{"id":1026,"date":"2019-02-19T15:46:15","date_gmt":"2019-02-19T20:46:15","guid":{"rendered":"https:\/\/orendasecurity.com\/?p=1026"},"modified":"2019-11-01T19:37:12","modified_gmt":"2019-11-01T23:37:12","slug":"les-avantages-dutiliser-sast-et-dast-ensemble","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/fr\/blog\/les-avantages-dutiliser-sast-et-dast-ensemble\/","title":{"rendered":"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE"},"content":{"rendered":"<p>Les tests statiques de s\u00e9curit\u00e9 des applications (SAST) et les tests dynamiques de s\u00e9curit\u00e9 des applications (DAST) sont des m\u00e9thodologies utilis\u00e9es pour tester la s\u00e9curit\u00e9 de l\u2019environnement des applications.<\/p>\n<ul>\n<li>DAST est une m\u00e9thode de test de s\u00e9curit\u00e9 de type bo\u00eete noire qui teste les applications de l\u2019ext\u00e9rieur vers l\u2019int\u00e9rieur.<\/li>\n<li>SAST est une m\u00e9thode de test de s\u00e9curit\u00e9 de type bo\u00eete blanche qui teste les applications de l\u2019int\u00e9rieur vers l\u2019ext\u00e9rieur.<\/li>\n<\/ul>\n<p>Ainsi, lorsque des cyber-analystes utilisent les SAST, ils \u00e9tudient le code source pour y d\u00e9celer des vuln\u00e9rabilit\u00e9s potentielles. D\u2019autre part, les DAST testent les applications pendant qu\u2019elles fonctionnent, en tentant de les exploiter exactement comme le ferait un vrai cyberpr\u00e9dateur. En bref, les DAST trouvent des vuln\u00e9rabilit\u00e9s lors de l\u2019ex\u00e9cution alors que le SAST les trouvent dans le code source. Ces deux m\u00e9thodes diff\u00e9rentes ont chacune leurs forces et leurs faiblesses. Il est donc pr\u00e9f\u00e9rable d\u2019utiliser les deux pour une s\u00e9curit\u00e9 plus compl\u00e8te et plus pr\u00e9cise.<\/p>\n<h2>Un balayage complet du code<\/h2>\n<p>Les SAST sont excellents pour cibler les vuln\u00e9rabilit\u00e9s du code source, \u00e0 octets et binaire dans tous les environnements. Ils trouvent \u00e9galement les faiblesses, une ligne \u00e0 la fois, avant que vous ne d\u00e9ployiez le logiciel, vous donnant l\u2019emplacement pr\u00e9cis de chaque vuln\u00e9rabilit\u00e9. Les vuln\u00e9rabilit\u00e9s habituelles consistent en\u00a0:<\/p>\n<ul>\n<li>Erreurs num\u00e9riques<\/li>\n<li>Validation des saisies<\/li>\n<li>Situations de concurrence<\/li>\n<li>Travers\u00e9es de r\u00e9pertoires<\/li>\n<li>Pointeurs et r\u00e9f\u00e9rences<\/li>\n<\/ul>\n<p>Les SAST sont tout indiqu\u00e9s pour les environnements de processus de design s\u00e9quentiel, les syst\u00e8mes en temps r\u00e9el, les applications mobiles et les logiciels sur appareils de syst\u00e8mes embarqu\u00e9s. Rappelez-vous\u00a0: si vous voulez que votre balayage SAST soit efficace, assurez-vous qu\u2019il supporte le langage du cadre de l\u2019application web. Cela inclut PHP, Java, Python et plus. R\u00e9ciproquement, l\u2019outil de balayage requiert \u00e9galement du support du cadre de l\u2019application.<\/p>\n<h2>Une analyse compl\u00e8te du cadre d\u2019application<\/h2>\n<p>Les DAST traitent les aspects complexes de la s\u00e9curit\u00e9 des applications, d\u00e9couvrant des faiblesses dans le cadre complet de l\u2019application, incluant:<\/p>\n<ul>\n<li>Proxys web<\/li>\n<li>Serveurs (AWS, Azure, physiques, etc.)<\/li>\n<li>Bases de donn\u00e9es (MySQL, Oracle, Microsoft, etc.)<\/li>\n<li>Caches (hors processus, \u00e0 l\u2019int\u00e9rieur du processus)<\/li>\n<\/ul>\n<p>Puisque les DAST sont utilis\u00e9s dans un environnement d\u2019ex\u00e9cution, toutes les structures interconnect\u00e9es qui existent \u00e0 l\u2019ext\u00e9rieur du code source sont test\u00e9es simultan\u00e9ment afin de d\u00e9celer des vuln\u00e9rabilit\u00e9s. Identifier des configurations inad\u00e9quates entre tous les environnements d\u2019applications donne au DevOps une meilleure compr\u00e9hension des particularit\u00e9s des vuln\u00e9rabilit\u00e9s, tout en exposant \u00e9galement des menaces potentielles \u00e0 l\u2019ext\u00e9rieur du code. Parce que les SAST ne prennent pas tout le cadre externe de l\u2019application en consid\u00e9ration, les DAST compl\u00e8tent le travail des SAST. Les DAST fournissent des r\u00e9sultats dans une requ\u00eate HTTP qui peut \u00eatre r\u00e9p\u00e9t\u00e9e pour v\u00e9rifiabilit\u00e9. Cette combinaison de tests en temps r\u00e9el et de r\u00e9sultats r\u00e9p\u00e9tables rend les DAST extr\u00eamement pr\u00e9cis et suffisamment dynamiques pour fournir une r\u00e9p\u00e9tabilit\u00e9 des vuln\u00e9rabilit\u00e9s.