{"id":1827,"date":"2025-12-15T15:32:31","date_gmt":"2025-12-15T15:32:31","guid":{"rendered":"https:\/\/swawe.fr\/?p=1827"},"modified":"2026-02-24T13:55:49","modified_gmt":"2026-02-24T13:55:49","slug":"le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap","status":"publish","type":"post","link":"https:\/\/swawe.fr\/en\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/","title":{"rendered":"Le CCM: Une r\u00e9ponse efficace pour s\u00e9curiser vos donn\u00e9es et applications SAP ?"},"content":{"rendered":"\n[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb14px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb min_height=\u00a0\u00bb3179.6px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; box_shadow_style=\u00a0\u00bbpreset4&Prime; box_shadow_horizontal=\u00a0\u00bb6px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb6px\u00a0\u00bb box_shadow_color=\u00a0\u00bb#EF7E26&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<p><strong>L&rsquo;essentiel :<\/strong><\/p>\n<ul>\n<li><strong>Approche proactive :<\/strong> Le Continuous Control Monitoring (CCM) remplace les audits ponctuels par une surveillance automatis\u00e9e et en temps r\u00e9el.<\/li>\n<li><strong>S\u00e9curit\u00e9 &amp; Cyber :<\/strong> Il cible la s\u00e9paration des t\u00e2ches (SoD), les acc\u00e8s critiques, mais aussi les vuln\u00e9rabilit\u00e9s techniques (comptes de service, param\u00e8tres syst\u00e8me).<\/li>\n<li><strong>Conformit\u00e9 &amp; \u00ab\u00a0Audit-Ready\u00a0\u00bb :<\/strong> R\u00e9pond aux exigences RGPD, SOX et NIS2 en fournissant des preuves d&rsquo;int\u00e9grit\u00e9 infalsifiables.<\/li>\n<li><strong>Efficacit\u00e9 op\u00e9rationnelle :<\/strong> R\u00e9duit la fatigue d&rsquo;alerte en filtrant les faux positifs et automatise le reporting pour les directions IT et Finance.<\/li>\n<\/ul>[\/et_pb_text][et_pb_text disabled_on=\u00a0\u00bbon|on|on\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb disabled=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<blockquote><\/blockquote>\n<h2><strong>Introduction<\/strong><\/h2>\n<p>La s\u00e9curit\u00e9 des donn\u00e9es et des applications SAP est un enjeu majeur pour les entreprises.<\/p>\n<p>Face \u00e0 des r\u00e9glementations strictes (SOX, RGPD) et \u00e0 des menaces croissantes, les organisations doivent garantir l\u2019int\u00e9grit\u00e9, la confidentialit\u00e9 et la disponibilit\u00e9 de leurs syst\u00e8mes.<\/p>\n<p>Le <strong>Continuous Control Monitoring (CCM)<\/strong> s\u2019impose comme une solution proactive pour renforcer la gouvernance et la conformit\u00e9. Mais peut-il r\u00e9ellement s\u00e9curiser vos environnements SAP ?<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bb&#8211;et_global_heading_font||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<p>La s\u00e9curit\u00e9 des donn\u00e9es et des applications SAP est devenue un enjeu vital. Au-del\u00e0 de la simple gestion informatique, c&rsquo;est la r\u00e9silience m\u00eame de l&rsquo;entreprise qui est en jeu. Face \u00e0 des r\u00e9glementations de plus en plus strictes <strong>(SOX, RGPD, NIS2)<\/strong> et \u00e0 des cybermenaces sophistiqu\u00e9es, les organisations ne peuvent plus se contenter de v\u00e9rifications a posteriori.<\/p>\n<p>Le <strong>Continuous Control Monitoring (CCM)<\/strong> s\u2019impose d\u00e9sormais comme la pi\u00e8ce ma\u00eetresse d&rsquo;une strat\u00e9gie de d\u00e9fense proactive. Mais comment cette technologie transforme-t-elle concr\u00e8tement la gouvernance de vos environnements SAP ?<\/p>[\/et_pb_text][et_pb_image src=\u00a0\u00bbhttps:\/\/swawe.fr\/wp-content\/uploads\/2025\/12\/Designer-4.png\u00a0\u00bb title_text=\u00a0\u00bbDesigner (4)\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb73%\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h1>Qu\u2019est-ce que le CCM ?<strong><\/strong><\/h1>\n<p>Le CCM est une m\u00e9thode de gouvernance assist\u00e9e par la technologie qui permet de surveiller l&rsquo;efficacit\u00e9 des contr\u00f4les internes de mani\u00e8re constante.