{"id":138612,"date":"2023-01-09T12:47:59","date_gmt":"2023-01-09T17:47:59","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/secrets-hub\/"},"modified":"2026-01-22T03:47:04","modified_gmt":"2026-01-22T08:47:04","slug":"secrets-hub","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/","title":{"rendered":"Secrets Hub"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1765384736572{background-color: #082233 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew-hero py-10&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h1><span class=\"ice\">Secrets Hub<\/span><\/h1>\n<p>\n[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-8&Prime;]Gestion centralis\u00e9e, visibilit\u00e9 et rotation des secrets dans AWS Secrets Manager (ASM), Azure Key Vault (AKV) et Google Secret Manager (GSM) \u2014 avec d\u00e9couverte pour HashiCorp Vault.[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:%23form|title:Obtenir%20le%20rapport|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid-cyan\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_esp33i5i6x videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1765388773962{background-color: #A0E8F9 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2&Prime;][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-md-offset-2 vc_col-md-8&Prime; el_class=\u00a0\u00bbtext-center py-10&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbmb-6&Prime;]<\/p>\n<h3>Savez-vous o\u00f9 se trouvent vos coffres-forts secrets ?<\/h3>\n<p>Faites cette rapide auto-\u00e9valuation pour d\u00e9couvrir les coffres cach\u00e9s, comprendre les risques et voir si vous \u00eates pr\u00eat pour un scan des secrets.<\/p>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bb\u00c9valuer la prolif\u00e9ration des coffres-forts\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fvault-sprawl-assessment%2F|title:%C3%89valuer%20la%20prolif%C3%A9ration%20des%20coffres-forts|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid-cyan\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 overview-vt py-10&Prime;][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>S\u00e9curisez les applications cloud<\/h3>\n<p>Permettez aux d\u00e9veloppeurs de continuer \u00e0 utiliser leurs workflows existants pour acc\u00e9der aux secrets dans les secrets stores int\u00e9gr\u00e9s (natifs) tout en offrant aux \u00e9quipes de s\u00e9curit\u00e9 la visibilit\u00e9 et tous les avantages de la gestion centralis\u00e9e des secrets de CyberArk.<\/p>\n<p>Commencez d\u00e8s aujourd&rsquo;hui \u00e0 r\u00e9pondre aux besoins des \u00e9quipes de s\u00e9curit\u00e9, des d\u00e9veloppeurs et des op\u00e9rations cloud qui cr\u00e9ent et d\u00e9ploient des applications \u00e0 l&rsquo;aide des coffres-forts int\u00e9gr\u00e9s des fournisseurs de cloud.<br \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-134795\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\" alt=\"Centralized Secrets Management and Rotation\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>G\u00e9rez et faites tourner de mani\u00e8re centralis\u00e9e<\/h4>\n<p>Offrez \u00e0 la s\u00e9curit\u00e9 une visibilit\u00e9, un contr\u00f4le et une rotation des secrets, tout en appliquant des politiques unifi\u00e9es.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-134811\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\" alt=\"Same Native Developer Experience\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Exp\u00e9rience d\u00e9veloppeur inchang\u00e9e<\/h4>\n<p>Permettez aux d\u00e9veloppeurs de continuer \u00e0 utiliser les magasins de secrets natifs du fournisseur de cloud, comme ils le font aujourd&rsquo;hui.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-134819\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Privilege-Escalation.svg\" alt=\"Reduces Vault Sprawl\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>D\u00e9couverte compl\u00e8te<\/h4>\n<p>D\u00e9couvrez et fournissez des informations sur les secrets non g\u00e9r\u00e9s et g\u00e9r\u00e9s stock\u00e9s dans des coffres-forts.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb disable_element=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 py-10&Prime;][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h4>Meilleur score pour le cas d&rsquo;utilisation \u00ab Gestion des secrets \u00bb dans le rapport 2023 Gartner\u00ae Critical Capabilities for PAM<\/h4>\n<p><span class=\"lead font-weight-normal\">D\u00e9couvrez pourquoi CyberArk a obtenu la meilleure note pour le cas d&rsquo;utilisation \u00ab Gestion des secrets \u00bb.