\u00e9rabilit\u00e9s<\/strong>, leurs impacts, et les moyens de s\u2019en pr\u00e9munir.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" id=\"blog-content\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><script type=\"text\/javascript\">\n(function ($) {\n  function setInnerLinks(containerID, elementClass) {\n    var $container = $('#' + containerID);\n    if (!$container.length) return;\n\n    \/\/ Emplacement du sommaire (Avada) avec repli sur le container\n    var $host = $(\"#blog-content>.fusion-builder-row>.fusion-layout-column:first-child .fusion-column-wrapper\");\n    if (!$host.length) $host = $container;\n\n    \/\/ Cr\u00e9e le bloc sommaire une seule fois\n    var $summary = $host.find('.summary');\n    if (!$summary.length) {\n      $summary = $(\"<div class='summary'><\/div>\");\n      var host = window.location.hostname.toLowerCase();\nvar tocTitle =\n  host.endsWith('.fr') ? 'Sommaire' :\n  host.endsWith('.com') ? 'Summary' :\n  ((document.documentElement.lang || '').toLowerCase().startsWith('fr') ? 'Sommaire' : 'Summary');\n\n\/\/ Insertion du titre (en texte, pas en HTML)\n$summary.append($('<h2\/>', { text: tocTitle, class: 'exclude-summary', style: 'padding-left: 25px;' }));\n      $summary.append(\"<ol id='\" + containerID + \"_links'><\/ol>\");\n      $host.prepend($summary);\n    }\n    var $list = $('#' + containerID + '_links').empty();\n\n    \/\/ Helpers: enlever la num\u00e9rotation, slug, unicit\u00e9\n    function stripLeadingEnumeration(str) {\n      var s = (str || '').trim();\n\n      \/\/ Cas 1 : \"1) Titre\", \"1. Titre\", \"1 - Titre\", \"1 \u2014 Titre\", \"1: Titre\"\n      s = s.replace(\/^\\d+\\s*[).:\\-\u2013\u2014]\\s+\/, '');\n\n      \/\/ Cas 2 : \"1.2 Titre\", \"2.3.4 Titre\" (au moins un point dans le groupe)\n      s = s.replace(\/^\\d+(?:\\.\\d+)+\\s+\/, '');\n\n      \/\/ NB : on ne retire PAS un simple nombre suivi d\u2019un espace (ex: \"2025 Roadmap\")\n      return s.trim();\n    }\n    var slugCounts = {};\n    function toSlug(str) {\n      return (str || '')\n        .toLowerCase()\n        .normalize('NFD').replace(\/[\\u0300-\\u036f]\/g, '')\n        .replace(\/[^\\w\\s-]\/g, '')\n        .trim()\n        .replace(\/\\s+\/g, '-')\n        .replace(\/-+\/g, '-');\n    }\n    function uniqueId(base) {\n      var n = (slugCounts[base] || 0) + 1;\n      slugCounts[base] = n;\n      return n === 1 ? base : base + '-' + n;\n    }\n\n    \/\/ S\u00e9lectionne les titres\n    var selector = elementClass || 'h2:not(.exclude-summary)';\n    var $headings = $container.find(selector);\n\n    $headings.each(function () {\n      var $h = $(this);\n      if ($h.hasClass('exclude-summary')) return;\n\n      \/\/ Texte pour l'affichage dans l'OL : sans la num\u00e9rotation initiale\n      var rawText = $.trim($h.text());\n      var displayText = stripLeadingEnumeration(rawText);\n\n      \/\/ ID bas\u00e9 sur le texte nettoy\u00e9 pour un slug plus propre\n      if (!$h.attr('id')) {\n        var base = toSlug(displayText || 'section');\n        var id = uniqueId(base);\n        while (document.getElementById(id)) { id = uniqueId(base); }\n        $h.attr('id', id);\n      }\n      var id = $h.attr('id');\n\n      \/\/ Focusable quand on suit l\u2019ancre\n      if (!$h.attr('tabindex')) $h.attr('tabindex', '-1');\n\n      \/\/ Ajoute l\u2019item de la liste ordonn\u00e9e (le num\u00e9ro est fourni par <ol>)\n      $list.append(\"<li><a href='#\" + id + \"'>\" + displayText + \"<\/a><\/li>\");\n    });\n\n    \/\/ Scroll fluide avec offset si header fixe\n    var $header = $('.fusion-header, .fusion-header-wrapper, header, .site-header').first();\n    var isFixed = \/fixed|sticky\/.test(($header.css('position') || ''));\n    var offset = isFixed ? ($header.outerHeight() || 0) : 0;\n\n    \/\/ D\u00e9l\u00e9gation: un seul handler pour tous les liens\n    $list.off('click.toc').on('click.toc', 'a', function (e) {\n      e.preventDefault();\n      var targetId = $(this).attr('href'); \/\/ ex: #vs-code-settings-sync\n      var $t = $(targetId);\n      if (!$t.length) return;\n\n      var y = Math.max($t.offset().top - offset, 0);\n      $('html, body').animate({ scrollTop: y }, 400);\n\n      \/\/ Met \u00e0 jour l\u2019URL sans jump\n      if (history.replaceState) history.replaceState(null, '', targetId);\n    });\n  }\n\n  \/\/ Document ready\n  $(function () {\n    setInnerLinks('blog-content', 'h2:not(.exclude-summary)');\n  });\n\n  \/\/ Optionnel: exporter la fonction\n  window.setInnerLinks = setInnerLinks;\n})(jQuery);\n<\/script>\n\n<div class=\"fusion-text fusion-text-3\"><h2 data-fontsize=\"30\" data-lineheight=\"36px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontSize: 30; line-height: 1.2;\">1. Injection SQL : une menace persistante<\/h2>\n<p>L\u2019<b>injection SQL<\/b> figure parmi les failles les plus r\u00e9pandues. Elle permet aux cyberattaquants d\u2019ex\u00e9cuter des requ\u00eates SQL malveillantes pour manipuler ou voler des donn\u00e9es.