{"id":5199,"date":"2024-06-12T09:34:59","date_gmt":"2024-06-12T09:34:59","guid":{"rendered":"https:\/\/locaterisk.com\/?p=5199"},"modified":"2025-08-08T07:24:21","modified_gmt":"2025-08-08T07:24:21","slug":"dora-digital-operational-resilience-act","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/dora-digital-operational-resilience-act\/","title":{"rendered":"DORA : Loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">DORA : Digital Operational Resilience Act - D\u00e9fis et opportunit\u00e9s<\/h1>\r\n            <p class=\"paragraph\">La loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique (DORA), qui entrera en vigueur en janvier 2025, s'ajoute \u00e0 la multitude de r\u00e9glementations concernant l'informatique des entreprises financi\u00e8res. Comme les exigences prudentielles existantes de la BaFin (BAIT, ZAIT, KAIT, VAIT ; en bref : XAIT) ont notamment servi de mod\u00e8le, de nombreuses entreprises devraient \u00eatre bien pr\u00e9par\u00e9es en cons\u00e9quence. Pour toutes les autres, il y a beaucoup \u00e0 faire.<br><br>Le secteur financier est confront\u00e9 \u00e0 une s\u00e9rie d'exigences r\u00e9glementaires adapt\u00e9es \u00e0 chaque domaine d'activit\u00e9 par la BaFin. Le Digital Operational Resilience Act (DORA) de l'UE compl\u00e8te d\u00e9sormais ces exigences nationales existantes et cr\u00e9e un cadre uniforme.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-1024x683.png\" alt=\"\" class=\"wp-image-5239\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-1024x683.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-300x200.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-768x512.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act-18x12.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-Digital-Operational-Resilience-Act.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">\u00c0 partir de janvier 2025, le Digital Operational Resilience Act (DORA) entrera en vigueur et entra\u00eenera des changements majeurs pour la s\u00e9curit\u00e9 informatique dans le secteur financier.<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Qui est concern\u00e9 par DORA ?<\/h3>\n\n\n\n<p>Contrairement \u00e0 XAIT, DORA n'est pas con\u00e7u pour un secteur sp\u00e9cifique, mais pour tous les secteurs. Cela signifie que la r\u00e9glementation concerne aussi bien les assurances que les soci\u00e9t\u00e9s de gestion de capitaux, les banques et les fonds d'investissement, etc. Concr\u00e8tement, sont concern\u00e9s (champ d'application article 2, paragraphe 1 DORA)<br><\/p>\n\n\n\n<p>\u00c9tablissements de cr\u00e9dit<br>\u00c9tablissements de paiement<br>Fournisseur de services d'information sur les comptes<br>\u00c9tablissements de monnaie \u00e9lectronique<br>Entreprises d'investissement<br>Fournisseur de services de cryptographie<br>D\u00e9positaire central de titres<br>Contreparties centrales<br>Places de n\u00e9goce<br>Registre des transactions<br>Gestionnaire de fonds d'investissement alternatifs<br>Soci\u00e9t\u00e9s de gestion<br>Services de mise \u00e0 disposition de donn\u00e9es<br>Entreprises d'assurance et de r\u00e9assurance<br>Interm\u00e9diaires d'assurance, interm\u00e9diaires de r\u00e9assurance et interm\u00e9diaires d'assurance \u00e0 titre accessoire<br>Institutions de retraite professionnelle<br>Agences de notation<br>Administrateurs de r\u00e9f\u00e9rences critiques<br>Prestataire de services de financement participatif<br>Registre des titrisations<br>Fournisseurs de services TIC<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br><strong>Quels sont les objectifs g\u00e9n\u00e9raux de DORA ?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>R\u00e9duction de la fragmentation :<\/strong> <br>DORA a pour objectif d'\u00e9liminer les diff\u00e9rences r\u00e9glementaires existantes et de cr\u00e9er une norme uniforme.<\/li>\n\n\n\n<li><strong>Renforcer la r\u00e9silience num\u00e9rique : <\/strong><br>\u00c9tablir des normes plus strictes pour g\u00e9rer les technologies de l'information et de la communication (TIC), les d\u00e9velopper et les mettre en \u0153uvre.