{"id":75422,"date":"2026-03-17T09:42:54","date_gmt":"2026-03-17T07:42:54","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=75422"},"modified":"2026-04-15T16:56:57","modified_gmt":"2026-04-15T14:56:57","slug":"le-reglement-dora-la-securite-des-applications-chez-arcad-software","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/","title":{"rendered":"Le r\u00e8glement DORA &#038; la s\u00e9curit\u00e9 des applications chez ARCAD Software"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-top:20px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><b>Le r\u00e8glement DORA (Digital Operational Resilience Act)<\/b> vise \u00e0 renforcer la <b>r\u00e9silience num\u00e9rique du secteur financier<\/b> face aux risques informatiques.<\/p>\n<p>Adopt\u00e9 en d\u00e9cembre 2022, entr\u00e9 en vigueur en janvier 2023, il est applicable depuis le 17 janvier 2025 dans l\u2019ensemble de l\u2019Union europ\u00e9enne.<\/p>\n<p>Dans ce contexte, plusieurs exigences concernent directement le d\u00e9veloppement, la gestion et la s\u00e9curisation des applications. <b>Les solutions propos\u00e9es par ARCAD Software<\/b> contribuent \u00e0 r\u00e9pondre \u00e0 ces exigences \u00e0 travers plusieurs axes cl\u00e9s.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" id=\"blog-content\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><script type=\"text\/javascript\">\n(function ($) {\n  function setInnerLinks(containerID, elementClass) {\n    var $container = $('#' + containerID);\n    if (!$container.length) return;\n\n    \/\/ Emplacement du sommaire (Avada) avec repli sur le container\n    var $host = $(\"#blog-content>.fusion-builder-row>.fusion-layout-column:first-child .fusion-column-wrapper\");\n    if (!$host.length) $host = $container;\n\n    \/\/ Cr\u00e9e le bloc sommaire une seule fois\n    var $summary = $host.find('.summary');\n    if (!$summary.length) {\n      $summary = $(\"<div class='summary'><\/div>\");\n      var host = window.location.hostname.toLowerCase();\nvar tocTitle =\n  host.endsWith('.fr') ? 'Sommaire' :\n  host.endsWith('.com') ? 'Summary' :\n  ((document.documentElement.lang || '').toLowerCase().startsWith('fr') ? 'Sommaire' : 'Summary');\n\n\/\/ Insertion du titre (en texte, pas en HTML)\n$summary.append($('<h2\/>', { text: tocTitle, class: 'exclude-summary', style: 'padding-left: 25px;' }));\n      $summary.append(\"<ol id='\" + containerID + \"_links'><\/ol>\");\n      $host.prepend($summary);\n    }\n    var $list = $('#' + containerID + '_links').empty();\n\n    \/\/ Helpers: enlever la num\u00e9rotation, slug, unicit\u00e9\n    function stripLeadingEnumeration(str) {\n      var s = (str || '').trim();\n\n      \/\/ Cas 1 : \"1) Titre\", \"1. Titre\", \"1 - Titre\", \"1 \u2014 Titre\", \"1: Titre\"\n      s = s.replace(\/^\\d+\\s*[).:\\-\u2013\u2014]\\s+\/, '');\n\n      \/\/ Cas 2 : \"1.2 Titre\", \"2.3.4 Titre\" (au moins un point dans le groupe)\n      s = s.replace(\/^\\d+(?:\\.\\d+)+\\s+\/, '');\n\n      \/\/ NB : on ne retire PAS un simple nombre suivi d\u2019un espace (ex: \"2025 Roadmap\")\n      return s.trim();\n    }\n    var slugCounts = {};\n    function toSlug(str) {\n      return (str || '')\n        .toLowerCase()\n        .normalize('NFD').replace(\/[\\u0300-\\u036f]\/g, '')\n        .replace(\/[^\\w\\s-]\/g, '')\n        .trim()\n        .replace(\/\\s+\/g, '-')\n        .replace(\/-+\/g, '-');\n    }\n    function uniqueId(base) {\n      var n = (slugCounts[base] || 0) + 1;\n      slugCounts[base] = n;\n      return n === 1 ? base : base + '-' + n;\n    }\n\n    \/\/ S\u00e9lectionne les titres\n    var selector = elementClass || 'h2:not(.exclude-summary)';\n    var $headings = $container.find(selector);\n\n    $headings.each(function () {\n      var $h = $(this);\n      if ($h.hasClass('exclude-summary')) return;\n\n      \/\/ Texte pour l'affichage dans l'OL : sans la num\u00e9rotation initiale\n      var rawText = $.trim($h.text());\n      var displayText = stripLeadingEnumeration(rawText);\n\n      \/\/ ID bas\u00e9 sur le texte nettoy\u00e9 pour un slug plus propre\n      if (!$h.attr('id')) {\n        var base = toSlug(displayText || 'section');\n        var id = uniqueId(base);\n        while (document.getElementById(id)) { id = uniqueId(base); }\n        $h.attr('id', id);\n      }\n      var id = $h.attr('id');\n\n      \/\/ Focusable quand on suit l\u2019ancre\n      if (!