« Cybersécurité Agile - Cartographie des technologies/en » : différence entre les versions

De Wiki Campus Cyber
Aller à :navigation, rechercher
Page créée avec « Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST. »
Page créée avec « <div class="divIframe"> <iframe src="https://wiki.campuscyber.fr/images/f/f2/Cybers%C3%A9curit%C3%A9_Agile_Carto_technologies_VF.pdf" width="1000" height="800" allow="fullscreen" ></iframe> </div> »
 
(4 versions intermédiaires par le même utilisateur non affichées)
Ligne 17 : Ligne 17 :
It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle,  such as SAST or DAST.
It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle,  such as SAST or DAST.


<div lang="fr" dir="ltr" class="mw-content-ltr">
This document summarizes the discussions and work carried out by the Agile Cybersecurity - Stream Technologies working group and has two main objectives:  
Ce document synthétise les réflexions et travaux menés par le groupe de travail Cybersécurité Agile - Stream technologies et poursuit deux objectifs principaux :
</div>


<div lang="fr" dir="ltr" class="mw-content-ltr">
* Present a map of technologies of interest in the context
* Présenter une cartographie des technologies d'intérêt dans le contexte
* Provide guidance to support organizations' choices
* Donner des orientations pour accompagner les choix des organisations
</div>


<div lang="fr" dir="ltr" class="mw-content-ltr">
<span id="Téléchargement"></span>
== Téléchargement==
== Download ==
</div>


<div lang="fr" dir="ltr" class="mw-content-ltr">
[https://wiki.campuscyber.fr/images/f/f2/Cybers%C3%A9curit%C3%A9_Agile_Carto_technologies_VF.pdf Téléchargez le livrable au format pdf]
[https://wiki.campuscyber.fr/images/f/f2/Cybers%C3%A9curit%C3%A9_Agile_Carto_technologies_VF.pdf Téléchargez le livrable au format pdf]
</div>


<div lang="fr" dir="ltr" class="mw-content-ltr">
<div class="divIframe">
<div class="divIframe">
<iframe
<iframe
Ligne 42 : Ligne 34 :
       allow="fullscreen"
       allow="fullscreen"
  ></iframe>
  ></iframe>
</div>
</div>
</div>
{{PageSubHeader Commun
{{PageSubHeader Commun
|WorkGroup=Cybersécurité Agile : Technologies
|WorkGroup=Cybersécurité Agile : Technologies
}}
}}

Dernière version du 13 octobre 2025 à 09:05

Cartographie des technologies - Cybersécurité Agile

Catégorie : Commun Statut : Production 1 : Idée - 2 : Prototype - 3 : Validation - 4 : Production


Description

Within the Cyber Campus, the Agile Cybersecurity Working Group was set up to study best practices and the transformations needed to achieve a good level of security in agile development cycles. Three areas of work were identified, which led to three projects within the group.

  1. Governance
  2. Security Champions & SME
  3. Technologies

This document is the main deliverable of the third project, known as “Technologies.”

Discussions and interviews with stakeholders in the community of interest formed around this topic highlighted the importance of technology in the transformation under discussion. It is clear that certain security activities, identified in particular in the work of the Governance project, require the implementation of specific tools. This is the case, for example, with automated security analysis activities in the application lifecycle, such as SAST or DAST.

This document summarizes the discussions and work carried out by the Agile Cybersecurity - Stream Technologies working group and has two main objectives:

  • Present a map of technologies of interest in the context
  • Provide guidance to support organizations' choices

Download

Téléchargez le livrable au format pdf