{"id":1082,"date":"2019-01-10T19:04:49","date_gmt":"2019-01-11T00:04:49","guid":{"rendered":"https:\/\/orendasecurity.com\/?p=1082"},"modified":"2019-11-01T19:45:21","modified_gmt":"2019-11-01T23:45:21","slug":"les-failles-dintegration-dans-les-api-resultent-souvent-en-violations-de-securite","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/fr\/blog\/les-failles-dintegration-dans-les-api-resultent-souvent-en-violations-de-securite\/","title":{"rendered":"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9"},"content":{"rendered":"<p>Plusieurs entreprises croient que les probl\u00e8mes de s\u00e9curit\u00e9 des API sont des \u00e9v\u00e9nements qui n\u2019arrivent qu\u2019aux grandes entreprises (250 employ\u00e9s et plus) telles que T-Mobile et McDonalds. Il est vrai que les cyberattaques ciblent plus souvent les entreprises qui d\u00e9tiennent de tr\u00e8s grandes quantit\u00e9s de donn\u00e9es pouvant \u00eatre vol\u00e9es avec un minimum d\u2019effort.<\/p>\n<p>Bien que les entreprises de cette taille r\u00e9ussissent \u00e0 traverser ces situations sans subir une grande perte de client\u00e8le, ces situations sont d\u00e9rangeantes et possiblement dangereuses. Lorsqu\u2019une petite ou moyenne entreprise est attaqu\u00e9e, elle a beaucoup plus \u00e0 perdre. Avec les ran\u00e7ons pour donn\u00e9es, les vols financiers et une myriade de nouvelles attaques, on ne peut plus pr\u00e9sumer que la s\u00e9curit\u00e9 est ad\u00e9quate.<\/p>\n<p>Le temps de panne requis pour r\u00e9parer les dommages devrait \u00eatre suffisant pour inciter les dirigeant principaux (CIO, CISO, CSO) et autres membres de l\u2019\u00e9quipe de s\u00e9curit\u00e9 \u00e0 prendre action. Un temps de panne d\u00e9mesur\u00e9 est n\u00e9cessaire pour\u00a0:<\/p>\n<ul>\n<li>Trouver les failles des API et les d\u00e9faillances de s\u00e9curit\u00e9<\/li>\n<li>S\u00e9curiser les donn\u00e9es avec (cryptage, utilisation de jetons, d\u00e9personnalisation)<\/li>\n<li>Centraliser le contr\u00f4le des utilisateurs de donn\u00e9es<\/li>\n<li>Contacter les clients qui auraient pu \u00eatre impact\u00e9s<\/li>\n<li>Renforcer les maillons faibles (automatis\u00e9s et humains)<\/li>\n<\/ul>\n<p>Par le temps que ces mesures sont prises, la dynamique des ventes est perdue et les clients pourraient perdre confiance et leur int\u00e9r\u00eat envers la marque, cr\u00e9ant un autre niveau de crise.<\/p>\n<p>D\u2019apr\u00e8s l\u2019Enqu\u00eate canadienne sur la cybers\u00e9curit\u00e9 et le cybercrime, les entreprises mondiales ont vu une augmentation de 57,4 pour cent de cyberattaques pendant la p\u00e9riode des f\u00eates de 2017, ce qui repr\u00e9sente plus du double que les chiffres de 2016. Selon Statistiques Canada, plus d\u2019une entreprise canadienne sur cinq a subi une cyberattaque en 2018.<\/p>\n<p>Un porte-parole de Statistiques Canada nous rappelle que \u00ab\u00a0les entreprises canadiennes continuent d\u2019adopter l\u2019internet et les technologies num\u00e9riques, ce qui les expose \u00e0 de plus grands risques et menaces de cybers\u00e9curit\u00e9. Cependant, l\u2019impact de ces risques et menaces sur les investissements et les d\u00e9cisions quotidiennes des entreprises n\u2019est pas facile \u00e0 comprendre car souvent les incidents de cybers\u00e9curit\u00e9 ne sont pas signal\u00e9s.\u00a0\u00bb<\/p>\n<h2>Les failles d\u2019API attirent les cybercriminels<\/h2>\n<p>Les API offrent l\u2019int\u00e9gration num\u00e9rique entre les applications, les ressources infonuagiques, les donn\u00e9es et les services d\u2019application, ce qui repr\u00e9sente une grande source de motivation pour les cyberpr\u00e9dateurs.<\/p>\n<p>Pensez-y\u2026 les API permettent l\u2019acc\u00e8s aux donn\u00e9es des clients et souvent \u00e0 leur environnement num\u00e9rique complet. De plus, plusieurs API ont des failles b\u00e9antes qui ne sont pas facilement d\u00e9celables sans des tests ad\u00e9quats et p\u00e9riodiques. Les failles d\u2019API offrent des opportunit\u00e9s faciles aux vols de s\u00e9curit\u00e9; il est donc essentiel de v\u00e9rifier l\u2019int\u00e9gration \u00e0 toute \u00e9preuve des diff\u00e9rentes composantes. Pendant la seule ann\u00e9e 2018, il y a eu une augmentation du nombre de violations et d\u2019expositions majeures de donn\u00e9es dues \u00e0 une s\u00e9curit\u00e9 inad\u00e9quate des API. Salesforce, Instagram et Venmo, pour n\u2019en nommer que quelques-unes, ont toutes \u00e9t\u00e9 victimes d\u2019incidents de s\u00e9curit\u00e9 des API.<\/p>\n<p>Depuis que les API ont \u00e9t\u00e9 rendues disponibles aux d\u00e9veloppeurs et aux utilisateurs du public afin d\u2019accroitre l\u2019utilisation des logiciels, il existe des opportunit\u00e9s \u00e9normes pour les cybercriminels. Selon une \u00e9tude de Imperva, une entreprise typique g\u00e8re en moyenne 363 API d\u00fb \u00e0 l\u2019utilisation croissante des micro-services.