{"id":8972,"date":"2024-03-21T09:41:51","date_gmt":"2024-03-21T08:41:51","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=8972"},"modified":"2025-10-16T15:32:16","modified_gmt":"2025-10-16T13:32:16","slug":"la-directive-nis-2","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/","title":{"rendered":"La Directive NIS 2"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"705\" height=\"263\" alt=\"Banner Directive NIS 2\" title=\"banner-article-blog-directive-nis2\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" class=\"lazyload img-responsive wp-image-8975\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27705%27%20height%3D%27263%27%20viewBox%3D%270%200%20705%20263%27%3E%3Crect%20width%3D%27705%27%20height%3D%27263%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-200x75.jpg 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-400x149.jpg 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-600x224.jpg 600w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg 705w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 705px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>L'introduction de la directive NIS 2 repr\u00e9sente une r\u00e9ponse essentielle \u00e0 la menace cybern\u00e9tique croissante. Publi\u00e9e en d\u00e9cembre 2022, elle offre une occasion unique aux entit\u00e9s qui influencent la vie quotidienne des citoyens de renforcer leur capacit\u00e9 \u00e0 se prot\u00e9ger contre les cyberattaques. En imposant des mesures pr\u00e9ventives et en \u00e9valuant les risques potentiels, cette directive vise \u00e0 s\u00e9curiser les infrastructures et \u00e0 minimiser l'impact des attaques.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column summary\" style=\"--awb-padding-top:35px;--awb-padding-right:35px;--awb-padding-bottom:25px;--awb-padding-left:35px;--awb-bg-color:rgba(0,100,254,0.09);--awb-bg-color-hover:rgba(0,100,254,0.09);--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.14;\">Au sommaire<\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;--awb-font-size:16px;\"><ol>\n<li><a href=\"#quest-ce-que-la-directive-nis2\">Qu'est-ce que la directive NIS 2 ?<\/a><\/li>\n<li><a href=\"#qui-est-concerne-par-la-nis2\"> Qui est concern\u00e9 par la NIS 2 ?<\/a><\/li>\n<li><a href=\"#quelles-sont-les-obligations-liees-a-cette-directive\">Quelles sont les obligations li\u00e9es \u00e0 cette directive ?<\/a><\/li>\n<li><a href=\"#quelles-sont-les-consequences-et-les-amendes-encourues-en-cas-de-non-respect-de-la-directive-nis2\">Quelles sont les cons\u00e9quences et amendes encourues en cas de non-respect ?<\/a><\/li>\n<li><a href=\"#comment-notre-solution-d-anonymisation-de-donnees-personnelles-et-identifiantes-dot-anonymizer-peut-aider-a-respecter-la-nis2\">Comment DOT Anonymizer aide-t-il \u00e0 respecter la NIS 2 ?<\/a><\/li>\n<li><a href=\"#conclusion\">Conclusion<\/a><\/li>\n<\/ol>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"quest-ce-que-la-directive-nis2\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.1;\">1. Qu'est-ce que la directive NIS 2 ?<\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:left;\"><p><strong>La directive NIS 2,<\/strong> issue de la pr\u00e9c\u00e9dente directive NIS 1, <strong>repr\u00e9sente un changement important dans le paysage national et europ\u00e9en de la cybers\u00e9curit\u00e9.<\/strong> Cette \u00e9volution d\u00e9coule de la strat\u00e9gie de cybers\u00e9curit\u00e9 de l'Union europ\u00e9enne, annonc\u00e9e en d\u00e9cembre 2020, qui appelait \u00e0 la r\u00e9vision de la directive NIS et \u00e0 l'adoption d'une nouvelle directive sur la r\u00e9silience des entit\u00e9s critiques. <strong>Elle a pour objectif d'unifier les pratiques de cybers\u00e9curit\u00e9 \u00e0 travers l'Union europ\u00e9enne<\/strong> et d'\u00e9largir sa port\u00e9e pour inclure un plus grand nombre d'entit\u00e9s, couvrant ainsi un \u00e9ventail plus large de secteurs d'activit\u00e9.