[{"data":1,"prerenderedAt":1016},["ShallowReactive",2],{"/fr-fr/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design/":3,"footer-fr-fr":36,"the-source-navigation-fr-fr":348,"the-source-newsletter-fr-fr":375,"strengthen-your-cybersecurity-strategy-with-secure-by-design-article-hero-category-fr-fr":387,"strengthen-your-cybersecurity-strategy-with-secure-by-design-the-source-gated-asset-fr-fr":410,"strengthen-your-cybersecurity-strategy-with-secure-by-design-category-fr-fr":425,"strengthen-your-cybersecurity-strategy-with-secure-by-design-the-source-resources-fr-fr":437,"strengthen-your-cybersecurity-strategy-with-secure-by-design-article-hero-author-fr-fr":467},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":14,"content":20,"type":28,"category":5,"slug":29,"_id":30,"_type":31,"title":7,"_source":32,"_file":33,"_stem":34,"_extension":35},"/fr-fr/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design","security",false,"",{"layout":9,"template":10,"articleType":11,"author":12,"featured":6,"gatedAsset":13},"the-source","TheSourceArticle","Regular","joel-krooswyk","source-lp-guide-to-dynamic-sboms",{"title":15,"description":16,"ogImage":17,"config":18},"Secure by Design : notre guide pour renforcer votre cybersécurité","Examinez de plus près les grands principes du Secure by Design et les concepts connexes, et découvrez les mesures que vous pouvez prendre dès aujourd'hui.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463932/pnfdgovoaq5qd1yprxuc.png",{"ignoreTitleCharLimit":19},true,{"title":15,"date":21,"description":16,"timeToRead":22,"heroImage":17,"keyTakeaways":23,"articleBody":27},"2024-10-29","6 minutes de lecture",[24,25,26],"Secure by Design, Secure by Default et Secure by Demand préviennent les vulnérabilités et attaques sur la chaîne logistique logicielle en encourageant l'intégration de la sécurité dans tous les aspects du design et développement des produits.","L'adoption d'une approche DevSecOps complète, ainsi que la création et la mise à jour régulière de nomenclatures logicielles (SBOM), sont des étapes clés pour répondre aux principes Secure by Design.","L'intégration de l'IA dans le cycle de développement logiciel peut également accélérer les processus de développement, renforcer la sécurité et faciliter la résolution des vulnérabilités.","L'approche des équipes de développement en matière de cybersécurité doit constamment évoluer à mesure que les surfaces d'attaque augmentent et qu'elles en apprennent davantage sur les menaces potentielles. Sachant que les menaces peuvent provenir de n'importe quel point de la [chaîne d'approvisionnement logicielle](https://about.gitlab.com/fr-fr/solutions/supply-chain/ \"Chaîne d'approvisionnement logicielle\"), le concept Secure by Design intègre la sécurité dans les phases de conception, de codage, de test et de déploiement du développement logiciel. Élevé au rang de norme pour les agences fédérales américaines, et pour toute entreprise utilisant leurs logiciels, le concept Secure by Design est devenu une véritable référence pour l'intégration de la sécurité dans le cycle de vie du développement logiciel.\n\nAu fil du temps, le concept Secure by Design s'est ramifié en concepts connexes tels que _Secure by Default_ et _Secure by Demand_, lesquels mettent l'accent sur différentes façons d'aborder les principes Secure by Design :\n\n- Le concept [Secure by Default](#les-principes-secure-by-default) vise à garantir que tous les produits logiciels sont sécurisés dès leur déploiement.\n- Le concept [Secure by Demand](#les-principes-secure-by-demand) étend les principes du concept Secure by Design au processus d'achat.\n\nDécouvrez dans cet article une explication approfondie des grands principes du Secure by Design et de ces approches connexes, ainsi qu'un guide pour aider les équipes de développement à adapter leurs stratégies afin de prévenir les vulnérabilités exploitables et les attaques de la chaîne d'approvisionnement logicielle.\n\n## Les principes du concept Secure by Design\nL'agence de cybersécurité et de sécurité des infrastructures américaine (CISA) a présenté en avril 2023 son [initiative Secure by Design](https://www.cisa.gov/securebydesign) en insistant sur trois principes clés en matière de sécurité des logiciels :\n\n1. Prendre en charge les résultats en matière de sécurité des clients\n1. Adopter une approche radicalement transparente et responsable\n1. Mettre en place une structure organisationnelle et un leadership permettant d'atteindre ces objectifs\n\nLe concept Secure by Design intègre des grands principes et des protocoles de sécurité à chaque étape du processus de développement logiciel. Les mesures de sécurité sont ainsi considérées comme une priorité et intégrées directement dans les phases de conception, de codage, de test et de déploiement du développement logiciel.\n\nL'objectif du concept Secure by Design est de créer une structure sécurisée pour les logiciels dès leur phase de conception, en réduisant les vulnérabilités et les surfaces d'attaque potentielles.\n\n### Les principes du Secure by Default\nVariante du concept Secure by Design, le concept Secure by Default vise à garantir que tout logiciel ou matériel est configuré de la manière la plus sûre possible, sans que l'utilisateur ait à le reconfigurer. Les produits appliquant les principes du Secure by Default activent automatiquement les [contrôles de sécurité](https://about.gitlab.com/fr-fr/topics/devsecops/devsecops-security-checklist/ \"Liste de contrôle de sécurité DevSecOps\") essentiels pour protéger les entreprises contre les accès non autorisés par des acteurs malveillants. Les utilisateurs n'ont donc pas besoin de suivre des étapes supplémentaires pour s'assurer qu'un produit est protégé contre les techniques d'exploitation les plus courantes.\n\nLes stratégies du concept Secure by Default comprennent l'élimination des mots de passe par défaut, l'authentification multifacteur et l'authentification unique, afin que seuls les utilisateurs autorisés puissent accéder aux ressources. Cette approche comprend également des mises à jour et des correctifs automatiques, ainsi que des configurations sécurisées pour tous les comptes d'utilisateurs et les appareils.