<\/p>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontSize: 20; line-height: 1.3; --minFontSize: 20;\">Cons\u00e9quences :<\/h3>\n<ul>\n<li>Acc\u00e8s non autoris\u00e9 aux bases de donn\u00e9es<\/li>\n<li>Vol d\u2019informations sensibles<\/li>\n<\/ul>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontSize: 20; line-height: 1.3; --minFontSize: 20;\">Comment l\u2019\u00e9viter ?<\/h3>\n<ul>\n<li>Utilisez des requ\u00eates pr\u00e9par\u00e9es ou des ORM (Object-Relational Mappers) pour s\u00e9curiser vos bases.<\/li>\n<li>D\u00e9tectez les vuln\u00e9rabilit\u00e9s gr\u00e2ce \u00e0 des outils comme <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a>.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Astuce : <\/b>Formez vos \u00e9quipes de d\u00e9veloppement aux bonnes pratiques de gestion des entr\u00e9es utilisateur pour minimiser les risques.<\/i><\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h2>2. Failles dans les API expos\u00e9es <\/h2>\n<p>Avec l\u2019utilisation accrue des <b>API<\/b>, leur s\u00e9curisation est souvent n\u00e9glig\u00e9e. Des API mal configur\u00e9es ou insuffisamment prot\u00e9g\u00e9es constituent une cible de choix pour les attaques. <\/p>\n<h3>Cons\u00e9quences :<\/h3>\n<ul>\n<li>Fuite de donn\u00e9es client<\/li>\n<li>Interruption des services<\/li>\n<\/ul>\n<h3>Comment l\u2019\u00e9viter ?<\/h3>\n<ul>\n<li>Mettez en place des m\u00e9canismes d\u2019authentification robustes comme OAuth. <\/li>\n<li>Effectuez des scans r\u00e9guliers des API \u00e0 l\u2019aide d\u2019outils automatis\u00e9s comme <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a>. <\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Bon \u00e0 savoir : <\/b>Une documentation API claire et r\u00e9guli\u00e8rement mise \u00e0 jour est une premi\u00e8re \u00e9tape vers une meilleure s\u00e9curit\u00e9.<\/i><\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><h2>3. Code non s\u00e9curis\u00e9 : une faille courante<\/h2>\n<p>Le <b>code source<\/b>, souvent exempt d\u2019examens rigoureux, peut accumuler des erreurs exploitables par des attaquants.<\/p>\n<h3>Cons\u00e9quences :<\/h3>\n<ul>\n<li>Ouverture de portes d\u00e9rob\u00e9es<\/li>\n<li>Accumulation de dette technique<\/li>\n<\/ul>\n<h3>Comment l\u2019\u00e9viter ?<\/h3>\n<ul>\n<li>Analysez le code avec des outils comme <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> pour d\u00e9tecter et corriger les mauvaises pratiques.<\/li>\n<li>Int\u00e9grez des revues de code r\u00e9guli\u00e8res dans vos processus DevOps.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Conseil : <\/b>Automatisez les contr\u00f4les de qualit\u00e9 pour limiter les erreurs r\u00e9currentes.<\/i><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><h2>4. Configurations syst\u00e8me faibles<\/h2>\n<p>Des <b>param\u00e8tres par d\u00e9faut<\/b> ou des <b>configurations non s\u00e9curis\u00e9es<\/b>, tels que des mots de passe standards ou des ports inutilis\u00e9s, augmentent le risque d\u2019intrusion.<\/p>\n<h3>Cons\u00e9quences :<\/h3>\n<ul>\n<li>Acc\u00e8s non autoris\u00e9 au syst\u00e8me<\/li>\n<li>Exploitation de failles syst\u00e8me<\/li>\n<\/ul>\n<h3>Comment l\u2019\u00e9viter ?<\/h3>\n<ul>\n<li>Revoyez et mettez \u00e0 jour vos configurations r\u00e9guli\u00e8rement.<\/li>\n<li>Supprimez les param\u00e8tres inutilis\u00e9s ou non s\u00e9curis\u00e9s.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Astuce : <\/b><\/i>Adoptez un processus de validation des configurations avant tout d\u00e9ploiement en production.<\/p>\n<\/div><div class=\"fusion-text fusion-text-7\"><h2>5. Absence de tests de s\u00e9curit\u00e9 r\u00e9guliers<\/h2>\n<p>Les <b>tests de s\u00e9curit\u00e9<\/b> sont souvent sous-estim\u00e9s, laissant ainsi des vuln\u00e9rabilit\u00e9s non d\u00e9tect\u00e9es pendant de longues p\u00e9riodes.<\/p>\n<h3>Cons\u00e9quences :<\/h3>\n<ul>\n<li>Exposition prolong\u00e9e aux menaces<\/li>\n<li>Non-conformit\u00e9 aux r\u00e9glementations<\/li>\n<\/ul>\n<h3>Comment l\u2019\u00e9viter ?<\/h3>\n<ul>\n<li>Planifiez des tests d\u2019intrusion p\u00e9riodiques.<\/li>\n<li>Utilisez <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> pour automatiser les analyses de s\u00e9curit\u00e9 tout au long du cycle de d\u00e9veloppement.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Bon \u00e0 savoir : <\/b><\/i>Les tests r\u00e9guliers sont requis pour respecter des normes comme le RGPD.<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-margin-top:50px;\"><h3>Conclusion<\/h3>\n<p>La s\u00e9curisation des applications est essentielle pour prot\u00e9ger vos syst\u00e8mes et vos donn\u00e9es. En identifiant et en corrigeant les vuln\u00e9rabilit\u00e9s comme les injections SQL ou les failles des API, et en utilisant des outils performants comme <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a>, vous pouvez r\u00e9duire consid\u00e9rablement les risques. Prenez les devants et assurez d\u00e8s aujourd\u2019hui la s\u00e9curit\u00e9 et la qualit\u00e9 de vos applications !