{"id":1218,"date":"2025-12-31T00:33:44","date_gmt":"2025-12-30T23:33:44","guid":{"rendered":"https:\/\/regulated-devsecops.com\/uncategorized\/ci-cd-security-audit-compliance-mapping-iso-27001-soc-2-dora-2\/"},"modified":"2026-03-26T00:41:17","modified_gmt":"2026-03-25T23:41:17","slug":"ci-cd-security-audit-compliance-mapping-iso-27001-soc-2-dora","status":"publish","type":"post","link":"https:\/\/regulated-devsecops.com\/fr\/ci-cd-governance\/ci-cd-security-audit-compliance-mapping-iso-27001-soc-2-dora\/","title":{"rendered":"Audit de s\u00e9curit\u00e9 CI\/CD \u2014 Cartographie de conformit\u00e9 (ISO 27001 \/ SOC 2 \/ DORA)"},"content":{"rendered":"\n<p>Ce tableau d&rsquo;audit orient\u00e9 <a href=\"https:\/\/regulated-devsecops.com\/compliance\/\" data-type=\"page\" data-id=\"17\">conformit\u00e9<\/a> met en correspondance les contr\u00f4les de <a href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">s\u00e9curit\u00e9 CI\/CD<\/a> avec les r\u00e9f\u00e9rentiels r\u00e9glementaires et d&rsquo;assurance courants.<br>Il est destin\u00e9 \u00e0 soutenir les audits internes, les \u00e9valuations externes et la pr\u00e9paration r\u00e9glementaire dans les environnements d&rsquo;entreprise.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Gestion des identit\u00e9s et des acc\u00e8s (IAM)<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Moindre privil\u00e8ge appliqu\u00e9 aux comptes de service CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.2 \/ A.5.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Risk Mgmt<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>S\u00e9paration entre les identit\u00e9s humaines et de pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Governance<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Acc\u00e8s bas\u00e9 sur les r\u00f4les pour la configuration des pipelines<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.18<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Access Control<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>MFA appliqu\u00e9 pour les administrateurs CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.17<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Security<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Approbation requise pour les actions de pipeline privil\u00e9gi\u00e9es<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.19<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Change Mgmt<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd11 Gestion des secrets<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Secrets non stock\u00e9s dans le contr\u00f4le de source<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.12<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Security<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Injection des secrets au moment de l&rsquo;ex\u00e9cution<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.24<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.7<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Risk Mgmt<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Secrets limit\u00e9s par environnement<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Governance<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Rotation r\u00e9guli\u00e8re des secrets<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Security<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Valeurs des secrets exclues des journaux<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.16<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Monitoring<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udce6 Int\u00e9grit\u00e9 des artefacts et cha\u00eene d&rsquo;approvisionnement logicielle<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Environnements de build CI\/CD durcis<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.20<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Resilience<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Signature des artefacts appliqu\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.23<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Supply Chain<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Provenance reliant code, pipeline et artefact<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.9<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Traceability<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>D\u00e9p\u00f4ts d&rsquo;artefacts appliquant l&rsquo;immuabilit\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.10<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.5<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Security<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Promotion limit\u00e9e aux artefacts de confiance<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.21<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">Change Mgmt<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd17 Int\u00e9grations tierces et CI\/CD<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Plugins CI\/CD tiers formellement approuv\u00e9s<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.22<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Third-Party Risk<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Int\u00e9grations \u00e9pingl\u00e9es \u00e0 des versions sp\u00e9cifiques<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.8<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Supply Chain<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>V\u00e9rification d&rsquo;int\u00e9grit\u00e9 des actions externes<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.23<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Security<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Restriction des plugins maintenus par la communaut\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.23<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">Risk Mgmt<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Surveillance de l&rsquo;utilisation des int\u00e9grations<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.16<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Monitoring<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcca Journalisation, surveillance et preuves d&rsquo;audit<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Activit\u00e9 des pipelines CI\/CD enti\u00e8rement journalis\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Monitoring<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Les journaux incluent les approbations et les contr\u00f4les de s\u00e9curit\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.14<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Governance<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Collecte centralis\u00e9e des journaux<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.16<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Risk Mgmt<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>R\u00e9tention des journaux align\u00e9e sur la politique<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.34<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">Record Keeping<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Les preuves supportent les audits et les investigations<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.31<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC2.