<\/li>\n\n\n\n<li><strong>Harmonisation des r\u00e9glementations :<\/strong> <br>Cr\u00e9er un cadre r\u00e9glementaire unique pour la s\u00e9curit\u00e9 informatique dans le secteur financier, qui permette la reconnaissance transfrontali\u00e8re des r\u00e9sultats des audits.<\/li>\n\n\n\n<li><strong>Gestion des risques :<\/strong> <br>Les institutions financi\u00e8res doivent mettre en place des proc\u00e9dures efficaces de gestion des risques afin d'identifier, de classer et de g\u00e9rer les risques li\u00e9s aux TIC.<\/li>\n\n\n\n<li><strong>Rapports d'incidents : <\/strong><br>Le r\u00e8glement oblige les institutions financi\u00e8res \u00e0 signaler les incidents graves li\u00e9s aux TIC aux autorit\u00e9s comp\u00e9tentes.<\/li>\n\n\n\n<li><strong>Augmenter la transparence : <\/strong><br>En acc\u00e9dant aux incidents li\u00e9s aux TIC, les entreprises et les autorit\u00e9s peuvent mieux faire face aux menaces de demain.<\/li>\n\n\n\n<li><strong>\u00c9liminer les redondances :<\/strong> <br>Au niveau europ\u00e9en, les obligations de d\u00e9claration sont simplifi\u00e9es et les informations d\u00e9clar\u00e9es de mani\u00e8re redondante sont minimis\u00e9es.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><br><strong>D\u00e9fis \u00e0 relever<\/strong><\/h3>\n\n\n\n<p>DORA vise \u00e0 assurer un niveau \u00e9lev\u00e9 de s\u00e9curit\u00e9 et de r\u00e9sistance (r\u00e9silience) du secteur financier dans l'UE et peut \u00eatre r\u00e9sum\u00e9 sommairement dans les quatre chapitres suivants :<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. gestion des risques li\u00e9s aux TIC (art. 5-16)<\/strong><\/h3>\n\n\n\n<p>Les institutions financi\u00e8res doivent disposer d'un ensemble complet et bien document\u00e9 de r\u00e8gles pour la gestion des risques li\u00e9s aux TIC. Cela comprend des strat\u00e9gies, des politiques, des proc\u00e9dures, des protocoles TIC et des outils pour identifier, classer, \u00e9valuer, surveiller et att\u00e9nuer les risques li\u00e9s aux TIC. L'organe de direction de l'entreprise financi\u00e8re (par exemple le conseil d'administration dans le cas d'une banque) est responsable de la strat\u00e9gie et du pilotage de la gestion des risques li\u00e9s aux TIC.<\/p>\n\n\n\n<p><strong><strong>Exigences et besoins de mise en \u0153uvre :<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Planification et mise \u00e0 disposition de ressources et d'un budget ad\u00e9quat<\/li>\n\n\n\n<li>Adaptation du cadre r\u00e9glementaire une fois par an et apr\u00e8s des incidents graves<\/li>\n\n\n\n<li>Contr\u00f4le r\u00e9gulier par des audits internes<\/li>\n\n\n\n<li>garantir l'ind\u00e9pendance de la gestion des risques, des contr\u00f4les et des audits gr\u00e2ce \u00e0 la s\u00e9paration des fonctions<\/li>\n\n\n\n<li>Ligne directrice en mati\u00e8re de s\u00e9curit\u00e9 de l'information avec des r\u00e8gles pour prot\u00e9ger la disponibilit\u00e9, l'authenticit\u00e9, l'int\u00e9grit\u00e9 et la confidentialit\u00e9 des donn\u00e9es<\/li>\n\n\n\n<li>Les syst\u00e8mes TIC doivent toujours \u00eatre \u00e0 la pointe du progr\u00e8s<\/li>\n<\/ul>\n\n\n\n<p><strong>C'est ainsi que LocateRisk peut apporter son soutien :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identification et classification des actifs informatiques<\/li>\n\n\n\n<li>R\u00e9alisation de l'\u00e9valuation annuelle des risques informatiques<\/li>\n\n\n\n<li>R\u00e9alisation d'un audit bas\u00e9 sur les incidents \u00e0 tout moment<\/li>\n\n\n\n<li>Surveillance continue de la s\u00e9curit\u00e9 des syst\u00e8mes informatiques<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. d\u00e9claration d'incidents TIC\/incident reporting (art. 17-23)<\/strong><\/h3>\n\n\n\n<p>En cas d'incidents importants li\u00e9s aux TIC, un rapport rapide et complet est n\u00e9cessaire. DORA d\u00e9finit des exigences et des d\u00e9lais pr\u00e9cis pour de tels rapports. Les entreprises doivent disposer de processus de gestion des incidents informatiques qui garantissent une d\u00e9tection et une r\u00e9solution rapides.