\n\n### Les principes du Secure by Demand\nLe concept Secure by Demand associe les principes du Secure by Design à la budgétisation et aux achats afin de faire du concept Secure by Design un impératif pour les fournisseurs et les sous-traitants. Le [guide du concept Secure by Demand de la CISA](https://www.cisa.gov/resources-tools/resources/secure-demand-guide) propose une série de questions et de ressources que les acquéreurs de logiciels, les acheteurs et les responsables des achats peuvent utiliser pour mieux comprendre l'approche d'un fournisseur potentiel en matière de cybersécurité. Il s'agit notamment de questions sur les pratiques d'authentification du fournisseur, sur la sécurité de la chaîne d'approvisionnement logicielle, ainsi que sur la divulgation et le signalement des vulnérabilités.\n\nEn exigeant des fournisseurs qu'ils adhèrent aux principes et protocoles du concept Secure by Design dans leurs produits et services, les entreprises peuvent contribuer à empêcher les vulnérabilités potentielles de s'introduire dans leur chaîne d'approvisionnement logicielle. L'approche Secure by Demand incite également les fournisseurs à améliorer en permanence leur propre dispositif de cybersécurité.\n\n## Comment élaborer une stratégie de cybersécurité avec le concept Secure by Design ?\nLa mise en œuvre du concept Secure by Design passe par la mise en place de pratiques DevSecOps efficaces, la tenue à jour d'une [nomenclature logicielle (SBOM)](https://about.gitlab.com/fr-fr/blog/the-ultimate-guide-to-sboms/ \"Qu’est-ce qu’une nomenclature logicielle (SBOM) ?\") et l'intégration de l'IA pour lutter contre les menaces à tous les points du cycle de vie du développement logiciel.\n\n### Adoptez les pratiques DevSecOps\nL'une des premières étapes nécessaires à la mise en œuvre du concept Secure by Design consiste à mettre en place un processus de développement logiciel sécurisé. Il s'agit donc de développer, construire, sécuriser et déployer des logiciels à l'aide d'une approche [DevSecOps](https://about.gitlab.com/fr-fr/topics/devsecops/ \"Qu'est-ce que DevSecOps ?\") complète.\n\nAujourd'hui, de nombreuses équipes de développement utilisent des outils complexes pour créer de nouveaux programmes. Selon une [récente enquête de GitLab](https://about.gitlab.com/fr-fr/developer-survey/), 62 % des personnes interrogées affirment utiliser 6 outils ou plus pour le développement logiciel, tandis que 20 % disent en utiliser au moins 11. Cette inefficacité accroît les risques en introduisant des failles de sécurité potentielles.\n\nLes équipes de développement devraient pouvoir accéder à tous les outils nécessaires aux workflows DevSecOps dans une interface unique et facile à utiliser. Une solution de bout en bout telle qu'une [plateforme DevSecOps](/platform/) permet la mise en œuvre d'une approche Secure by Design sans alourdir la charge de travail des équipes.\n\n### Créez et tenez à jour des SBOM\nLa transparence est un autre élément essentiel du concept Secure by Design. Les entreprises doivent comprendre ce que contiennent leurs logiciels, en particulier lorsqu'ils peuvent inclure des composants provenant de sources multiples.\n\nLes SBOM sont des outils essentiels pour parvenir à cette transparence. En offrant un inventaire détaillé des composants logiciels, y compris la version, la licence et les dépendances, elles permettent de mieux cerner les vulnérabilités potentielles ou toute injection de code malveillant.\n\nLa tenue à jour de cet inventaire permet de comprendre pleinement les vulnérabilités et les risques qui pourraient survenir lorsque des éléments sont extraits de dépôts open source et de composants tiers sous licence. Une plateforme DevSecOps peut aider à [générer et mettre à jour automatiquement les SBOM](/solutions/security-compliance/), à les intégrer dans les workflows existants et à les relier aux vulnérabilités associées.\n\nBien que de nombreuses entreprises utilisent aujourd'hui des SBOM, celles-ci doivent être dynamiques, connectées à des outils de scanning de sécurité et mises à jour en permanence pour être pleinement efficaces. Intégrées à des outils de scanning et à des tableaux de bord, les SBOM permettent d'identifier les risques liés à une application. Même lorsqu'elles ne sont pas requises, les SBOM peuvent contribuer à la [conformité aux règles de sécurité](https://about.gitlab.com/fr-fr/solutions/security-compliance/ \"Sécurité et conformité \") en validant que le code est sécurisé.\n\n### Utilisez l'IA dans le développement logiciel\nAlors que les entreprises explorent les possibilités de l'IA, les workflows de développement logiciel constituent un point d'entrée précieux pour intégrer cette technologie et exploiter son potentiel à accélérer les processus de développement et à renforcer la sécurité.\n\nLes entreprises de tous les secteurs commencent déjà à explorer ces applications : 39 % des personnes interrogées [au cours de l'enquête de GitLab](https://about.gitlab.com/fr-fr/developer-survey/2024/ai/) ont déclaré qu'elles utilisaient déjà l'IA dans leur cycle de développement logiciel.\n\nLe recours à l'IA dans l'ensemble du cycle de développement logiciel permet d'éviter les effets de silo et les backlogs générés par l'utilisation de multiples IA dans les différents workflows de développement. L'IA peut remplir des fonctions essentielles telles que :\n\n* L'explication du code et le réusinage du code hérité en [langages à mémoire sécurisée](https://about.gitlab.com/blog/memory-safe-vs-unsafe/)\n* L'[analyse des causes profondes pour les pipelines DevSecOps](https://about.gitlab.com/fr-fr/blog/developing-gitlab-duo-blending-ai-and-root-cause-analysis-to-fix-ci-cd/), qui permet de résoudre rapidement des problèmes complexes pendant les tests\n* La [résolution des vulnérabilités](https://about.gitlab.com/blog/understand-and-resolve-vulnerabilities-with-ai-powered-gitlab-duo/) pour comprendre les vulnérabilités connues et favoriser une remédiation plus approfondie\n\nAlors que les leaders du secteur intègrent l'IA dans leurs workflows, il est crucial de faire de la confidentialité et de la sécurité des données une priorité. Un aspect essentiel de l'adoption du concept Secure by Design est l'élaboration d'une [stratégie d'IA qui protège les données sensibles et les droits de propriété intellectuelle](https://about.gitlab.com/the-source/ai/building-a-transparency-first-ai-strategy-7-questions-to-ask-your-devops/).\n\n### Adoptez le concept Secure By Design dès aujourd’hui !