{"id":91,"date":"2026-01-16T16:00:53","date_gmt":"2026-01-16T15:00:53","guid":{"rendered":"https:\/\/secure-pipelines.com\/?page_id=91"},"modified":"2026-03-25T09:04:26","modified_gmt":"2026-03-25T08:04:26","slug":"topics","status":"publish","type":"page","link":"https:\/\/secure-pipelines.com\/fr\/topics\/","title":{"rendered":"Th\u00e8mes"},"content":{"rendered":"<p>Cette page pr\u00e9sente les principaux th\u00e8mes techniques couverts sur Secure Pipelines.<\/p>\n<p>Chaque th\u00e8me repr\u00e9sente un domaine cl\u00e9 de la s\u00e9curit\u00e9 CI\/CD et de la cha\u00eene d&rsquo;approvisionnement logicielle, avec des articles approfondis, des guides et des labs pratiques.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">S\u00e9curit\u00e9 CI\/CD<\/h2>\n<p>Ce th\u00e8me se concentre sur la s\u00e9curisation des pipelines CI\/CD contre la falsification, les abus et les modifications non autoris\u00e9es.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/complete-guide-ci-cd-pipeline-security\/\">\u2192 Lire le guide complet de la s\u00e9curit\u00e9 des pipelines CI\/CD<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-execution-models-trust-assumptions-security-guide-2\/\">Mod\u00e8les d&rsquo;ex\u00e9cution de pipeline et fronti\u00e8res de confiance<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/separation-of-duties-least-privilege-ci-cd-pipelines\/\">Permissions, identit\u00e9s et contr\u00f4le d&rsquo;acc\u00e8s<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/secrets-management-ci-cd-pipelines-patterns-vault-2\/\">Exposition et protection des secrets<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/secure-deployment-workflows-ci-cd-pipeline-production\/\">Workflows de d\u00e9ploiement s\u00e9curis\u00e9s<\/a><\/li>\n<\/ul>\n<p><em>Guides :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/policy-as-code-ci-cd-opa-rego-security-gates-2\/\">Policy as Code<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/short-lived-credentials-workload-identity-federation-ci-cd\/\">Workload Identity Federation<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/defensive-patterns-mitigations-ci-cd-pipeline-attacks\/\">Patterns d\u00e9fensifs<\/a><br \/><em>Cheat sheets :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/owasp-top-10-ci-cd-risks-explained-real-world-examples\/\">OWASP Top 10 des risques CI\/CD<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/slsa-levels-explained-practical-compliance-checklist\/\">Checklist des niveaux SLSA<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">S\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement logicielle<\/h2>\n<p>La s\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement logicielle traite de l&rsquo;int\u00e9grit\u00e9 des d\u00e9pendances, des builds et des artefacts.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/software-supply-chain\/software-supply-chain-security-comprehensive-guide\/\">\u2192 Lire le guide complet de la s\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement logicielle<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/dependency-confusion-artifact-poisoning-attacks-defenses\/\">Risques li\u00e9s aux d\u00e9pendances et confiance transitive<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/build-integrity-reproducible-builds-ci-cd\/\">Int\u00e9grit\u00e9 des builds et builds reproductibles<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/artifact-provenance-attestations-slsa-in-toto-2\/\">Provenance des artefacts et attestations<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/signing-verifying-container-images-sigstore-cosign\/\">Signature et v\u00e9rification des artefacts<\/a><\/li>\n<\/ul>\n<p><em>Labs :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-signing-verifying-container-images-cosign-github-actions\/\">Signature Cosign<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-generating-verifying-slsa-provenance-container-images\/\">Provenance SLSA<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-sbom-pipeline-generate-attest-verify-syft-cosign\/\">Pipeline SBOM<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-reproducible-container-builds-pinning-verifying-diffing\/\">Builds reproductibles<\/a><br \/><em>Comparatifs :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/container-image-signing-tools-compared-cosign-notation-gpg\/\">Outils de signature<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/sbom-tools-compared-syft-trivy-cyclonedx-cli\/\">Outils SBOM<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Durcissement des pipelines<\/h2>\n<p>Ce th\u00e8me couvre les techniques de renforcement des environnements d&rsquo;ex\u00e9cution des pipelines.