{"id":6128,"date":"2023-07-16T22:59:26","date_gmt":"2023-07-16T20:59:26","guid":{"rendered":"https:\/\/kalweit-its.de\/?page_id=6128"},"modified":"2024-02-24T10:40:27","modified_gmt":"2024-02-24T09:40:27","slug":"devsecops","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/fr\/prestations\/devsecops\/","title":{"rendered":"DevSecOps"},"content":{"rendered":"

[et_pb_section fb_built=\u00a0\u00bb1″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb0px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb||10px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/kalweit-its.de\/wp-content\/uploads\/2023\/07\/devops-3155973_1280.jpg\u00a0\u00bb title_text=\u00a0\u00bbdevops-3155973_1280″ _builder_version=\u00a0\u00bb4.21.0″ _module_preset=\u00a0\u00bb5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb0px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb|||on|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

DevSecops<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1″ module_id=\u00a0\u00bbdevsecops\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px||20px||true|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

La s\u00e9curit\u00e9 informatique est un processus global. Dans le d\u00e9veloppement d’applications en particulier, il peut \u00eatre \u00e9conomiquement int\u00e9ressant d’identifier les zones probl\u00e9matiques en mati\u00e8re de s\u00e9curit\u00e9 non pas au moment de la sortie du produit, mais d\u00e8s le processus de codage.<\/p>\n

En tant que boutique de conseil exp\u00e9riment\u00e9e, sp\u00e9cialis\u00e9e dans la r\u00e9alisation de tests d’intrusion, nous connaissons les normes de l’\u00e9tat de l’art, les vecteurs d’attaque connus ou fr\u00e9quemment rencontr\u00e9s et les obstacles dans le d\u00e9veloppement s\u00e9curis\u00e9 de logiciels. Les connaissances acquises lors de chaque test d’intrusion nous permettent d’adapter ces connaissances et de les transmettre dans le cadre du conseil aux entreprises.<\/p>\n

 <\/p>\n

 <\/p>\n

 <\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image.jpg\u00a0\u00bb title_text=\u00a0\u00bbimage\u00a0\u00bb module_class=\u00a0\u00bbcrop-img-3-2 animate-img\u00a0\u00bb _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bb8d58e759-e650-4217-8248-3d6426f90cd2″ global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]Les risques de s\u00e9curit\u00e9 peuvent ainsi \u00eatre identifi\u00e9s tr\u00e8s t\u00f4t et pris en compte dans le cadre du d\u00e9veloppement, avant que d’autres cycles de projet n’avancent.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb2_5,3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb2_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

Nous vous soutenons dans les domaines suivants<\/h4>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb3_5″ _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16″ _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n

D\u00e9veloppement et mise en \u0153uvre de concepts DevSecOps<\/p>\n