\nLe concept Secure by Design pourrait bientôt devenir l'approche par défaut pour créer un écosystème logiciel plus fiable. Le [gouvernement américain](https://about.gitlab.com/the-source/security/national-cybersecurity-strategy-a-wake-up-call-for-software-developers/) travaille actuellement avec des équipes de développement logiciel pour créer des frameworks incitant légalement le secteur privé à produire et à sortir des logiciels répondant aux principes du Secure by Design, afin de pousser les entreprises à investir davantage dans les technologies et les pratiques sécurisées.\n\nGrâce à l'intégration de la sécurité dès le départ dans le développement logiciel, à la transparence garantie par des SBOM efficaces et à l'amélioration du processus de développement par l'IA, toutes les personnes impliquées dans le cycle de développement logiciel seront en mesure de mener leurs projets à bien.","article","strengthen-your-cybersecurity-strategy-with-secure-by-design","content:fr-fr:the-source:security:strengthen-your-cybersecurity-strategy-with-secure-by-design:index.yml","yaml","content","fr-fr/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design/index.yml","fr-fr/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design/index","yml",{"_path":37,"_dir":38,"_draft":6,"_partial":6,"_locale":7,"data":39,"_id":344,"_type":31,"title":345,"_source":32,"_file":346,"_stem":347,"_extension":35},"/shared/fr-fr/main-footer","fr-fr",{"text":40,"source":41,"edit":47,"contribute":52,"config":57,"items":62,"minimal":335},"Git est une marque déposée de Software Freedom Conservancy et notre utilisation de « GitLab » est sous licence",{"text":42,"config":43},"Afficher le code source de la page",{"href":44,"dataGaName":45,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":48,"config":49},"Modifier cette page",{"href":50,"dataGaName":51,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":53,"config":54},"Veuillez contribuer",{"href":55,"dataGaName":56,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":58,"facebook":59,"youtube":60,"linkedin":61},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[63,90,163,235,297],{"title":64,"links":65,"subMenu":71},"Plateforme",[66],{"text":67,"config":68},"Plateforme DevSecOps",{"href":69,"dataGaName":70,"dataGaLocation":46},"/fr-fr/platform/","devsecops platform",[72],{"title":73,"links":74},"Tarifs",[75,80,85],{"text":76,"config":77},"Voir les forfaits",{"href":78,"dataGaName":79,"dataGaLocation":46},"/fr-fr/pricing/","view plans",{"text":81,"config":82},"Pourquoi choisir GitLab Premium ?",{"href":83,"dataGaName":84,"dataGaLocation":46},"/fr-fr/pricing/premium/","why premium",{"text":86,"config":87},"Pourquoi choisir GitLab Ultimate ?",{"href":88,"dataGaName":89,"dataGaLocation":46},"/fr-fr/pricing/ultimate/","why ultimate",{"title":91,"links":92},"Solutions",[93,98,103,108,113,118,123,128,133,138,143,148,153,158],{"text":94,"config":95},"Transformation digitale",{"href":96,"dataGaName":97,"dataGaLocation":46},"/fr-fr/topics/digital-transformation/","digital transformation",{"text":99,"config":100},"Sécurité et conformité",{"href":101,"dataGaName":102,"dataGaLocation":46},"/fr-fr/solutions/security-compliance/","security & compliance",{"text":104,"config":105},"Livraison de logiciels automatisée",{"href":106,"dataGaName":107,"dataGaLocation":46},"/fr-fr/solutions/delivery-automation/","automated software delivery",{"text":109,"config":110},"Développement agile",{"href":111,"dataGaName":112,"dataGaLocation":46},"/fr-fr/solutions/agile-delivery/","agile delivery",{"text":114,"config":115},"Transformation cloud",{"href":116,"dataGaName":117,"dataGaLocation":46},"/fr-fr/topics/cloud-native/","cloud transformation",{"text":119,"config":120},"SCM",{"href":121,"dataGaName":122,"dataGaLocation":46},"/fr-fr/solutions/source-code-management/","source code management",{"text":124,"config":125},"CI/CD",{"href":126,"dataGaName":127,"dataGaLocation":46},"/fr-fr/solutions/continuous-integration/","continuous integration & delivery",{"text":129,"config":130},"Gestion de la chaîne de valeur",{"href":131,"dataGaName":132,"dataGaLocation":46},"/fr-fr/solutions/value-stream-management/","value stream management",{"text":134,"config":135},"GitOps",{"href":136,"dataGaName":137,"dataGaLocation":46},"/fr-fr/solutions/gitops/","gitops",{"text":139,"config":140},"Entreprises",{"href":141,"dataGaName":142,"dataGaLocation":46},"/fr-fr/enterprise/","enterprise",{"text":144,"config":145},"PME",{"href":146,"dataGaName":147,"dataGaLocation":46},"/fr-fr/small-business/","small business",{"text":149,"config":150},"Secteur public",{"href":151,"dataGaName":152,"dataGaLocation":46},"/fr-fr/solutions/public-sector/","public sector",{"text":154,"config":155},"Formation",{"href":156,"dataGaName":157,"dataGaLocation":46},"/fr-fr/solutions/education/","education",{"text":159,"config":160},"Services financiers",{"href":161,"dataGaName":162,"dataGaLocation":46},"/fr-fr/solutions/finance/","financial services",{"title":164,"links":165},"Ressources",[166,171,176,181,186,191,195,200,205,210,215,220,225,230],{"text":167,"config":168},"Installation",{"href":169,"dataGaName":170,"dataGaLocation":46},"/fr-fr/install/","install",{"text":172,"config":173},"Guides de démarrage rapide",{"href":174,"dataGaName":175,"dataGaLocation":46},"/fr-fr/get-started/","quick setup checklists",{"text":177,"config":178},"Apprentissage",{"href":179,"dataGaName":180,"dataGaLocation":46},"https://university.gitlab.com/","learn",{"text":182,"config":183},"Documentation sur le produit",{"href":184,"dataGaName":185,"dataGaLocation":46},"https://docs.gitlab.com/","docs",{"text":187,"config":188},"Blog",{"href":189,"dataGaName":190},"/fr-fr/blog/","blog",{"text":192,"config":193},"Histoires de réussite client",{"href":194,"dataGaLocation":46},"/customers/",{"text":196,"config":197},"Histoires de succès client",{"href":198,"dataGaName":199,"dataGaLocation":46},"/fr-fr/customers/","customer success stories",{"text":201,"config":202},"Travail à distance",{"href":203,"dataGaName":204,"dataGaLocation":46},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":206,"config":207},"Services GitLab",{"href":208,"dataGaName":209,"dataGaLocation":46},"/fr-fr/services/","services",{"text":211,"config":212},"TeamOps",{"href":213,"dataGaName":214,"dataGaLocation":46},"/fr-fr/teamops/","teamops",{"text":216,"config":217},"Communauté",{"href":218,"dataGaName":219,"dataGaLocation":46},"/community/","community",{"text":221,"config":222},"Forum",{"href":223,"dataGaName":224,"dataGaLocation":46},"https://forum.gitlab.com/","forum",{"text":226,"config":227},"Événements",{"href":228,"dataGaName":229,"dataGaLocation":46},"/events/","events",{"text":231,"config":232},"Partenaires",{"href":233,"dataGaName":234,"dataGaLocation":46},"/fr-fr/partners/","partners",{"title":236,"links":237},"Société",[238,243,248,253,258,263,268,272,277,282,287,292],{"text":239,"config":240},"À