<\/p>\n<p><strong>Face \u00e0 l'\u00e9volution rapide des cybermenaces, cette transition vers le NIS 2 est n\u00e9cessaire pour garantir la s\u00e9curit\u00e9 num\u00e9rique collective de l'UE.<\/strong> La directive impose des obligations aux op\u00e9rateurs de services essentiels et aux fournisseurs de services num\u00e9riques, et les \u00c9tats membres doivent identifier les op\u00e9rateurs soumis \u00e0 des exigences renforc\u00e9es. <strong>La transposition de la NIS 2 dans le droit national des \u00c9tats membres d'ici octobre 2024<\/strong> repr\u00e9sente un d\u00e9fi majeur, mais indispensable pour renforcer la r\u00e9silience face aux cybermenaces croissantes. Le 17 janvier 2025, les \u00c9tats membres devrons informer la Commission Europ\u00e9enne des r\u00e8gles et mesures adopt\u00e9es.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:450px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"566\" height=\"547\" alt=\"Sch\u00e9ma dates cl\u00e9s Directive NIS 2\" title=\"schema-dates-directive-nis2\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/schema-dates-directive-nis2.png\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/schema-dates-directive-nis2.png\" class=\"lazyload img-responsive wp-image-8980\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27566%27%20height%3D%27547%27%20viewBox%3D%270%200%20566%20547%27%3E%3Crect%20width%3D%27566%27%20height%3D%27547%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/schema-dates-directive-nis2-200x193.png 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/schema-dates-directive-nis2-400x387.png 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/schema-dates-directive-nis2.png 566w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 566px\" \/><\/span><\/div><div class=\"fusion-menu-anchor\" id=\"qui-est-concerne-par-la-nis2\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.1;\">2. Qui est concern\u00e9 par la NIS 2 ?<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p><strong>La directive NIS 2 d\u00e9finit plus de 18 secteurs concern\u00e9s<\/strong>, s\u00e9par\u00e9s en secteurs critiques et hautement critiques. Elle touchera environ <strong>10 000 types d'entit\u00e9s distincts<\/strong>, comprenant une vari\u00e9t\u00e9 d'administrations de toutes tailles ainsi que des entreprises allant des PME aux grands groupes du CAC40.<\/p>\n<p>Elle introduit plusieurs changements significatifs, notamment<strong> l'\u00e9largissement du nombre de secteurs hautement critiques de sept \u00e0 onze.<\/strong> Ces secteurs comprennent d\u00e9sormais l'\u00e9nergie, les transports, les banques, les infrastructures de march\u00e9 financier, les infrastructures num\u00e9riques, l'eau potable, les eaux us\u00e9es, l'alimentaire (de la production \u00e0 la livraison), la sant\u00e9, l'administration publique et l'espace.<\/p>\n<p>En ce qui concerne<strong> les infrastructures num\u00e9riques<\/strong> qui rev\u00eatent une importance croissante, ils couvrent un large \u00e9ventail d'activit\u00e9s, impliquant notamment les fournisseurs de services Internet, les services DNS, les solutions de cloud, les centres de donn\u00e9es, les services de diffusion de contenus, les services de confiance et les r\u00e9seaux de communications \u00e9lectroniques publics.<\/p>\n<p>Les crit\u00e8res de taille, tels que le nombre d'employ\u00e9s ou le chiffre d'affaires, d\u00e9terminent \u00e9galement l'inclusion des entit\u00e9s dans la directive. En outre, la directive englobe <strong>presque toutes les moyennes et grandes entreprises op\u00e9rant sur le march\u00e9 int\u00e9rieur de l'UE<\/strong>, y compris celles situ\u00e9es en dehors de l'UE mais essentielles \u00e0 son march\u00e9.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"quelles-sont-les-obligations-liees-a-cette-directive\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.1;\">3. Quelles sont les obligations li\u00e9es \u00e0 cette directive ?