{"id":11811,"date":"2018-08-01T11:34:07","date_gmt":"2018-08-01T18:34:07","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=11811"},"modified":"2026-03-09T07:24:12","modified_gmt":"2026-03-09T14:24:12","slug":"les-mises-a-jour-de-la-division-de-la-securite-informatique-du-nist-entrent-en-vigueur-aujourdhui-votre-securite-est-elle-a-jour","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","title":{"rendered":"Les mises \u00e0 jour de la division de la s\u00e9curit\u00e9 informatique du NIST entrent en vigueur aujourd'hui - Votre s\u00e9curit\u00e9 est-elle \u00e0 jour ?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>Par Michael Hall, responsable de la s\u00e9curit\u00e9 de l'information<\/em><\/p>\n<p>A partir d'aujourd'hui, <a href=\"https:\/\/csrc.nist.gov\/\" target=\"_blank\" rel=\"noopener\">Division de la s\u00e9curit\u00e9 informatique du NIST<\/a> vient de mettre \u00e0 jour ses lignes directrices recommand\u00e9es en \u00e9liminant onze publications SP 800.<\/p>\n<h2>Additionner en soustrayant<\/h2>\n<p>En quoi l'\u00e9limination des recommandations en mati\u00e8re de s\u00e9curit\u00e9 constituerait-elle une am\u00e9lioration ?<br \/>\nCes onze publications font toutes r\u00e9f\u00e9rence \u00e0 des technologies obsol\u00e8tes ou qui ne sont plus utilis\u00e9es, ainsi qu'\u00e0 des mises en \u0153uvre qui ont \u00e9t\u00e9 am\u00e9lior\u00e9es depuis la r\u00e9daction initiale de ces lignes directrices. Par cons\u00e9quent, l'\u00e9limination de ces anciens articles permet de d\u00e9sencombrer le site et de faciliter l'acc\u00e8s et la mise en \u0153uvre des recommandations plus actuelles et mises \u00e0 jour contenues dans les publications SP 800 restantes.<br \/>\nVoici les sections supprim\u00e9es et les raisons pour lesquelles elles l'ont \u00e9t\u00e9 <a href=\"https:\/\/csrc.nist.gov\/News\/2018\/NIST-to-Withdraw-Eleven-Outdated-SP-800-Pubs\" target=\"_blank\" rel=\"noopener\">Annonce du NIST<\/a>:<\/p>\n<ul>\n<li><em>SP 800-13 (octobre 1995), Lignes directrices sur la s\u00e9curit\u00e9 des t\u00e9l\u00e9communications pour le r\u00e9seau de gestion des t\u00e9l\u00e9communications :<\/em>\n<ul>\n<li><em>D\u00e9crit les technologies qui ne sont plus d'actualit\u00e9.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-17 (f\u00e9vrier 1998), Syst\u00e8me de validation des modes de fonctionnement (MOVS) : Exigences et proc\u00e9dures :<\/em>\n<ul>\n<li><em>Ce syst\u00e8me de validation concerne les algorithmes qui ont \u00e9t\u00e9 abandonn\u00e9s (par exemple, DES, Skipjack). Pour plus d'informations sur les syst\u00e8mes actuels de validation des algorithmes, voir le Cryptographic Algorithm Validation Program (CAVP).<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-19 (octobre 1999), Mobile Agent Security :<\/em>\n<ul>\n<li><em>L'environnement et les technologies d'aujourd'hui sont beaucoup plus complexes que l'environnement trait\u00e9 dans cette publication.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-23 (ao\u00fbt 2000), Guidelines to Federal Organizations on Security Assurance and Acquisition\/Use of Tested\/Evaluated Products (Lignes directrices \u00e0 l'intention des organisations f\u00e9d\u00e9rales sur l'assurance de la s\u00e9curit\u00e9 et l'acquisition\/utilisation de produits test\u00e9s\/\u00e9valu\u00e9s) :<\/em>\n<ul>\n<li><em>Il est ant\u00e9rieur \u00e0 de nombreuses lois, r\u00e9glementations et directives ex\u00e9cutives pertinentes et ne refl\u00e8te pas les programmes de validation actuels du NIST, le cadre de gestion des risques ou le cadre de cybers\u00e9curit\u00e9. Pour une vue d'ensemble actuelle, voir SP 800-12 Rev. 1, An Introduction to Information Security (Introduction \u00e0 la s\u00e9curit\u00e9 de l'information).<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-24 (avril 2001), PBX Vulnerability Analysis : Trouver les failles dans votre PBX avant que quelqu'un d'autre ne le fasse :<\/em>\n<ul>\n<li><em>Elle n'aborde pas les nouvelles technologies, telles que la voix sur IP (VOIP) ; elle fait r\u00e9f\u00e9rence \u00e0 des \"contr\u00f4les de s\u00e9curit\u00e9\" ant\u00e9rieurs \u00e0 la norme SP 800-53.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-33 (d\u00e9cembre 2001), Mod\u00e8les techniques sous-jacents pour la s\u00e9curit\u00e9 des technologies de l'information :<\/em>\n<ul>\n<li><em>D\u00e9crit un mod\u00e8le ant\u00e9rieur au cadre de gestion des risques et au cadre de cybers\u00e9curit\u00e9.