propos",{"href":241,"dataGaName":242,"dataGaLocation":46},"/fr-fr/company/","company",{"text":244,"config":245},"Emplois",{"href":246,"dataGaName":247,"dataGaLocation":46},"/jobs/","jobs",{"text":249,"config":250},"Leadership",{"href":251,"dataGaName":252,"dataGaLocation":46},"/company/team/e-group/","leadership",{"text":254,"config":255},"Équipe",{"href":256,"dataGaName":257,"dataGaLocation":46},"/company/team/","team",{"text":259,"config":260},"Manuel",{"href":261,"dataGaName":262,"dataGaLocation":46},"https://handbook.gitlab.com/","handbook",{"text":264,"config":265},"Relations avec les investisseurs",{"href":266,"dataGaName":267,"dataGaLocation":46},"https://ir.gitlab.com/","investor relations",{"text":269,"config":270},"Sustainability",{"href":271,"dataGaName":269,"dataGaLocation":46},"/sustainability/",{"text":273,"config":274},"Diversité, inclusion et appartenance (DIB)",{"href":275,"dataGaName":276,"dataGaLocation":46},"/fr-fr/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":278,"config":279},"Centre de confiance",{"href":280,"dataGaName":281,"dataGaLocation":46},"/fr-fr/security/","trust center",{"text":283,"config":284},"Newsletter",{"href":285,"dataGaName":286,"dataGaLocation":46},"/company/contact/","newsletter",{"text":288,"config":289},"Presse",{"href":290,"dataGaName":291,"dataGaLocation":46},"/press/","press",{"text":293,"config":294},"Déclaration de transparence sur l'esclavage moderne",{"href":295,"dataGaName":296,"dataGaLocation":46},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":298,"links":299},"Nous contacter",[300,305,310,315,320,325,330],{"text":301,"config":302},"Échanger avec un expert",{"href":303,"dataGaName":304,"dataGaLocation":46},"/fr-fr/sales/","sales",{"text":306,"config":307},"Aide",{"href":308,"dataGaName":309,"dataGaLocation":46},"/support/","get help",{"text":311,"config":312},"Portail clients GitLab",{"href":313,"dataGaName":314,"dataGaLocation":46},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":316,"config":317},"Statut",{"href":318,"dataGaName":319,"dataGaLocation":46},"https://status.gitlab.com/","status",{"text":321,"config":322},"Conditions d'utilisation",{"href":323,"dataGaName":324},"/terms/","terms of use",{"text":326,"config":327},"Déclaration de confidentialité",{"href":328,"dataGaName":329,"dataGaLocation":46},"/fr-fr/privacy/","privacy statement",{"text":331,"config":332},"Préférences en matière de cookies",{"dataGaName":333,"dataGaLocation":46,"id":334,"isOneTrustButton":19},"cookie preferences","ot-sdk-btn",{"items":336},[337,339,342],{"text":321,"config":338},{"href":323,"dataGaName":324,"dataGaLocation":46},{"text":340,"config":341},"Politique de confidentialité",{"href":328,"dataGaName":329,"dataGaLocation":46},{"text":331,"config":343},{"dataGaName":333,"dataGaLocation":46,"id":334,"isOneTrustButton":19},"content:shared:fr-fr:main-footer.yml","Main Footer","shared/fr-fr/main-footer.yml","shared/fr-fr/main-footer",{"_path":349,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":350,"subscribeLink":355,"navItems":359,"_id":371,"_type":31,"title":372,"_source":32,"_file":373,"_stem":374,"_extension":35},"/shared/fr-fr/the-source/navigation",{"altText":351,"config":352},"the source logo",{"src":353,"href":354},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/fr-fr/the-source/",{"text":356,"config":357},"S'abonner",{"href":358},"#subscribe",[360,364,367],{"text":361,"config":362},"Intelligence artificielle",{"href":363},"/fr-fr/the-source/ai/",{"text":99,"config":365},{"href":366},"/fr-fr/the-source/security/",{"text":368,"config":369},"Plateforme et infrastructure",{"href":370},"/fr-fr/the-source/platform/","content:shared:fr-fr:the-source:navigation.yml","Navigation","shared/fr-fr/the-source/navigation.yml","shared/fr-fr/the-source/navigation",{"_path":376,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":377,"description":378,"submitMessage":379,"formData":380,"_id":384,"_type":31,"_source":32,"_file":385,"_stem":386,"_extension":35},"/shared/fr-fr/the-source/newsletter","La newsletter The Source","Recevez une mine d'informations sur l'avenir du développement logiciel.","Vous êtes désormais inscrit à la newsletter The Source.",{"config":381},{"formId":382,"formName":383,"hideRequiredLabel":19},28453,"thesourcenewsletter","content:shared:fr-fr:the-source:newsletter.yml","shared/fr-fr/the-source/newsletter.yml","shared/fr-fr/the-source/newsletter",{"_path":388,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":389,"seo":390,"content":392,"type":406,"slug":5,"_id":407,"_type":31,"title":7,"_source":32,"_file":408,"_stem":409,"_extension":35},"/fr-fr/the-source/security",{"layout":9},{"title":99,"description":391,"ogImage":7},"Découvrez comment les entreprises peuvent se protéger des dernières menaces de sécurité tout en respectant les exigences de conformité.",[393,399],{"componentName":394,"componentContent":395},"TheSourceCategoryHero",{"title":99,"description":391,"image":396},{"config":397},{"src":398},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":400,"componentContent":401},"TheSourceCategoryMainSection",{"config":402},{"gatedAssets":403},[13,404,405],"source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","application-security-in-the-digital-age","category","content:fr-fr:the-source:security:index.yml","fr-fr/the-source/security/index.yml","fr-fr/the-source/security/index",{"_path":411,"_dir":412,"_draft":6,"_partial":6,"_locale":7,"config":413,"title":414,"description":415,"link":416,"_id":422,"_type":31,"_source":32,"_file":423,"_stem":424,"_extension":35},"/shared/fr-fr/the-source/gated-assets/source-lp-guide-to-dynamic-sboms","gated-assets",{"id":13},"Guide de GitLab sur les nomenclatures logicielles dynamiques : un élément essentiel du développement logiciel moderne","Découvrez comment gagner en visibilité sur des risques organisationnels jusqu'alors non identifiés grâce à une nomenclature logicielle (SBOM).",{"text":417,"config":418},"Consulter le