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/pipeline-hardening\/pipeline-hardening-secure-ci-cd-build-deployment-environments\/\">\u2192 Lire le guide de durcissement des pipelines<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-ephemeral-self-hosted-runners-actions-runner-controller\/\">Isolation des runners et des agents de build<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/network-filesystem-restrictions-ci-cd-build-environments\/\">Restrictions r\u00e9seau et syst\u00e8me de fichiers<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/separation-of-duties-least-privilege-ci-cd-pipelines\/\">Mod\u00e8les d&rsquo;ex\u00e9cution \u00e0 moindre privil\u00e8ge<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/github-actions\/securing-github-actions-runners\/\">Durcissement des runners partag\u00e9s et auto-h\u00e9berg\u00e9s<\/a><\/li>\n<\/ul>\n<p><em>Labs :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-hardening-github-actions-workflows-permissions-pinning-secrets\/\">Durcissement GHA<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-detecting-preventing-secret-leaks-ci-cd-pipelines\/\">Fuites de secrets<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-enforcing-kubernetes-policies-opa-conftest-ci-cd-2\/\">OPA Conftest<\/a><br \/><em>Comparatifs :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-security-scanners-compared-trivy-grype-snyk-checkov\/\">Scanners de s\u00e9curit\u00e9<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-policy-engines-compared-opa-kyverno-sentinel-cedar\/\">Moteurs de politiques<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">GitHub Actions<\/h2>\n<p>Ce th\u00e8me se concentre sur la s\u00e9curisation des workflows construits avec GitHub Actions.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/github-actions-security-definitive-guide\/\">\u2192 Lire le guide de r\u00e9f\u00e9rence de la s\u00e9curit\u00e9 GitHub Actions<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/github-actions-security-cheat-sheet\/\">Permissions des workflows et port\u00e9e des tokens<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-detecting-malicious-github-actions-static-analysis\/\">S\u00e9curisation des actions tierces<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-ephemeral-self-hosted-runners-actions-runner-controller\/\">S\u00e9curit\u00e9 et isolation des runners<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-configuring-oidc-workload-identity-github-actions-aws\/\">OIDC workload identity avec AWS<\/a><\/li>\n<\/ul>\n<p><em>Labs :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-hardening-github-actions-workflows-permissions-pinning-secrets\/\">Durcissement des workflows<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-signing-verifying-container-images-cosign-github-actions\/\">Signature Cosign<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-generating-verifying-slsa-provenance-container-images\/\">Provenance SLSA<\/a><br \/><em>Cheat sheet :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/github-actions-security-cheat-sheet\/\">GitHub Actions Security Cheat Sheet<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">GitLab CI<\/h2>\n<p>Ce th\u00e8me explore les consid\u00e9rations de s\u00e9curit\u00e9 sp\u00e9cifiques \u00e0 GitLab CI\/CD.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/gitlab-ci-cd-security-definitive-guide\/\">\u2192 Lire le guide de r\u00e9f\u00e9rence de la s\u00e9curit\u00e9 GitLab CI\/CD<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-securing-gitlab-ci-pipelines-protected-variables-runners-environments\/\">S\u00e9curit\u00e9 des pipelines et des jobs<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/gitlab-ci-security-cheat-sheet\/\">Configuration et isolation des runners<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/secrets-management-ci-cd-pipelines-patterns-vault-2\/\">Gestion des secrets dans les pipelines GitLab<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/secure-deployment-workflows-ci-cd-pipeline-production\/\">Workflows de d\u00e9ploiement s\u00e9curis\u00e9s<\/a><\/li>\n<\/ul>\n<p><em>Lab :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-securing-gitlab-ci-pipelines-protected-variables-runners-environments\/\">S\u00e9curisation des pipelines GitLab CI<\/a><br \/><em>Cheat sheet :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/gitlab-ci-security-cheat-sheet\/\">GitLab CI Security Cheat Sheet<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Menaces et attaques<\/h2>\n<p>Comprendre comment les pipelines CI\/CD sont attaqu\u00e9s est essentiel pour les d\u00e9fendre.