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Compliance<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Gestion des changements et gouvernance<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Changements revus et approuv\u00e9s via le pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.32<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC8.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">Change Mgmt<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>S\u00e9paration entre les r\u00f4les de build et de d\u00e9ploiement<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Governance<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Application des politiques via des portes automatis\u00e9es<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.19<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">ICT Security<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Exceptions formellement approuv\u00e9es et journalis\u00e9es<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.31<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC2.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Compliance<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Gouvernance CI\/CD revue p\u00e9riodiquement<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.36<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC1.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Oversight<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Comment utiliser ce tableau d&rsquo;audit de conformit\u00e9<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Utiliser lors des <strong>audits internes ISO 27001<\/strong><\/li>\n\n\n\n<li>Joindre aux <strong>\u00e9valuations de pr\u00e9paration SOC 2<\/strong><\/li>\n\n\n\n<li>Soutenir les <strong>preuves de gestion des risques ICT DORA<\/strong><\/li>\n\n\n\n<li>Suivre les actions de rem\u00e9diation dans la colonne <strong>Notes<\/strong><\/li>\n\n\n\n<li>R\u00e9viser p\u00e9riodiquement \u00e0 mesure que les pipelines CI\/CD \u00e9voluent<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Ressources associ\u00e9es<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">S\u00e9curit\u00e9 CI\/CD<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-governance\/ci-cd-security-checklist-for-enterprises\/\" data-type=\"post\" data-id=\"32\">Checklist de s\u00e9curit\u00e9 CI\/CD pour les entreprises<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/devsecops\/\" data-type=\"page\" data-id=\"13\">DevSecOps<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/compliance\/\" data-type=\"page\" data-id=\"17\">Conformit\u00e9<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n    <section class=\"rds-author-box rds-author-box--audit\"\r\n             dir=\"ltr\" lang=\"fr\"\r\n             style=\"border:1px solid rgba(100,116,139,.35);border-radius:14px;padding:16px 18px;margin:26px 0 18px;background:rgba(148,163,184,.08);\">\r\n      <strong style=\"margin:0 0 8px; font-size:14px; font-weight:700; letter-spacing:.02em;\">Contexte \u201caudit-ready\u201d<\/strong>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Contenu con\u00e7u pour les environnements r\u00e9glement\u00e9s : contr\u00f4les avant outils, enforcement par politiques dans le CI\/CD, et evidence-by-design pour l\u2019audit.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Focus sur la tra\u00e7abilit\u00e9, les approbations, la gouvernance des exceptions et la r\u00e9tention des preuves de bout en bout.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">\r\n        <a href=\"https:\/\/regulated-devsecops.com\/fr\/fr\/about\/\">Voir la m\u00e9thodologie sur la page About.<\/a>\r\n      <\/p>\r\n    <\/section>\r\n    \n","protected":false},"excerpt":{"rendered":"<p>Ce tableau d&rsquo;audit orient\u00e9 conformit\u00e9 met en correspondance les contr\u00f4les de s\u00e9curit\u00e9 CI\/CD avec les r\u00e9f\u00e9rentiels r\u00e9glementaires et d&rsquo;assurance courants.Il est destin\u00e9 \u00e0 soutenir les audits internes, les \u00e9valuations externes et la pr\u00e9paration r\u00e9glementaire dans les environnements d&rsquo;entreprise. \ud83d\udd10 Gestion des identit\u00e9s et des acc\u00e8s (IAM) Contr\u00f4le ISO 27001 SOC 2 DORA Oui Non Moindre &#8230; <a title=\"Audit de s\u00e9curit\u00e9 CI\/CD \u2014 Cartographie de conformit\u00e9 (ISO 27001 \/ SOC 2 \/ DORA)\" class=\"read-more\" href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-governance\/ci-cd-security-audit-compliance-mapping-iso-27001-soc-2-dora\/\" aria-label=\"En savoir plus sur Audit de s\u00e9curit\u00e9 CI\/CD \u2014 Cartographie de conformit\u00e9 (ISO 27001 \/ SOC 2 \/ DORA)\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123,126,124],"tags":[],"post_folder":[],"class_list":["post-1218","post","type-post","status-publish","format-standard","hentry","category-ci-cd-governance","category-regulatory-frameworks","category-cross-regulation-comparisons"],"_links":{"self":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/comments?post=1218"}],"version-history":[{"count":0,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1218\/revisions"}],"wp:attachment":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/media?parent=1218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/categories?post=1218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/tags?post=1218"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/post_folder?post=1218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}