$h.attr('tabindex')) $h.attr('tabindex', '-1');\n\n      \/\/ Ajoute l\u2019item de la liste ordonn\u00e9e (le num\u00e9ro est fourni par <ol>)\n      $list.append(\"<li><a href='#\" + id + \"'>\" + displayText + \"<\/a><\/li>\");\n    });\n\n    \/\/ Scroll fluide avec offset si header fixe\n    var $header = $('.fusion-header, .fusion-header-wrapper, header, .site-header').first();\n    var isFixed = \/fixed|sticky\/.test(($header.css('position') || ''));\n    var offset = isFixed ? ($header.outerHeight() || 0) : 0;\n\n    \/\/ D\u00e9l\u00e9gation: un seul handler pour tous les liens\n    $list.off('click.toc').on('click.toc', 'a', function (e) {\n      e.preventDefault();\n      var targetId = $(this).attr('href'); \/\/ ex: #vs-code-settings-sync\n      var $t = $(targetId);\n      if (!$t.length) return;\n\n      var y = Math.max($t.offset().top - offset, 0);\n      $('html, body').animate({ scrollTop: y }, 400);\n\n      \/\/ Met \u00e0 jour l\u2019URL sans jump\n      if (history.replaceState) history.replaceState(null, '', targetId);\n    });\n  }\n\n  \/\/ Document ready\n  $(function () {\n    setInnerLinks('blog-content', 'h2:not(.exclude-summary)');\n  });\n\n  \/\/ Optionnel: exporter la fonction\n  window.setInnerLinks = setInnerLinks;\n})(jQuery);\n<\/script>\n\n<div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#437cb4;--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">1. S\u00e9curisation du cycle de d\u00e9veloppement logiciel (Secure SDLC)<\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p>Le r\u00e8glement DORA impose aux institutions financi\u00e8res de mettre en place un cadre solide de <b>gestion des risques li\u00e9s aux syst\u00e8mes d\u2019information (ICT)<\/b> afin de s\u00e9curiser leurs applications et leurs infrastructures informatiques.<\/p>\n<p><i>\u00ab Les entit\u00e9s financi\u00e8res disposent d\u2019un cadre de gestion du risque li\u00e9 aux TIC solide, complet et bien document\u00e9, faisant partie de leur syst\u00e8me global de gestion des risques, qui leur permet de parer au risque li\u00e9 aux TIC de mani\u00e8re rapide, efficiente et exhaustive et de garantir un niveau \u00e9lev\u00e9 de r\u00e9silience op\u00e9rationnelle num\u00e9rique. \u00bb<\/i><\/p>\n<p><span style=\"background-color: rgba(0, 0, 0, 0);\">\u2014<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX:32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\"> Article 6, r\u00e8glement (UE) 2022\/2554<\/a><\/span><\/p>\n<p>Ces exigences conduisent les organisations \u00e0 <b>s\u00e9curiser l\u2019ensemble du cycle de d\u00e9veloppement logiciel<\/b> afin de limiter les risques li\u00e9s aux modifications applicatives et aux d\u00e9ploiements.<\/p>\n<p>\u27a1\ufe0f <b style=\"color: #437cb4;\">Contribution ARCAD :<\/b><\/p>\n<p>Nos <a href=\"\/arcad\/produits\/arcad-for-devops\/\" target=\"_blank\" rel=\"noopener noreferrer\">solutions DevOps<\/a> permettent d\u2019automatiser et de <b>s\u00e9curiser les processus de d\u00e9veloppement<\/b>,<b> de test <\/b>et<b> de d\u00e9ploiement des applications<\/b>, tout en assurant une gestion rigoureuse des versions et des changements.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">2. Gestion et tra\u00e7abilit\u00e9 des changements (Audit trail)<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>DORA exige que les organisations puissent<b> tracer pr\u00e9cis\u00e9ment les modifications apport\u00e9es \u00e0 leurs syst\u00e8mes informatiques<\/b>, afin de garantir la transparence, la gouvernance des syst\u00e8mes IT et la conformit\u00e9 r\u00e9glementaire.<\/p>\n<p>DORA impose \u00e9galement que les modifications des syst\u00e8mes informatiques soient strictement encadr\u00e9es :<\/p>\n<p><i>\u00ab Les entit\u00e9s financi\u00e8res mettent en place des politiques, proc\u00e9dures et contr\u00f4les document\u00e9s pour la gestion des changements li\u00e9s aux TIC, afin de garantir que les changements apport\u00e9s aux syst\u00e8mes TIC soient enregistr\u00e9s, test\u00e9s, \u00e9valu\u00e9s, approuv\u00e9s et mis en \u0153uvre de mani\u00e8re contr\u00f4l\u00e9e. \u00bb<\/i><\/p>\n<p><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX:32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">\u2014 Article 9, r\u00e8glement (UE) 