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-36 (octobre 2003), Guide to Selecting Information Technology Security Products (Guide de s\u00e9lection des produits de s\u00e9curit\u00e9 des technologies de l'information) :<\/em>\n<ul>\n<li><em>Ne refl\u00e8te pas les types de produits de s\u00e9curit\u00e9 actuels et les r\u00e9f\u00e9rences sont obsol\u00e8tes.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-43 (novembre 2002), Conseils d'administration des syst\u00e8mes pour la s\u00e9curisation du syst\u00e8me professionnel Windows 2000 :<\/em>\n<ul>\n<li><em>Ce syst\u00e8me d'exploitation n'est plus pris en charge.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-65 (janvier 2005), Integrating IT Security into the Capital Planning and Investment Control Process :<\/em>\n<ul>\n<li><em>Il est ant\u00e9rieur \u00e0 d'importantes directives du NIST telles que SP 800-53 Rev. 4, SP 800-53A Rev. 4 et le cadre de cybers\u00e9curit\u00e9.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-68 Rev. 1 (octobre 2008), Guide de s\u00e9curisation des syst\u00e8mes Microsoft Windows XP pour les professionnels de l'informatique : A NIST Security Configuration Checklist (Liste de contr\u00f4le de la configuration de la s\u00e9curit\u00e9 du NIST) :<\/em>\n<ul>\n<li><em>Ce syst\u00e8me d'exploitation n'est plus pris en charge.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-69 (septembre 2006), Guidance for Securing Microsoft\u00a0<\/em><em>Windows XP Home Edition : Liste de contr\u00f4le de la configuration de la s\u00e9curit\u00e9 du NIST :<\/em>\n<ul>\n<li><em>Ce syst\u00e8me d'exploitation n'est plus pris en charge.<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Votre politique de s\u00e9curit\u00e9 est-elle \u00e0 jour ?<\/h2>\n<p>La mise \u00e0 jour du NIST nous rappelle qu'au fur et \u00e0 mesure que la technologie devient obsol\u00e8te et est remplac\u00e9e, les parties de notre politique de s\u00e9curit\u00e9 li\u00e9es aux donn\u00e9es et \u00e0 la technologie doivent l'\u00eatre \u00e9galement.<br \/>\nLes appareils appartenant \u00e0 l'entreprise contiennent souvent des informations stock\u00e9es \u00e9lectroniquement (ESI) sensibles en termes de s\u00e9curit\u00e9, notamment la propri\u00e9t\u00e9 intellectuelle critique, les bases de donn\u00e9es financi\u00e8res, les fichiers comptables, les \u00e9changes de courriels, les dossiers des clients, les PCI, les PII et les PHI. Si l'on tient compte des co\u00fbts associ\u00e9s \u00e0 une violation de la s\u00e9curit\u00e9 r\u00e9sultant d'un vol ou d'un autre acc\u00e8s non autoris\u00e9, tels que les enqu\u00eates, la gestion de crise, la notification des victimes, les frais juridiques et la perte de clients, le prix \u00e0 payer pour une faille dans le protocole de s\u00e9curit\u00e9 d'une entreprise s'alourdit rapidement.<br \/>\nSelon l'Institut Ponemon, le co\u00fbt moyen d'une violation de donn\u00e9es aux \u00c9tats-Unis en 2017 \u00e9tait de $225 par enregistrement, soit une moyenne de $7,35 millions de co\u00fbt organisationnel total par violation. Ces co\u00fbts \u00e9taient encore plus \u00e9lev\u00e9s pour les \u00e9tablissements de sant\u00e9 et les institutions financi\u00e8res. En outre, plus le nombre d'enregistrements perdus est important, plus le co\u00fbt de la violation de donn\u00e9es est \u00e9lev\u00e9.<br \/>\nLa technologie \u00e9voluant tous les dix mois ou moins, il est conseill\u00e9 de revoir r\u00e9guli\u00e8rement la politique de s\u00e9curit\u00e9 de l'entreprise et de s'assurer qu'elle ne se r\u00e9f\u00e8re pas \u00e0 une technologie d\u00e9pass\u00e9e et qu'elle inclut non seulement les nouvelles technologies, mais aussi les nouvelles menaces pour la s\u00e9curit\u00e9.<\/p>\n<h2>Comment se pr\u00e9parer et rester pr\u00e9par\u00e9<\/h2>\n<p>Voici quelques conseils pour assurer la s\u00e9curit\u00e9 des donn\u00e9es de votre entreprise.<\/p>\n<h3>Effectuer une analyse des risques<\/h3>\n<p>\u00c9galement appel\u00e9e \"analyse des lacunes\" ou \"\u00e9valuation des risques de s\u00e9curit\u00e9\", l'analyse des risques est la premi\u00e8re \u00e9tape de l'\u00e9laboration et de la mise \u00e0 jour d'une politique de s\u00e9curit\u00e9 des donn\u00e9es. L'\u00e9valuation des risques de s\u00e9curit\u00e9 doit \u00eatre r\u00e9alis\u00e9e annuellement, semestriellement ou \u00e0 chaque fois qu'un changement intervient, comme l'achat d'un nouvel \u00e9quipement ou l'extension des services de l'entreprise.