{"id":61681,"date":"2017-06-22T08:35:50","date_gmt":"2017-06-22T12:35:50","guid":{"rendered":"https:\/\/www.cyberark.com\/nerc-cip\/"},"modified":"2020-07-27T16:19:30","modified_gmt":"2020-07-27T20:19:30","slug":"nerc-cip","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/solutions\/nerc-cip\/","title":{"rendered":"NERC CIP"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbNERC CIP\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_btn title=\u00a0\u00bbT\u00c9L\u00c9CHARGER LE LIVRE BLANC\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#ffffff\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button large event-click\u00a0\u00bb el_id=\u00a0\u00bbNERC CIP Page: Download Whitepaper\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=\u00a0\u00bb.vc_custom_1538259099844{padding-top: 2rem !important;padding-bottom: 2rem !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h4>S\u00e9curiser l\u2019acc\u00e8s aux comptes \u00e0 privil\u00e8ges et l\u2019acc\u00e8s \u00e0 distance vers le r\u00e9seau \u00e9lectrique et les services publics<\/h4>\n<p>Pour les services \u00e9nerg\u00e9tiques, le respect de la conformit\u00e9 NERC pour les comptes \u00e0 privil\u00e8ges peut \u00eatre difficile en raison de la taille et de la complexit\u00e9 des syst\u00e8mes de contr\u00f4le industriel. \u00c0 ce d\u00e9fi s\u2019ajoute la version\u00a05 de la norme qui \u00e9tend sa port\u00e9e, incluant de nouveaux \u00e9l\u00e9ments et exigences ayant trait \u00e0 l\u2019utilisation des comptes \u00e0 privil\u00e8ges au sein de cyber entit\u00e9s critiques.<\/p>\n<p>Avec CyberArk, les services \u00e9nerg\u00e9tiques peuvent mettre en place les applications afin de respecter la conformit\u00e9 NERC pour le contr\u00f4le de l\u2019acc\u00e8s aux comptes \u00e0 privil\u00e8ges, la gestion de l\u2019acc\u00e8s \u00e0 distance et la r\u00e9vocation de l\u2019acc\u00e8s.\u00a0 Dans les syst\u00e8mes de contr\u00f4le industriel (ICS) <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/privileged-session-manager\/\">CyberArk Privileged Account Security<\/a> prot\u00e8ge \u00e0 la fois l\u2019acc\u00e8s interne et l\u2019acc\u00e8s du fournisseur distant, autorisant les parties \u00e0 se connecter aux syst\u00e8mes cibles de fa\u00e7on s\u00e9curis\u00e9e, sans divulguer l\u2019identifiant du compte \u00e0 privil\u00e8ges et sans introduire de nouveaux risques pour l\u2019entreprise. <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/privileged-session-manager\/\">La solution<\/a> s\u2019int\u00e8gre \u00e0 une gamme de syst\u00e8mes, dispositifs et applications dans l\u2019entreprise, instaurant la responsabilit\u00e9, l\u2019efficacit\u00e9 fonctionnelle et une trace d\u2019audit inviolable dans l\u2019ensemble de l\u2019infrastructure de contr\u00f4le industriel.<\/p>\n<p><strong>Avantages cl\u00e9s<\/strong>:<\/p>\n<ul>\n<li>Obtenir une conformit\u00e9 NERC CIP en assurant la responsabilit\u00e9 pour chaque utilisation des comptes partag\u00e9s et des comptes \u00e0 privil\u00e8ges.<\/li>\n<li>S\u00e9curisez l\u2019acc\u00e8s \u00e0 distance pour les prestataires ext\u00e9rieurs avec une \u00ab\u00a0supervision en bin\u00f4me\u00a0\u00bb<a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/privileged-session-manager\/\"> supervision de la session en temps r\u00e9el<\/a><\/li>\n<li>Enregistrer chaque session de comptes \u00e0 privil\u00e8ges pour une lecture bas\u00e9e sur le contexte<\/li>\n<li><a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/privileged-session-manager\/\">Isoler les sessions de comptes \u00e0 privil\u00e8ges<\/a> \u00e0 partir des attaques cibl\u00e9es et sophistiqu\u00e9es sans exposer l\u2019identifiant du compte \u00e0 privil\u00e8ges<\/li>\n<li>S\u00e9curiser les identifiants des comptes \u00e0 privil\u00e8ges et les enregistrements de session dans un <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-account-security-solution\/\">coffre num\u00e9rique<\/a>inviolable et brevet\u00e9<\/li>\n<li>G\u00e9rez les r\u00e8gles de fa\u00e7on centralis\u00e9e et acc\u00e9dez aux worflows qui doivent \u00eatre flexibles pour r\u00e9pondre aux exigences m\u00e9tiers.