2022\/2554<\/a><\/p>\n<p>Les organisations doivent notamment :<\/p>\n<ul>\n<li>conserver l\u2019historique des modifications<\/li>\n<li>identifier les utilisateurs ayant effectu\u00e9 les changements<\/li>\n<li>documenter les op\u00e9rations r\u00e9alis\u00e9es sur les applications et les environnements informatiques<\/li>\n<li>le contr\u00f4le et la tra\u00e7abilit\u00e9 des changements<\/li>\n<\/ul>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>Contribution ARCAD :<\/b><\/span><\/p>\n<p>Nos <a href=\"\/arcad\/produits\/arcad-for-devops\/\" target=\"_blank\" rel=\"noopener noreferrer\">solutions DevOps<\/a> fournissent un <b>audit trail complet<\/b>, permettant de suivre l\u2019ensemble des op\u00e9rations r\u00e9alis\u00e9es sur les applications, depuis le d\u00e9veloppement jusqu\u2019au d\u00e9ploiement en production.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Optimisez votre cycle de livraison<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_2_5 2_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/produits\/arcad-for-devops\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD for DevOps<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD for DevOps<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">3. Tests de r\u00e9silience et de robustesse des syst\u00e8mes<\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p>Le dispositif europ\u00e9en DORA impose aux institutions financi\u00e8res de tester r\u00e9guli\u00e8rement la robustesse de leurs syst\u00e8mes afin de garantir leur <b>r\u00e9silience op\u00e9rationnelle num\u00e9rique<\/b> face aux incidents informatiques.<\/p>\n<p><i>\u00ab Les entit\u00e9s financi\u00e8res, autres que les microentreprises, d\u00e9finissent des proc\u00e9dures et des strat\u00e9gies destin\u00e9es \u00e0 hi\u00e9rarchiser, classer et r\u00e9soudre tous les probl\u00e8mes mis en \u00e9vidence au cours des tests et \u00e9laborent des m\u00e9thodes de validation interne pour veiller \u00e0 ce que toutes les faiblesses, d\u00e9faillances ou lacunes recens\u00e9es soient enti\u00e8rement corrig\u00e9es. \u00bb<\/i><\/p>\n<p>\u2014 <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX:32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">Article 24, r\u00e8glement (UE) 2022\/2554<\/a><\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>Contribution ARCAD :<\/b><\/span><\/p>\n<p>Nos <a href=\"\/arcad\/produits\/arcad-for-devops\/\" target=\"_blank\" rel=\"noopener noreferrer\">solutions DevOps<\/a> facilitent l\u2019automatisation des tests dans le cycle de d\u00e9veloppement, ce qui permet :<\/p>\n<ul>\n<li>de s\u00e9curiser les mises en production<\/li>\n<li>de r\u00e9duire les risques li\u00e9s aux changements applicatifs<\/li>\n<li>d\u2019am\u00e9liorer la qualit\u00e9 et la stabilit\u00e9 des applications.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">4. Identification des syst\u00e8mes critiques et cartographie applicative<\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p>La r\u00e9glementation DORA exige que les organisations puissent<b> identifier leurs syst\u00e8mes critiques<\/b> et <b>comprendre les d\u00e9pendances<\/b> entre les applications et les infrastructures IT.<\/p>\n<p><i>\u00ab Les entit\u00e9s financi\u00e8res [&#8230;] r\u00e9pertorient la configuration des actifs informationnels et des actifs de TIC et les liens et interd\u00e9pendances entre les diff\u00e9rents actifs informationnels et actifs de TIC. \u00bb<\/i><\/p>\n<p>\u2014 <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX:32022R2554\">Article 8, r\u00e8glement (UE) 2022\/2554<\/a><\/p>\n<p>Cette capacit\u00e9 est essentielle pour analyser l\u2019impact potentiel d\u2019un incident ou d\u2019une modification sur l\u2019ensemble du syst\u00e8me d\u2019information.