{"id":125840,"date":"2023-12-15T15:09:49","date_gmt":"2023-12-15T13:09:49","guid":{"rendered":"https:\/\/jfrog.com\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"},"modified":"2025-01-27T18:28:09","modified_gmt":"2025-01-27T16:28:09","slug":"enhancing-aws-security-with-jfrog-and-assumerole","status":"publish","type":"post","link":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","title":{"rendered":"Renforcer la s\u00e9curit\u00e9 de Kubernetes : Int\u00e9gration transparente de JFrog avec AWS AssumeRole"},"content":{"rendered":"<h2><img decoding=\"async\" class=\"alignnone size-full wp-image-123175\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141727\/AssumeRole-863x300-1.png\" alt=\"JFrog Access and AWS AssumeRoll enhance Kuernetes security.\" width=\"863\" height=\"300\" \/><\/h2>\n<h2 class=\"entry-title text-left\">Qu\u2019est-ce que AssumeRole et pourquoi<\/h2>\n<p>Dans l\u2019environnement en constante \u00e9volution des applications \u00ab\u00a0cloud native\u00a0\u00bb, la s\u00e9curit\u00e9 et les connexions transparentes sont une priorit\u00e9. De nombreux professionnels <a href=\"https:\/\/jfrog.com\/fr\/devops-tools\/what-is-devops\/\">DevOps<\/a> et SecOps utilisent les fonctionnalit\u00e9s natives de Kubernetes pour g\u00e9rer la s\u00e9curit\u00e9 de leurs conteneurs et ainsi garder le contr\u00f4le des droits d\u2019acc\u00e8s et des secrets afin d\u2019am\u00e9liorer la s\u00e9curit\u00e9. L\u2019int\u00e9gration entre <a href=\"https:\/\/docs.aws.amazon.com\/STS\/latest\/APIReference\/API_AssumeRole.html\">AWS AssumeRole<\/a> et <a href=\"https:\/\/jfrog.com\/blog\/managing-security-entities-with-jfrog-access\/\">JFrog Access<\/a> dans Amazon Elastic Kubernetes Services (EKS), renforce la s\u00e9curit\u00e9 des entreprises en automatisant la gestion des secrets.<\/p>\n<p>Alors que le paysage du cloud computing continue d\u2019\u00e9voluer, il existe un nombre important de clients communs AWS\/JFrog pour lesquels l\u2019exploitation de la puissance d\u2019AssumeRole est devenue essentielle. Qu\u2019est-ce que AssumeRole et pourquoi rev\u00eat-il une telle importance dans le domaine de la s\u00e9curit\u00e9 AWS\u00a0?<\/p>\n<h2>La gestion manuelle des secrets dans Kubernetes est un d\u00e9fi<\/h2>\n<p>Les m\u00e9thodes traditionnelles de gestion des identifiants d\u2019acc\u00e8s et des secrets dans Kubernetes n\u00e9cessitent souvent une intervention manuelle, <strong>introduisant plusieurs <a href=\"https:\/\/jfrog.com\/fr\/devops-tools\/article\/software-vulnerability\/\">vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9<\/a> potentielles<\/strong> qui peuvent compromettre la s\u00e9curit\u00e9 globale. Voici quelques probl\u00e8mes courants qui peuvent survenir lors de l\u2019utilisation d\u2019une approche manuelle\u00a0:<\/p>\n<ul>\n<li><strong>Erreur humaine<\/strong>\u00a0\u2013\u00a0Augmente la probabilit\u00e9 de mauvaises configurations et d\u2019exposition d\u2019informations sensibles.<\/li>\n<li><strong>Stockage non s\u00e9curis\u00e9<\/strong>\u00a0\u2013\u00a0Le stockage de secrets dans des fichiers en texte clair peut les exposer \u00e0 un acc\u00e8s non autoris\u00e9.<\/li>\n<li><strong>Lacunes en mati\u00e8re d\u2019audit et de journalisation<\/strong>\u00a0\u2013\u00a0Les m\u00e9thodes manuelles ne disposent pas de m\u00e9canismes de suivi appropri\u00e9s, ce qui rend difficile l\u2019identification des personnes qui ont acc\u00e9d\u00e9 \u00e0 des informations sensibles ou les ont modifi\u00e9es.<\/li>\n<li><strong>Secrets statiques<\/strong>\u00a0\u2013\u00a0Les secrets invariables repr\u00e9sentent un risque important et sont difficiles \u00e0 maintenir avec les m\u00e9thodes traditionnelles.<\/li>\n<li><strong>Attribution manuelle de donn\u00e9es d\u2019acc\u00e8s<\/strong>\u00a0\u2013\u00a0L\u2019attribution manuelle de donn\u00e9es d\u2019acc\u00e8s peut prendre du temps et \u00eatre source d\u2019erreurs, ce qui augmente le risque d\u2019usurpation d\u2019identit\u00e9.<\/li>\n<\/ul>\n<p>Pour rem\u00e9dier \u00e0 ces vuln\u00e9rabilit\u00e9s, il est important d\u2019adopter des pratiques plus s\u00fbres qui permettent d\u2019automatiser les processus cl\u00e9s afin d\u2019\u00e9viter ces vuln\u00e9rabilit\u00e9s et d\u2019autres encore.