<\/li>\n<li>Audit et analyse de tous les comptes \u00e0 privil\u00e8ges et des activit\u00e9s li\u00e9es \u00e0 ces comptes \u00e0 l\u2019aide de rapports int\u00e9gr\u00e9s pr\u00e9d\u00e9finis ou personnalis\u00e9s<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537546226715{padding-top: 2rem !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/12&Prime;][\/vc_column][vc_column width=\u00a0\u00bb5\/6&Prime; css=\u00a0\u00bb.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbRESSOURCES\u00a0\u00bb font_container=\u00a0\u00bbtag:h2|text_align:center|color:%23414042&Prime; use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcyb-ltr-spc-6&Prime;][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg0KDQo8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTU5NTAxMjU1OTMzMCI+PC9kaXY+DQoNCjxzY3JpcHQ+DQp3aW5kb3cuX3VmSHViQ29uZmlnID0gd2luZG93Ll91Zkh1YkNvbmZpZyB8fCBbXTsNCndpbmRvdy5fdWZIdWJDb25maWcucHVzaCh7DQogICdjb250YWluZXJzJzp7J2FwcCc6JyNVZkVtYmVkZGVkSHViMTU5NTAxMjU1OTMzMCd9LA0KICAnY29sbGVjdGlvbic6ICc3MDIwMTk1JywNCiAgJ29wZW5MaW5rJzpmdW5jdGlvbih1cmwpew0KICAgIHdpbmRvdy50b3AubG9jYXRpb24uaHJlZj11cmw7DQogIH0sDQogICdsYXp5bG9hZGVyJzp7DQogICAgJ2l0ZW1EaXNwbGF5TGltaXQnOjIwLA0KICAgICdtYXhUaWxlc1BlclJvdyc6NCwNCiAgICAnbWF4SXRlbXNUb3RhbCc6IDQNCiAgfSwNCiAgJ3RpbGVTaXplJzogJ21lZGl1bScsDQogICdlbmFibGVQYWdlVHJhY2tpbmcnOmZhbHNlLA0KICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vZnIvcmVzb3VyY2VzLycsDQogICdmaWxlc1VybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vZnIvcmVzb3VyY2VzLycsDQogICdnZW5lcmF0ZWRBdFVUQyc6ICcyMDIwLTA3LTE3IDE5OjAyOjI4JywNCn0pOw0KPC9zY3JpcHQ+DQoNCjxzY3JpcHQ+KGZ1bmN0aW9uKGQsdCx1KSB7DQogIGZ1bmN0aW9uIGxvYWQoKXsNCiAgICB2YXIgcz1kLmNyZWF0ZUVsZW1lbnQodCk7cy5zcmM9dTtkLmJvZHkuYXBwZW5kQ2hpbGQocyk7DQogIH0NCiAgaWYgKHdpbmRvdy5hZGRFdmVudExpc3RlbmVyKSB7DQogICAgd2luZG93LmFkZEV2ZW50TGlzdGVuZXIoJ2xvYWQnLGxvYWQsZmFsc2UpOw0KICB9DQogIGVsc2UgaWYgKHdpbmRvdy5hdHRhY2hFdmVudCkgew0KICAgIHdpbmRvdy5hdHRhY2hFdmVudCgnb25sb2FkJyxsb2FkKTsNCiAgfQ0KICBlbHNlew0KICAgIHdpbmRvdy5vbmxvYWQ9bG9hZDsNCiAgfQ0KfShkb2N1bWVudCwnc2NyaXB0JywnaHR0cHM6Ly93d3cuY3liZXJhcmsuY29tL2ZyL3Jlc291cmNlcy9odWJzRnJvbnQvZW1iZWRfY29sbGVjdGlvbicpKTsNCjwvc2NyaXB0Pg0KPCEtLSAvRW5kIFViZXJmbGlwIEVtYmVkZGVkIEh1YiBXaWRnZXQgLS0+[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb][vc_column css=\u00a0\u00bb.vc_custom_1537546542206{padding-bottom: 3.125rem !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_btn title=\u00a0\u00bbPLUS DE RESSOURCES\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#414042&Prime; shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresources%2F|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button\u00a0\u00bb][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbtop\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-section\u00a0\u00bb][vc_column][vc_row_inner content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero-header\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-hero-header-text\u00a0\u00bb][vc_custom_heading text=\u00a0\u00bbNERC CIP\u00a0\u00bb font_container=\u00a0\u00bbtag:h1|text_align:left\u00a0\u00bb use_theme_fonts=\u00a0\u00bbyes\u00a0\u00bb][vc_btn title=\u00a0\u00bbT\u00c9L\u00c9CHARGER LE LIVRE BLANC\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb#ffffff\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|\u00a0\u00bb