<\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>Contribution ARCAD :<\/b><\/span><\/p>\n<p>Notre solution <a href=\"\/discover\/\" target=\"_blank\" rel=\"noopener noreferrer\">DISCOVER<\/a> permet :<\/p>\n<ul>\n<li>d\u2019analyser les programmes et bases de donn\u00e9es<\/li>\n<li>de cartographier les d\u00e9pendances applicatives<\/li>\n<li>d\u2019identifier les impacts potentiels des modifications sur l\u2019ensemble du syst\u00e8me d\u2019information<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Documentez vos applications legacy avec l&#8217;IA<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/discover\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DISCOVER<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DISCOVER<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">5. Ma\u00eetrise des d\u00e9ploiements et capacit\u00e9 de rollback<\/h2><\/div><div class=\"fusion-text fusion-text-8\"><p>La r\u00e9glementation europ\u00e9enne impose \u00e9galement aux institutions financi\u00e8res de <b>garantir la continuit\u00e9 et la r\u00e9silience de leurs syst\u00e8mes informatiques<\/b>, notamment en cas d\u2019incident ou d\u2019erreur lors d\u2019une \u00e9volution applicative.<\/p>\n<p><i>\u00ab Les entit\u00e9s financi\u00e8res mettent en place des syst\u00e8mes de sauvegarde qui peuvent \u00eatre activ\u00e9s conform\u00e9ment aux politiques et proc\u00e9dures de sauvegarde, ainsi qu\u2019aux proc\u00e9dures et m\u00e9thodes de restauration et de r\u00e9tablissement. \u00bb<\/i><\/p>\n<p><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX:32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">\u2014 Article 12, r\u00e8glement (UE) 2022\/2554<\/a><\/p>\n<p>Dans ce contexte, les organisations doivent pouvoir <b>ma\u00eetriser les d\u00e9ploiements logiciels,<\/b> <b>s\u00e9curiser les mises en production<\/b> et <b>restaurer rapidement une version stable<\/b> en cas de probl\u00e8me, afin de garantir la continuit\u00e9 des services.<\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>Contribution ARCAD :<\/b><\/span><\/p>\n<p>La solution<a href=\"\/drops\/\"> <b>DROPS,<\/b><\/a><b><\/b> outil de <b>platform engineering<\/b>, automatise et s\u00e9curise les d\u00e9ploiements applicatifs tout en garantissant la continuit\u00e9 de service. <span style=\"background-color: rgba(0, 0, 0, 0);\">Elle permet notamment de <b>g\u00e9rer les versions <\/b>et<b> d\u2019effectuer un rollback rapide<\/b> vers une version stable en cas d\u2019erreur, afin de limiter l\u2019impact des incidents.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Orchestrez vos d\u00e9ploiements multiplateformes<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/drops\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DROPS<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez DROPS<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">6. Qualit\u00e9 du code et d\u00e9tection pr\u00e9coce des vuln\u00e9rabilit\u00e9s<\/h2><\/div><div class=\"fusion-text fusion-text-10\"><p>Le cadre r\u00e9glementaire DORA impose aux institutions financi\u00e8res <b>d\u2019identifier les faiblesses de leurs syst\u00e8mes<\/b> afin de renforcer leur r\u00e9silience num\u00e9rique.<\/p>\n<p><i>\u00ab Afin d\u2019\u00e9valuer l\u2019\u00e9tat de pr\u00e9paration en vue du traitement d\u2019incidents li\u00e9s aux TIC, de recenser les faiblesses, les d\u00e9faillances et les lacunes en mati\u00e8re de r\u00e9silience op\u00e9rationnelle num\u00e9rique et de mettre rapidement en \u0153uvre des mesures correctives, les entit\u00e9s financi\u00e8res \u00e9tablissent, maintiennent et r\u00e9examinent, en tenant compte des crit\u00e8res \u00e9nonc\u00e9s, un programme solide et complet de tests de r\u00e9silience op\u00e9rationnelle num\u00e9rique. \u00bb<\/i><\/p>\n<p><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX:32022R2554\" target=\"_blank\" rel=\"noopener noreferrer\">\u2014 Article 24, r\u00e8glement (UE) 2022\/2554<\/a><\/p>\n<p>La <b>qualit\u00e9 du code<\/b> et la <b>d\u00e9tection pr\u00e9coce des vuln\u00e9rabilit\u00e9s<\/b> permettent de r\u00e9duire les co\u00fbts et les risques, d\u2019am\u00e9liorer la maintenabilit\u00e9 des applications et de s\u00e9curiser les d\u00e9veloppements, notamment lors de l\u2019onboarding de nouveaux d\u00e9veloppeurs.<\/p>\n<p>\u27a1\ufe0f <span style=\"color: #437cb4;\"><b>Contribution ARCAD :<\/b><\/span><\/p>\n<p>La solution <a href=\"https:\/\/www.arcadsoftware.fr\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD CodeChecker<\/a> analyse automatiquement le code pour d\u00e9tecter vuln\u00e9rabilit\u00e9s, erreurs et mauvaises pratiques. <span style=\"background-color: rgba(0, 0, 0, 0);\">Elle am\u00e9liore la qualit\u00e9 du code et contribue \u00e0 renforcer la r\u00e9silience des syst\u00e8mes informatiques, conform\u00e9ment aux exigences DORA.