{"id":35161,"date":"2023-11-02T12:20:04","date_gmt":"2023-11-02T06:50:04","guid":{"rendered":"https:\/\/www.tjc-group.com\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/"},"modified":"2024-09-27T21:05:03","modified_gmt":"2024-09-27T15:35:03","slug":"lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite","status":"publish","type":"blog","link":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/","title":{"rendered":"Syst\u00e8mes legacy &#8211; L&#8217;obsolescence ne va pas avec la s\u00e9curit\u00e9"},"content":{"rendered":"\n<p class=\"has-text-color\" style=\"color:#56abda;font-style:normal;font-weight:600\">L&#8217;auteur : Yannick Thommassier, RSSI du groupe TJC<\/p>\n\n<p>Vous pourriez penser que les syst\u00e8mes obsol\u00e8tes ne sont jamais affect\u00e9s par de nouvelles vuln\u00e9rabilit\u00e9s parce qu&#8217;ils ont atteint leur dernier niveau de mise \u00e0 jour disponible et qu&#8217;aucun chercheur en s\u00e9curit\u00e9 ou pirate informatique n&#8217;essaiera de les exploiter.\nCe n&#8217;est toutefois pas le cas, car les vuln\u00e9rabilit\u00e9s r\u00e9centes d\u00e9couvertes dans une biblioth\u00e8que peuvent en fin de compte affecter toutes les versions actuelles et pass\u00e9es de cette biblioth\u00e8que. <\/p>\n\n<p>Prenez, par exemple, les vuln\u00e9rabilit\u00e9s r\u00e9centes <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2023-38545\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2023-38545<\/strong><\/a>et <strong>CVE-<\/strong><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2023-38546\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>2023-38546<\/strong><\/a> dans la <a href=\"https:\/\/curl.se\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">biblioth\u00e8que cURL, <\/a>un projet de logiciel informatique fournissant une biblioth\u00e8que (libcurl) et un outil de ligne de commande (curl) pour le transfert de donn\u00e9es \u00e0 l&#8217;aide de divers protocoles de r\u00e9seau.<\/p>\n\n<p>Prenez, par exemple, les vuln\u00e9rabilit\u00e9s r\u00e9centes <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2023-38545\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2023-38545<\/strong><\/a>et <strong>CVE-<\/strong><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2023-38546\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>2023-38546<\/strong><\/a> dans la <a href=\"https:\/\/curl.se\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">biblioth\u00e8que cURL, <\/a>un projet de logiciel informatique fournissant une biblioth\u00e8que (libcurl) et un outil de ligne de commande (curl) pour le transfert de donn\u00e9es \u00e0 l&#8217;aide de divers protocoles de r\u00e9seau.<\/p>\n\n<p>Par cons\u00e9quent, il faut compter sur l&#8217;hypoth\u00e9tique r\u00e9troportage des corrections apport\u00e9es au code source de ces versions ant\u00e9rieures de la biblioth\u00e8que pour garantir la s\u00e9curit\u00e9.\nToutefois, ce processus peut prendre du temps et entra\u00eener des incompatibilit\u00e9s.\nLa mise \u00e0 jour d&#8217;une biblioth\u00e8que sur un syst\u00e8me obsol\u00e8te est une t\u00e2che complexe.  <\/p>\n\n<p>C&#8217;est pourquoi le maintien d&#8217;un syst\u00e8me ancien, m\u00eame \u00e0 jour des derniers correctifs publi\u00e9s par l&#8217;\u00e9diteur, n&#8217;est pas s\u00e9curis\u00e9 \u00e0 long terme.\nLe stockage de donn\u00e9es sur ces syst\u00e8mes \u00e0 moyen ou long terme pr\u00e9sente un risque de s\u00e9curit\u00e9. <\/p>\n\n<p>Il est donc vivement conseill\u00e9 d&#8217;envisager le d\u00e9commissionnement de ces syst\u00e8mes legacy et le transfert de leurs donn\u00e9es vers un service d&#8217;archivage moderne, robuste et actualis\u00e9, con\u00e7u \u00e0 cet effet et garantissant le plus haut niveau de s\u00e9curit\u00e9 des donn\u00e9es.<\/p>\n\n<p>L&#8217;article suivant pourrait \u00e9galement vous int\u00e9resser :<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Est-il prudent de conserver des donn\u00e9es historiques dans un ancien syst\u00e8me SAP ? <a href=\"https:\/\/www.tjc-group.com\/fr\/blogs\/est-il-prudent-de-conserver-des-anciennes-donnees-dans-un-systeme-legacy-sap\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.tjc-group.com\/blogs\/is-it-safe-to-keep-legacy-data-in-an-old-sap-system\/<\/a><\/li>\n<\/ul>\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n","protected":false},"featured_media":29821,"parent":0,"menu_order":0,"template":"","meta":{"content-type":"","footnotes":""},"blog_tag":[352,196],"class_list":["post-35161","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_tag-cybersecurite","blog_tag-decommissionnement-des-systemes-legacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Syst\u00e8mes legacy - L&#039;obsolescence ne va pas de pair avec la s\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"Le maintien d&#039;un syst\u00e8me ancienne, m\u00eame avec les derniers correctifs, n&#039;est pas s\u00fbr \u00e0 long terme. D\u00e9couvrez pourquoi le d\u00e9commissionnement est l&#039;option la plus s\u00fbre en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Syst\u00e8mes legacy - L&#039;obsolescence ne va pas avec la s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Le maintien d&#039;un syst\u00e8me ancienne, m\u00eame avec les derniers correctifs, n&#039;est pas s\u00fbr \u00e0 long terme. D\u00e9couvrez pourquoi le d\u00e9commissionnement est l&#039;option la plus s\u00fbre en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"TJC Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-27T15:35:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tjc-group.com\/wp-content\/uploads\/2023\/11\/Header_web_article_cybersecurity_1920x960px.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@tjcsoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/\",\"url\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/\",\"name\":\"Syst\u00e8mes legacy - L'obsolescence ne va pas de pair avec la s\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tjc-group.