{"id":1258,"date":"2011-10-14T13:21:02","date_gmt":"2011-10-14T11:21:02","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1258"},"modified":"2011-10-14T13:29:55","modified_gmt":"2011-10-14T11:29:55","slug":"cloud-les-pertes-de-donnees-virtuelles-explosent","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1258","title":{"rendered":"Cloud : Les pertes de donn\u00e9es virtuelles explosent"},"content":{"rendered":"<p style=\"text-align: justify;\">L&#8217;article qui suit pose le probl\u00e8me de la s\u00e9curit\u00e9 des donn\u00e9es dont la gestion est externalis\u00e9e. La situation n&#8217;est sans doute pas aussi catastrophique que \u00e7a mais\u00a0cet article\u00a0a le m\u00e9rite d&#8217;attirer l&#8217;attention sur un point essentiel : la r\u00e9duction \u00e0 tout prix des co\u00fbts informatiques des entreprises ne doit pas \u00eatre engag\u00e9e au d\u00e9triment de la s\u00e9curit\u00e9 des donn\u00e9es. Que les donn\u00e9es soient g\u00e9r\u00e9es en interne ou dans des centre de donn\u00e9es externes, le caract\u00e8re strat\u00e9gique des donn\u00e9es de l&#8217;entreprise conserve le m\u00eame poids ; la perte de donn\u00e9es strat\u00e9giques a impact potentiel majeure sur sa p\u00e9rennit\u00e9. L&#8217;entreprise doit\u00a0\u00e0 cet \u00e9gard appr\u00e9hender son plan de crise en tenant compte du risque de d\u00e9faillance du prestataire externe (au lieu de consid\u00e9rer l&#8217;externalisation comme une source de risque en moins).\u00a0B.R.<\/p>\n<p style=\"text-align: justify;\"><em>Deux entreprises sur trois subissent de fr\u00e9quentes pertes de donn\u00e9es en environnement virtuel. Dans quatre cas sur 10, le prestataire de Cloud n&#8217;explique pas en amont comment il compte r\u00e9cup\u00e9rer des donn\u00e9es \u00e9ventuellement perdues.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>La virtualisation et le Cloud Computing multiplient-ils la perte de donn\u00e9es ? C&#8217;est ce qu&#8217;a voulu savoir l&#8217;expert en s\u00e9curit\u00e9 Kroll Ontrack, qui a interrog\u00e9 369 professionnels de l&#8217;informatique lors de la conf\u00e9rence VMworld qui s&#8217;est tenue fin aout. Selon l&#8217;\u00e9tude qui en a r\u00e9sult\u00e9, 65 % des entreprises subissent &#8220;fr\u00e9quemment&#8221; une perte de donn\u00e9es en environnement virtuel (datacenter virtualis\u00e9 en interne, ou Cloud Computing public). Compar\u00e9 \u00e0 l&#8217;an pass\u00e9, cela repr\u00e9sente une hausse des pertes de donn\u00e9es virtuelles de 140%.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>L&#8217;\u00e9tude pr\u00e9cise que 53% des personnes interrog\u00e9es ont subi cinq cas de perte de donn\u00e9es virtuelles au cours de l&#8217;ann\u00e9e \u00e9coul\u00e9e, et 12% en ont subi plus de cinq au cours des douze derniers mois.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Quant \u00e0 l&#8217;aptitude de leur prestataire de Cloud Computing \u00e0 g\u00e9rer correctement les incidents de perte de donn\u00e9es, 55% des r\u00e9pondants ont d\u00e9clar\u00e9 manquer de confiance. Seules 39% des personnes interrog\u00e9es ont confi\u00e9 que leur prestataire de Cloud Computing avait expliqu\u00e9 \u00e0 leur entreprise comment il traiterait une situation de r\u00e9cup\u00e9ration de donn\u00e9es&#8230;<\/em><\/p>\n<p><em>Source : <a href=\"http:\/\/www.journaldunet.com\/solutions\/securite\/perte-de-donnee-et-cloud-computing-1011.shtml\">http:\/\/www.journaldunet.com\/solutions\/securite\/perte-de-donnee-et-cloud-computing-1011.shtml<\/a><\/em><\/p>\n<p><em>Publi\u00e9 le 13\/10\/2011<\/em><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Cloud%20%3A%20Les%20pertes%20de%20donn%C3%A9es%20virtuelles%20explosent\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>L&#8217;article qui suit pose le probl\u00e8me de la s\u00e9curit\u00e9 des donn\u00e9es dont la gestion est externalis\u00e9e. La situation n&#8217;est sans doute pas aussi catastrophique que \u00e7a mais\u00a0cet article\u00a0a le m\u00e9rite d&#8217;attirer l&#8217;attention sur un point essentiel : la r\u00e9duction \u00e0 tout prix des co\u00fbts informatiques des entreprises ne doit pas \u00eatre engag\u00e9e au d\u00e9triment de &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1258\" class=\"more-link\">Continue reading &lsquo;Cloud : Les pertes de donn\u00e9es virtuelles explosent&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Cloud%20%3A%20Les%20pertes%20de%20donn%C3%A9es%20virtuelles%20explosent\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,36,30,33],"tags":[473,530,25,474,316,100,92,1629,140,1627,529],"class_list":["post-1258","post","type-post","status-publish","format-standard","hentry","category-breves","category-protection-des-donnees","category-sites-internet","category-systeme-informatique","tag-cloud-computing","tag-kroll-ontrack","tag-nouvelles-technologies","tag-nuage","tag-perennite","tag-perte-de-donnees","tag-plan-de-crise","tag-protection-des-donnees","tag-risque-informatique","tag-systeme-informatique","tag-virtualisation"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1258"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1258\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}