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:15px;--awb-padding-right:15px;--awb-padding-bottom:15px;--awb-padding-left:15px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:57%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.3684210526316%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.3684210526316%;--awb-width-medium:57%;--awb-order-medium:0;--awb-spacing-right-medium:3.3684210526316%;--awb-spacing-left-medium:3.3684210526316%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11 fusion-text-no-margin\" style=\"--awb-font-size:16px;--awb-line-height:1.3;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Prot\u00e9gez votre code contre les vuln\u00e9rabilit\u00e9s<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:42%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.5714285714286%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.5714285714286%;--awb-width-medium:42%;--awb-order-medium:0;--awb-spacing-right-medium:4.5714285714286%;--awb-spacing-left-medium:4.5714285714286%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-4 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD CodeChecker<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD CodeChecker<\/span><\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\">En conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-12\"><p><b>DORA <\/b>renforce les exigences en mati\u00e8re de <b>s\u00e9curit\u00e9 des syst\u00e8mes informatiques<\/b>, de <b>tra\u00e7abilit\u00e9 des modifications<\/b> et de <b>r\u00e9silience num\u00e9rique<\/b> dans le secteur financier.<\/p>\n<p>Gr\u00e2ce \u00e0 nos solutions ARCAD Software accompagne les organisations dans :<\/p>\n<ul>\n<li>la s\u00e9curisation du cycle de d\u00e9veloppement logiciel<\/li>\n<li>la tra\u00e7abilit\u00e9 des modifications applicatives<\/li>\n<li>l\u2019automatisation des tests et des d\u00e9ploiements<\/li>\n<li>la cartographie des syst\u00e8mes et la compr\u00e9hension des d\u00e9pendances applicatives<\/li>\n<\/ul>\n<p>Ces solutions contribuent ainsi \u00e0 am\u00e9liorer la <b>r\u00e9silience op\u00e9rationnelle num\u00e9rique et la conformit\u00e9 aux exigences du r\u00e8glement DORA.<\/b><\/p>\n<p>Par ailleurs, la gestion des environnements de test et la protection des donn\u00e9es restent des enjeux cl\u00e9s dans le cadre de la conformit\u00e9 DORA. <b>L\u2019anonymisation des donn\u00e9es<\/b>, notamment avec<b> <a href=\"\/dot\/\">DOT Anonymizer,<\/a><\/b> permet de limiter les risques tout en facilitant les tests et les d\u00e9veloppements.<\/p>\n<p>\ud83d\udc49 Pour en savoir plus, consultez <a href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/le-reglement-dora-reglementation-sur-la-resilience-operationnelle-numerique\/\" target=\"_blank\" rel=\"noopener noreferrer\">notre article d\u00e9di\u00e9<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le r\u00e8glement DORA renforce les exigences de s\u00e9curit\u00e9, de tra\u00e7abilit\u00e9 et de r\u00e9silience des syst\u00e8mes IT. D\u00e9couvrez comment ARCAD aide \u00e0 s\u2019y conformer.<\/p>\n","protected":false},"author":16,"featured_media":75424,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[246],"tags":[569,556],"class_list":["post-75422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-fr","tag-blog","tag-modernisation-ibm-i"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le r\u00e8glement DORA &amp; la s\u00e9curit\u00e9 des applications<\/title>\n<meta name=\"description\" content=\"Le r\u00e8glement DORA renforce les exigences de s\u00e9curit\u00e9, tra\u00e7abilit\u00e9 &amp; r\u00e9silience des syst\u00e8mes IT. D\u00e9couvrez comment ARCAD aide \u00e0 se conformer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le r\u00e8glement DORA &amp; la s\u00e9curit\u00e9 des applications\" \/>\n<meta property=\"og:description\" content=\"Le r\u00e8glement DORA renforce les exigences de s\u00e9curit\u00e9, tra\u00e7abilit\u00e9 &amp; r\u00e9silience des syst\u00e8mes IT. D\u00e9couvrez comment ARCAD aide \u00e0 se conformer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T07:42:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T14:56:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\"},\"headline\":\"Le r\u00e8glement DORA &#038; la s\u00e9curit\u00e9 des applications chez ARCAD