<\/p>\n<h2>La solution automatis\u00e9e AssumeRole-JFrog<\/h2>\n<p>L\u2019int\u00e9gration d\u2019AssumeRole et de JFrog Access constitue une solution puissante. En s\u2019appuyant sur AssumeRole, les utilisateurs d\u2019AWS <a href=\"https:\/\/aws.amazon.com\/iam\/\">Identity and Access Management<\/a> (IAM) peuvent temporairement obtenir des autorisations pour effectuer des actions d\u2019une mani\u00e8re s\u00fbre et contr\u00f4l\u00e9e.<\/p>\n<p>En outre, l\u2019int\u00e9gration d\u2019outils tiers tels que JFrog Artifactory dans les environnements AWS permet d\u2019extraire de mani\u00e8re transparente des images du registre priv\u00e9 JFrog Docker, resserrant ainsi les m\u00e9canismes de contr\u00f4le d\u2019acc\u00e8s pour garantir une int\u00e9gration fluide qui s\u2019aligne sur les pratiques \u00e9tablies du secteur.<\/p>\n<p>Voici quelques-uns des principaux avantages de la solution AWS AssumeRole et JFrog Access\u00a0:<\/p>\n<ol>\n<li><strong>Rotation automatis\u00e9e des jetons<\/strong>\u00a0: JFrog Access peut d\u00e9sormais g\u00e9rer la rotation des jetons de mani\u00e8re transparente au sein de votre cluster EKS. Il n\u2019est donc plus n\u00e9cessaire d\u2019intervenir manuellement, ce qui r\u00e9duit le risque d\u2019acc\u00e8s non autoris\u00e9 d\u00fb \u00e0 des informations d\u2019identification n\u00e9glig\u00e9es ou oubli\u00e9es.<\/li>\n<li><strong>S\u00e9curit\u00e9 renforc\u00e9e<\/strong>\u00a0: Avec AssumeRole, vous pouvez mettre en \u0153uvre des contr\u00f4les d\u2019acc\u00e8s pr\u00e9cis, garantissant que seules les entit\u00e9s autoris\u00e9es ont acc\u00e8s \u00e0 votre cluster EKS et \u00e0 JFrog Artifactory. Cela permet de renforcer la s\u00e9curit\u00e9 en minimisant la surface d\u2019attaque et en adh\u00e9rant au principe du moindre privil\u00e8ge.<\/li>\n<li><strong>Int\u00e9gration de l\u2019environnement AWS<\/strong>\u00a0: L\u2019int\u00e9gration d\u2019AssumeRole et de JFrog Access fait de votre d\u00e9p\u00f4t Artifactory un \u00e9l\u00e9ment central de votre environnement AWS. Cela signifie que vous pouvez r\u00e9cup\u00e9rer des images de votre d\u00e9p\u00f4t Artifactory comme s\u2019il s\u2019agissait d\u2019un composant natif de votre cluster EKS.<\/li>\n<\/ol>\n<h2>AssumeRole JFrog\u00a0\u2013\u00a0Architecture et d\u00e9ploiement<\/h2>\n<p style=\"text-align: left\">Le diagramme ci-dessous montre l\u2019architecture de base de la fa\u00e7on dont AssumeRole s\u2019int\u00e8gre \u00e0 JFrog Access pour fournir un contr\u00f4le d\u2019acc\u00e8s am\u00e9lior\u00e9\u00a0:<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"size-full wp-image-123259 aligncenter\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/18092157\/AssumeRole_operational_diagram_v2.png\" alt=\"The JFrog Platform and AWS AssumeRole enhance EKS security\" width=\"1578\" height=\"746\" \/><em>En d\u00e9finissant cette annotation, EKS g\u00e9n\u00e8re automatiquement des informations d\u2019identification pour \u00ab myRole \u00bb qui sont disponibles pour toute charge de travail utilisant le compte de service.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Si vous souhaitez passer d\u2019une gestion manuelle des secrets vuln\u00e9rable \u00e0 une gestion automatis\u00e9e et s\u00e9curis\u00e9e des secrets, votre voyage vers un avenir conteneuris\u00e9 plus s\u00fbr et plus transparent commence ici.<\/p>\n<p>Consultez notre <a href=\"https:\/\/jfrog.com\/help\/r\/setting-up-jfrog-s-assumerole-capabilities-in-aws\/artifactory-setting-up-jfrog-s-assumerole-capabilities-in-aws\">guide d\u2019installation et de configuration \u00e9tape par \u00e9tape<\/a> et d\u00e9couvrez \u00e0 quelle vitesse vous pouvez utiliser cette puissante fonctionnalit\u00e9.<\/p>\n<h2>Conclusion<\/h2>\n<p>L\u2019int\u00e9gration d\u2019AWS AssumeRole et de JFrog Access dans votre environnement EKS marque une \u00e9tape importante vers la s\u00e9curit\u00e9 et l\u2019efficacit\u00e9 op\u00e9rationnelle au niveau de votre organisation. En automatisant la rotation des jetons, en am\u00e9liorant les contr\u00f4les d\u2019acc\u00e8s et en int\u00e9grant de mani\u00e8re transparente JFrog Artifactory dans votre environnement AWS, vous \u00eates mieux plac\u00e9 pour g\u00e9rer vos charges de travail conteneuris\u00e9es de mani\u00e8re plus s\u00fbre et plus efficace. Consultez la <a href=\"https:\/\/jfrog.com\/fr\/partner\/amazon\/\">Page des partenaires AWS<\/a> pour plus d\u2019informations sur la fa\u00e7on dont JFrog et AWS rendent le d\u00e9veloppement d\u2019applications cloud plus s\u00fbr et plus efficace pour nos clients.