<\/p>\n<h2>Une attaque \u00e0 deux volets<\/h2>\n<p>Les DAST et SAST devraient tous les deux \u00eatre implant\u00e9s sur deux volets, automatis\u00e9s et manuels. Les fournisseurs de services, comme Orenda Security, offrent des \u00e9valuations manuelles et automatis\u00e9es pour les deux m\u00e9thodes de test de s\u00e9curit\u00e9 des applications. Les \u00e9valuations DAST automatis\u00e9es offrent une bonne couverture g\u00e9n\u00e9rale du cadre de l\u2019application et r\u00e9alisent des sch\u00e9mas de stress et d\u2019attaques de base. En m\u00eame temps, les \u00e9valuations manuelles peuvent creuser profond\u00e9ment dans des sch\u00e9mas d\u2019attaque tr\u00e8s sp\u00e9cifiques et tenter de prendre avantage des connaissances d\u2019experts pour r\u00e9aliser des sch\u00e9mas d\u2019attaques complexes. Cette combinaison peut exposer des vuln\u00e9rabilit\u00e9s simples et complexes tout en s\u2019assurant que chaque sch\u00e9ma d\u2019attaque connu soit r\u00e9p\u00e9t\u00e9 soigneusement dans tous les cadres d\u2019applications.<\/p>\n<p><strong>Note: Les bons fournisseurs de SAST devraient \u00e9galement tirer avantage des solutions automatis\u00e9es tout en utilisant les experts pour revoir manuellement les vuln\u00e9rabilit\u00e9s du code.<\/strong><\/p>\n<h2>Conclusion<\/h2>\n<p>Les SAST et DAST forment un duo dynamique en aidant les WebOps \u00e0 d\u00e9couvrir des vuln\u00e9rabilit\u00e9s dans les applications. Si vous recherchez des\u00a0<a href=\"https:\/\/orendasecurity.com\/about\">experts en s\u00e9curit\u00e9<\/a>\u00a0qui offrent des revues manuelles et automatis\u00e9es approfondies d\u2019applications via les SAST, DAST et tests d\u2019intrusion,\u00a0<a href=\"https:\/\/orendasecurity.com\/contact\">contactez-nous<\/a>\u00a0d\u00e8s maintenant.<\/p>\n<p>&nbsp;<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1026\" data-postid=\"1026\" class=\"themify_builder_content themify_builder_content-1026 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>Les tests statiques de s\u00e9curit\u00e9 des applications (SAST) et les tests dynamiques de s\u00e9curit\u00e9 des applications (DAST) sont des m\u00e9thodologies utilis\u00e9es pour tester la s\u00e9curit\u00e9 de l\u2019environnement des applications. DAST est une m\u00e9thode de test de s\u00e9curit\u00e9 de type bo\u00eete noire qui teste les applications de l\u2019ext\u00e9rieur vers l\u2019int\u00e9rieur. SAST est une m\u00e9thode de test [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":341,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[36],"tags":[],"class_list":["post-1026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evaluation-dapplications","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE - Orenda Security<\/title>\n<meta name=\"description\" content=\"En bref, DAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s au moment de l\u2019ex\u00e9cution, tandis que SAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans le code source. Les deux sont utilis\u00e9s pour tester la s\u00e9curit\u00e9 des environnements d&#039;applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"En bref, DAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s au moment de l\u2019ex\u00e9cution, tandis que SAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans le code source. Les deux sont utilis\u00e9s pour tester la s\u00e9curit\u00e9 des environnements d&#039;applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-19T20:46:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-01T23:37:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/background-code-coder-177598.