<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-column-inner-bg-wrapper cta-box\" style=\"--awb-padding-top:25px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-inner-bg-color:var(--awb-color1);--awb-inner-bg-color-hover:var(--awb-color1);--awb-inner-bg-size:cover;--awb-box-shadow:2px 1px 4px 0px rgba(33,41,52,0.41);;--awb-border-color:#ea5050;--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:60%;--awb-margin-top-large:25px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:15px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-margin-bottom:5px;\"><p>S\u00e9curisez le code de vos applications IBM i d\u00e8s maintenant !<\/p>\n<\/div><div class=\"fusion-text fusion-text-10 fusion-text-no-margin cta\" style=\"--awb-text-color:#ea5050;--awb-margin-bottom:5px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:500;\"><p>D\u00e9couvrez ARCAD CodeChecker<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-left:25px;--awb-bg-color:var(--awb-color1);--awb-bg-color-hover:var(--awb-color1);--awb-bg-size:cover;--awb-box-shadow:2px 1px 4px 0px rgba(33,41,52,0.41);;--awb-width-large:51%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.7647058823529%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.7647058823529%;--awb-width-medium:51%;--awb-order-medium:0;--awb-spacing-right-medium:3.7647058823529%;--awb-spacing-left-medium:3.7647058823529%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:5px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:9.6%;--awb-width-small:20%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:9.6%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:130px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:50px;\"><img decoding=\"async\" width=\"200\" height=\"200\" alt=\"Michel Mouchon\" title=\"Michel Mouchon\" src=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon.png\" class=\"img-responsive wp-image-70818\" srcset=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon-66x66.png 66w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon-150x150.png 150w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon.png 200w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_3_4 3_4 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:80%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:2.4%;--awb-spacing-left-small:2.4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:22;--minFontSize:22;line-height:1.3;\">Michel Mouchon<\/h3><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:5px;--awb-margin-top-small:0px;--awb-margin-bottom-small:10px;--awb-font-size:16px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.36;\">CTO et Business Line Manager DevOps<\/h4><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\" style=\"--awb-font-size:15px;--awb-line-height:1.4;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>CTO d\u2019ARCAD Software depuis 2000 et aujourd\u2019hui Business Line Manager de la marque DevOps for Legacy, Michel Mouchon est charg\u00e9 de d\u00e9finir la strat\u00e9gie technologique globale d\u2019ARCAD, pionnier du march\u00e9 dans des domaines tels que le DevSecOps et la digitalisation, afin de stimuler la croissance de l\u2019entreprise. \u00c0 ce titre, il joue un r\u00f4le majeur dans la coordination des d\u00e9partements R&amp;D, Ing\u00e9nierie et Avant-vente. Michel s\u2019est construit des comp\u00e9tences tr\u00e8s transversales en informatique, en commen\u00e7ant sa carri\u00e8re par un double dipl\u00f4me en \u00e9lectronique et en g\u00e9nie logiciel. Sa curiosit\u00e9 pour les nouvelles technologies et pour leur mise en \u0153uvre dans l\u2019univers ARCAD et DevOps, ainsi que son talent pour la communication, ont renforc\u00e9 la communaut\u00e9 des utilisateurs d\u2019ARCAD et ont \u00e9t\u00e9 d\u00e9terminants dans la mise en lumi\u00e8re de nouvelles technologies, notamment aujourd\u2019hui pour transcender l\u2019acc\u00e8s aux produits et \u00e0 la connaissance des applications gr\u00e2ce \u00e0 l\u2019IA, tout en tirant parti de la forte valeur ajout\u00e9e des solutions ARCAD.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9couvrez les 5 vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 les plus courantes sur IBM i et comment les \u00e9viter pour prot\u00e9ger vos donn\u00e9es et applications contre les attaques.