{"id":147882,"date":"2024-05-02T22:57:51","date_gmt":"2024-05-02T20:57:51","guid":{"rendered":"https:\/\/jfrog.com\/blog\/shift-left-vs-shift-right-security\/"},"modified":"2025-01-27T18:21:17","modified_gmt":"2025-01-27T16:21:17","slug":"shift-left-vs-shift-right-security","status":"publish","type":"post","link":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/","title":{"rendered":"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-130103\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03145012\/863x300-4-1.png\" alt=\"\" width=\"863\" height=\"300\" \/><\/p>\n<p>Malgr\u00e9 les efforts des organisations, les menaces \u00e0 la s\u00e9curit\u00e9 augmentent et les acteurs malveillants ne cessent de faire \u00e9voluer leurs tactiques. Malheureusement, la situation ne fait que s\u2019intensifier \u00e0 mesure que des pirates informatiques de tous horizons exploitent les techniques d\u2019intelligence artificielle (IA) et d\u2019apprentissage machine (ML).<\/p>\n<p>Pour lutter contre ces menaces, les \u00e9quipes de s\u00e9curit\u00e9 doivent mettre en place des barri\u00e8res et des contr\u00f4les tout au long du cycle de d\u00e9veloppement des logiciels. Une v\u00e9ritable s\u00e9curit\u00e9 de bout en bout implique l\u2019adoption d\u2019une combinaison d\u2019approches proactives (Shift Left) et r\u00e9actives (Shift Right) pour s\u00e9curiser les applications \u00e0 chaque \u00e9tape de leur d\u00e9veloppement.<\/p>\n<p>Bien que le concept de \u00ab Shift Left \u00bb est plus largement connu, il continue d\u2019\u00e9voluer. Les outils d\u2019IA g\u00e9n\u00e9rative comme Copilot sont de plus en plus utilis\u00e9s par les d\u00e9veloppeurs pour les aider \u00e0 \u00e9crire plus de code, plus rapidement et de mani\u00e8re plus s\u00fbre. Par ailleurs, l\u2019approche \u00ab Shift Right \u00bb implique la protection de l\u2019environnement de production, qui, selon votre strat\u00e9gie de d\u00e9ploiement, peut inclure des applications conteneuris\u00e9es et des d\u00e9ploiements cloud native.<\/p>\n<p>Pour en savoir plus sur ce sujet, t\u00e9l\u00e9chargez notre e-book : <a href=\"https:\/\/jfrog.com\/fr\/ebook\/shift-left-and-right-sdlc-security\/\">\u00ab Shift Left and Right : La cl\u00e9 pour s\u00e9curiser votre cha\u00eene d\u2019approvisionnement logicielle de bout en bout. \u00bb<\/a><\/p>\n\n    <a class=\"button button-primary\"  href=\"https:\/\/jfrog.com\/fr\/ebook\/shift-left-and-right-sdlc-security\/\" target=\"_self\">\n    <span>T\u00e9l\u00e9charger l\u2019e-book<\/span>\n    <\/a>\n    \n<h2>Qu\u2019est-ce que la s\u00e9curit\u00e9 Shift Right ?<\/h2>\n<p>En d\u00e9pla\u00e7ant les tests de s\u00e9curit\u00e9 vers une approche Shift Right, on se concentre sur les tests continus des applications fonctionnant dans un environnement de production, en \u00e9tablissant des contr\u00f4les de s\u00e9curit\u00e9 continus et en \u00e9vitant que les vuln\u00e9rabilit\u00e9s d\u00e9tect\u00e9es apr\u00e8s le d\u00e9ploiement ne soient incluses dans la prochaine mise \u00e0 jour. Si le concept de s\u00e9curit\u00e9 Shift Left est plus connu, la s\u00e9curit\u00e9 Shift Right est tout aussi importante lorsqu\u2019il s\u2019agit de prot\u00e9ger la cha\u00eene d\u2019approvisionnement logicielle de mani\u00e8re int\u00e9grale.<\/p>\n<p>Elle met l\u2019accent sur les mesures de s\u00e9curit\u00e9 pendant les phases d\u2019ex\u00e9cution et de d\u00e9ploiement, afin d\u2019am\u00e9liorer l\u2019exp\u00e9rience de l\u2019utilisateur et de s\u2019assurer qu\u2019il n\u2019y a pas de probl\u00e8mes avant la publication des mises \u00e0 jour logicielles. Cela implique de surveiller les environnements de production, de d\u00e9tecter les incidents de s\u00e9curit\u00e9 et d\u2019y r\u00e9pondre, et d\u2019am\u00e9liorer en permanence la s\u00e9curit\u00e9 de leurs logiciels sur la base des r\u00e9actions du monde r\u00e9el. La s\u00e9curit\u00e9 Shift Right reconna\u00eet que des vuln\u00e9rabilit\u00e9s peuvent subsister ou \u00e9merger dans les environnements de production, \u00e9largissant ainsi la surface d\u2019attaque \u00e0 des probl\u00e8mes tels que les mauvaises configurations, les images de conteneurs vuln\u00e9rables et les exploits d\u2019ex\u00e9cution.