<\/span>[\/vc_column_text][vc_btn title=\u00a0\u00bbObtenir le rapport\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid-cyan\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog%2Fcio-pov-what-am-i-actually-supposed-to-do-with-agentic-ai|title:Lire%20maintenant|\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_single_image image=\u00a0\u00bb220374&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 py-10&Prime;][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbtext-center\u00a0\u00bb offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h3>CyberArk nomm\u00e9 leader global dans le rapport KuppingerCole Analysts Leadership Compass 2025 pour la gestion des secrets d&rsquo;entreprise<\/h3>\n<p>\n[\/vc_column_text][vc_btn title=\u00a0\u00bbObtenir le rapport complet\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid-cyan\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2F2025-kuppingercole-leadership-compass-for-enterprise-secrets-management|title:Obtenir%20le%20rapport%20complet|\u00a0\u00bb][\/vc_column][vc_column][vc_single_image image=\u00a0\u00bb215675&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 pt-12 pb-10&Prime; css=\u00a0\u00bb.vc_custom_1765388794489{background-color: #082233 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbpb-8&Prime; offset=\u00a0\u00bbvc_col-lg-offset-0 vc_col-md-3&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h5 class=\"ice\">G\u00e9rez et d\u00e9couvrez de mani\u00e8re centralis\u00e9e les secrets dans des coffres-forts natifs du cloud sans modifier l&rsquo;exp\u00e9rience des d\u00e9veloppeurs.<\/h5>\n<p><span class=\"text-white\">B\u00e9n\u00e9ficiez de tous les avantages de la gestion centralis\u00e9e des secrets sans impact sur les workflows des d\u00e9veloppeurs.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-8&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbpr-4 pb-8&Prime; width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/password__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h5 class=\"ice\">Gestion et rotation centralis\u00e9es<\/h5>\n<p><span class=\"text-white\">Mettez en place un contr\u00f4le centralis\u00e9 et appliquez une rotation unifi\u00e9e et d&rsquo;autres politiques relatives aux secrets \u00e0 l&rsquo;aide des processus et de l&rsquo;infrastructure de s\u00e9curit\u00e9 existants.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpr-4 pb-8&Prime; width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-security__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h5 class=\"ice\">Exp\u00e9rience inchang\u00e9e pour les d\u00e9veloppeurs et les op\u00e9rations<\/h5>\n<p><span class=\"text-white\">Permet aux d\u00e9veloppeurs de continuer \u00e0 utiliser AWS Secrets Manager, Azure Key Vault et Google Secret Manager pour acc\u00e9der aux secrets, tandis que les \u00e9quipes de s\u00e9curit\u00e9 b\u00e9n\u00e9ficient d&rsquo;une visibilit\u00e9 centralis\u00e9e. Avec Secrets Hub, la s\u00e9curit\u00e9 peut \u00e9galement d\u00e9couvrir l&rsquo;utilisation de HashiCorp Vault cr\u00e9\u00e9e et g\u00e9r\u00e9e en dehors de la gouvernance centrale.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpr-4 pb-8&Prime; width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-magnifying-glass__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h5 class=\"ice\">D\u00e9couverte et visibilit\u00e9<\/h5>\n<p><span class=\"text-white\">Obtenez des informations sur les secrets dans les coffres-forts natifs AWS, Azure et GCP, et d\u00e9tectez les instances HashiCorp Vault qui peuvent \u00eatre g\u00e9r\u00e9es par des d\u00e9veloppeurs ou des \u00e9quipes en dehors de la supervision centrale de la s\u00e9curit\u00e9.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpr-4 pb-8&Prime; width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/fact-check__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h5 class=\"ice\">Extensible et complet<\/h5>\n<p><span class=\"text-white\">En tant que partie int\u00e9grante de la plateforme de s\u00e9curit\u00e9 des identit\u00e9s de CyberArk, il permet de s\u00e9curiser et de g\u00e9rer de mani\u00e8re centralis\u00e9e les secrets pour tous les types d&rsquo;applications, les identit\u00e9s humaines et machines.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbpr-4 pb-8&Prime; width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/speed__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h5 class=\"ice\">Simplicit\u00e9 du SaaS<\/h5>\n<p><span class=\"text-white\">Simplifie les op\u00e9rations et le d\u00e9ploiement, minimise le besoin de comp\u00e9tences sp\u00e9cialis\u00e9es tout en offrant des niveaux \u00e9lev\u00e9s de scalabilit\u00e9 et de disponibilit\u00e9.