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Header_web_article_cybersecurity_1920x960px.webp\",\"datePublished\":\"2023-11-02T06:50:04+00:00\",\"dateModified\":\"2024-09-27T15:35:03+00:00\",\"description\":\"Le maintien d'un syst\u00e8me ancienne, m\u00eame avec les derniers correctifs, n'est pas s\u00fbr \u00e0 long terme. D\u00e9couvrez pourquoi le d\u00e9commissionnement est l'option la plus s\u00fbre en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tjc-group.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Header_web_article_cybersecurity_1920x960px.webp\",\"contentUrl\":\"https:\\\/\\\/www.tjc-group.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Header_web_article_cybersecurity_1920x960px.webp\",\"width\":2500,\"height\":1250,\"caption\":\"Legacy systems | Obsolescence doesn\u2019t go hand in hand with security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/blogs\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Syst\u00e8mes legacy &#8211; L&#8217;obsolescence ne va pas avec la s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/\",\"name\":\"TJC Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/#organization\",\"name\":\"TJC Group\",\"url\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.tjc-group.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.tjc-group.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/logo.svg\",\"caption\":\"TJC Group\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tjc-group.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tjcsoftware\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/tjc-group\",\"https:\\\/\\\/www.youtube.com\\\/tjcgroup\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Syst\u00e8mes legacy - L'obsolescence ne va pas de pair avec la s\u00e9curit\u00e9","description":"Le maintien d'un syst\u00e8me ancienne, m\u00eame avec les derniers correctifs, n'est pas s\u00fbr \u00e0 long terme. D\u00e9couvrez pourquoi le d\u00e9commissionnement est l'option la plus s\u00fbre en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/","og_locale":"fr_FR","og_type":"article","og_title":"Syst\u00e8mes legacy - L'obsolescence ne va pas avec la s\u00e9curit\u00e9","og_description":"Le maintien d'un syst\u00e8me ancienne, m\u00eame avec les derniers correctifs, n'est pas s\u00fbr \u00e0 long terme. D\u00e9couvrez pourquoi le d\u00e9commissionnement est l'option la plus s\u00fbre en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es.","og_url":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/","og_site_name":"TJC Group","article_modified_time":"2024-09-27T15:35:03+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/www.tjc-group.com\/wp-content\/uploads\/2023\/11\/Header_web_article_cybersecurity_1920x960px.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@tjcsoftware","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/","url":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/","name":"Syst\u00e8mes legacy - L'obsolescence ne va pas de pair avec la s\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/www.tjc-group.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/#primaryimage"},"image":{"@id":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tjc-group.com\/wp-content\/uploads\/2023\/11\/Header_web_article_cybersecurity_1920x960px.webp","datePublished":"2023-11-02T06:50:04+00:00","dateModified":"2024-09-27T15:35:03+00:00","description":"Le maintien d'un syst\u00e8me ancienne, m\u00eame avec les derniers correctifs, n'est pas s\u00fbr \u00e0 long terme. D\u00e9couvrez pourquoi le d\u00e9commissionnement est l'option la plus s\u00fbre en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es.","breadcrumb":{"@id":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/#primaryimage","url":"https:\/\/www.tjc-group.com\/wp-content\/uploads\/2023\/11\/Header_web_article_cybersecurity_1920x960px.webp","contentUrl":"https:\/\/www.tjc-group.com\/wp-content\/uploads\/2023\/11\/Header_web_article_cybersecurity_1920x960px.webp","width":2500,"height":1250,"caption":"Legacy systems | Obsolescence doesn\u2019t go hand in hand with security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tjc-group.com\/fr\/blogs\/lobsolescence-des-systemes-legacy-ne-va-pas-avec-la-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tjc-group.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.tjc-group.com\/fr\/blogs\/"},{"@type":"ListItem","position":3,"name":"Syst\u00e8mes legacy &#8211; L&#8217;obsolescence ne va pas avec la s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.tjc-group.com\/fr\/#website","url":"https:\/\/www.tjc-group.com\/fr\/","name":"TJC Group","description":"","publisher":{"@id":"https:\/\/www.tjc-group.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tjc-group.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.tjc-group.com\/fr\/#organization","name":"TJC Group","url":"https:\/\/www.tjc-group.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tjc-group.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.tjc-group.com\/wp-content\/uploads\/2021\/05\/logo.svg","contentUrl":"https:\/\/www.tjc-group.com\/wp-content\/uploads\/2021\/05\/logo.svg","caption":"TJC Group"},"image":{"@id":"https:\/\/www.tjc-group.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tjcsoftware","https:\/\/www.linkedin.com\/company\/tjc-group","https:\/\/www.youtube.com\/tjcgroup"]}]}},"_links":{"self":[{"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/blog\/35161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/types\/blog"}],"version-history":[{"count":1,"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/blog\/35161\/revisions"}],"predecessor-version":[{"id":35162,"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/blog\/35161\/revisions\/35162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/media\/29821"}],"wp:attachment":[{"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/media?parent=35161"}],"wp:term":[{"taxonomy":"blog_tag","embeddable":true,"href":"https:\/\/www.tjc-group.com\/fr\/wp-json\/wp\/v2\/blog_tag?post=35161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}