{"id":5157,"date":"2022-06-20T14:43:41","date_gmt":"2022-06-20T12:43:41","guid":{"rendered":"https:\/\/www.protect.airbus.com\/cybersecurite\/architecture-design-and-integration\/"},"modified":"2025-09-24T16:15:31","modified_gmt":"2025-09-24T14:15:31","slug":"conception-architecture","status":"publish","type":"page","link":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/","title":{"rendered":"Conception de l\u2019architecture"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text h2_style=\u00a0\u00bbh2Big\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1681306833205{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb]<\/p>\n<h2>Mettre en \u0153uvre la bonne architecture de s\u00e9curit\u00e9<\/h2>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpBig\u00a0\u00bb]<span style=\"font-weight: 400;\">En raison de la transformation digitale continue et la connectivit\u00e9 en pleine croissance, les produits comme les syst\u00e8mes IT et OT sont de plus en plus expos\u00e9s \u00e0 des cyberattaques en tout genre.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Les organisations doivent donc mettre en \u0153uvre des contr\u00f4les de s\u00e9curit\u00e9 afin de prot\u00e9ger leurs produits, leur architecture syst\u00e8me et leurs actifs contre ces menaces. Ces contr\u00f4les doivent assurer la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la disponibilit\u00e9. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">En parall\u00e8le, les organisations doivent concentrer leurs efforts sur une conception des syst\u00e8mes robuste pour garantir la bonne mise en \u0153uvre des contr\u00f4les de s\u00e9curit\u00e9 et la r\u00e9alisation de tests ad\u00e9quats.<\/span>[\/vc_column_text][vc_column_text h2_style=\u00a0\u00bbh2Big\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1681306975914{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb]<\/p>\n<h3>Ouvrir la voie<\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<span style=\"font-weight: 400;\">Nos consultants disposent d\u2019une tr\u00e8s grande exp\u00e9rience dans les activit\u00e9s d\u2019architecture de s\u00e9curit\u00e9 et de conception de syst\u00e8mes, qu&rsquo;il s\u2019agisse d&rsquo;un produit individuel ou d\u2019une architecture organisationnelle mondiale. Cette expertise inclut l\u2019architecture informatique, la mise en r\u00e9seau et les communications, la cryptographie, l&rsquo;ing\u00e9nierie syst\u00e8me, la configuration, la v\u00e9rification et la validation produit, et bien plus encore.<\/span>[\/vc_column_text][vc_column_text h2_style=\u00a0\u00bbh2Big\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1681307015549{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb]<\/p>\n<h3>Pourquoi choisir Airbus Protect ?<\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<span style=\"font-weight: 400;\">Nous pouvons vous aider \u00e0 mettre en place une architecture de cybers\u00e9curit\u00e9 s\u00e9curis\u00e9e et personnalis\u00e9e dans l&rsquo;ensemble de votre organisation. Nos \u00e9quipes d&rsquo;experts poss\u00e8dent\u00a0:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">De l\u2019exp\u00e9rience dans des domaines extr\u00eamement exigeants : spatial, a\u00e9ronautique, militaire et d\u00e9fense, automobile et ferroviaire<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Une compr\u00e9hension des processus d&rsquo;analyse des risques et de la conception \u00e0 co\u00fbt objectif<\/span><\/li>\n<li><span style=\"font-weight: 400;\">De l\u2019exp\u00e9rience dans toutes les activit\u00e9s du bureau d&rsquo;\u00e9tudes, du suivi technique quotidien des fournisseurs \u00e0 l&rsquo;\u00e9valuation rapide des architectures.