{"id":51910,"date":"2019-04-16T17:00:25","date_gmt":"2019-04-16T21:00:25","guid":{"rendered":"https:\/\/www.cyberark.com\/sarbanes-oxley-sox\/"},"modified":"2020-07-17T10:37:41","modified_gmt":"2020-07-17T14:37:41","slug":"sarbanes-oxley","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/audit-compliance\/sarbanes-oxley\/","title":{"rendered":"Sarbanes-Oxley (SOX)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537365138136{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/mas-trm-hero.jpg?id=26780) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbSARBANES OXLEY (SOX)\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbAppliquez les mesures de contr\u00f4le interne et de reporting n\u00e9cessaires pour respecter la loi SOX\u00a0\u00bb font_container=\u00a0\u00bbtag:h3|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bblight\u00a0\u00bb][vc_btn title=\u00a0\u00bbT\u00c9L\u00c9CHARGER LE LIVRE BLANC\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#ffffff\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresource%2Fprotecting-financial-information-sarbanes-oxley%2F|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button xlarge event-click\u00a0\u00bb el_id=\u00a0\u00bbSOX Page: Download Whitepaper\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=\u00a0\u00bb.vc_custom_1537365220235{padding-top: 2.25rem !important;padding-bottom: 2.25rem !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1538666077508{padding-bottom: 1.875rem !important;}\u00a0\u00bb]<\/p>\n<p>Les entreprises soumises \u00e0 la loi Sarbanes Oxley (SOX) sont confront\u00e9es \u00e0 des d\u00e9fis de conformit\u00e9 sans pr\u00e9c\u00e9dent. Bien que la conformit\u00e9 \u00e0 la loi Sarbanes Oxley aille au-del\u00e0 de la mise en \u0153uvre d\u2019une technologie appropri\u00e9e, celle-ci s\u2019av\u00e8re indispensable. Les solutions CyberArk de protection des comptes \u00e0 privil\u00e8ges, de responsabilisation et de supervision ont d\u00e9montr\u00e9 leur capacit\u00e9 \u00e0 fournir les preuves et les contr\u00f4les exig\u00e9s par l\u2019article\u00a0404 et \u00e9tay\u00e9s par des cadres d\u2019\u00e9valuation interne tels que le COSO et le COBIT.<\/p>\n<p>Pour assurer l\u2019efficacit\u00e9 des contr\u00f4les internes sur les rapports financiers, les entreprises sont tenues d\u2019appliquer des mesures de contr\u00f4le et de pr\u00e9vention de la fraude, des faiblesses importantes et des carences en mati\u00e8re de contr\u00f4le interne dans le cadre du cycle de vie des informations r\u00e9gies par la loi Sarbanes Oxley. Ce type d\u2019information pr\u00e9sente g\u00e9n\u00e9ralement des risques parce que, dans les entreprises, de nombreux employ\u00e9s ont un acc\u00e8s \u00e0 privil\u00e8ges aux syst\u00e8mes dans lesquels elles sont stock\u00e9es. Outre ces employ\u00e9s, les cyberattaquants cherchent \u00e0 s\u2019emparer des informations d\u2019identification \u00e0 privil\u00e8ges pour acc\u00e9der aux syst\u00e8mes critiques des entreprises et en extraire des donn\u00e9es.<\/p>\n<p>Les solutions CyberArk appliquent les mesures de contr\u00f4le interne et de reporting n\u00e9cessaires pour respecter la loi SOX. Elles vont au-del\u00e0 de la simple conformit\u00e9 \u00e0 cette loi en mettant en \u0153uvre une approche globale de la s\u00e9curit\u00e9 qui devient partie int\u00e9grante de l\u2019identit\u00e9 de l\u2019entreprise concernant la protection des informations critiques.<\/p>\n<p>[\/vc_column_text][vc_custom_heading text=\u00a0\u00bbPRINCIPAUX AVANTAGES DE NOTRE SOLUTION INT\u00c9GR\u00c9E\u00a0\u00bb font_container=\u00a0\u00bbtag:h3|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcyb-ltr-spc-6&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-ltr-spc-6&Prime;]<\/p>\n<ul>\n<li>Application de contr\u00f4les d\u2019acc\u00e8s stricts et granulaires ainsi que de workflows reposant sur le principe de la s\u00e9paration des t\u00e2ches<\/li>\n<li>Responsabilisation et disponibilit\u00e9 d\u2019un historique d\u00e9taill\u00e9 inalt\u00e9rable pour les rapports SOX sur les activit\u00e9s \u00e0 privil\u00e8ges<\/li>\n<li>Supervision et enregistrement des activit\u00e9s \u00e0 privil\u00e8ges \u00e0 des fins de signalement ou d\u2019analyse approfondie en temps r\u00e9el<\/li>\n<li>R\u00e9f\u00e9rentiel s\u00e9curis\u00e9 \u00e0 plusieurs niveaux pour prot\u00e9ger les donn\u00e9es inactives et en cours de transfert<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537206690510{padding-top: 2rem !important;background-color: #f1f2f2 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/12&Prime;][\/vc_column][vc_column width=\u00a0\u00bb5\/6&Prime; css=\u00a0\u00bb.