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top\u00a0\u00bb][vc_column el_class=\u00a0\u00bbtext-md-center pb-12&Prime; offset=\u00a0\u00bbvc_col-md-offset-2 vc_col-md-8&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>\u00c9liminez la prolif\u00e9ration des coffres-forts dans les environnements AWS, Azure et GCP, et b\u00e9n\u00e9ficiez d&rsquo;une visibilit\u00e9 sur l&rsquo;utilisation de HashiCorp Vault en dehors de la gouvernance centrale.<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 pb-10&Prime;][vc_column][vc_single_image image=\u00a0\u00bb220384&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 customer-stories cybv2-pad\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h3>Aider les clients du monde entier \u00e0 s\u00e9curiser les identit\u00e9s pour les workloads et les applications cloud<\/h3>\n<p><\/p>\n<h6>Les clients de CyberArk utilisent CyberArk Secrets Manager et la plateforme de s\u00e9curit\u00e9 des identit\u00e9s pour s\u00e9curiser toutes leurs identit\u00e9s humaines et non humaines.<\/h6>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Voir plus de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cyb-pad-btm featured-video-overflow\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1671212795028{background-color: #ffffff !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbpb-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215681\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg\" alt=\"dz bank logo\" width=\"638\" height=\"622\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg 638w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-300x292.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-150x146.jpg 150w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-4&Prime;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"double quotes\" width=\"87\" height=\"64\" \/><\/p>\n<p><span class=\"large-quote\" style=\"font-size: 22px;\">\u201c(with) identity security and especially PAM, CyberArk is the key service DZ BANK uses to protect our IT infrastructure. Since integrating CyberArk into our environment, privilege management and security have definitely improved. Fundamentally, it always comes back to having control over privileges and being able to manage secrets.\u201d<\/span><\/p>\n<p><strong>Kurt Sand<\/strong>,\u00a0GM,<br \/>Machine Identity Security at CyberArk[\/vc_column_text][vc_row_inner el_class=\u00a0\u00bbresource-button-sand\u00a0\u00bb][vc_column_inner column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-business-value-of-cyberark|title:Lire%20le%20livre%20blanc|\u00a0\u00bb offset=\u00a0\u00bbvc_col-lg-10 vc_col-md-10 vc_col-xs-11&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]Livre blanc[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]Rapport sur l&rsquo;\u00e9tat de la s\u00e9curit\u00e9 des identit\u00e9s machines en 2025<i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm\u00a0\u00bb][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzODQzNCIgcG9zMl9pZD0iMTI4MTQyIiBwb3MzX2lkPSIxMzU0NzYiIHBvczRfaWQ9IjEyODQ2MSJdPGJyPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 promo-image\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1756391477950{background-color: #D6F77A !important;}\u00a0\u00bb][vc_column][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/12&Prime; offset=\u00a0\u00bbvc_col-md-offset-2&Prime;][vc_single_image image=\u00a0\u00bb220411&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb3\/4&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Am\u00e9liorez la s\u00e9curit\u00e9 des applications en allant \u00e0 la rencontre des d\u00e9veloppeurs l\u00e0 o\u00f9 ils se trouvent<\/h3>\n<p><strong>Consid\u00e9rations cl\u00e9s pour s\u00e9curiser diff\u00e9rents types d&rsquo;identit\u00e9s non humaines<\/strong><br \/>D\u00e9couvrez comment simplifier la s\u00e9curisation centralis\u00e9e des secrets dans les environnements cloud, hybrides et autres.[\/vc_column_text][vc_btn title=\u00a0\u00bbGet the eBook\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fkey-considerations-for-securing-different-machine-identities|title:Get%20the%20eBook|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>D\u00e9couvrez les ressources associ\u00e9es<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1765389588065{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1765389636724{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb el_id=\u00a0\u00bbform\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h2>Demander une d\u00e9monstration<\/h2>\n<p><strong>D\u00e9couverte et visibilit\u00e9 :<\/strong>\u00a0Visualisez les secrets sur AWS, Azure et GCP, et d\u00e9couvrez les instances HashiCorp Vault \u00e9chappant \u00e0 la surveillance centrale de la s\u00e9curit\u00e9.