<\/p>\n<h2>Tests d\u2019API \u2013 maintenant essentiels au maintien de la s\u00e9curit\u00e9<\/h2>\n<p>Les tests d\u2019API peuvent \u00eatre r\u00e9alis\u00e9s lors du d\u00e9veloppement. Des tests r\u00e9p\u00e9t\u00e9s d\u2019API sont cependant recommand\u00e9s lorsque des API sont ajout\u00e9es, modifi\u00e9es ou mises \u00e0 jour. Par le pass\u00e9, les tests d\u2019interfaces utilisateur semblaient suffisants; les tests d\u2019API sont cependant beaucoup plus rapides et plus efficaces que d\u2019attendre que les utilisateurs d\u00e9couvrent des bogues sur une longue p\u00e9riode de temps. Les tests d\u2019API permettent une communication entre les syst\u00e8mes int\u00e9gr\u00e9s de logiciels et permettent de d\u00e9couvrir des vuln\u00e9rabilit\u00e9s qui peuvent \u00eatre corrig\u00e9es et consid\u00e9r\u00e9es s\u00e9curitaires.<\/p>\n<p>Dans le cas de la faille d\u2019API que le service postal des \u00c9tats-Unis a subie sur une p\u00e9riode d\u2019un an (novembre 2018), une \u00e9norme quantit\u00e9 de renseignements confidentiels sur les clients \u00e9tait \u00e9minemment disponible pour acc\u00e8s sans autorisation sp\u00e9ciale. Cela signifie qu\u2019\u00e0 peu pr\u00e8s n\u2019importe qui pouvait acc\u00e9der \u00e0 plus de 60 millions d\u2019adresses courriel d\u2019utilisateurs corporatifs, leur adresse civique, num\u00e9ros de t\u00e9l\u00e9phone, etc. Cette d\u00e9faillance aurait pu \u00eatre responsable d\u2019un tr\u00e8s grand nombre d\u2019hame\u00e7onnages, de tromperies sociales et de fraudes \u00e0 tout azimut. \u00c0 ce jour, le service postal des \u00c9tats-Unis pr\u00e9tend que la vuln\u00e9rabilit\u00e9 n\u2019a pas \u00e9t\u00e9 exploit\u00e9e. Mais apr\u00e8s pr\u00e8s d\u2019un an d\u2019exposition, ce n\u2019est peut-\u00eatre qu\u2019une question de temps avant que les ramifications ne fassent surface.<\/p>\n<p>D\u2019autres exemples notables incluent Air Canada, la Banque de Montr\u00e9al, la Banque canadienne imp\u00e9riale de commerce et Equifax. Des tests d\u2019API auraient \u00e9vit\u00e9 chacun de ces incidents.<\/p>\n<h2>Rendez vos API s\u00e9curitaires<\/h2>\n<p>D\u2019apr\u00e8s toutes les sources, l\u2019exploitation des API via internet sera la principale cause de violations en 2022. Bien que la s\u00e9curit\u00e9 internet soit devenue un des plus importants aspects des entreprises de d\u00e9tail et de commerce \u00e9lectronique, l\u2019int\u00e9gration des API est souvent n\u00e9glig\u00e9e. Afin de surmonter ces probabilit\u00e9s, les syst\u00e8mes doivent \u00eatre test\u00e9s pour en corriger les failles. Alors que la technologie \u00e9volue, les tests doivent rester une priorit\u00e9 pour toutes les entreprises qui veulent maintenir les plus hauts standards en cybers\u00e9curit\u00e9. Gagnez en confiance concernant l\u2019int\u00e9gration de vos API en gardant une longueur d\u2019avance sur les menaces latentes qui pourraient paralyser temporairement (ou de fa\u00e7on permanente) votre entreprise.<\/p>\n<p>Notre \u00e9quipe Orenda Security, hautement qualifi\u00e9e et exp\u00e9riment\u00e9e, se sp\u00e9cialise dans l\u2019\u00e9valuation d\u2019applications et tests d\u2019API, parmi tous les types de s\u00e9curit\u00e9 internet. Nous pouvons tester votre logiciel pour d\u00e9terminer s\u2019il rencontre les attentes en termes de fonctionnalit\u00e9s, fiabilit\u00e9, performance et s\u00e9curit\u00e9. Obtenez la tranquillit\u00e9 d\u2019esprit en \u00e9vitant des situations qui pourraient impacter n\u00e9gativement votre entreprise en croissance.<\/p>\n<p>Contactez-nous d\u00e8s aujourd\u2019hui \u00e0 info@orendasecurity.com pour obtenir une consultation gratuite et une soumission.<\/p>\n<p>&nbsp;<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1082\" data-postid=\"1082\" class=\"themify_builder_content themify_builder_content-1082 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>Plusieurs entreprises croient que les probl\u00e8mes de s\u00e9curit\u00e9 des API sont des \u00e9v\u00e9nements qui n\u2019arrivent qu\u2019aux grandes entreprises (250 employ\u00e9s et plus) telles que T-Mobile et McDonalds. Il est vrai que les cyberattaques ciblent plus souvent les entreprises qui d\u00e9tiennent de tr\u00e8s grandes quantit\u00e9s de donn\u00e9es pouvant \u00eatre vol\u00e9es avec un minimum d\u2019effort. Bien que [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":829,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[41],"tags":[],"class_list":["post-1082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-affaires-et-securite","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9 - Orenda Security<\/title>\n<meta name=\"description\" content=\"Les API fournissent l&#039;int\u00e9gration num\u00e9rique entre les applications, les ressources du cloud, les donn\u00e9es et les services d&#039;application, ce qui motive fortement les cyberhackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9 - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"Les API fournissent l&#039;int\u00e9gration num\u00e9rique entre les applications, les ressources du cloud, les donn\u00e9es et les services d&#039;application, ce qui motive fortement les cyberhackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-11T00:04:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-01T23:45:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/fingerprint-2904774_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9\",\"datePublished\":\"2019-01-11T00:04:49+00:00\",\"dateModified\":\"2019-11-01T23:45:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/\"},\"wordCount\":1140,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/fingerprint-2904774_1920.jpg\",\"articleSection\":[\"Affaires et s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/\",\"name\":\"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9 - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/fingerprint-2904774_1920.jpg\",\"datePublished\":\"2019-01-11T00:04:49+00:00\",\"dateModified\":\"2019-11-01T23:45:21+00:00\",\"description\":\"Les API fournissent l'int\u00e9gration num\u00e9rique entre les applications, les ressources du cloud, les donn\u00e9es et les services d'application, ce qui motive fortement les cyberhackers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/fingerprint-2904774_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/fingerprint-2904774_1920.jpg\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/integration-flaws-in-apis-often-result-in-security-breaches-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9 - Orenda Security","description":"Les API fournissent l'int\u00e9gration num\u00e9rique entre les applications, les ressources du cloud, les donn\u00e9es et les services d'application, ce qui motive fortement les cyberhackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/","og_locale":"fr_FR","og_type":"article","og_title":"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9 - Orenda Security","og_description":"Les API fournissent l'int\u00e9gration num\u00e9rique entre les applications, les ressources du cloud, les donn\u00e9es et les services d'application, ce qui motive fortement les cyberhackers.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/","og_site_name":"Orenda Security","article_published_time":"2019-01-11T00:04:49+00:00","article_modified_time":"2019-11-01T23:45:21+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/fingerprint-2904774_1920.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9","datePublished":"2019-01-11T00:04:49+00:00","dateModified":"2019-11-01T23:45:21+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/"},"wordCount":1140,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/fingerprint-2904774_1920.jpg","articleSection":["Affaires et s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/","url":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/","name":"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9 - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/fingerprint-2904774_1920.jpg","datePublished":"2019-01-11T00:04:49+00:00","dateModified":"2019-11-01T23:45:21+00:00","description":"Les API fournissent l'int\u00e9gration num\u00e9rique entre les applications, les ressources du cloud, les donn\u00e9es et les services d'application, ce qui motive fortement les cyberhackers.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/fingerprint-2904774_1920.jpg","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/fingerprint-2904774_1920.jpg","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/integration-flaws-in-apis-often-result-in-security-breaches-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"LES FAILLES D\u2019INT\u00c9GRATION DANS LES API R\u00c9SULTENT SOUVENT EN VIOLATIONS DE S\u00c9CURIT\u00c9"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/fr\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=1082"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1082\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media\/829"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=1082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=1082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=1082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}