<\/p>\n<ul>\n<li><strong>D\u00e9finition :<\/strong> C&rsquo;est un moteur d&rsquo;automatisation qui analyse en continu les configurations, les donn\u00e9es de base et les transactions au sein de SAP.<\/li>\n<li><strong>Objectif :<\/strong> Identifier instantan\u00e9ment les d\u00e9rives de configuration, les tentatives de fraude ou les erreurs de saisie avant qu&rsquo;elles n&rsquo;impactent le bilan financier.<\/li>\n<li><strong>\u00c9volution de l&rsquo;Audit :<\/strong> Contrairement \u00e0 l&rsquo;audit traditionnel (souvent bas\u00e9 sur des \u00e9chantillons et r\u00e9alis\u00e9 une fois par an), le CCM offre une visibilit\u00e9 \u00e0 100% sur 100% des donn\u00e9es, 365 jours par an.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9fis de la s\u00e9curit\u00e9 SAP<strong><\/strong><\/h2>\n<p>La complexit\u00e9 particuli\u00e8re de SAP cr\u00e9e des zones d&rsquo;ombre pour la s\u00e9curit\u00e9 :<\/p>\n<ul>\n<li><strong>Architecture hybride :<\/strong> La transition vers <strong>S\/4HANA<\/strong> et l&rsquo;usage de solutions Cloud augmentent la surface d&rsquo;attaque.<\/li>\n<li><strong>Gestion des identit\u00e9s :<\/strong> Les conflits de <strong>S\u00e9paration des T\u00e2ches (SoD)<\/strong> sont fr\u00e9quents dans les environnements o\u00f9 les r\u00f4les sont accumul\u00e9s au fil des ann\u00e9es.<\/li>\n<li><strong>Vuln\u00e9rabilit\u00e9s techniques :<\/strong> L&rsquo;usage de comptes g\u00e9n\u00e9riques, de mots de passe par d\u00e9faut ou de connexions RFC non s\u00e9curis\u00e9es repr\u00e9sente une \u00ab\u00a0porte d\u00e9rob\u00e9e\u00a0\u00bb pour les attaquants.<\/li>\n<li><strong>Volume de donn\u00e9es :<\/strong> Analyser manuellement des millions de lignes de transactions pour d\u00e9tecter une anomalie est devenu humainement impossible.<\/li>\n<\/ul>[\/et_pb_text][et_pb_image src=\u00a0\u00bbhttps:\/\/swawe.fr\/wp-content\/uploads\/2025\/12\/Designer-6.png\u00a0\u00bb title_text=\u00a0\u00bbDesigner (6)\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb73%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_3_font_size=\u00a0\u00bb20px\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h2>Comment le CCM s\u00e9curise SAP ?<\/h2>\n<h3>1. Surveillance dynamique des acc\u00e8s (GRC &amp; SoD)<\/h3>\n<p>Le CCM d\u00e9tecte en temps r\u00e9el si un utilisateur se voit attribuer des droits incompatibles (ex: pouvoir cr\u00e9er un fournisseur ET valider un paiement). Il surveille \u00e9galement les comptes \u00e0 hauts privil\u00e8ges (SAP*, DDIC) et les acc\u00e8s d&rsquo;urgence (Firefighter).<\/p>\n<h3>2. Int\u00e9grit\u00e9 des processus transactionnels<\/h3>\n<p>Il ne surveille pas seulement \u00ab\u00a0qui\u00a0\u00bb a acc\u00e8s, mais \u00ab\u00a0ce qui\u00a0\u00bb est fait.<\/p>\n<p><em>Exemple :<\/em> D\u00e9tection de modifications directes dans les tables (via SE16N), changements de RIB fournisseurs juste avant un virement, ou contournement des seuils d&rsquo;approbation.<\/p>\n<h3>3. Durcissement technique et audit des transports<\/h3>\n<p>Le CCM v\u00e9rifie les param\u00e8tres de s\u00e9curit\u00e9 critiques (Hardening) et surveille les <strong>flux de transport.<\/strong> Il s&rsquo;assure qu&rsquo;aucune modification de code ou de param\u00e9trage critique n&rsquo;est inject\u00e9e en production sans passer par le workflow de validation.<\/p>\n<h2><\/h2>\n<h2>Les b\u00e9n\u00e9fices strat\u00e9giques pour l&rsquo;organisation<\/h2>\n<p><strong>R\u00e9duction des risques de fraude et d\u2019erreurs :<\/strong> Identification imm\u00e9diate des anomalies transactionnelles et des tentatives de d\u00e9tournement avant qu&rsquo;elles ne g\u00e9n\u00e8rent une perte financi\u00e8re.<\/p>\n<p><strong>Am\u00e9lioration de la conformit\u00e9 r\u00e9glementaire :<\/strong> Alignement continu avec les cadres l\u00e9gaux (SOX, LCAP, RGPD) gr\u00e2ce \u00e0 des contr\u00f4les standardis\u00e9s et reproductibles.