<\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:left;\"><p>La directive NIS 2, en accord avec le <a href=\"\/dot\/anonymisation-et-rgpd-enjeux-obligations-et-bonnes-pratiques\/\" target=\"_blank\" rel=\"noopener\">RGPD<\/a>, vise \u00e0 s\u00e9curiser les syst\u00e8mes d'information tout en pr\u00e9servant la protection des donn\u00e9es personnelles, cr\u00e9ant un d\u00e9fi de conformit\u00e9 int\u00e9gr\u00e9 pour les entit\u00e9s concern\u00e9es.<\/p>\n<p><strong>La NIS 2 impose \u00e9galement diverses obligations aux entit\u00e9s dans le but de renforcer la r\u00e9silience face aux cybermenaces. Ces entit\u00e9s sont tenues de\u00a0:<\/strong><\/p>\n<ul>\n<li><strong>D\u00e9clarer les incidents majeurs<\/strong> de s\u00e9curit\u00e9 informatique <strong>aux autorit\u00e9s comp\u00e9tentes<\/strong> et aux personnes concern\u00e9es dans les 24 heures suivant leur survenance.<\/li>\n<li><strong>Se soumettre \u00e0 des audits de s\u00e9curit\u00e9<\/strong> pour recevoir des recommandations et r\u00e9pondre \u00e0 des normes de s\u00e9curit\u00e9 strictes. Ces obligations incluent l'analyse des risques, la s\u00e9curit\u00e9 des syst\u00e8mes d'information, la gestion des incidents, la continuit\u00e9 des activit\u00e9s, la s\u00e9curit\u00e9 de la cha\u00eene d'approvisionnement, l'acquisition, le d\u00e9veloppement et la maintenance des syst\u00e8mes d'information, ainsi que l'utilisation de solutions d'authentification \u00e0 plusieurs facteurs.<\/li>\n<li><strong>Respecter des mesures de s\u00e9curit\u00e9 a minima,<\/strong> telles que la mise en place de politiques relatives \u00e0 l'analyse des risques, la gestion des incidents, les plans de continuit\u00e9 d'activit\u00e9, la s\u00e9curit\u00e9 des ressources humaines, l'utilisation d'outils de communication s\u00e9curis\u00e9s, et bien d'autres encore.<\/li>\n<\/ul>\n<p>La NIS2 \u00e9tablit \u00e9galement une distinction entre certaines entreprises de taille interm\u00e9diaire (ETI) qui seront class\u00e9es <strong>comme entit\u00e9s importantes (EI)<\/strong> tandis que d'autres seront consid\u00e9r\u00e9es comme <strong>entit\u00e9s essentielles (EE)<\/strong>. En fonction de leur classification (EE ou EI) et conform\u00e9ment au principe de proportionnalit\u00e9, elles ne seront pas assujetties aux m\u00eames exigences et feront l'objet de consultations avec les parties concern\u00e9es afin de prendre en compte leurs sp\u00e9cificit\u00e9s.<\/p>\n<p>Chaque \u00c9tat membre de l\u2019UE doit communiquer une liste de ses entit\u00e9s essentielles et importantes d'ici le 17 avril 2025, et cette liste doit \u00eatre r\u00e9examin\u00e9e r\u00e9guli\u00e8rement.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p><strong>Guide pratique : Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">T\u00e9l\u00e9charger le guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"quelles-sont-les-consequences-et-les-amendes-encourues-en-cas-de-non-respect-de-la-directive-nis2\"><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.1;\">4. Quelles sont les cons\u00e9quences et les amendes encourues en cas de non-respect de la directive NIS 2 ?<\/h2><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:left;\"><p><strong>L\u2019ANSSI (en France) a un pouvoir de surveillance renforc\u00e9 qui varie selon l\u2019entit\u00e9 contr\u00f4l\u00e9e : qu\u2019elle soit essentielle ou importante<\/strong>. Les entit\u00e9s essentielles peuvent faire l'objet d'un <strong>contr\u00f4le ex ant<\/strong>e, m\u00eame en l'absence d'incidents de s\u00e9curit\u00e9, ainsi que d'un <strong>contr\u00f4le ex post<\/strong>. En revanche, les entit\u00e9s importantes ne sont soumises qu'\u00e0 un contr\u00f4le ex post, d\u00e9clench\u00e9 par un incident de s\u00e9curit\u00e9 ou des indications de non-conformit\u00e9. L'ANSSI est habilit\u00e9e \u00e0 r\u00e9aliser des inspections sur place ou \u00e0 distance, incluant des audits de s\u00e9curit\u00e9 cibl\u00e9s, des scans de s\u00e9curit\u00e9 et des demandes d'informations sur les mesures de s\u00e9curit\u00e9 adopt\u00e9es par l'entit\u00e9.