guide",{"href":419,"dataGaName":420,"dataGaLocation":421},"https://about.gitlab.com/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","thesource","content:shared:fr-fr:the-source:gated-assets:source-lp-guide-to-dynamic-sboms.yml","shared/fr-fr/the-source/gated-assets/source-lp-guide-to-dynamic-sboms.yml","shared/fr-fr/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",{"_path":388,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":426,"seo":427,"content":428,"type":406,"slug":5,"_id":407,"_type":31,"title":7,"_source":32,"_file":408,"_stem":409,"_extension":35},{"layout":9},{"title":99,"description":391,"ogImage":7},[429,433],{"componentName":394,"componentContent":430},{"title":99,"description":391,"image":431},{"config":432},{"src":398},{"componentName":400,"componentContent":434},{"config":435},{"gatedAssets":436},[13,404,405],[438,452,463],{"_path":439,"_dir":412,"_draft":6,"_partial":6,"_locale":7,"config":440,"title":442,"description":443,"link":444,"_id":449,"_type":31,"_source":32,"_file":450,"_stem":451,"_extension":35},"/shared/fr-fr/the-source/gated-assets/application-security-in-the-digital-age",{"id":405,"formId":441},1002,"La sécurité des applications à l'ère du numérique","Lisez les [conclusions de notre enquête menée auprès de plus de 5 000 professionnels DevSecOps dans le monde entier](https://about.gitlab.com/fr-fr/developer-survey/2024/security-compliance/) afin de comprendre pourquoi les entreprises sont confrontées à l'augmentation des surfaces d'attaque et à l'évolution des comportements à l'égard de la sécurité et de l'IA.",{"text":445,"config":446},"Lire le rapport",{"href":447,"dataGaName":448,"dataGaLocation":421},"https://about.gitlab.com/developer-survey/2024/security-compliance","Application Security in the Digital Age","content:shared:fr-fr:the-source:gated-assets:application-security-in-the-digital-age.yml","shared/fr-fr/the-source/gated-assets/application-security-in-the-digital-age.yml","shared/fr-fr/the-source/gated-assets/application-security-in-the-digital-age",{"_path":453,"_dir":412,"_draft":6,"_partial":6,"_locale":7,"config":454,"title":455,"link":456,"_id":460,"_type":31,"_source":32,"_file":461,"_stem":462,"_extension":35},"/shared/fr-fr/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"id":404},"Guide pratique sur les vecteurs de menace dans la chaîne d'approvisionnement logicielle",{"config":457},{"href":458,"dataGaName":459,"dataGaLocation":421},"https://about.gitlab.com/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:fr-fr:the-source:gated-assets:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/fr-fr/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/fr-fr/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":411,"_dir":412,"_draft":6,"_partial":6,"_locale":7,"config":464,"title":414,"description":415,"link":465,"_id":422,"_type":31,"_source":32,"_file":423,"_stem":424,"_extension":35},{"id":13},{"text":417,"config":466},{"href":419,"dataGaName":420,"dataGaLocation":421},[468,491,507,523,539,560,580,596,614,634,651,672,688,706,723,741,760,778,797,817,838,854,870,888,906,925,941,959,975,994],{"_path":469,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":471,"seo":472,"content":474,"type":486,"slug":487,"_id":488,"_type":31,"title":473,"_source":32,"_file":489,"_stem":490,"_extension":35},"/fr-fr/the-source/authors/amanda-rueda","authors",{"layout":9},{"title":473},"Amanda Rueda",[475,484],{"componentName":476,"componentContent":477},"TheSourceAuthorHero",{"config":478,"name":473,"headshot":481},{"gitlabHandle":479,"linkedInProfileUrl":480},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":473,"config":482},{"src":483},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":485},"TheSourceArticlesList","author","amanda-rueda","content:fr-fr:the-source:authors:amanda-rueda.yml","fr-fr/the-source/authors/amanda-rueda.yml","fr-fr/the-source/authors/amanda-rueda",{"_path":492,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":493,"seo":494,"content":496,"type":486,"slug":503,"_id":504,"_type":31,"title":495,"_source":32,"_file":505,"_stem":506,"_extension":35},"/fr-fr/the-source/authors/andre-michael-braun",{"layout":9},{"title":495},"Andre Michael Braun",[497,502],{"componentName":476,"componentContent":498},{"name":495,"headshot":499},{"altText":495,"config":500},{"src":501},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":485},"andre-michael-braun","content:fr-fr:the-source:authors:andre-michael-braun.yml","fr-fr/the-source/authors/andre-michael-braun.yml","fr-fr/the-source/authors/andre-michael-braun",{"_path":508,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":509,"seo":510,"content":512,"type":486,"slug":519,"_id":520,"_type":31,"title":511,"_source":32,"_file":521,"_stem":522,"_extension":35},"/fr-fr/the-source/authors/andrew-haschka",{"layout":9},{"title":511},"Andrew Haschka",[513,518],{"componentName":476,"componentContent":514},{"name":511,"headshot":515},{"altText":511,"config":516},{"src":517},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":485},"andrew-haschka","content:fr-fr:the-source:authors:andrew-haschka.yml","fr-fr/the-source/authors/andrew-haschka.yml","fr-fr/the-source/authors/andrew-haschka",{"_path":524,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":525,"seo":526,"content":528,"type":486,"slug":535,"_id":536,"_type":31,"title":527,"_source":32,"_file":537,"_stem":538,"_extension":35},"/fr-fr/the-source/authors/ayoub-fandi",{"layout":9},{"title":527},"Ayoub Fandi",[529,534],{"componentName":476,"componentContent":530},{"name":527,"headshot":531},{"altText":527,"config":532},{"src":533},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":485},"ayoub-fandi","content:fr-fr:the-source:authors:ayoub-fandi.yml","fr-fr/the-source/authors/ayoub-fandi.yml","fr-fr/the-source/authors/ayoub-fandi",{"_path":540,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":541,"seo":542,"content":544,"type":486,"slug":556,"_id":557,"_type":31,"title":543,"_source":32,"_file":558,"_stem":559,"_extension":35},"/fr-fr/the-source/authors/brian-wald",{"layout":9},{"title":543},"Brian Wald",[545,555],{"componentName":476,"componentContent":546},{"config":547,"name":543,"role":550,"bio":551,"headshot":552},{"gitlabHandle":548,"linkedInProfileUrl":549},"brianwald","https://www.linkedin.com/in/brianwald/","Head of Global Field CTO org","Brian Wald est Head of Global Field CTO org chez GitLab. Il dirige une équipe dynamique de directeurs techniques de terrain, dédiée à la transformation des pratiques de