<\/p>\n<p><strong>Gain de temps et d\u2019efficacit\u00e9 gr\u00e2ce \u00e0 l\u2019automatisation :<\/strong> Suppression des t\u00e2ches de contr\u00f4le manuel r\u00e9p\u00e9titives, permettant aux \u00e9quipes de se concentrer sur l&rsquo;analyse et la rem\u00e9diation des risques r\u00e9els.<\/p>\n<p><strong>Renforcement de la confiance des parties prenantes :<\/strong> Assurance pour la direction g\u00e9n\u00e9rale, le conseil d&rsquo;administration et les actionnaires que les actifs critiques sont prot\u00e9g\u00e9s par une surveillance de pointe.<\/p>\n<p><strong>Int\u00e9gration au SOC\/SIEM :<\/strong> Capacit\u00e9 d&rsquo;alimenter le centre de surveillance de la cybers\u00e9curit\u00e9 (SOC) avec des \u00e9v\u00e9nements SAP m\u00e9tier pour une visibilit\u00e9 de s\u00e9curit\u00e9 transversale.<\/p>\n<p><strong>Audit \u00ab\u00a0Always-on\u00a0\u00bb :<\/strong> Transformation de l&rsquo;audit annuel en une simple formalit\u00e9 de validation gr\u00e2ce \u00e0 des preuves num\u00e9riques g\u00e9n\u00e9r\u00e9es en continu et inalt\u00e9rables.<\/p>[\/et_pb_text][et_pb_image src=\u00a0\u00bbhttps:\/\/swawe.fr\/wp-content\/uploads\/2025\/12\/Designer-7.png\u00a0\u00bb title_text=\u00a0\u00bbDesigner (7)\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb73%\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h2>Limites et bonnes pratiques<strong><\/strong><\/h2>\n<p>Bien que puissant, le CCM n&rsquo;est pas une solution \u00ab\u00a0plug-and-play\u00a0\u00bb miracle :<\/p>\n<ul>\n<li><strong>Qualit\u00e9 des r\u00e8gles :<\/strong> Un CCM mal param\u00e9tr\u00e9 g\u00e9n\u00e8re trop d&rsquo;alertes (fatigue d&rsquo;alerte). Il est crucial de corr\u00e9ler les donn\u00e9es pour ne remonter que les risques r\u00e9els.<\/li>\n<li><strong>R\u00e9ponse aux incidents :<\/strong> D\u00e9tecter est inutile si personne n&rsquo;est charg\u00e9 de traiter l&rsquo;alerte. Une workflow clair de rem\u00e9diation est indispensable.<\/li>\n<li><strong>Gouvernance IT-M\u00e9tier :<\/strong> La r\u00e9ussite repose sur la collaboration entre le RSSI (pour la technique) et le Contr\u00f4leur Interne (pour le m\u00e9tier).<\/li>\n<\/ul>\n<h2>Conclusion :<\/h2>\n<p>Le CCM est bien plus qu&rsquo;une simple couche logicielle ; c&rsquo;est un changement de paradigme pour la s\u00e9curit\u00e9 SAP. En passant d&rsquo;une posture r\u00e9active \u00e0 une vigilance proactive, les entreprises prot\u00e8gent non seulement leurs actifs financiers, mais aussi leur r\u00e9putation et leur conformit\u00e9 r\u00e9glementaire.<\/p>\n<p>Gr\u00e2ce au CCM, vous <strong>reprenez le contr\u00f4le total sur votre paysage SAP, tout en lib\u00e9rant vos \u00e9quipes des t\u00e2ches de contr\u00f4le manuel \u00e0 faible valeur ajout\u00e9e<\/strong>.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb3_5,2_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; box_shadow_style=\u00a0\u00bbpreset4&Prime; box_shadow_horizontal=\u00a0\u00bb5px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb5px\u00a0\u00bb box_shadow_color=\u00a0\u00bb#EF7E26&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; custom_padding=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#004899&Prime; header_2_font_size=\u00a0\u00bb28px\u00a0\u00bb header_2_line_height=\u00a0\u00bb1.4em\u00a0\u00bb header_3_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#004899&Prime; background_layout=\u00a0\u00bbdark\u00a0\u00bb max_width=\u00a0\u00bb700px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|20px||20px|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<h3>Une expertise d\u00e9di\u00e9e \u00e0 votre environnement SAP<\/h3>\nD\u00e9couvrez comment notre solution SWAWE CCM peut s\u00e9curiser vos acc\u00e8s et acc\u00e9l\u00e9rer vos interventions.