Software\",\"datePublished\":\"2026-03-17T07:42:54+00:00\",\"dateModified\":\"2026-04-15T14:56:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/\"},\"wordCount\":6148,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"keywords\":[\"blog\",\"Modernisation IBM i\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/\",\"name\":\"Le r\u00e8glement DORA & la s\u00e9curit\u00e9 des applications\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"datePublished\":\"2026-03-17T07:42:54+00:00\",\"dateModified\":\"2026-04-15T14:56:57+00:00\",\"description\":\"Le r\u00e8glement DORA renforce les exigences de s\u00e9curit\u00e9, tra\u00e7abilit\u00e9 & r\u00e9silience des syst\u00e8mes IT. D\u00e9couvrez comment ARCAD aide \u00e0 se conformer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/banner-blog-article-dora-devops.png\",\"width\":940,\"height\":350,\"caption\":\"Banner Blog article r\u00e8glement DORA et produits ARCAD for DevOps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/infos-et-evenements\\\/blog-fr\\\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le r\u00e8glement DORA &#038; la s\u00e9curit\u00e9 des applications chez ARCAD Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\",\"name\":\"Myriam Goutte\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/myriam-goutte\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le r\u00e8glement DORA & la s\u00e9curit\u00e9 des applications","description":"Le r\u00e8glement DORA renforce les exigences de s\u00e9curit\u00e9, tra\u00e7abilit\u00e9 & r\u00e9silience des syst\u00e8mes IT. D\u00e9couvrez comment ARCAD aide \u00e0 se conformer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/","og_locale":"en_US","og_type":"article","og_title":"Le r\u00e8glement DORA & la s\u00e9curit\u00e9 des applications","og_description":"Le r\u00e8glement DORA renforce les exigences de s\u00e9curit\u00e9, tra\u00e7abilit\u00e9 & r\u00e9silience des syst\u00e8mes IT. D\u00e9couvrez comment ARCAD aide \u00e0 se conformer.","og_url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2026-03-17T07:42:54+00:00","article_modified_time":"2026-04-15T14:56:57+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730"},"headline":"Le r\u00e8glement DORA &#038; la s\u00e9curit\u00e9 des applications chez ARCAD Software","datePublished":"2026-03-17T07:42:54+00:00","dateModified":"2026-04-15T14:56:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/"},"wordCount":6148,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","keywords":["blog","Modernisation IBM i"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/","url":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/","name":"Le r\u00e8glement DORA & la s\u00e9curit\u00e9 des applications","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","datePublished":"2026-03-17T07:42:54+00:00","dateModified":"2026-04-15T14:56:57+00:00","description":"Le r\u00e8glement DORA renforce les exigences de s\u00e9curit\u00e9, tra\u00e7abilit\u00e9 & r\u00e9silience des syst\u00e8mes IT. D\u00e9couvrez comment ARCAD aide \u00e0 se conformer.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2026\/03\/banner-blog-article-dora-devops.png","width":940,"height":350,"caption":"Banner Blog article r\u00e8glement DORA et produits ARCAD for DevOps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/infos-et-evenements\/blog-fr\/le-reglement-dora-la-securite-des-applications-chez-arcad-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Le r\u00e8glement DORA &#038; la s\u00e9curit\u00e9 des applications chez ARCAD Software"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730","name":"Myriam Goutte","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/myriam-goutte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/75422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/comments?post=75422"}],"version-history":[{"count":3,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/75422\/revisions"}],"predecessor-version":[{"id":75794,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/posts\/75422\/revisions\/75794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media\/75424"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media?parent=75422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/categories?post=75422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/tags?post=75422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}