<\/p>\n<h2>Qu\u2019est-ce que la s\u00e9curit\u00e9 Shift Left ?<\/h2>\n<p>D\u2019autre part, le concept de la s\u00e9curit\u00e9 Shift Left implique l\u2019int\u00e9gration de pratiques de s\u00e9curit\u00e9 d\u00e8s le d\u00e9but du cycle de d\u00e9veloppement, r\u00e9duisant ainsi la probabilit\u00e9 d\u2019introduire des vuln\u00e9rabilit\u00e9s dans votre environnement de d\u00e9veloppement. Repr\u00e9sentant le bord le plus \u00e0 gauche (Left), les d\u00e9veloppeurs de logiciels assurent la s\u00e9curit\u00e9 par le biais de pratiques de codage s\u00e9curis\u00e9es en emp\u00eachant le code non s\u00e9curis\u00e9 d\u2019\u00eatre compil\u00e9 dans un binaire logiciel.<\/p>\n<p>L\u2019objectif est de minimiser la surface d\u2019attaque en pr\u00e9venant les vuln\u00e9rabilit\u00e9s \u00e0 un stade pr\u00e9coce, telles que les pratiques de codage risqu\u00e9es et les faiblesses en mati\u00e8re d\u2019authentification. La d\u00e9tection et la correction des bogues \u00e0 un stade pr\u00e9coce du processus permettent \u00e9galement de r\u00e9duire les co\u00fbts et les complications li\u00e9s \u00e0 la rem\u00e9diation.<\/p>\n<h2>Shift Left VS Shift Right<\/h2>\n<p>La s\u00e9curit\u00e9 Shift Left et la s\u00e9curit\u00e9 Shift Right sont deux approches distinctes qui int\u00e8grent les pratiques de s\u00e9curit\u00e9 \u00e0 diff\u00e9rents stades du cycle de d\u00e9veloppement des logiciels. Le Shift Right englobe l\u2019application des pratiques de s\u00e9curit\u00e9 dans les phases de production et de runtime, alors que le Shift Left vise les \u00e9tapes initiales du processus.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-130089\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/02212730\/Screenshot-2024-05-01-at-4.18.55%E2%80%AFPM.png\" alt=\"\" width=\"982\" height=\"206\" \/><\/p>\n<p><span style=\"font-weight: 400\">Alors que les pratiques de s\u00e9curit\u00e9 Shift Left permettent de d\u00e9tecter les probl\u00e8mes \u00e0 un stade pr\u00e9coce, les tests Shift Right offrent une protection essentielle pour le d\u00e9ploiement et l\u2019environnement d\u2019ex\u00e9cution, en veillant \u00e0 ce que l\u2019application fonctionne comme pr\u00e9vu en toutes circonstances. La strat\u00e9gie la plus efficace pour s\u00e9curiser la cha\u00eene d\u2019approvisionnement logicielle consiste \u00e0 adopter les deux approches, Shift Left et Shift Right.<\/span><\/p>\n<p><b>S\u00e9curiser le cycle de d\u00e9veloppement des logiciels de bout en bout<\/b><\/p>\n<p>Le cycle de vie du d\u00e9veloppement logiciel (SDLC) est un framework qui d\u00e9crit un processus efficace pour toutes les \u00e9tapes du d\u00e9veloppement des logiciels, y compris les consid\u00e9rations de co\u00fbt et de temps. Au cours des diff\u00e9rentes \u00e9tapes du d\u00e9veloppement d\u2019un logiciel, de nouvelles vuln\u00e9rabilit\u00e9s peuvent appara\u00eetre, ce qui rend essentielle la mise en \u0153uvre de mesures de s\u00e9curit\u00e9 continues. L\u2019application de pratiques de s\u00e9curit\u00e9 tout au long du SDLC permet d\u2019att\u00e9nuer les risques et de garantir que les versions des logiciels sont \u00e0 la fois efficaces et s\u00fbres.<\/p>\n<p><b>Prochaines \u00e9tapes<\/b><\/p>\n<p>Les menaces de s\u00e9curit\u00e9 croissantes qui p\u00e8sent sur la cha\u00eene d\u2019approvisionnement logicielle des organisations sont une pr\u00e9occupation urgente, en particulier avec les progr\u00e8s de l\u2019intelligence artificielle et de l\u2019apprentissage automatique. Pour r\u00e9soudre ce probl\u00e8me, il est essentiel de mettre en \u0153uvre des contr\u00f4les de s\u00e9curit\u00e9 complets tout au long du cycle de d\u00e9veloppement des logiciels. Cela implique l\u2019adoption d\u2019une approche proactive Shift Left et d\u2019une approche r\u00e9active Shift Right. En combinant ces approches de la s\u00e9curit\u00e9, les entreprises peuvent prot\u00e9ger efficacement leurs applications \u00e0 chaque \u00e9tape de leur d\u00e9veloppement.