<\/p>\n<p><strong>Gestion et rotation centralis\u00e9es :<\/strong>\u00a0G\u00e9rez et faites tourner les secrets de mani\u00e8re coh\u00e9rente dans les coffres-forts natifs AWS, Azure et GCP.<\/p>\n<p><strong>Exp\u00e9rience d\u00e9veloppeur inchang\u00e9e :<\/strong>\u00a0Pr\u00e9servez les workflows des d\u00e9veloppeurs avec AWS, Azure, GCP et HashiCorp Vault tout en ajoutant une visibilit\u00e9 centralis\u00e9e.<\/p>\n<p><strong>R\u00e9duisez la prolif\u00e9ration des coffres-forts : <\/strong> Simplifiez les op\u00e9rations et augmentez la visibilit\u00e9 en g\u00e9rant de mani\u00e8re centralis\u00e9e les secrets dans tous les secrets stores natifs des principaux fournisseurs de cloud et dans HashiCorp Vault.[\/vc_column_text][vc_single_image image=\u00a0\u00bb220384&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h5>Commencez avec une d\u00e9monstration de Secrets Hub<\/h5>\n<p>[\/vc_column_text][vc_raw_html css=\u00a0\u00bb\u00a0\u00bb]W21hcmtldG9fZm9ybSBpZD0iMTExMDAiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdGhhbmsteW91LXNlY3JldHMtaHViLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1765384736572{background-color: #082233 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew-hero py-10&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] Secrets Hub [\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbpb-8&Prime;]Gestion centralis\u00e9e, visibilit\u00e9 et rotation des secrets dans AWS Secrets Manager (ASM), Azure Key Vault (AKV)&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27774],"class_list":["post-138612","page","type-page","status-publish","hentry","product_category-devsecops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gestion et renouvellement des secrets pour AWS Secrets Manager | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Secrets Hub offre tous les avantages de la gestion et du renouvellement centralis\u00e9s des secrets pour AWS Secrets Manager sans modifier les workflows des d\u00e9veloppeurs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secrets Hub\" \/>\n<meta property=\"og:description\" content=\"CyberArk Secrets Hub offre tous les avantages de la gestion et du renouvellement centralis\u00e9s des secrets pour AWS Secrets Manager sans modifier les workflows des d\u00e9veloppeurs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T08:47:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/\",\"name\":\"Gestion et renouvellement des secrets pour AWS Secrets Manager | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\",\"datePublished\":\"2023-01-09T17:47:59+00:00\",\"dateModified\":\"2026-01-22T08:47:04+00:00\",\"description\":\"CyberArk Secrets Hub offre tous les avantages de la gestion et du renouvellement centralis\u00e9s des secrets pour AWS Secrets Manager sans modifier les workflows des d\u00e9veloppeurs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/fr\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secrets Hub\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gestion et renouvellement des secrets pour AWS Secrets Manager | CyberArk","description":"CyberArk Secrets Hub offre tous les avantages de la gestion et du renouvellement centralis\u00e9s des secrets pour AWS Secrets Manager sans modifier les workflows des d\u00e9veloppeurs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/","og_locale":"fr_FR","og_type":"article","og_title":"Secrets Hub","og_description":"CyberArk Secrets Hub offre tous les avantages de la gestion et du renouvellement centralis\u00e9s des secrets pour AWS Secrets Manager sans modifier les workflows des d\u00e9veloppeurs.","og_url":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-01-22T08:47:04+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/","url":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/","name":"Gestion et renouvellement des secrets pour AWS Secrets Manager | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg","datePublished":"2023-01-09T17:47:59+00:00","dateModified":"2026-01-22T08:47:04+00:00","description":"CyberArk Secrets Hub offre tous les avantages de la gestion et du renouvellement centralis\u00e9s des secrets pour AWS Secrets Manager sans modifier les workflows des d\u00e9veloppeurs.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/products\/secrets-hub\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/fr\/products\/"},{"@type":"ListItem","position":3,"name":"Secrets Hub"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/138612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=138612"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/138612\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=138612"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=138612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}