<\/p>\n<p>Les clients de JFrog qui souhaitent commencer peuvent consulter la documentation AssumeRole sur la <a href=\"https:\/\/jfrog.com\/help\/r\/setting-up-jfrog-s-assumerole-capabilities-in-aws\/artifactory-setting-up-jfrog-s-assumerole-capabilities-in-aws\">Base de connaissances de JFrog<\/a>.<\/p>\n<p>Si vous n\u2019\u00eates pas encore client de JFrog SaaS et que vous souhaitez en savoir plus, inscrivez-vous pour un essai gratuit de la <a href=\"https:\/\/jfrog.com\/fr\/start-free\/aws\/\">plateforme de cha\u00eene d\u2019approvisionnement logicielle Jfrog sur AWS.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Qu\u2019est-ce que AssumeRole et pourquoi Dans l\u2019environnement en constante \u00e9volution des applications \u00ab\u00a0cloud native\u00a0\u00bb, la s\u00e9curit\u00e9 et les connexions transparentes sont une priorit\u00e9. De nombreux professionnels DevOps et SecOps utilisent les fonctionnalit\u00e9s natives de Kubernetes pour g\u00e9rer la s\u00e9curit\u00e9 de leurs conteneurs et ainsi garder le contr\u00f4le des droits d\u2019acc\u00e8s et des secrets afin d\u2019am\u00e9liorer &hellip;<\/p>\n","protected":false},"author":590,"featured_media":123180,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10424,10425,10153,9963,9393,9212],"tags":[],"class_list":["post-125840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pipelines-fr","category-distribution-fr","category-securite-et-devsecops","category-plateforme-jfrog","category-categories-de-blog-principales","category-non-classifiee"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9 Kubernetes et int\u00e9gration de JFrog avec AWS AssumeRole | JFrog<\/title>\n<meta name=\"description\" content=\"L\u2019int\u00e9gration d\u2019AWS AssumeRole et de JFrog Access dans votre environnement EKS vous permet de renforcer la s\u00e9curit\u00e9 de Kubernetes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/125840\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Renforcer la s\u00e9curit\u00e9 de Kubernetes : Int\u00e9gration transparente de JFrog avec AWS AssumeRole\" \/>\n<meta property=\"og:description\" content=\"L\u2019int\u00e9gration d\u2019AWS AssumeRole et de JFrog Access dans votre environnement EKS vous permet de renforcer la s\u00e9curit\u00e9 de Kubernetes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-15T13:09:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-27T16:28:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"203\" \/>\n\t<meta property=\"og:image:height\" content=\"148\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"drewt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"drewt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\"},\"author\":{\"name\":\"drewt\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28\"},\"headline\":\"Renforcer la s\u00e9curit\u00e9 de Kubernetes : Int\u00e9gration transparente de JFrog avec AWS AssumeRole\",\"datePublished\":\"2023-12-15T13:09:49+00:00\",\"dateModified\":\"2025-01-27T16:28:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\"},\"wordCount\":985,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"articleSection\":[\"Pipelines\",\"Distribution\",\"S\u00e9curit\u00e9 et DevSecOps\",\"Plateforme JFrog\",\"Cat\u00e9gories de Blog Principales\",\"Non classifi\u00e9(e)\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\",\"url\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\",\"name\":\"S\u00e9curit\u00e9 Kubernetes et int\u00e9gration de JFrog avec AWS AssumeRole | JFrog\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"datePublished\":\"2023-12-15T13:09:49+00:00\",\"dateModified\":\"2025-01-27T16:28:09+00:00\",\"description\":\"L\u2019int\u00e9gration d\u2019AWS AssumeRole et de JFrog Access dans votre environnement EKS vous permet de renforcer la s\u00e9curit\u00e9 de