{"id":85239,"date":"2024-09-17T02:47:34","date_gmt":"2024-09-17T09:47:34","guid":{"rendered":"https:\/\/blog.axway.com\/?p=85239"},"modified":"2024-10-18T05:24:07","modified_gmt":"2024-10-18T12:24:07","slug":"souverainete-numerique-continuite-services","status":"publish","type":"post","link":"https:\/\/blog.axway.com\/fr\/learning-center-fr\/strategie-digitale\/souverainete-numerique-continuite-services","title":{"rendered":"Souverainet\u00e9 num\u00e9rique : un enjeu vital pour nos soci\u00e9t\u00e9s"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><p><span data-contrast=\"auto\">Dans un article r\u00e9cemment <\/span><span data-contrast=\"auto\">publi\u00e9 sur <a href=\"https:\/\/www.solutions-numeriques.com\/avis-dexpert-de-la-gouvernance-des-donnees-a-la-continuite-de-services-comment-assurer-votre-souverainete-numerique\/\"><em>Solutions num\u00e9riques &amp; cybers\u00e9curit\u00e9<\/em><\/a>, nous avons abord\u00e9 la question cruciale de la souverainet\u00e9 des donn\u00e9es. Aujourd&#8217;hui, apr\u00e8s les \u00e9v\u00e9nements marquants de cet \u00e9t\u00e9, notamment la panne massive de Microsoft, il nous para\u00eet essentiel de revenir sur ce sujet et d&#8217;apporter des \u00e9claircissements suppl\u00e9mentaires.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">La souverainet\u00e9 num\u00e9rique est souvent per\u00e7ue \u00e0 tort comme une simple affaire de confidentialit\u00e9 des donn\u00e9es personnelles, ce qu&#8217;on appelle commun\u00e9ment la \u00ab data privacy \u00bb. Cette vision r\u00e9ductrice a conduit l&#8217;Union europ\u00e9enne \u00e0 mettre en place des r\u00e9glementations qui, bien qu&#8217;importantes, restent insuffisantes pour garantir une v\u00e9ritable souverainet\u00e9 des citoyens.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Heureusement, ce cadre r\u00e9glementaire est en \u00e9volution, et nous devons en comprendre les enjeux plus larges.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"quest-ce-que-la-souverainete-numerique\"><\/span><span data-contrast=\"none\">Qu&#8217;est-ce que la souverainet\u00e9 num\u00e9rique ?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">Pour saisir pleinement les risques li\u00e9s \u00e0 l&#8217;absence de souverainet\u00e9 num\u00e9rique, il est crucial de poser quelques questions fondamentales :<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Quelles menaces la souverainet\u00e9 doit-elle contrer ?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Peut-on concevoir une souverainet\u00e9 efficace qui d\u00e9passe les fronti\u00e8res nationales ?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Les solutions actuelles, comme le stockage des donn\u00e9es sur le territoire europ\u00e9en, sont-elles vraiment adapt\u00e9es \u00e0 toutes les menaces ?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Nous pouvons donc d\u00e9finir la souverainet\u00e9 num\u00e9rique comme la capacit\u00e9 d&#8217;une nation \u00e0 contr\u00f4ler et s\u00e9curiser ses infrastructures et services essentiels, au-del\u00e0 de la simple protection des donn\u00e9es personnelles. Elle est cruciale pour assurer la r\u00e9silience et la s\u00e9curit\u00e9 de la soci\u00e9t\u00e9 moderne dans des domaines tels que l&#8217;informatique, les transports, l\u2019alimentation, ou les communications.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bercynumerique.finances.gouv.fr\/quest-ce-que-la-souverainete-numerique\"><i><span data-contrast=\"none\">Pour approfondir le sujet, voir les communications officielles de l\u2019Etat \u00e0 ce sujet.<\/span><\/i><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"le-contexte-du-risque\"><\/span><span data-contrast=\"none\">Le contexte du risque<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">Le risque dont nous parlons ici est syst\u00e9mique et concerne l&#8217;ensemble d&#8217;une nation. Il s&#8217;agit de menaces qui peuvent paralyser les activit\u00e9s vitales de nos soci\u00e9t\u00e9s modernes : r\u00e9seaux informatiques, transports, distribution d&#8217;\u00e9nergie, communications, sant\u00e9, alimentation.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Par exemple, un piratage des feux de signalisation pourrait entra\u00eener une paralysie quasi-totale du pays. De m\u00eame, la commande \u00e0 distance des voitures autonomes pourrait, en quelques heures, bloquer une grande ville, comme le d\u00e9montre le r\u00e9cent bug des taxis autonomes \u00e0 San Francisco.