<\/p>\n<p><strong>Amendes en cas de non-respect :<\/strong><\/p>\n<p>La NIS 2 pr\u00e9voit \u00e9galement des amendes administratives en cas de non-respect, avec des plafonds fix\u00e9s dans le droit national, <strong>notamment 10 millions d'euros ou 2% du chiffre d'affaires annuel mondial pour les entit\u00e9s essentielles, et 7 millions d'euros ou 1,4% du chiffre d'affaires annuel mondial pour les entit\u00e9s importantes.<\/strong><br \/>\nCes amendes peuvent \u00eatre prononc\u00e9es par les autorit\u00e9s comp\u00e9tentes, comme l'ANSSI, et peuvent \u00eatre assorties de sanctions suppl\u00e9mentaires en cas de non-coop\u00e9ration de l'entit\u00e9 concern\u00e9e.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"comment-notre-solution-d-anonymisation-de-donnees-personnelles-et-identifiantes-dot-anonymizer-peut-aider-a-respecter-la-nis2\"><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.1;\">5. Comment notre solution d\u2019anonymisation de donn\u00e9es personnelles et identifiantes DOT Anonymizer peut aider \u00e0 respecter la NIS 2 ?<\/h2><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:left;\"><p><a href=\"\/dot\/masquage-des-donnees-de-test\/dot-anonymizer\/\"><b>DOT Anonymizer<\/b><\/a> est un outil majeur pour la mise en conformit\u00e9 avec la directive NIS 2, en offrant une solution performante pour l'anonymisation des donn\u00e9es personnelles et identifiantes.<\/p>\n<p><strong>M\u00eame si elle ne pr\u00e9cise pas explicitement les obligations en mati\u00e8re d'anonymisation des donn\u00e9es, la directive NIS 2 encourage n\u00e9anmoins les strat\u00e9gies de s\u00e9curit\u00e9 informatique susceptibles d'englober cette pratique.<\/strong> Elle impose des normes \u00e9lev\u00e9es en mati\u00e8re de pr\u00e9vention des risques num\u00e9riques, de signalement des incidents et de s\u00e9curit\u00e9 dans les cha\u00eenes d'approvisionnement, sugg\u00e9rant ainsi indirectement l'adoption de l'anonymisation pour am\u00e9liorer la s\u00e9curit\u00e9 des donn\u00e9es.<\/p>\n<p><strong>DOT Anonymizer \u00e9limine les possibilit\u00e9s d'exploiter les donn\u00e9es en cas de violation de s\u00e9curit\u00e9.<\/strong> Cela contribue \u00e0 renforcer la r\u00e9silience des syst\u00e8mes d'information contre les cybermenaces et de rendre les entreprises conformes aux exigences de s\u00e9curit\u00e9 de la NIS 2.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"conclusion\"><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.1;\">6. Conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:left;\"><p>La directive NIS 2 repr\u00e9sente une avanc\u00e9e significative pour renforcer la cybers\u00e9curit\u00e9 au sein de l'Union europ\u00e9enne. En \u00e9tendant les obligations de s\u00e9curit\u00e9 et en introduisant des m\u00e9canismes de surveillance renforc\u00e9s, elle vise \u00e0 harmoniser les pratiques de protection des donn\u00e9es \u00e0 travers diff\u00e9rents secteurs. En d\u00e9finitive, la directive NIS 2 est essentielle pour pr\u00e9server la confiance des citoyens dans un cyberespace europ\u00e9en s\u00fbr et s\u00e9curis\u00e9.<\/p>\n<p>Cependant, cette r\u00e9forme soul\u00e8ve des questions budg\u00e9taires, en particulier pour les entreprises et les entit\u00e9s publiques confront\u00e9es \u00e0 des ressources limit\u00e9es pour r\u00e9pondre aux exigences de cybers\u00e9curit\u00e9.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p><strong>Guide : 5 conseils pour mener \u00e0 bien son projet d\u2019anonymisation !<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/5-conseils-pour-mener-a-bien-son-projet-d-anonymisation\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Lire le Guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"jzZ3r5gY9Nw\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures et \u00e0 r\u00e9duire l&#8217;impact des cyberattaques sur les entit\u00e9s en imposant des mesures pr\u00e9ventives et en \u00e9valuant les risques potentiels.