{"id":1251,"date":"2025-12-31T00:33:24","date_gmt":"2025-12-30T23:33:24","guid":{"rendered":"https:\/\/regulated-devsecops.com\/uncategorized\/ci-cd-security-audit-compliance-mapping-nis2-pci-dss-2\/"},"modified":"2026-03-26T00:41:29","modified_gmt":"2026-03-25T23:41:29","slug":"ci-cd-security-audit-compliance-mapping-nis2-pci-dss","status":"publish","type":"post","link":"https:\/\/regulated-devsecops.com\/fr\/ci-cd-governance\/ci-cd-security-audit-compliance-mapping-nis2-pci-dss\/","title":{"rendered":"Audit de s\u00e9curit\u00e9 CI\/CD \u2014 Cartographie de conformit\u00e9 (NIS2 \/ PCI DSS)"},"content":{"rendered":"\n<p>Ce tableau d&rsquo;audit met en correspondance les contr\u00f4les de <a href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">s\u00e9curit\u00e9 CI\/CD<\/a> avec les exigences de la directive NIS2 et les contr\u00f4les PCI DSS.<br>Il soutient la gestion des risques, la s\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement et la pr\u00e9paration aux audits pour les syst\u00e8mes critiques et li\u00e9s aux paiements.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Gestion des identit\u00e9s et des acc\u00e8s (IAM)<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Moindre privil\u00e8ge appliqu\u00e9 aux comptes de service CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>S\u00e9paration des identit\u00e9s humaines et de pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>RBAC appliqu\u00e9 pour les syst\u00e8mes CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>MFA appliqu\u00e9 pour les administrateurs CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 8.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Les actions privil\u00e9gi\u00e9es n\u00e9cessitent une approbation<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd11 Gestion des secrets et des identifiants<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Secrets non stock\u00e9s dans le code source<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 3.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Injection des secrets au moment de l&rsquo;ex\u00e9cution<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 3.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Identifiants limit\u00e9s par environnement<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Rotation r\u00e9guli\u00e8re des secrets<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 3.6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Secrets exclus des journaux<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.5<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udce6 Cha\u00eene d&rsquo;approvisionnement logicielle et int\u00e9grit\u00e9 des artefacts<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Environnements de build CI\/CD durcis<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Signature des artefacts appliqu\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Provenance et tra\u00e7abilit\u00e9 des artefacts<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>D\u00e9p\u00f4ts d&rsquo;artefacts immuables<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Seuls les artefacts de confiance sont promus<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd17 Int\u00e9grations tierces et CI\/CD<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Outils CI\/CD tiers formellement approuv\u00e9s<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.8<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Actions tierces \u00e9pingl\u00e9es \u00e0 des versions sp\u00e9cifiques<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Int\u00e9grit\u00e9 des composants CI\/CD externes v\u00e9rifi\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Plugins communautaires restreints<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Activit\u00e9 des int\u00e9grations surveill\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcca Journalisation, surveillance et pr\u00e9paration aux incidents<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Activit\u00e9 des pipelines CI\/CD enti\u00e8rement journalis\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Les journaux incluent les approbations et les \u00e9v\u00e9nements de s\u00e9curit\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Journalisation centralis\u00e9e activ\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.5<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>R\u00e9tention des journaux align\u00e9e sur la politique<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.7<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Les journaux CI\/CD supportent l&rsquo;investigation des incidents<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 23<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.10<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Gouvernance, risques et gestion des