<\/p>\n<p>Pour plus d\u2019informations sur la mani\u00e8re d\u2019appliquer une approche Shift Left et Shift Right \u00e0 la s\u00e9curit\u00e9 de la cha\u00eene d\u2019approvisionnement logicielle, <a href=\"https:\/\/jfrog.com\/ebook\/shift-left-and-right-sdlc-security\/\">consultez notre e-book<\/a>. Ou, pour plus de d\u00e9tails, consultez l\u2019infographie : <a href=\"https:\/\/jfrog.com\/fr\/infographic\/shift-left-and-shift-right-security-strategies\/\">Shift Everywhere<\/a>.<\/p>\n<figure id=\"attachment_128869\" aria-describedby=\"caption-attachment-128869\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/jfrog.com\/fr\/infographic\/shift-left-and-shift-right-security-strategies\/\"><img decoding=\"async\" class=\"wp-image-128869\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/04\/18151150\/JFrog_Shift-left_Shift-Right-2.png\" alt=\"\" width=\"600\" height=\"1682\" \/><\/a><figcaption id=\"caption-attachment-128869\" class=\"wp-caption-text\"><em>Cliquez ci-dessus pour voir l\u2019infographie compl\u00e8te<\/em><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Malgr\u00e9 les efforts des organisations, les menaces \u00e0 la s\u00e9curit\u00e9 augmentent et les acteurs malveillants ne cessent de faire \u00e9voluer leurs tactiques. Malheureusement, la situation ne fait que s\u2019intensifier \u00e0 mesure que des pirates informatiques de tous horizons exploitent les techniques d\u2019intelligence artificielle (IA) et d\u2019apprentissage machine (ML). Pour lutter contre ces menaces, les \u00e9quipes &hellip;<\/p>\n","protected":false},"author":506,"featured_media":130098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10153],"tags":[10722,10723,10724,9997],"class_list":["post-147882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-et-devsecops","tag-shift-right-fr","tag-shift-left-fr","tag-security-fr","tag-devsecops-fr","resource_categories-security","resource_categories-devsecops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te | JFrog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/147882\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te\" \/>\n<meta property=\"og:description\" content=\"Malgr\u00e9 les efforts des organisations, les menaces \u00e0 la s\u00e9curit\u00e9 augmentent et les acteurs malveillants ne cessent de faire \u00e9voluer leurs tactiques. Malheureusement, la situation ne fait que s\u2019intensifier \u00e0 mesure que des pirates informatiques de tous horizons exploitent les techniques d\u2019intelligence artificielle (IA) et d\u2019apprentissage machine (ML). Pour lutter contre ces menaces, les \u00e9quipes &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-02T20:57:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-27T16:21:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144851\/1200x630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"zoer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zoer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/\"},\"author\":{\"name\":\"zoer\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\"},\"headline\":\"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te\",\"datePublished\":\"2024-05-02T20:57:51+00:00\",\"dateModified\":\"2025-01-27T16:21:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/\"},\"wordCount\":1103,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"keywords\":[\"shift-right\",\"shift-left\",\"security\",\"DevSecOps\"],\"articleSection\":[\"S\u00e9curit\u00e9 et