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_5&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb\/demande-de-demo\/\u00a0\u00bb button_text=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#004899&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb button_border_radius=\u00a0\u00bb4px\u00a0\u00bb button_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb button_font=\u00a0\u00bbRoboto|700||on|||||\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_margin=\u00a0\u00bb30px|20px||20px|false|true\u00a0\u00bb custom_padding=\u00a0\u00bb10px|20px|10px|20px|true|true\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset3&Prime; box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb box_shadow_blur=\u00a0\u00bb30px\u00a0\u00bb box_shadow_spread=\u00a0\u00bb-10px\u00a0\u00bb box_shadow_color=\u00a0\u00bbrgba(246,166,21,0.38)\u00a0\u00bb button_letter_spacing_hover=\u00a0\u00bb5.5px\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb button_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_letter_spacing__hover_enabled=\u00a0\u00bbon\u00a0\u00bb button_letter_spacing__hover=\u00a0\u00bb5.5px\u00a0\u00bb button_one_letter_spacing__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_letter_spacing__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<h3>FAQ : Tout comprendre sur le Continuous Control Monitoring<\/h3>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb closed_toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb closed_toggle_background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb icon_color=\u00a0\u00bb#EF7E26&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb body_font=\u00a0\u00bb&#8211;et_global_body_font||||||||\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_accordion_item title=\u00a0\u00bb1. Le CCM remplace-t-il les outils de GRC (Governance, Risk and Compliance) ?\u00a0\u00bb open=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<p>Non, le CCM compl\u00e8te souvent une solution GRC. Alors que la GRC g\u00e8re les autorisations (le \u00ab\u00a0droit de faire\u00a0\u00bb), le CCM analyse l&rsquo;activit\u00e9 r\u00e9elle (le \u00ab\u00a0fait de faire\u00a0\u00bb) pour valider l&rsquo;efficacit\u00e9 des contr\u00f4les.<\/p>[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb2. Quel est l&rsquo;impact du CCM sur la performance de mon syst\u00e8me SAP ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb]<p>Les solutions modernes comme SWAWE CCM utilisent des extractions delta et des analyses hors-ligne pour garantir un impact quasi-nul sur les performances transactionnelles des utilisateurs finaux.<\/p>[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb3. Le CCM peut-il d\u00e9tecter des cyberattaques complexes ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb]<p>Oui, en surveillant les param\u00e8tres de s\u00e9curit\u00e9 et les logs techniques, il peut d\u00e9tecter des comportements anormaux (ex: t\u00e9l\u00e9chargement massif de donn\u00e9es via des transactions standard) qui \u00e9chappent souvent aux outils de s\u00e9curit\u00e9 r\u00e9seau classiques.<\/p>[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb4. Combien de temps faut-il pour d\u00e9ployer une solution de CCM ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb]Avec des biblioth\u00e8ques de contr\u00f4les pr\u00e9-param\u00e9tr\u00e9es, un socle de base peut \u00eatre op\u00e9rationnel en 4 \u00e0 6 semaines. L&rsquo;affinage des seuils pour r\u00e9duire les faux positifs se fait ensuite de mani\u00e8re it\u00e9rative.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb5. Comment le CCM facilite-t-il la relation avec les auditeurs ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb]Il fournit des journaux d&rsquo;audit inalt\u00e9rables et des preuves de contr\u00f4le sur l&rsquo;int\u00e9gralit\u00e9 de la p\u00e9riode audit\u00e9e, \u00e9liminant ainsi les d\u00e9bats sur l&rsquo;\u00e9chantillonnage et les erreurs de manipulation de fichiers Excel.