développement logiciel en entreprise.",{"altText":543,"config":553},{"src":554},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":485},"brian-wald","content:fr-fr:the-source:authors:brian-wald.yml","fr-fr/the-source/authors/brian-wald.yml","fr-fr/the-source/authors/brian-wald",{"_path":561,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":562,"seo":563,"content":565,"type":486,"slug":576,"_id":577,"_type":31,"title":564,"_source":32,"_file":578,"_stem":579,"_extension":35},"/fr-fr/the-source/authors/bryan-ross",{"layout":9},{"title":564},"Bryan Ross",[566,575],{"componentName":476,"componentContent":567},{"config":568,"name":564,"headshot":572},{"gitlabHandle":569,"twitterXProfileUrl":570,"linkedInProfileUrl":571},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":564,"config":573},{"src":574},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":485},"bryan-ross","content:fr-fr:the-source:authors:bryan-ross.yml","fr-fr/the-source/authors/bryan-ross.yml","fr-fr/the-source/authors/bryan-ross",{"_path":581,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":582,"seo":583,"content":585,"type":486,"slug":592,"_id":593,"_type":31,"title":584,"_source":32,"_file":594,"_stem":595,"_extension":35},"/fr-fr/the-source/authors/chandler-gibbons",{"layout":9},{"title":584},"Chandler Gibbons",[586,591],{"componentName":476,"componentContent":587},{"name":584,"headshot":588},{"altText":584,"config":589},{"src":590},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":485},"chandler-gibbons","content:fr-fr:the-source:authors:chandler-gibbons.yml","fr-fr/the-source/authors/chandler-gibbons.yml","fr-fr/the-source/authors/chandler-gibbons",{"_path":597,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":598,"seo":599,"content":601,"type":486,"slug":610,"_id":611,"_type":31,"title":600,"_source":32,"_file":612,"_stem":613,"_extension":35},"/fr-fr/the-source/authors/dave-steer",{"layout":9},{"title":600},"Dave Steer",[602,609],{"componentName":476,"componentContent":603},{"config":604,"name":600,"headshot":606},{"gitlabHandle":605},"dsteer",{"altText":600,"config":607},{"src":608},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":485},"dave-steer","content:fr-fr:the-source:authors:dave-steer.yml","fr-fr/the-source/authors/dave-steer.yml","fr-fr/the-source/authors/dave-steer",{"_path":615,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":616,"seo":617,"content":619,"type":486,"slug":629,"_id":630,"_type":31,"title":631,"_source":32,"_file":632,"_stem":633,"_extension":35},"/fr-fr/the-source/authors/ddesanto",{"layout":9},{"title":618},"David DeSanto",[620,628],{"componentName":476,"componentContent":621},{"config":622,"name":618,"headshot":625},{"gitlabHandle":623,"linkedInProfileUrl":624},"david","https://www.linkedin.com/in/ddesanto/",{"altText":618,"config":626},{"src":627},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":485},"ddesanto","content:fr-fr:the-source:authors:ddesanto.yml","Ddesanto","fr-fr/the-source/authors/ddesanto.yml","fr-fr/the-source/authors/ddesanto",{"_path":635,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":636,"seo":637,"content":639,"type":486,"slug":646,"_id":647,"_type":31,"title":648,"_source":32,"_file":649,"_stem":650,"_extension":35},"/fr-fr/the-source/authors/derek-debellis",{"layout":9},{"title":638},"Derek DeBellis",[640,645],{"componentName":476,"componentContent":641},{"name":638,"headshot":642},{"altText":638,"config":643},{"src":644},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":485},"derek-debellis","content:fr-fr:the-source:authors:derek-debellis.yml","Derek Debellis","fr-fr/the-source/authors/derek-debellis.yml","fr-fr/the-source/authors/derek-debellis",{"_path":652,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":653,"seo":654,"content":656,"type":486,"slug":668,"_id":669,"_type":31,"title":655,"_source":32,"_file":670,"_stem":671,"_extension":35},"/fr-fr/the-source/authors/emilio-salvador",{"layout":9},{"title":655},"Emilio Salvador",[657,667],{"componentName":476,"componentContent":658},{"config":659,"name":655,"role":662,"bio":663,"headshot":664},{"gitlabHandle":660,"linkedInProfileUrl":661},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vice President, Strategy and Developer Relations","Emilio Salvador est Vice President de la stratégie et des relations avec les développeurs chez GitLab. Cadre dans le domaine des technologies avec plus de 20 ans d'expérience, Emilio a occupé des postes chez Amazon et Microsoft. Il a plus récemment dirigé la stratégie et les opérations de l'équipe « Developer Advocacy and Experience » chez Google. Il est titulaire d'un MBA de la Sloan School of Management du MIT.",{"altText":655,"config":665},{"src":666},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":485},"emilio-salvador","content:fr-fr:the-source:authors:emilio-salvador.yml","fr-fr/the-source/authors/emilio-salvador.yml","fr-fr/the-source/authors/emilio-salvador",{"_path":673,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":674,"seo":675,"content":677,"type":486,"slug":684,"_id":685,"_type":31,"title":676,"_source":32,"_file":686,"_stem":687,"_extension":35},"/fr-fr/the-source/authors/erika-feldman",{"layout":9},{"title":676},"Erika Feldman",[678,683],{"componentName":476,"componentContent":679},{"name":676,"headshot":680},{"altText":676,"config":681},{"src":682},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":485},"erika-feldman","content:fr-fr:the-source:authors:erika-feldman.yml","fr-fr/the-source/authors/erika-feldman.yml","fr-fr/the-source/authors/erika-feldman",{"_path":689,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":690,"seo":691,"content":693,"type":486,"slug":702,"_id":703,"_type":31,"title":692,"_source":32,"_file":704,"_stem":705,"_extension":35},"/fr-fr/the-source/authors/george-kichukov",{"layout":9},{"title":692},"George