el_class=\u00a0\u00bbcyb-button large event-click\u00a0\u00bb el_id=\u00a0\u00bbNERC CIP Page:&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":51588,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-61681","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Conformit\u00e9 NERC CIP\u00a0: Solutions CyberArk pour NERC CIP<\/title>\n<meta name=\"description\" content=\"Les solutions CyberArk destin\u00e9es aux entreprises de services publics s\u00e9curisent les acc\u00e8s \u00e0 privil\u00e8ges internes et \u00e0 distance au r\u00e9seau \u00e9lectrique et aux services conform\u00e9ment \u00e0 la norme NERC CIP.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NERC CIP\" \/>\n<meta property=\"og:description\" content=\"Les solutions CyberArk destin\u00e9es aux entreprises de services publics s\u00e9curisent les acc\u00e8s \u00e0 privil\u00e8ges internes et \u00e0 distance au r\u00e9seau \u00e9lectrique et aux services conform\u00e9ment \u00e0 la norme NERC CIP.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-27T20:19:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\",\"name\":\"Conformit\u00e9 NERC CIP\u00a0: Solutions CyberArk pour NERC CIP\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T12:35:50+00:00\",\"dateModified\":\"2020-07-27T20:19:30+00:00\",\"description\":\"Les solutions CyberArk destin\u00e9es aux entreprises de services publics s\u00e9curisent les acc\u00e8s \u00e0 privil\u00e8ges internes et \u00e0 distance au r\u00e9seau \u00e9lectrique et aux services conform\u00e9ment \u00e0 la norme NERC CIP.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de s\u00e9curit\u00e9 des identit\u00e9s\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NERC CIP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Conformit\u00e9 NERC CIP\u00a0: Solutions CyberArk pour NERC CIP","description":"Les solutions CyberArk destin\u00e9es aux entreprises de services publics s\u00e9curisent les acc\u00e8s \u00e0 privil\u00e8ges internes et \u00e0 distance au r\u00e9seau \u00e9lectrique et aux services conform\u00e9ment \u00e0 la norme NERC CIP.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","og_locale":"fr_FR","og_type":"article","og_title":"NERC CIP","og_description":"Les solutions CyberArk destin\u00e9es aux entreprises de services publics s\u00e9curisent les acc\u00e8s \u00e0 privil\u00e8ges internes et \u00e0 distance au r\u00e9seau \u00e9lectrique et aux services conform\u00e9ment \u00e0 la norme NERC CIP.","og_url":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-27T20:19:30+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","url":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","name":"Conformit\u00e9 NERC CIP\u00a0: Solutions CyberArk pour NERC CIP","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T12:35:50+00:00","dateModified":"2020-07-27T20:19:30+00:00","description":"Les solutions CyberArk destin\u00e9es aux entreprises de services publics s\u00e9curisent les acc\u00e8s \u00e0 privil\u00e8ges internes et \u00e0 distance au r\u00e9seau \u00e9lectrique et aux services conform\u00e9ment \u00e0 la norme NERC CIP.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Solutions de s\u00e9curit\u00e9 des identit\u00e9s","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"NERC CIP"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/61681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=61681"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/61681\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51588"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=61681"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=61681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}