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE\",\"datePublished\":\"2019-02-19T20:46:15+00:00\",\"dateModified\":\"2019-11-01T23:37:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/\"},\"wordCount\":801,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/background-code-coder-177598.jpg\",\"articleSection\":[\"\u00c9valuation d\u2019applications\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/\",\"name\":\"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/background-code-coder-177598.jpg\",\"datePublished\":\"2019-02-19T20:46:15+00:00\",\"dateModified\":\"2019-11-01T23:37:12+00:00\",\"description\":\"En bref, DAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s au moment de l\u2019ex\u00e9cution, tandis que SAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans le code source. Les deux sont utilis\u00e9s pour tester la s\u00e9curit\u00e9 des environnements d'applications.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/background-code-coder-177598.jpg\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/background-code-coder-177598.jpg\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-using-sast-and-dast-together-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE - Orenda Security","description":"En bref, DAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s au moment de l\u2019ex\u00e9cution, tandis que SAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans le code source. Les deux sont utilis\u00e9s pour tester la s\u00e9curit\u00e9 des environnements d'applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/","og_locale":"fr_FR","og_type":"article","og_title":"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE - Orenda Security","og_description":"En bref, DAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s au moment de l\u2019ex\u00e9cution, tandis que SAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans le code source. Les deux sont utilis\u00e9s pour tester la s\u00e9curit\u00e9 des environnements d'applications.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/","og_site_name":"Orenda Security","article_published_time":"2019-02-19T20:46:15+00:00","article_modified_time":"2019-11-01T23:37:12+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/background-code-coder-177598.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE","datePublished":"2019-02-19T20:46:15+00:00","dateModified":"2019-11-01T23:37:12+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/"},"wordCount":801,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/background-code-coder-177598.jpg","articleSection":["\u00c9valuation d\u2019applications"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/","url":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/","name":"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/background-code-coder-177598.jpg","datePublished":"2019-02-19T20:46:15+00:00","dateModified":"2019-11-01T23:37:12+00:00","description":"En bref, DAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s au moment de l\u2019ex\u00e9cution, tandis que SAST d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans le code source. Les deux sont utilis\u00e9s pour tester la s\u00e9curit\u00e9 des environnements d'applications.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/background-code-coder-177598.jpg","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/background-code-coder-177598.jpg","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-using-sast-and-dast-together-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"LES AVANTAGES D\u2019UTILISER SAST ET DAST ENSEMBLE"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/fr\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=1026"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1026\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media\/341"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=1026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=1026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=1026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}