changements<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Contr\u00f4le<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Oui<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Non<\/strong><\/th><\/tr><\/thead><tbody><tr><td>CI\/CD inclus dans la gestion des risques de cybers\u00e9curit\u00e9<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>S\u00e9paration des fonctions appliqu\u00e9e<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Approbations des changements appliqu\u00e9es via les pipelines<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Exceptions formellement approuv\u00e9es et document\u00e9es<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Posture de s\u00e9curit\u00e9 CI\/CD revue p\u00e9riodiquement<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(f)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.11<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Comment utiliser ce tableau d&rsquo;audit NIS2 \/ PCI DSS<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Utiliser pour les <strong>\u00e9valuations des risques de cybers\u00e9curit\u00e9 NIS2<\/strong><\/li>\n\n\n\n<li>Soutenir les <strong>audits PCI DSS Requirement 6 et 10<\/strong><\/li>\n\n\n\n<li>D\u00e9montrer l&rsquo;inclusion du CI\/CD dans la <strong>gouvernance organisationnelle de la s\u00e9curit\u00e9<\/strong><\/li>\n\n\n\n<li>Joindre les r\u00e9f\u00e9rences de preuves dans la colonne Notes<\/li>\n\n\n\n<li>R\u00e9\u00e9valuer apr\u00e8s les changements de pipeline ou d&rsquo;outillage<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Ressources associ\u00e9es<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">S\u00e9curit\u00e9 CI\/CD<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/devsecops\/\" data-type=\"page\" data-id=\"13\">DevSecOps<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/compliance\/\" data-type=\"page\" data-id=\"17\">Conformit\u00e9<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-governance\/ci-cd-security-checklist-for-enterprises\/\" data-type=\"post\" data-id=\"32\">Checklist de s\u00e9curit\u00e9 CI\/CD pour les entreprises<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n    <section class=\"rds-author-box rds-author-box--audit\"\r\n             dir=\"ltr\" lang=\"fr\"\r\n             style=\"border:1px solid rgba(100,116,139,.35);border-radius:14px;padding:16px 18px;margin:26px 0 18px;background:rgba(148,163,184,.08);\">\r\n      <strong style=\"margin:0 0 8px; font-size:14px; font-weight:700; letter-spacing:.02em;\">Contexte \u201caudit-ready\u201d<\/strong>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Contenu con\u00e7u pour les environnements r\u00e9glement\u00e9s : contr\u00f4les avant outils, enforcement par politiques dans le CI\/CD, et evidence-by-design pour l\u2019audit.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Focus sur la tra\u00e7abilit\u00e9, les approbations, la gouvernance des exceptions et la r\u00e9tention des preuves de bout en bout.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">\r\n        <a href=\"https:\/\/regulated-devsecops.com\/fr\/fr\/about\/\">Voir la m\u00e9thodologie sur la page About.<\/a>\r\n      <\/p>\r\n    <\/section>\r\n    \n","protected":false},"excerpt":{"rendered":"<p>Ce tableau d&rsquo;audit met en correspondance les contr\u00f4les de s\u00e9curit\u00e9 CI\/CD avec les exigences de la directive NIS2 et les contr\u00f4les PCI DSS.Il soutient la gestion des risques, la s\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement et la pr\u00e9paration aux audits pour les syst\u00e8mes critiques et li\u00e9s aux paiements. \ud83d\udd10 Gestion des identit\u00e9s et des acc\u00e8s (IAM) &#8230; <a title=\"Audit de s\u00e9curit\u00e9 CI\/CD \u2014 Cartographie de conformit\u00e9 (NIS2 \/ PCI DSS)\" class=\"read-more\" href=\"https:\/\/regulated-devsecops.com\/fr\/ci-cd-governance\/ci-cd-security-audit-compliance-mapping-nis2-pci-dss\/\" aria-label=\"En savoir plus sur Audit de s\u00e9curit\u00e9 CI\/CD \u2014 Cartographie de conformit\u00e9 (NIS2 \/ PCI DSS)\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123,126,124],"tags":[],"post_folder":[],"class_list":["post-1251","post","type-post","status-publish","format-standard","hentry","category-ci-cd-governance","category-regulatory-frameworks","category-cross-regulation-comparisons"],"_links":{"self":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/comments?post=1251"}],"version-history":[{"count":0,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1251\/revisions"}],"wp:attachment":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/media?parent=1251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/categories?post=1251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/tags?post=1251"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/post_folder?post=1251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}