<\/p>\n","protected":false},"author":5,"featured_media":8975,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71,60],"tags":[],"class_list":["post-8972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ressources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La Directive NIS 2 | Blog<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures &amp; \u00e0 r\u00e9duire l&#039;impact des cyberattaques sur les entit\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La Directive NIS 2 | Blog\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures &amp; \u00e0 r\u00e9duire l&#039;impact des cyberattaques sur les entit\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-21T08:41:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T13:32:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"705\" \/>\n\t<meta property=\"og:image:height\" content=\"263\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"La Directive NIS 2\",\"datePublished\":\"2024-03-21T08:41:51+00:00\",\"dateModified\":\"2025-10-16T13:32:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\"},\"wordCount\":5043,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"articleSection\":[\"Articles de blog\",\"Ressources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\",\"name\":\"La Directive NIS 2 | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"datePublished\":\"2024-03-21T08:41:51+00:00\",\"dateModified\":\"2025-10-16T13:32:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures & \u00e0 r\u00e9duire l'impact des cyberattaques sur les entit\u00e9s.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"contentUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"width\":705,\"height\":263,\"caption\":\"Banner Directive NIS 2\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La Directive NIS 2 | Blog","description":"D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures & \u00e0 r\u00e9duire l'impact des cyberattaques sur les entit\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/","og_locale":"en_US","og_type":"article","og_title":"La Directive NIS 2 | Blog","og_description":"D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures & \u00e0 r\u00e9duire l'impact des cyberattaques sur les entit\u00e9s.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2024-03-21T08:41:51+00:00","article_modified_time":"2025-10-16T13:32:16+00:00","og_image":[{"width":705,"height":263,"url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","type":"image\/jpeg"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"La Directive NIS 2","datePublished":"2024-03-21T08:41:51+00:00","dateModified":"2025-10-16T13:32:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/"},"wordCount":5043,"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","articleSection":["Articles de blog","Ressources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/","name":"La Directive NIS 2 | Blog","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","datePublished":"2024-03-21T08:41:51+00:00","dateModified":"2025-10-16T13:32:16+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"D\u00e9couvrez comment la directive NIS 2 vise \u00e0 renforcer la s\u00e9curit\u00e9 des infrastructures & \u00e0 r\u00e9duire l'impact des cyberattaques sur les entit\u00e9s.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/la-directive-nis-2\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","contentUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","width":705,"height":263,"caption":"Banner Directive NIS 2"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/8972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/comments?post=8972"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/8972\/revisions"}],"predecessor-version":[{"id":12667,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/8972\/revisions\/12667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media\/8975"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media?parent=8972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/categories?post=8972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/tags?post=8972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}