[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;essentiel : Approche proactive : Le Continuous Control Monitoring (CCM) remplace les audits ponctuels par une surveillance automatis\u00e9e et en temps r\u00e9el. S\u00e9curit\u00e9 &amp; Cyber : Il cible la s\u00e9paration des t\u00e2ches (SoD), les acc\u00e8s critiques, mais aussi les vuln\u00e9rabilit\u00e9s techniques (comptes de service, param\u00e8tres syst\u00e8me). Conformit\u00e9 &amp; \u00ab\u00a0Audit-Ready\u00a0\u00bb : R\u00e9pond aux exigences RGPD, SOX [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":1740,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-1827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-controles-monitoring-ccm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le CCM : s\u00e9curit\u00e9 de vos donn\u00e9es et applications SAP<\/title>\n<meta name=\"description\" content=\"Le CCM pour s\u00e9curiser efficacement vos donn\u00e9es et applications SAP face \u00e0 la mont\u00e9e des menaces et aux enjeux croissants de conformit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swawe.fr\/en\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le CCM : s\u00e9curit\u00e9 de vos donn\u00e9es et applications SAP\" \/>\n<meta property=\"og:description\" content=\"Le CCM pour s\u00e9curiser efficacement vos donn\u00e9es et applications SAP face \u00e0 la mont\u00e9e des menaces et aux enjeux croissants de conformit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swawe.fr\/en\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/\" \/>\n<meta property=\"og:site_name\" content=\"Swawe\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-15T15:32:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T13:55:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christophe Bizot\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christophe Bizot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/\"},\"author\":{\"name\":\"Christophe Bizot\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4\"},\"headline\":\"Le CCM: Une r\u00e9ponse efficace pour s\u00e9curiser vos donn\u00e9es et applications SAP ?\",\"datePublished\":\"2025-12-15T15:32:31+00:00\",\"dateModified\":\"2026-02-24T13:55:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/\"},\"wordCount\":2379,\"image\":{\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png\",\"articleSection\":[\"Contr\u00f4les &amp; Monitoring (CCM)\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/\",\"url\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/\",\"name\":\"Le CCM : s\u00e9curit\u00e9 de vos donn\u00e9es et applications SAP\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png\",\"datePublished\":\"2025-12-15T15:32:31+00:00\",\"dateModified\":\"2026-02-24T13:55:49+00:00\",\"author\":{\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4\"},\"description\":\"Le CCM pour s\u00e9curiser efficacement vos donn\u00e9es et applications SAP face \u00e0 la mont\u00e9e des menaces et aux enjeux croissants de conformit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage\",\"url\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png\",\"contentUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/swawe.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le CCM: Une r\u00e9ponse efficace pour s\u00e9curiser vos donn\u00e9es et applications SAP ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swawe.fr\/#website\",\"url\":\"https:\/\/swawe.fr\/\",\"name\":\"Swawe\",\"description\":\"Your Compliance Companion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swawe.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4\",\"name\":\"Christophe Bizot\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g\",\"caption\":\"Christophe Bizot\"},\"url\":\"https:\/\/swawe.fr\/en\/author\/christophe\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le CCM : s\u00e9curit\u00e9 de vos donn\u00e9es et applications SAP","description":"Le CCM pour s\u00e9curiser efficacement vos donn\u00e9es et applications SAP face \u00e0 la mont\u00e9e des menaces et aux enjeux croissants de conformit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swawe.fr\/en\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/","og_locale":"en_US","og_type":"article","og_title":"Le CCM : s\u00e9curit\u00e9 