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbDEMANDER UNE D\u00c9MO EN DIRECT\u00a0\u00bb font_container=\u00a0\u00bbtag:h2|text_align:center|color:%23414042&Prime; use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcyb-ltr-spc-6&Prime;][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537206699923{padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}\u00a0\u00bb][vc_column][vc_raw_html]W3JlcXVlc3RfZGVtb10=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537365138136{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/mas-trm-hero.jpg?id=26780) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbSARBANES OXLEY (SOX)\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbAppliquez les mesures de contr\u00f4le interne et de reporting n\u00e9cessaires pour respecter la loi&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":52009,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-51910","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Conformit\u00e9 SOX\u00a0: Solutions de s\u00e9curit\u00e9 CyberArk pour SOX<\/title>\n<meta name=\"description\" content=\"Les solutions de conformit\u00e9 CyberArk Sarbanes Oxley renforcent les contr\u00f4les internes et les exigences en mati\u00e8re de rapport, exigences qui sont n\u00e9cessaires pour respecter la conformit\u00e9 SOX.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sarbanes-Oxley (SOX)\" \/>\n<meta property=\"og:description\" content=\"Les solutions de conformit\u00e9 CyberArk Sarbanes Oxley renforcent les contr\u00f4les internes et les exigences en mati\u00e8re de rapport, exigences qui sont n\u00e9cessaires pour respecter la conformit\u00e9 SOX.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-17T14:37:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\",\"name\":\"Conformit\u00e9 SOX\u00a0: Solutions de s\u00e9curit\u00e9 CyberArk pour SOX\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2019-04-16T21:00:25+00:00\",\"dateModified\":\"2020-07-17T14:37:41+00:00\",\"description\":\"Les solutions de conformit\u00e9 CyberArk Sarbanes Oxley renforcent les contr\u00f4les internes et les exigences en mati\u00e8re de rapport, exigences qui sont n\u00e9cessaires pour respecter la conformit\u00e9 SOX.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Audit et conformit\u00e9 r\u00e9glementaire\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Sarbanes-Oxley (SOX)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Conformit\u00e9 SOX\u00a0: Solutions de s\u00e9curit\u00e9 CyberArk pour SOX","description":"Les solutions de conformit\u00e9 CyberArk Sarbanes Oxley renforcent les contr\u00f4les internes et les exigences en mati\u00e8re de rapport, exigences qui sont n\u00e9cessaires pour respecter la conformit\u00e9 SOX.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","og_locale":"fr_FR","og_type":"article","og_title":"Sarbanes-Oxley (SOX)","og_description":"Les solutions de conformit\u00e9 CyberArk Sarbanes Oxley renforcent les contr\u00f4les internes et les exigences en mati\u00e8re de rapport, exigences qui sont n\u00e9cessaires pour respecter la conformit\u00e9 SOX.","og_url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-17T14:37:41+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","name":"Conformit\u00e9 SOX\u00a0: Solutions de s\u00e9curit\u00e9 CyberArk pour SOX","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2019-04-16T21:00:25+00:00","dateModified":"2020-07-17T14:37:41+00:00","description":"Les solutions de conformit\u00e9 CyberArk Sarbanes Oxley renforcent les contr\u00f4les internes et les exigences en mati\u00e8re de rapport, exigences qui sont n\u00e9cessaires pour respecter la conformit\u00e9 SOX.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Audit et conformit\u00e9 r\u00e9glementaire","item":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"Sarbanes-Oxley (SOX)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=51910"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51910\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/52009"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=51910"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=51910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}