<\/p>\n\n\n\n<p><strong>Objectifs :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assurer une d\u00e9tection et une r\u00e9ponse rapides aux incidents informatiques<\/li>\n\n\n\n<li>Notification rapide aux autorit\u00e9s et aux clients\/consommateurs<\/li>\n\n\n\n<li>Promouvoir les \u00e9changes sur les nouvelles menaces<\/li>\n<\/ul>\n\n\n\n<p><strong>Exigences et besoins de mise en \u0153uvre :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Classification des incidents TIC selon certains crit\u00e8res<\/li>\n\n\n\n<li>Signaler imm\u00e9diatement les incidents informatiques graves aux autorit\u00e9s dans des d\u00e9lais d\u00e9finis<\/li>\n\n\n\n<li>Cr\u00e9ation de plans de communication de crise<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. test de la r\u00e9silience num\u00e9rique op\u00e9rationnelle\/Digital Resilience Testing (articles 24-27)<\/strong><\/h3>\n\n\n\n<p>DORA oblige les entreprises financi\u00e8res \u00e0 mettre en place des programmes de test complets pour \u00e9valuer leur niveau de pr\u00e9paration aux cyber-risques et d\u00e9tecter les \u00e9ventuelles vuln\u00e9rabilit\u00e9s.<\/p>\n\n\n\n<p><strong>Objectifs :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Contr\u00f4le objectif de l'efficacit\u00e9 de la gestion des risques informatiques<\/li>\n\n\n\n<li>Initier et d\u00e9montrer l'am\u00e9lioration continue de la mesure de protection<\/li>\n<\/ul>\n\n\n\n<p><strong><strong>Exigences et besoins de mise en \u0153uvre :<\/strong><\/strong><br>Les tests annuels de base comprennent<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00c9valuations et analyses de vuln\u00e9rabilit\u00e9<\/li>\n\n\n\n<li>Analyses open source<\/li>\n\n\n\n<li>\u00c9valuations de la s\u00e9curit\u00e9 du r\u00e9seau<\/li>\n\n\n\n<li>Analyses GAP<\/li>\n\n\n\n<li>V\u00e9rifications de la s\u00e9curit\u00e9 physique<\/li>\n\n\n\n<li>Questionnaires et scans de solutions logicielles<\/li>\n\n\n\n<li>Contr\u00f4les du code source<\/li>\n\n\n\n<li>Tests de compatibilit\u00e9<\/li>\n\n\n\n<li>Tests de performance<\/li>\n\n\n\n<li>Tests de bout en bout<\/li>\n\n\n\n<li>Tests d'intrusion et autres<\/li>\n<\/ul>\n\n\n\n<p>Tests obligatoires tous les trois ans :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tests d'intrusion ax\u00e9s sur les menaces et r\u00e9alis\u00e9s par des testeurs qualifi\u00e9s et r\u00e9put\u00e9s<\/li>\n<\/ul>\n\n\n\n<p><strong>Voici comment LocateRisk peut aider<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00c9valuations des points faibles<\/li>\n\n\n\n<li>Tests de performance<\/li>\n\n\n\n<li>Analyses GAP<\/li>\n\n\n\n<li>Contr\u00f4le de la s\u00e9curit\u00e9 du r\u00e9seau<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4) gestion des risques li\u00e9s aux TIC\/gestion des risques li\u00e9s aux tiers (articles 28 \u00e0 44)<\/strong><\/h3>\n\n\n\n<p>En plus de leur propre s\u00e9curit\u00e9 informatique, les entreprises financi\u00e8res doivent \u00e9galement minimiser les risques dans leurs relations commerciales avec les prestataires de services externes. Cela implique une strat\u00e9gie de gestion des risques pour les parties tierces telles que les fournisseurs de services en nuage, les fournisseurs de logiciels, les services d'analyse de donn\u00e9es et les centres de donn\u00e9es, ainsi que les fournisseurs de services de paiement et de traitement des paiements.