DevSecOps\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/\",\"url\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/\",\"name\":\"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te | JFrog\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"datePublished\":\"2024-05-02T20:57:51+00:00\",\"dateModified\":\"2025-01-27T16:21:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png\",\"width\":203,\"height\":148},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/fr\/#website\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\",\"name\":\"zoer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"caption\":\"zoer\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te | JFrog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/147882","og_locale":"fr_FR","og_type":"article","og_title":"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te","og_description":"Malgr\u00e9 les efforts des organisations, les menaces \u00e0 la s\u00e9curit\u00e9 augmentent et les acteurs malveillants ne cessent de faire \u00e9voluer leurs tactiques. Malheureusement, la situation ne fait que s\u2019intensifier \u00e0 mesure que des pirates informatiques de tous horizons exploitent les techniques d\u2019intelligence artificielle (IA) et d\u2019apprentissage machine (ML). Pour lutter contre ces menaces, les \u00e9quipes &hellip;","og_url":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2024-05-02T20:57:51+00:00","article_modified_time":"2025-01-27T16:21:17+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144851\/1200x630.png","type":"image\/png"}],"author":"zoer","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"zoer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/"},"author":{"name":"zoer","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e"},"headline":"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te","datePublished":"2024-05-02T20:57:51+00:00","dateModified":"2025-01-27T16:21:17+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/"},"wordCount":1103,"publisher":{"@id":"https:\/\/jfrog.com\/fr\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","keywords":["shift-right","shift-left","security","DevSecOps"],"articleSection":["S\u00e9curit\u00e9 et DevSecOps"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/","url":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/","name":"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te | JFrog","isPartOf":{"@id":"https:\/\/jfrog.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","datePublished":"2024-05-02T20:57:51+00:00","dateModified":"2025-01-27T16:21:17+00:00","breadcrumb":{"@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2024\/05\/03144731\/Blog_Thumbnail-2.png","width":203,"height":148},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/fr\/blog\/shift-left-vs-shift-right-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Tirer parti des approches Shift Left et Shift Right pour une s\u00e9curit\u00e9 applicative compl\u00e8te"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/fr\/#website","url":"https:\/\/jfrog.com\/fr\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/fr\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e","name":"zoer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","caption":"zoer"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/147882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/users\/506"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/comments?post=147882"}],"version-history":[{"count":5,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/147882\/revisions"}],"predecessor-version":[{"id":147889,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/147882\/revisions\/147889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/media\/130098"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/media?parent=147882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/categories?post=147882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/tags?post=147882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}