<\/p>\n<h3>Examen de l'acc\u00e8s et de l'autorisation<\/h3>\n<p>Dans le cadre d'une analyse des risques, il convient d'examiner un certain nombre de domaines et de m\u00e9thodes pour s'assurer qu'ils sont correctement s\u00e9curis\u00e9s, y compris les zones physiques. L'acc\u00e8s doit \u00eatre physiquement inaccessible \u00e0 toute personne non autoris\u00e9e.<\/p>\n<h3>Mise \u00e0 jour de la politique de s\u00e9curit\u00e9 des donn\u00e9es de l'entreprise<\/h3>\n<p>Relisez la politique de s\u00e9curit\u00e9 des donn\u00e9es de votre entreprise et v\u00e9rifiez qu'elle tient compte de tous les risques identifi\u00e9s lors de l'analyse des risques. Ajoutez les \u00e9l\u00e9ments qui n'y figurent pas et \u00e9liminez ceux qui ne sont plus pertinents.<\/p>\n<h3>V\u00e9rifier le personnel et les prestataires tiers<\/h3>\n<p>V\u00e9rifier les ant\u00e9c\u00e9dents de tous les nouveaux employ\u00e9s. Les fournisseurs tiers doivent \u00e9galement \u00eatre contr\u00f4l\u00e9s afin de s'assurer qu'ils suivent des protocoles de s\u00e9curit\u00e9 document\u00e9s identiques ou plus robustes que ceux en place au sein de votre entreprise. Il convient d'accorder une attention particuli\u00e8re aux fournisseurs tiers qui ont acc\u00e8s aux ordinateurs et aux t\u00e9l\u00e9phones de l'entreprise et qui peuvent acc\u00e9der aux donn\u00e9es de l'entreprise, tels que les fournisseurs charg\u00e9s de la r\u00e9cup\u00e9ration des donn\u00e9es.<\/p>\n<p>Le rapport d'avril 2018 sur la cybers\u00e9curit\u00e9 de DriveSavers met en \u00e9vidence le risque n\u00e9glig\u00e9 de la r\u00e9cup\u00e9ration de donn\u00e9es par des tiers et comprend une liste de contr\u00f4le de la s\u00e9curit\u00e9. La liste de contr\u00f4le est sp\u00e9cifique aux services de r\u00e9cup\u00e9ration de donn\u00e9es ; cependant, de nombreux \u00e9l\u00e9ments \u00e9num\u00e9r\u00e9s peuvent s'appliquer \u00e0 tous les fournisseurs tiers et constituent une excellente ressource lors de l'examen des entreprises avec lesquelles vous pourriez commencer \u00e0 travailler.<\/p>\n<h3>\u00c9duquer et faire appliquer<\/h3>\n<p>Organiser des programmes obligatoires de formation et de sensibilisation \u00e0 la s\u00e9curit\u00e9, en veillant \u00e0 faire signer les documents \u00e0 lire obligatoirement. Faire appliquer les politiques et les proc\u00e9dures de s\u00e9curit\u00e9 par le biais de sanctions. La formation doit toujours faire partie de la mise en \u0153uvre et de l'application. Il s'agit de la partie la plus importante de la s\u00e9curit\u00e9 de votre entreprise et elle doit \u00eatre propos\u00e9e en permanence.<\/p>\n<h2>Qu'avez-vous \u00e0 perdre ?<\/h2>\n<p>Votre entreprise d\u00e9tient-elle des brevets, des formules exclusives ou des \"recettes secr\u00e8tes\" qui lui conf\u00e8rent un avantage concurrentiel ? Votre entreprise stocke-t-elle des informations sur les cartes de cr\u00e9dit des clients, des num\u00e9ros de s\u00e9curit\u00e9 sociale ou d'autres donn\u00e9es personnelles qui pourraient avoir un impact sur eux en cas de vol ?<\/p>\n<p>Pensez \u00e0 ce qui pourrait se produire si les donn\u00e9es de l'entreprise \u00e9taient consult\u00e9es par la ou les mauvaises personnes. Suivez l'exemple du NIST. Assurez la s\u00e9curit\u00e9 de votre organisation et de vos clients en actualisant et en appliquant la politique de s\u00e9curit\u00e9 de l'entreprise.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"By Michael Hall, Chief Information Security Officer Effective today, NIST\u2019s Computer Security Division just updated their recommended guidelines by eliminating eleven SP 800 publications. Adding by Subtracting How would eliminating security recommendations be an improvement? These eleven publications all reference technology that is out of date or no longer used, and implementations that have been&hellip;","protected":false},"author":30,"featured_media":45272,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[143],"post_series":[],"class_list":["post-11811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/les-mises-a-jour-de-la-division-de-la-securite-informatique-du-nist-entrent-en-vigueur-aujourdhui-votre-securite-est-elle-a-jour\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/les-mises-a-jour-de-la-division-de-la-securite-informatique-du-nist-entrent-en-vigueur-aujourdhui-votre-securite-est-elle-a-jour\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-01T18:34:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T14:24:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1046\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\"},\"author\":{\"name\":\"Michelle