Kichukov",[694,701],{"componentName":476,"componentContent":695},{"config":696,"name":692,"headshot":698},{"gitlabHandle":697},"gkichukov",{"altText":692,"config":699},{"src":700},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":485},"george-kichukov","content:fr-fr:the-source:authors:george-kichukov.yml","fr-fr/the-source/authors/george-kichukov.yml","fr-fr/the-source/authors/george-kichukov",{"_path":707,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":708,"seo":709,"content":711,"type":486,"slug":718,"_id":719,"_type":31,"title":720,"_source":32,"_file":721,"_stem":722,"_extension":35},"/fr-fr/the-source/authors/gitlab",{"layout":9},{"title":710},"GitLab",[712,717],{"componentName":476,"componentContent":713},{"name":710,"headshot":714},{"altText":710,"config":715},{"src":716},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":485},"gitlab","content:fr-fr:the-source:authors:gitlab.yml","Gitlab","fr-fr/the-source/authors/gitlab.yml","fr-fr/the-source/authors/gitlab",{"_path":724,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":725,"seo":726,"content":728,"type":486,"slug":737,"_id":738,"_type":31,"title":727,"_source":32,"_file":739,"_stem":740,"_extension":35},"/fr-fr/the-source/authors/grant-hickman",{"layout":9},{"title":727},"Grant Hickman",[729,736],{"componentName":476,"componentContent":730},{"config":731,"name":727,"headshot":733},{"gitlabHandle":732},"g.hickman",{"altText":727,"config":734},{"src":735},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":485},"grant-hickman","content:fr-fr:the-source:authors:grant-hickman.yml","fr-fr/the-source/authors/grant-hickman.yml","fr-fr/the-source/authors/grant-hickman",{"_path":742,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":743,"seo":744,"content":746,"type":486,"slug":756,"_id":757,"_type":31,"title":745,"_source":32,"_file":758,"_stem":759,"_extension":35},"/fr-fr/the-source/authors/haim-snir",{"layout":9},{"title":745},"Haim Snir",[747,755],{"componentName":476,"componentContent":748},{"config":749,"name":745,"headshot":752},{"gitlabHandle":750,"linkedInProfileUrl":751},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":745,"config":753},{"src":754},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":485},"haim-snir","content:fr-fr:the-source:authors:haim-snir.yml","fr-fr/the-source/authors/haim-snir.yml","fr-fr/the-source/authors/haim-snir",{"_path":761,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":762,"seo":763,"content":765,"type":486,"slug":769,"_id":774,"_type":31,"title":775,"_source":32,"_file":776,"_stem":777,"_extension":35},"/fr-fr/the-source/authors/iganbaruch",{"layout":9},{"title":764},"Itzik Gan Baruch",[766,773],{"componentName":476,"componentContent":767},{"config":768,"name":764,"headshot":770},{"gitlabHandle":769},"iganbaruch",{"altText":764,"config":771},{"src":772},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":485},"content:fr-fr:the-source:authors:iganbaruch.yml","Iganbaruch","fr-fr/the-source/authors/iganbaruch.yml","fr-fr/the-source/authors/iganbaruch",{"_path":779,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":780,"seo":781,"content":783,"type":486,"slug":792,"_id":793,"_type":31,"title":794,"_source":32,"_file":795,"_stem":796,"_extension":35},"/fr-fr/the-source/authors/jlongo",{"layout":9},{"title":782},"Joseph Longo",[784,791],{"componentName":476,"componentContent":785},{"config":786,"name":782,"headshot":788},{"gitlabHandle":787},"jlongo_gitlab",{"altText":782,"config":789},{"src":790},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":485},"jlongo","content:fr-fr:the-source:authors:jlongo.yml","Jlongo","fr-fr/the-source/authors/jlongo.yml","fr-fr/the-source/authors/jlongo",{"_path":798,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":799,"seo":800,"content":802,"type":486,"slug":12,"_id":814,"_type":31,"title":801,"_source":32,"_file":815,"_stem":816,"_extension":35},"/fr-fr/the-source/authors/joel-krooswyk",{"layout":9},{"title":801},"Joel Krooswyk",[803,813],{"componentName":476,"componentContent":804},{"config":805,"name":801,"role":808,"bio":809,"headshot":810},{"gitlabHandle":806,"linkedInProfileUrl":807},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Federal CTO","Joel Krooswyk est federal CTO chez GitLab. Joel contribue activement à la croissance de GitLab depuis 2017. Ses 25 années d'expérience en matière de leadership couvrent non seulement le secteur public américain, mais aussi les petites, moyennes et grandes entreprises à l'échelle mondiale. Joel cumule une profonde expertise en matière de politique gouvernementale avec une riche expérience dans les domaines de la technologie, du développement logiciel, de l'IA et de la cybersécurité. Il est souvent sollicité par le secteur public comme privé pour fournir des commentaires et des réponses dans le cadre de leurs politiques.",{"altText":801,"config":811},{"src":812},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":485},"content:fr-fr:the-source:authors:joel-krooswyk.yml","fr-fr/the-source/authors/joel-krooswyk.yml","fr-fr/the-source/authors/joel-krooswyk",{"_path":818,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":819,"seo":820,"content":822,"type":486,"slug":834,"_id":835,"_type":31,"title":821,"_source":32,"_file":836,"_stem":837,"_extension":35},"/fr-fr/the-source/authors/josh-lemos",{"layout":9},{"title":821},"Josh Lemos",[823,833],{"componentName":476,"componentContent":824},{"config":825,"name":821,"role":828,"bio":829,"headshot":830},{"gitlabHandle":826,"linkedInProfileUrl":827},"joshlemos","https://www.linkedin.com/in/joshlemos/","Chief Information Security Officer","Josh Lemos, Chief Information Security Officer chez GitLab Inc., bénéficie de 20 ans d'expérience dans la direction d'équipes de sécurité de l'information. Il est responsable de la vision, de la stratégie et du programme de l'entreprise dans le but de protéger efficacement les actifs et les technologies de l'information. Il a également pour mission de renforcer la plateforme DevSecOps de Gitlab et d'offrir une sécurité de pointe aux clients.",{"altText":821,"config":831},{"src":832},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":485},"josh-lemos","content:fr-fr:the-source:authors:josh-lemos.yml","fr-fr/the-source/authors/josh-lemos.yml","fr-fr/the-source/authors/josh-lemos",{"_path":839,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":840,"seo":841,"content":843,"type":486,"slug":850,"_id":851,"_type":31,"title":842,"_source":32,"_file":852,"_stem":853,"_extension":35},"/fr-fr/the-source/authors/julie-griffin",{"layout":9},{"title":842},"Julie Griffin",[844,849],{"componentName":476,"componentContent":845},{"name":842,"headshot":846},{"altText":842,"config":847},{"src":848},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":485},"julie-griffin","content:fr-fr:the-source:authors:julie-griffin.yml","fr-fr/the-source/authors/julie-griffin.yml","fr-fr/the-source/authors/julie-griffin",{"_path":855,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":856,"seo":857,"content":859,"type":486,"slug":866,"_id":867,"_type":31,"title":858,"_source":32,"_file":868,"_stem":869,"_extension":35},"/fr-fr/the-source/authors/kristina-weis",{"layout":9},{"title":858},"Kristina