<\/p>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-threats-attacks-what-attackers-target-how-to-defend\/\">\u2192 Lire le guide des menaces et attaques CI\/CD<\/a><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/threats-attacks\/ci-cd-pipelines-primary-attack-surface\/\">Chemins d&rsquo;attaque courants des pipelines CI\/CD<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/dependency-confusion-artifact-poisoning-attacks-defenses\/\">Techniques d&rsquo;attaque de la cha\u00eene d&rsquo;approvisionnement<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-exploiting-defending-poisoned-pipeline-execution-ppe\/\">Poisoned Pipeline Execution<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/owasp-top-10-ci-cd-risks-explained-real-world-examples\/\">OWASP Top 10 des risques CI\/CD<\/a><\/li>\n<\/ul>\n<p><em>Labs :<\/em> <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-exploiting-defending-poisoned-pipeline-execution-ppe\/\">Attaque PPE<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-simulating-dependency-confusion-attack-sandbox\/\">Dependency Confusion<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-detecting-malicious-github-actions-static-analysis\/\">Actions malveillantes<\/a> | <a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-artifact-tampering-detection-swapping-container-images-registry-2\/\">Falsification d&rsquo;artefacts<\/a><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Policy as Code<\/h2>\n<p>Le Policy as Code permet des contr\u00f4les de s\u00e9curit\u00e9 automatis\u00e9s et applicables dans les pipelines CI\/CD.<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/policy-as-code-ci-cd-opa-rego-security-gates-2\/\">Principes de conception de politiques et OPA\/Rego<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-enforcing-kubernetes-policies-opa-conftest-ci-cd-2\/\">Validation de configurations et de workflows avec Conftest<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-policy-engines-compared-opa-kyverno-sentinel-cedar\/\">Comparatif des moteurs de politiques : OPA vs Kyverno vs Sentinel vs Cedar<\/a><\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Comment utiliser les th\u00e8mes<\/h2>\n<p>Les th\u00e8mes peuvent \u00eatre explor\u00e9s ind\u00e9pendamment ou utilis\u00e9s comme points d&rsquo;entr\u00e9e vers un contenu plus structur\u00e9.<\/p>\n<p>Chaque th\u00e8me renvoie vers :<\/p>\n<ul class=\"wp-block-list\">\n<li>Des articles connexes et des guides piliers<\/li>\n<li>Des guides techniques approfondis<\/li>\n<li>Des labs pratiques<\/li>\n<li>Des cheat sheets et des ressources comparatives<\/li>\n<\/ul>\n<p>Ensemble, ils offrent une vue compl\u00e8te de la s\u00e9curit\u00e9 CI\/CD et de la cha\u00eene d&rsquo;approvisionnement logicielle.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">\u00c9cosyst\u00e8me associ\u00e9<\/h2>\n<p>Pour les perspectives de conformit\u00e9, gouvernance et r\u00e9glementation li\u00e9es au DevSecOps et au CI\/CD, consultez <strong><a href=\"https:\/\/regulated-devsecops.com\" target=\"_blank\" rel=\"noopener\">regulated-devsecops.com<\/a><\/strong>.<\/p>\n<p>Secure Pipelines se concentre sur l&rsquo;impl\u00e9mentation technique, tandis que Regulated DevSecOps se concentre sur la gouvernance et l&rsquo;auditabilit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cette page pr\u00e9sente les principaux th\u00e8mes techniques couverts sur Secure Pipelines. Chaque th\u00e8me repr\u00e9sente un domaine cl\u00e9 de la s\u00e9curit\u00e9 CI\/CD et de la cha\u00eene d&rsquo;approvisionnement logicielle, avec des articles approfondis, des guides et des labs pratiques. S\u00e9curit\u00e9 CI\/CD Ce th\u00e8me se concentre sur la s\u00e9curisation des pipelines CI\/CD contre la falsification, les abus et &#8230; <a title=\"Th\u00e8mes\" class=\"read-more\" href=\"https:\/\/secure-pipelines.com\/fr\/topics\/\" aria-label=\"En savoir plus sur Th\u00e8mes\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-91","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages\/91","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/comments?post=91"}],"version-history":[{"count":1,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages\/91\/revisions"}],"predecessor-version":[{"id":748,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages\/91\/revisions\/748"}],"wp:attachment":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/media?parent=91"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}