West\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\"},\"headline\":\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\",\"datePublished\":\"2018-08-01T18:34:07+00:00\",\"dateModified\":\"2026-03-09T14:24:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\"},\"wordCount\":1053,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"keywords\":[\"security\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\",\"name\":\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"datePublished\":\"2018-08-01T18:34:07+00:00\",\"dateModified\":\"2026-03-09T14:24:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"width\":2000,\"height\":1046},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\",\"name\":\"Michelle West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"caption\":\"Michelle West\"},\"description\":\"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/west-michelle\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/fr-fr\\\/author\\\/michelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les mises \u00e0 jour de la division de la s\u00e9curit\u00e9 informatique du NIST entrent en vigueur aujourd'hui - Votre s\u00e9curit\u00e9 est-elle \u00e0 jour ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/les-mises-a-jour-de-la-division-de-la-securite-informatique-du-nist-entrent-en-vigueur-aujourdhui-votre-securite-est-elle-a-jour\/","og_locale":"fr_FR","og_type":"article","og_title":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?","og_url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/les-mises-a-jour-de-la-division-de-la-securite-informatique-du-nist-entrent-en-vigueur-aujourdhui-votre-securite-est-elle-a-jour\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2018-08-01T18:34:07+00:00","article_modified_time":"2026-03-09T14:24:12+00:00","og_image":[{"width":2000,"height":1046,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","type":"image\/jpeg"}],"author":"Michelle West","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"\u00c9crit par":"Michelle West","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/"},"author":{"name":"Michelle West","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c"},"headline":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?","datePublished":"2018-08-01T18:34:07+00:00","dateModified":"2026-03-09T14:24:12+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/"},"wordCount":1053,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","keywords":["security"],"articleSection":["DriveSavers Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","name":"Les mises \u00e0 jour de la division de la s\u00e9curit\u00e9 informatique du NIST entrent en vigueur aujourd'hui - Votre s\u00e9curit\u00e9 est-elle \u00e0 jour ?","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","datePublished":"2018-08-01T18:34:07+00:00","dateModified":"2026-03-09T14:24:12+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","width":2000,"height":1046},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"Services de r\u00e9cup\u00e9ration de donn\u00e9es DriveSavers","description":"Le leader mondial de la r\u00e9cup\u00e9ration de donn\u00e9es","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers R\u00e9cup\u00e9ration de Donn\u00e9es","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c","name":"Michelle West","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","caption":"Michelle West"},"description":"DriveSavers Senior Marketing Manager Ecrire sur DriveSavers, la r\u00e9cup\u00e9ration de donn\u00e9es, ou un autre sujet li\u00e9 \u00e0 la technologie ? Contactez nous.","sameAs":["https:\/\/www.linkedin.com\/in\/west-michelle\/"],"url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/author\/michelle\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/11811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=11811"}],"version-history":[{"count":2,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/11811\/revisions"}],"predecessor-version":[{"id":83269,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/11811\/revisions\/83269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media\/45272"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=11811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=11811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=11811"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/post_series?post=11811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}