{"id":1250,"date":"2026-02-19T10:39:18","date_gmt":"2026-02-19T09:39:18","guid":{"rendered":"https:\/\/regulated-devsecops.com\/uncategorized\/supplier-governance-ci-cd-controls-strict-auditor-version-2\/"},"modified":"2026-03-26T00:10:47","modified_gmt":"2026-03-25T23:10:47","slug":"supplier-governance-ci-cd-controls-strict-auditor-version","status":"publish","type":"post","link":"https:\/\/regulated-devsecops.com\/fr\/regulatory-frameworks\/supplier-governance-ci-cd-controls-strict-auditor-version\/","title":{"rendered":"Gouvernance des fournisseurs et contr\u00f4les CI\/CD \u2014 Version stricte pour auditeurs"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Section A \u2014 Gouvernance &amp; Inventaire<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><th><strong>R\u00e9f\u00e9rence de preuve<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Un inventaire complet des fournisseurs li\u00e9s au CI\/CD existe<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>La classification de criticit\u00e9 des fournisseurs est d\u00e9finie<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Un propri\u00e9taire m\u00e9tier est formellement d\u00e9sign\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Un propri\u00e9taire technique est formellement d\u00e9sign\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Une \u00e9valuation annuelle des risques est r\u00e9alis\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>La liste des sous-traitants est document\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Section B \u2014 Contr\u00f4les contractuels &amp; r\u00e9glementaires<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><th><strong>R\u00e9f\u00e9rence de preuve<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Les obligations de s\u00e9curit\u00e9 sont incluses dans le contrat<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Le SLA de notification d&rsquo;incident est d\u00e9fini<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Une clause de droits d&rsquo;audit est pr\u00e9sente<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>La transparence sur la localisation des donn\u00e9es est incluse<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>La clause de strat\u00e9gie de sortie est d\u00e9finie contractuellement<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Section C \u2014 Application technique CI\/CD<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><th><strong>R\u00e9f\u00e9rence de preuve<\/strong><\/th><\/tr><\/thead><tbody><tr><td>SSO impos\u00e9 sur les comptes admin CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>MFA obligatoire pour les r\u00f4les privil\u00e9gi\u00e9s<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Acc\u00e8s bas\u00e9 sur les r\u00f4les avec moindre privil\u00e8ge<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Branches prot\u00e9g\u00e9es appliqu\u00e9es<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Approbations obligatoires pour la production configur\u00e9es<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Les barri\u00e8res de politique bloquent les r\u00e9sultats critiques<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Signature des artefacts impos\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>G\u00e9n\u00e9ration de SBOM automatis\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Isolation des runners impl\u00e9ment\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Section D \u2014 Preuves &amp; R\u00e9tention<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><th><strong>R\u00e9f\u00e9rence de preuve<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Journaux CI\/CD conserv\u00e9s selon la politique<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Journaux d&rsquo;approbation exportables<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>R\u00e9sultats de scan de s\u00e9curit\u00e9 archiv\u00e9s centralement<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Tra\u00e7abilit\u00e9 compl\u00e8te commit \u2192 artefact \u2192 prod<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Dur\u00e9e de r\u00e9tention des preuves document\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Section E \u2014 Strat\u00e9gie de sortie &amp; Test PRA<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><th><strong>R\u00e9f\u00e9rence de preuve<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Un plan de sortie document\u00e9 existe<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Export du code test\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Export de la configuration pipeline test\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Export des artefacts test\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><tr><td>Exercice PRA \/ migration r\u00e9alis\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2610<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Bloc de d\u00e9cision de l&rsquo;auditeur<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Niveau de risque global : ___<\/li>\n\n\n\n<li>Constats critiques : ___<\/li>\n\n\n\n<li>Rem\u00e9diation requise avant le : ___<\/li>\n\n\n\n<li>Date d&rsquo;audit de suivi : ___<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Section A \u2014 Gouvernance &amp; Inventaire Contr\u00f4le Oui Non R\u00e9f\u00e9rence de preuve Un inventaire complet des fournisseurs li\u00e9s au CI\/CD existe \u2610 \u2610 La classification de criticit\u00e9 des fournisseurs est d\u00e9finie \u2610 \u2610 Un propri\u00e9taire m\u00e9tier est formellement d\u00e9sign\u00e9 \u2610 \u2610 Un propri\u00e9taire technique est formellement d\u00e9sign\u00e9 \u2610 \u2610 Une \u00e9valuation annuelle des risques est &#8230; <a title=\"Gouvernance des fournisseurs et contr\u00f4les CI\/CD \u2014 Version stricte pour auditeurs\" class=\"read-more\" href=\"https:\/\/regulated-devsecops.com\/fr\/regulatory-frameworks\/supplier-governance-ci-cd-controls-strict-auditor-version\/\" aria-label=\"En savoir plus sur Gouvernance des fournisseurs et contr\u00f4les CI\/CD \u2014 Version stricte pour auditeurs\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126,122],"tags":[],"post_folder":[],"class_list":["post-1250","post","type-post","status-publish","format-standard","hentry","category-regulatory-frameworks","category-audit-evidence"],"_links":{"self":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/comments?post=1250"}],"version-history":[{"count":0,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1250\/revisions"}],"wp:attachment":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/media?parent=1250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/categories?post=1250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/tags?post=1250"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/post_folder?post=1250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}