Kubernetes\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"width\":203,\"height\":148,\"caption\":\"JFrog Access and AWS AssumeRoll enhance Kuernetes security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Renforcer la s\u00e9curit\u00e9 de Kubernetes : Int\u00e9gration transparente de JFrog avec AWS AssumeRole\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/fr\/#website\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28\",\"name\":\"drewt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g\",\"caption\":\"drewt\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 Kubernetes et int\u00e9gration de JFrog avec AWS AssumeRole | JFrog","description":"L\u2019int\u00e9gration d\u2019AWS AssumeRole et de JFrog Access dans votre environnement EKS vous permet de renforcer la s\u00e9curit\u00e9 de Kubernetes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/125840","og_locale":"fr_FR","og_type":"article","og_title":"Renforcer la s\u00e9curit\u00e9 de Kubernetes : Int\u00e9gration transparente de JFrog avec AWS AssumeRole","og_description":"L\u2019int\u00e9gration d\u2019AWS AssumeRole et de JFrog Access dans votre environnement EKS vous permet de renforcer la s\u00e9curit\u00e9 de Kubernetes","og_url":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2023-12-15T13:09:49+00:00","article_modified_time":"2025-01-27T16:28:09+00:00","og_image":[{"width":203,"height":148,"url":"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","type":"image\/png"}],"author":"drewt","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"drewt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"},"author":{"name":"drewt","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28"},"headline":"Renforcer la s\u00e9curit\u00e9 de Kubernetes : Int\u00e9gration transparente de JFrog avec AWS AssumeRole","datePublished":"2023-12-15T13:09:49+00:00","dateModified":"2025-01-27T16:28:09+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"},"wordCount":985,"publisher":{"@id":"https:\/\/jfrog.com\/fr\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","articleSection":["Pipelines","Distribution","S\u00e9curit\u00e9 et DevSecOps","Plateforme JFrog","Cat\u00e9gories de Blog Principales","Non classifi\u00e9(e)"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","url":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","name":"S\u00e9curit\u00e9 Kubernetes et int\u00e9gration de JFrog avec AWS AssumeRole | JFrog","isPartOf":{"@id":"https:\/\/jfrog.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","datePublished":"2023-12-15T13:09:49+00:00","dateModified":"2025-01-27T16:28:09+00:00","description":"L\u2019int\u00e9gration d\u2019AWS AssumeRole et de JFrog Access dans votre environnement EKS vous permet de renforcer la s\u00e9curit\u00e9 de Kubernetes","breadcrumb":{"@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","width":203,"height":148,"caption":"JFrog Access and AWS AssumeRoll enhance Kuernetes security."},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/fr\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Renforcer la s\u00e9curit\u00e9 de Kubernetes : Int\u00e9gration transparente de JFrog avec AWS AssumeRole"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/fr\/#website","url":"https:\/\/jfrog.com\/fr\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/fr\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28","name":"drewt","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g","caption":"drewt"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/125840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/users\/590"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/comments?post=125840"}],"version-history":[{"count":3,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/125840\/revisions"}],"predecessor-version":[{"id":147891,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/125840\/revisions\/147891"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/media\/123180"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/media?parent=125840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/categories?post=125840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/tags?post=125840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}