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Plus concr\u00e8tement, la crise du Covid a r\u00e9v\u00e9l\u00e9 les cons\u00e9quences dramatiques d&#8217;une absence de souverainet\u00e9, comme l&#8217;incapacit\u00e9 \u00e0 produire des masques ou des m\u00e9dicaments essentiels.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Plus r\u00e9cemment, la guerre en Ukraine a montr\u00e9 comment les hyperscalers (grandes entreprises du cloud) pouvaient perturber l&#8217;\u00e9conomie d&#8217;un pays entier, en l&#8217;occurrence la Russie, et m\u00eame plonger des r\u00e9gions enti\u00e8res dans la famine en bloquant les paiements transfrontaliers de c\u00e9r\u00e9ales.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Et d&#8217;un autre c\u00f4t\u00e9, le ministre de la Transformation Digitale de l\u2019Ukraine <\/span><a href=\"https:\/\/www.eulisa.europa.eu\/Publications\/Reports\/Industry%20Roundtable%20Report%20-%20June%202024.pdf\"><span data-contrast=\"none\">t\u00e9moignait r\u00e9cemment en faveur d\u2019une solution \u00ab hors sol \u00bb<\/span><\/a><span data-contrast=\"auto\"> (bas\u00e9e sur les Hyperscalers U.S.) qui a permis \u00e0 l\u2019IT de l\u2019\u00e9tat Ukrainien de rester op\u00e9rationnelle parce que leurs data centers n\u2019\u00e9taient pas susceptibles d\u2019\u00eatre bombard\u00e9s.<\/span> <span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Ces exemples illustrent clairement que le risque ne concerne pas seulement la gouvernance des donn\u00e9es, mais bien plus largement les services essentiels \u00e0 notre soci\u00e9t\u00e9.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"lincident-microsoft-une%e2%80%aflecon-a-retenir\"><\/span><span data-contrast=\"none\">L&#8217;incident Microsoft : une\u202fle\u00e7on \u00e0 retenir<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">En juillet dernier, la <\/span><a href=\"https:\/\/www.msn.com\/fr-fr\/actualite\/technologie-et-sciences\/une-panne-informatique-mondiale-touche-les-services-de-microsoft-365-et-azure\/ar-BB1qTzgz?ocid=BingNewsSerp\"><span data-contrast=\"none\">panne majeure de Microsoft 365<\/span><\/a><span data-contrast=\"auto\"> a eu des r\u00e9percussions mondiales. Des services critiques comme les emails, le stockage de fichiers dans le cloud, et les outils de collaboration tels que Microsoft Teams ont \u00e9t\u00e9 s\u00e9rieusement perturb\u00e9s, impactant directement les entreprises et leurs op\u00e9rations.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mais au-del\u00e0 des pertes financi\u00e8res pour les entreprises, cette panne a \u00e9galement eu des cons\u00e9quences sur les citoyens, avec des interruptions de paiements et des services de sant\u00e9.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cet incident soul\u00e8ve une question fondamentale : comment g\u00e9rer un tel risque \u00e0 l&#8217;avenir ?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"la-reponse-reglementaire-un-bon-depart-mais-insuffisant\"><\/span><span data-contrast=\"none\">La r\u00e9ponse r\u00e9glementaire : un bon d\u00e9part, mais insuffisant<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p aria-level=\"2\"><span data-contrast=\"auto\">L&#8217;Union europ\u00e9enne a entrepris de mettre en place des r\u00e9glementations pour renforcer la souverainet\u00e9 num\u00e9rique, comme le RGPD, l&#8217;arr\u00eat Schrems II, ou encore la directive NIS2.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cependant, ces mesures, bien qu&#8217;encourageantes, restent trop centr\u00e9es sur la protection des donn\u00e9es personnelles et ne prennent pas suffisamment en compte la dimension des services.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"une-formation-globale-et-une-analyse-des-risques\"><\/span><span data-contrast=\"none\">Une formation globale et une analyse des risques<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">Il est imp\u00e9ratif que tous les responsables des infrastructures IT prennent conscience des v\u00e9ritables risques pour la souverainet\u00e9. Une analyse syst\u00e9matique doit \u00eatre effectu\u00e9e, int\u00e9grant non seulement les risques pour l&#8217;entreprise, mais aussi les risques pour l&#8217;ensemble de la nation.