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text h2_style=\u00a0\u00bbh2Big\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1681307144580{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb]<\/p>\n<h3>Notre offre<\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<span style=\"font-weight: 400;\">Nous proposons un service hautement personnalis\u00e9 de conception d&rsquo;architectures s\u00e9curis\u00e9es pour vos syst\u00e8mes et produits IT\/OT. Ce service inclut en r\u00e8gle g\u00e9n\u00e9rale\u00a0:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Des conseils sur la s\u00e9curit\u00e9 tout au long du processus de d\u00e9veloppement du produit, de la recherche au d\u00e9veloppement en passant m\u00eame par la maintenance<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Une aide \u00e0 la conception de la s\u00e9curit\u00e9 au niveau du front-end de l&rsquo;infrastructure ou des plateformes<\/span><\/li>\n<li aria-level=\"1\">Des exercices d&rsquo;int\u00e9gration des syst\u00e8mes majeurs pour identifier les vuln\u00e9rabilit\u00e9s ouvertes<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Afin d\u2019assurer la s\u00e9curit\u00e9 de vos actifs physiques et digitaux, notre \u00e9quipe d\u2019experts fournit aussi des services complets de garantie de la conception de la s\u00e9curit\u00e9, avec notamment des conseils dans ces domaines\u00a0:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Conception des installations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Obtention de la certification appropri\u00e9e<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Nous vous accompagnons dans la mise en \u0153uvre de solutions de cybers\u00e9curit\u00e9 cl\u00e9 en main et sur mesure. Notre service d&rsquo;int\u00e9gration de la s\u00e9curit\u00e9 comprend les activit\u00e9s suivantes\u00a0:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Mise en place de l&rsquo;OT<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Simulation de crise de cybers\u00e9curit\u00e9 pour l&rsquo;OT<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Formation pratique pour les \u00e9quipes<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Ces activit\u00e9s impliquent en g\u00e9n\u00e9ral\u00a0:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">D\u2019\u00e9valuer les avantages d\u2019une solution donn\u00e9e<\/span><\/li>\n<li><span style=\"font-weight: 400;\">D\u2019\u00e9valuer de mani\u00e8re approfondie le produit choisi<\/span><\/li>\n<li><span style=\"font-weight: 400;\">D\u2019explorer l\u2019utilisation du nouvel \u00e9quipement et des nouvelles proc\u00e9dures de s\u00e9curit\u00e9 dans une simulation r\u00e9aliste de vos environnements IT et OT, \u00e0 l\u2019aide de la plateforme Airbus CyberRange<\/span><\/li>\n<li><span style=\"font-weight: 400;\">D\u2019\u00e9valuer et de valider les r\u00e8gles de d\u00e9tection du SOC<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]    <div class=\"hightlightBracket\">\n        <div class=\"glyphe\"><\/div>\n        <div class=\"highlight\"><p>Contactez-nous pour d\u00e9couvrir comment nous pouvons vous aider<\/p><\/div>\n    <\/div>\n    <div class=\"divBtCTA btAlignCenter\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/contact\/\"  class=\"button btAuto\">Nous contacter<\/a><\/div><div class=\"whatsNew\" id=\"whatsnew_69efb4c852f0f\">\n    <div class=\"lineTitleFilter\">\n        <div id=\"conteneur_h2_WhatsNew\"><h2>Des nouveaut\u00e9s ?<\/h2><\/div>\n        <div id=\"conteneur_FiltreWhatsNew\">\n\t\t\t<div class=\"filterWhatsNew\"><span>Filtre<\/span>\n\t\t\t\t<ul>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterNews\" onclick=\"fctFilterWhatsNew('news','cybersecurity','whatsnew_69efb4c852f0f')\">Actualit\u00e9<\/button><\/li>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterWhitePaper\" onclick=\"fctFilterWhatsNew('whitepaper','cybersecurity','whatsnew_69efb4c852f0f')\">Livre blanc<\/button><\/li>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterBlog\" onclick=\"fctFilterWhatsNew('blog','cybersecurity','whatsnew_69efb4c852f0f')\">Blog<\/button><\/li>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterEvent\" onclick=\"fctFilterWhatsNew('event','cybersecurity','whatsnew_69efb4c852f0f')\">\u00c9v\u00e9nement<\/button><\/li>\n\t\t\t\t<\/ul><\/div>\n\t\t\t<div