de vos donn\u00e9es et applications SAP","og_description":"Le CCM pour s\u00e9curiser efficacement vos donn\u00e9es et applications SAP face \u00e0 la mont\u00e9e des menaces et aux enjeux croissants de conformit\u00e9.","og_url":"https:\/\/swawe.fr\/en\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/","og_site_name":"Swawe","article_published_time":"2025-12-15T15:32:31+00:00","article_modified_time":"2026-02-24T13:55:49+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1-1024x683.png","type":"image\/png"}],"author":"Christophe Bizot","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christophe Bizot","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#article","isPartOf":{"@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/"},"author":{"name":"Christophe Bizot","@id":"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4"},"headline":"Le CCM: Une r\u00e9ponse efficace pour s\u00e9curiser vos donn\u00e9es et applications SAP ?","datePublished":"2025-12-15T15:32:31+00:00","dateModified":"2026-02-24T13:55:49+00:00","mainEntityOfPage":{"@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/"},"wordCount":2379,"image":{"@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage"},"thumbnailUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png","articleSection":["Contr\u00f4les &amp; Monitoring (CCM)"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/","url":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/","name":"Le CCM : s\u00e9curit\u00e9 de vos donn\u00e9es et applications SAP","isPartOf":{"@id":"https:\/\/swawe.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage"},"image":{"@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage"},"thumbnailUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png","datePublished":"2025-12-15T15:32:31+00:00","dateModified":"2026-02-24T13:55:49+00:00","author":{"@id":"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4"},"description":"Le CCM pour s\u00e9curiser efficacement vos donn\u00e9es et applications SAP face \u00e0 la mont\u00e9e des menaces et aux enjeux croissants de conformit\u00e9.","breadcrumb":{"@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#primaryimage","url":"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png","contentUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2025\/10\/Principe-de-moindre-privilege-1.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/swawe.fr\/controles-monitoring-ccm\/le-ccm-une-reponse-efficace-pour-securiser-vos-donnees-et-applications-sap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/swawe.fr\/"},{"@type":"ListItem","position":2,"name":"Le CCM: Une r\u00e9ponse efficace pour s\u00e9curiser vos donn\u00e9es et applications SAP ?"}]},{"@type":"WebSite","@id":"https:\/\/swawe.fr\/#website","url":"https:\/\/swawe.fr\/","name":"Swawe","description":"Your Compliance Companion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swawe.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swawe.fr\/#\/schema\/person\/a430925d824c740d4ed7565873b872b4","name":"Christophe Bizot","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swawe.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36b893283538a191d5f109e0963a0a9dcdc8d16e1603c81c06d9fe77fde3b422?s=96&d=mm&r=g","caption":"Christophe Bizot"},"url":"https:\/\/swawe.fr\/en\/author\/christophe\/"}]}},"_links":{"self":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/comments?post=1827"}],"version-history":[{"count":28,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1827\/revisions"}],"predecessor-version":[{"id":2274,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1827\/revisions\/2274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/media\/1740"}],"wp:attachment":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/media?parent=1827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/categories?post=1827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/tags?post=1827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}