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Ce n&#8217;est pas une t\u00e2che ais\u00e9e, car peu d&#8217;entreprises sont habitu\u00e9es \u00e0 prendre en compte des risques au-del\u00e0 de leur p\u00e9rim\u00e8tre d&#8217;activit\u00e9.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"vers-une-priorite-nationale-dans-les-choix-it\"><\/span><span data-contrast=\"none\">Vers une priorit\u00e9 nationale dans les choix IT<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">Il est plus que jamais n\u00e9cessaire d&#8217;orienter les choix IT vers des solutions qui garantissent, \u00e0 terme, une souverainet\u00e9 nationale. Cela implique de privil\u00e9gier les \u00e9diteurs fran\u00e7ais et, lorsque ce n&#8217;est pas possible, de s&#8217;assurer de l&#8217;ind\u00e9pendance des solutions propos\u00e9es.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">L&#8217;open source pourrait \u00eatre une alternative, mais il n\u00e9cessite des comp\u00e9tences accrues, et donc des co\u00fbts suppl\u00e9mentaires.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Il est \u00e9vident que la souverainet\u00e9 num\u00e9rique doit devenir un r\u00e9flexe, non seulement pour les entreprises, mais aussi pour l&#8217;\u00c9tat, qui doit montrer l&#8217;exemple en privil\u00e9giant les choix nationaux dans le domaine des logiciels.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">C&#8217;est une condition indispensable pour assurer notre ind\u00e9pendance et la s\u00e9curit\u00e9 de nos services essentiels. La souverainet\u00e9 num\u00e9rique n&#8217;est pas un luxe, c&#8217;est une n\u00e9cessit\u00e9 pour la survie de notre soci\u00e9t\u00e9.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<div class=\"wpcmsdev-call-to-action layout-horizontal wpcmsdev-columns color-red\">\n<div class=\"call-to-action-content column column-width-two-thirds\">\n<p>D\u00e9couvrez le nouveau whitepaper sur la gouvernance des donn\u00e9es en action et le leadership d&#8217;Axway en mati\u00e8re de confidentialit\u00e9 et de s\u00e9curit\u00e9.<\/p>\n<\/div>\n<div class=\"call-to-action-button column column-width-one-third\"><a class=\"wpcmsdev-button color-red\" href=\"https:\/\/resources.axway.com\/open-everything\/wp-data-governance-in-action-en\"><span>Click Here<\/span><\/a><\/div>\n<\/div>\n<p><b><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un article r\u00e9cemment publi\u00e9 sur Solutions num\u00e9riques &amp; cybers\u00e9curit\u00e9, nous avons abord\u00e9 la question cruciale de la souverainet\u00e9 des donn\u00e9es. Aujourd&#8217;hui, apr\u00e8s les \u00e9v\u00e9nements marquants de cet \u00e9t\u00e9, notamment la panne massive de Microsoft, il nous para\u00eet essentiel de revenir sur ce sujet et d&#8217;apporter des \u00e9claircissements suppl\u00e9mentaires.\u00a0 La souverainet\u00e9 num\u00e9rique est souvent per\u00e7ue [&hellip;]<\/p>\n","protected":false},"author":94,"featured_media":85237,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6846],"tags":[6982,6979,6981,6980],"yst_prominent_words":[3877,5378],"coauthors":[5529],"class_list":{"0":"post-85239","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-strategie-digitale","8":"tag-cloud-fr","9":"tag-data-sovereignty-fr","10":"tag-gouvernance-des-donnees","11":"tag-souverainete-numerique"},"acf":[],"jetpack_featured_media_url":"https:\/\/blog.axway.com\/wp-content\/uploads\/2024\/09\/Digital-sovereignty-a-vital-issue-for-our-societies.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pa97bN-maP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/posts\/85239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/comments?post=85239"}],"version-history":[{"count":2,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/posts\/85239\/revisions"}],"predecessor-version":[{"id":85242,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/posts\/85239\/revisions\/85242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/media\/85237"}],"wp:attachment":[{"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/media?parent=85239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/categories?post=85239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/tags?post=85239"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=85239"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.axway.com\/fr\/wp-json\/wp\/v2\/coauthors?post=85239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}