<\/p>\n","protected":false},"author":3,"featured_media":71386,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[246],"tags":[569,552,556],"class_list":["post-71374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-fr","tag-blog","tag-devops-pour-ibm-i","tag-modernisation-ibm-i"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les 5 vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 les plus courantes sur IBM i et comment prot\u00e9ger vos donn\u00e9es et applications contre les attaques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les 5 vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 les plus courantes sur IBM i et comment prot\u00e9ger vos donn\u00e9es et applications contre les attaques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T17:01:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T12:57:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"298\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"administrator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/\"},\"author\":{\"name\":\"administrator\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/ac3c33678907c9c414148df7a202dfbf\"},\"headline\":\"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i (et comment les \u00e9viter)\",\"datePublished\":\"2025-01-20T17:01:34+00:00\",\"dateModified\":\"2026-05-04T12:57:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/\"},\"wordCount\":3351,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"keywords\":[\"blog\",\"DevOps pour IBM i\",\"Modernisation IBM i\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/\",\"name\":\"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"datePublished\":\"2025-01-20T17:01:34+00:00\",\"dateModified\":\"2026-05-04T12:57:16+00:00\",\"description\":\"D\u00e9couvrez les 5 vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 les plus courantes sur IBM i et comment prot\u00e9ger vos donn\u00e9es et applications contre les attaques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"width\":800,\"height\":298,\"caption\":\"IBM i security vulnerabilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i (et comment les \u00e9viter)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/ac3c33678907c9c414148df7a202dfbf\",\"name\":\"administrator\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/administrator\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i","description":"D\u00e9couvrez les 5 vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 les plus courantes sur IBM i et comment prot\u00e9ger vos donn\u00e9es et applications contre les attaques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i","og_description":"D\u00e9couvrez les 5 vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 les plus courantes sur IBM i et comment prot\u00e9ger vos donn\u00e9es et applications contre les attaques.","og_url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2025-01-20T17:01:34+00:00","article_modified_time":"2026-05-04T12:57:16+00:00","og_image":[{"width":800,"height":298,"url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","type":"image\/png"}],"author":"administrator","twitter_misc":{"Written by":"administrator","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/"},"author":{"name":"administrator","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/ac3c33678907c9c414148df7a202dfbf"},"headline":"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i (et comment les \u00e9viter)","datePublished":"2025-01-20T17:01:34+00:00","dateModified":"2026-05-04T12:57:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/"},"wordCount":3351,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","keywords":["blog","DevOps pour IBM i","Modernisation IBM i"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/","url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/","name":"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","datePublished":"2025-01-20T17:01:34+00:00","dateModified":"2026-05-04T12:57:16+00:00","description":"D\u00e9couvrez les 5 vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 les plus courantes sur IBM i et comment prot\u00e9ger vos donn\u00e9es et applications contre les attaques.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","width":800,"height":298,"caption":"IBM i security vulnerabilities"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/top-5-vulnerabilites-securite-ibm-i-et-comment-les-eviter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Top 5 des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 sur IBM i (et comment les \u00e9viter)"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/ac3c33678907c9c414148df7a202dfbf","name":"administrator","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/administrator\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/71374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/comments?post=71374"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/71374\/revisions"}],"predecessor-version":[{"id":76049,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/71374\/revisions\/76049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media\/71386"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media?parent=71374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/categories?post=71374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/tags?post=71374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}