Weis",[860,865],{"componentName":476,"componentContent":861},{"name":858,"headshot":862},{"altText":858,"config":863},{"src":864},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":485},"kristina-weis","content:fr-fr:the-source:authors:kristina-weis.yml","fr-fr/the-source/authors/kristina-weis.yml","fr-fr/the-source/authors/kristina-weis",{"_path":871,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":872,"seo":873,"content":875,"type":486,"slug":884,"_id":885,"_type":31,"title":874,"_source":32,"_file":886,"_stem":887,"_extension":35},"/fr-fr/the-source/authors/lee-faus",{"layout":9},{"title":874},"Lee Faus",[876,883],{"componentName":476,"componentContent":877},{"config":878,"name":874,"headshot":880},{"gitlabHandle":879},"lfaus",{"altText":874,"config":881},{"src":882},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":485},"lee-faus","content:fr-fr:the-source:authors:lee-faus.yml","fr-fr/the-source/authors/lee-faus.yml","fr-fr/the-source/authors/lee-faus",{"_path":889,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":890,"seo":891,"content":893,"type":486,"slug":897,"_id":902,"_type":31,"title":903,"_source":32,"_file":904,"_stem":905,"_extension":35},"/fr-fr/the-source/authors/ncregan",{"layout":9},{"title":892},"Niall Cregan",[894,901],{"componentName":476,"componentContent":895},{"config":896,"name":892,"headshot":898},{"gitlabHandle":897},"ncregan",{"altText":892,"config":899},{"src":900},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":485},"content:fr-fr:the-source:authors:ncregan.yml","Ncregan","fr-fr/the-source/authors/ncregan.yml","fr-fr/the-source/authors/ncregan",{"_path":907,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":908,"seo":909,"content":911,"type":486,"slug":920,"_id":921,"_type":31,"title":922,"_source":32,"_file":923,"_stem":924,"_extension":35},"/fr-fr/the-source/authors/rschulman",{"layout":9},{"title":910},"Robin Schulman",[912,919],{"componentName":476,"componentContent":913},{"config":914,"name":910,"headshot":916},{"gitlabHandle":915},"robin",{"altText":910,"config":917},{"src":918},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":485},"rschulman","content:fr-fr:the-source:authors:rschulman.yml","Rschulman","fr-fr/the-source/authors/rschulman.yml","fr-fr/the-source/authors/rschulman",{"_path":926,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":927,"seo":928,"content":930,"type":486,"slug":937,"_id":938,"_type":31,"title":929,"_source":32,"_file":939,"_stem":940,"_extension":35},"/fr-fr/the-source/authors/sabrina-farmer",{"layout":9},{"title":929},"Sabrina Farmer",[931,936],{"componentName":476,"componentContent":932},{"name":929,"headshot":933},{"altText":929,"config":934},{"src":935},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":485},"sabrina-farmer","content:fr-fr:the-source:authors:sabrina-farmer.yml","fr-fr/the-source/authors/sabrina-farmer.yml","fr-fr/the-source/authors/sabrina-farmer",{"_path":942,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":943,"seo":944,"content":946,"type":486,"slug":955,"_id":956,"_type":31,"title":945,"_source":32,"_file":957,"_stem":958,"_extension":35},"/fr-fr/the-source/authors/sandra-gittlen",{"layout":9},{"title":945},"Sandra Gittlen",[947,954],{"componentName":476,"componentContent":948},{"config":949,"name":945,"headshot":951},{"gitlabHandle":950},"sgittlen",{"altText":945,"config":952},{"src":953},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":485},"sandra-gittlen","content:fr-fr:the-source:authors:sandra-gittlen.yml","fr-fr/the-source/authors/sandra-gittlen.yml","fr-fr/the-source/authors/sandra-gittlen",{"_path":960,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":961,"seo":962,"content":964,"type":486,"slug":971,"_id":972,"_type":31,"title":963,"_source":32,"_file":973,"_stem":974,"_extension":35},"/fr-fr/the-source/authors/sharon-gaudin",{"layout":9},{"title":963},"Sharon Gaudin",[965,970],{"componentName":476,"componentContent":966},{"name":963,"headshot":967},{"altText":963,"config":968},{"src":969},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":485},"sharon-gaudin","content:fr-fr:the-source:authors:sharon-gaudin.yml","fr-fr/the-source/authors/sharon-gaudin.yml","fr-fr/the-source/authors/sharon-gaudin",{"_path":976,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":977,"seo":978,"content":980,"type":486,"slug":990,"_id":991,"_type":31,"title":979,"_source":32,"_file":992,"_stem":993,"_extension":35},"/fr-fr/the-source/authors/stephen-walters",{"layout":9},{"title":979},"Stephen Walters",[981,989],{"componentName":476,"componentContent":982},{"config":983,"name":979,"headshot":986},{"gitlabHandle":984,"linkedInProfileUrl":985},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":979,"config":987},{"src":988},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":485},"stephen-walters","content:fr-fr:the-source:authors:stephen-walters.yml","fr-fr/the-source/authors/stephen-walters.yml","fr-fr/the-source/authors/stephen-walters",{"_path":995,"_dir":470,"_draft":6,"_partial":6,"_locale":7,"config":996,"seo":997,"content":999,"type":486,"slug":1011,"_id":1012,"_type":31,"title":1013,"_source":32,"_file":1014,"_stem":1015,"_extension":35},"/fr-fr/the-source/authors/taylor-mccaslin",{"layout":9},{"title":998},"Taylor McCaslin",[1000,1010],{"componentName":476,"componentContent":1001},{"config":1002,"name":998,"role":1005,"bio":1006,"headshot":1007},{"gitlabHandle":1003,"linkedInProfileUrl":1004},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Group Manager, Product - Data Science","Taylor McCaslin est Product Lead IA/ML chez GitLab et supervise les chefs de produit en charge des groupes dédiés aux fonctionnalités d'IA et au cycle de vie des modèles d'IA (ModelOps). Il définit la vision et oriente les processus afin d'intégrer la science des données au programme DevOps de GitLab. Avant de rejoindre GitLab, Taylor a forgé son expérience chez Indeed, Duo Security et WP Engine.",{"altText":998,"config":1008},{"src":1009},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":485},"taylor-mccaslin","content:fr-fr:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","fr-fr/the-source/authors/taylor-mccaslin.yml","fr-fr/the-source/authors/taylor-mccaslin",1753733344076]