<br><br><strong>Objectifs :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>R\u00e9duire le risque d'attaques via la cha\u00eene d'approvisionnement<\/li>\n\n\n\n<li>minimiser les cons\u00e9quences potentielles de la d\u00e9faillance de certains prestataires de services<\/li>\n<\/ul>\n\n\n\n<p><strong><strong>Exigences et besoins de mise en \u0153uvre :<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>D\u00e9j\u00e0 avant la conclusion du contrat :<\/strong><br>\u00e9valuer la criticit\u00e9 ou l'importance des services externalis\u00e9s et l'ad\u00e9quation du prestataire de services TIC tiers sur la base d'une analyse compl\u00e8te<\/li>\n\n\n\n<li><strong>Dispositions contractuelles :<\/strong><br>Les contrats avec les fournisseurs de TIC tiers doivent contenir des accords clairs et pr\u00e9cis sur les aspects de la r\u00e9silience op\u00e9rationnelle, y compris les accords de niveau de service (SLA), les exigences de disponibilit\u00e9, les normes de s\u00e9curit\u00e9 et les plans d'urgence.<\/li>\n\n\n\n<li><strong>Surveillance et testing :<\/strong><br>Les entreprises financi\u00e8res sont encourag\u00e9es \u00e0 surveiller en permanence les activit\u00e9s des fournisseurs de TIC tiers et \u00e0 tester r\u00e9guli\u00e8rement l'efficacit\u00e9 des mesures de s\u00e9curit\u00e9 et des strat\u00e9gies de r\u00e9silience.<\/li>\n\n\n\n<li><strong>Strat\u00e9gie de sortie :<\/strong><br>Une strat\u00e9gie de sortie claire doit \u00eatre mise en place dans le cas o\u00f9 le service d'un fournisseur tiers de TIC est interrompu ou ne r\u00e9pond plus aux normes requises, afin d'assurer la continuit\u00e9 des processus d'entreprise et de se pr\u00e9munir contre une d\u00e9pendance excessive \u00e0 l'\u00e9gard d'un seul fournisseur.<\/li>\n<\/ul>\n\n\n\n<p><strong>Voici comment LocateRisk peut aider<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00c9valuation \u00e0 la demande des nouveaux partenaires commerciaux<\/li>\n\n\n\n<li>V\u00e9rification automatis\u00e9e de la conformit\u00e9 informatique et au RGPD<\/li>\n\n\n\n<li>Surveillance des prestataires, des partenaires et des fournisseurs \u00e0 des intervalles librement choisis<\/li>\n\n\n\n<li>Contr\u00f4le des fournisseurs au moyen d'un questionnaire num\u00e9rique \/ Self Assessment Questionnaire (SAQ)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>DORA pr\u00e9sente des d\u00e9fis consid\u00e9rables, mais aussi des opportunit\u00e9s pour le secteur financier. L'harmonisation des r\u00e9glementations et l'introduction de normes plus strictes en mati\u00e8re de r\u00e9silience num\u00e9rique visent \u00e0 atteindre un niveau de s\u00e9curit\u00e9 uniforme dans l'UE. Les nouvelles exigences sont vastes et exigent des entreprises une pr\u00e9paration et une mise en \u0153uvre approfondies. Le soutien de fournisseurs sp\u00e9cialis\u00e9s tels que LocateRisk peut aider \u00e0 r\u00e9pondre \u00e0 ces nouvelles exigences r\u00e9glementaires et \u00e0 renforcer la r\u00e9silience num\u00e9rique.<br><br>L'article se concentre sur les quatre chapitres mentionn\u00e9s et ne traite pas de l'ensemble du r\u00e8glement. Vous trouverez des informations d\u00e9taill\u00e9es sur DORA sur le site web de la BaFin Bundesanstalt f\u00fcr Finanzdienstleistungsaufsicht \u00e0 l'adresse suivante <a href=\"https:\/\/www.bafin.de\/DE\/Aufsicht\/DORA\/DORA_node.html;jsessionid=EC87600ACD07D74E9F521A1EEB490682.internet992\" target=\"_blank\" rel=\"noreferrer noopener\">DORA - Loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique<\/a><\/p>\n\n\n\n<p><br><br><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"dora-digital-operational-resilience-act\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Ce que signifie DORA, qui est concern\u00e9 et o\u00f9 exactement LocateRisk peut apporter son soutien. <\/p>","protected":false},"author":8,"featured_media":5248,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[61,60,36,62],"class_list":["post-5199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-digital-operational-resilience-act","tag-dora","tag-eu-richtlinie","tag-finance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA: Digital Operational Resilience Act - LocateRisk<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/dora-digital-operational-resilience-act\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA: Digital Operational Resilience Act - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/dora-digital-operational-resilience-act\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T09:34:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:24:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"632\" \/>\n\t<meta property=\"og:image:height\" content=\"632\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"DORA: Digital Operational Resilience Act\",\"datePublished\":\"2024-06-12T09:34:59+00:00\",\"dateModified\":\"2025-08-08T07:24:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\"},\"wordCount\":1111,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"keywords\":[\"Digital Operational Resilience Act\",\"DORA\",\"EU-Richtlinie\",\"Finance\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\",\"name\":\"DORA: Digital Operational Resilience Act - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"datePublished\":\"2024-06-12T09:34:59+00:00\",\"dateModified\":\"2025-08-08T07:24:21+00:00\",\"description\":\"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DORA-2.png\",\"width\":632,\"height\":632,\"caption\":\"Bild zu DORA: Digital Operational Resilience Act\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/dora-digital-operational-resilience-act\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA: Digital Operational Resilience Act\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA : Loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique - LocateRisk","description":"D\u00e9couvrez ce que signifie DORA, qui il concerne et o\u00f9 exactement LocateRisk peut vous aider.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/dora-digital-operational-resilience-act\/","og_locale":"fr_FR","og_type":"article","og_title":"DORA: Digital Operational Resilience Act - LocateRisk","og_description":"Erfahren Sie, was DORA bedeutet, wen es betrifft und wo genau LocateRisk unterst\u00fctzen kann.","og_url":"https:\/\/locaterisk.com\/fr\/dora-digital-operational-resilience-act\/","og_site_name":"LocateRisk","article_published_time":"2024-06-12T09:34:59+00:00","article_modified_time":"2025-08-08T07:24:21+00:00","og_image":[{"width":632,"height":632,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Kristina Breuer","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"DORA: Digital Operational Resilience Act","datePublished":"2024-06-12T09:34:59+00:00","dateModified":"2025-08-08T07:24:21+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/"},"wordCount":1111,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","keywords":["Digital Operational Resilience Act","DORA","EU-Richtlinie","Finance"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/","url":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/","name":"DORA : Loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","datePublished":"2024-06-12T09:34:59+00:00","dateModified":"2025-08-08T07:24:21+00:00","description":"D\u00e9couvrez ce que signifie DORA, qui il concerne et o\u00f9 exactement LocateRisk peut vous aider.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/06\/DORA-2.png","width":632,"height":632,"caption":"Bild zu DORA: Digital Operational Resilience Act"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/dora-digital-operational-resilience-act\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"DORA: Digital Operational Resilience Act"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/5199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=5199"}],"version-history":[{"count":36,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/5199\/revisions"}],"predecessor-version":[{"id":6295,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/5199\/revisions\/6295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/5248"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=5199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=5199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=5199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}