id=\"whathsnew_glyphe\"><\/div>\n\t\t<\/div>\n    <\/div>\n\t\n    <div class=\"listWhatsNew\">\n    <article id=\"whatsnew_item_5015\">\n    <span class=\"whatsNewType\">Actualit\u00e9<\/span>\n    <a href=\"https:\/\/www.protect.airbus.com\/fr\/fence-ebios-risk-manager-anssi\/\"><img loading=\"lazy\" decoding=\"async\" width=\"349\" height=\"189\" src=\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/04\/Fence-news-image-for-website-349x189.png\" class=\"attachment-post-bloc size-post-bloc wp-post-image\" alt=\"logo Fence\" \/><\/a>\n    <div class=\"titreWN\">Fence a re\u00e7u le label EBIOS Risk Manager de l\u2019ANSSI<\/div>\n    <p><p>Fence, la solution logicielle d\u2019analyse et gestion de risque de cybers\u00e9curit\u00e9 d\u2019Airbus Protect, a re\u00e7u le label EBIOS Risk Manager de l\u2019ANSSI. L\u2019outil d\u2019Airbus Protect Fence permet la r\u00e9alisation simple et intuitive d\u2019analyse de risques suivant la m\u00e9thode EBIOS Risk Manager, ainsi que des analyses de conformit\u00e9. Il assure \u00e9galement le suivi des risques identifi\u00e9s [&hellip;]<\/p>\n<\/p>\n        <div id=\"conteneur_btReadMore\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/fence-ebios-risk-manager-anssi\/\" class=\"btReadMore\">En savoir plus<\/a><\/div><\/article>\n<article id=\"whatsnew_item_4258\">\n    <span class=\"whatsNewType\">Blog<\/span>\n    <a href=\"https:\/\/www.protect.airbus.com\/fr\/blog\/3-questions-1-experts-christian-siemers\/\"><img loading=\"lazy\" decoding=\"async\" width=\"349\" height=\"189\" src=\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2022\/12\/3-questions-1-expert-Christian-Siemers_image-en-avant-349x189.png\" class=\"attachment-post-bloc size-post-bloc wp-post-image\" alt=\"3_questions_1_expert_serie_Christian Siemers\" \/><\/a>\n    <div class=\"titreWN\">3 questions, 1 experts : Christian Siemers, consultant OT (certifi\u00e9 CISSP)<\/div>\n    <p><p>Dans cette nouvelle s\u00e9rie, nous posons trois questions \u00e0 des experts en s\u00fbret\u00e9, en sustainability et en cybers\u00e9curit\u00e9 pour en savoir plus sur leur r\u00f4le au sein d&rsquo;Airbus Protect. Nous commen\u00e7ons par Christian Siemers, qui est bas\u00e9 dans notre bureau d&rsquo;Ottobrunn. Peux-tu nous dire en quoi consiste ton travail de consultant OT ? La premi\u00e8re [&hellip;]<\/p>\n<\/p>\n        <div id=\"conteneur_btReadMore\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/blog\/3-questions-1-experts-christian-siemers\/\" class=\"btReadMore\">En savoir plus<\/a><\/div><\/article>\n    <\/div>\n    <div class=\"conteneurLineMoreInsight\"><div class=\"lineMoreInsight\"><a href=\"\/fr\/informations\/\">d\u00e9couvrir<\/a><\/div><\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text h2_style=\u00a0\u00bbh2Big\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1681306833205{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb] Mettre en \u0153uvre la bonne architecture de s\u00e9curit\u00e9 [\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpBig\u00a0\u00bb]En raison de la transformation digitale continue et la connectivit\u00e9 en pleine croissance, les produits comme les syst\u00e8mes IT et OT sont de plus en plus expos\u00e9s \u00e0 des cyberattaques en tout genre. Les organisations doivent donc mettre en [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":821,"parent":6938,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-5157","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity: Conception de l\u2019architecture | Airbus Protect<\/title>\n<meta name=\"description\" content=\"Nos experts s\u00e9curisent les produits et syst\u00e8mes IT et OT gr\u00e2ce \u00e0 des services de conception d&#039;architecture et d&#039;int\u00e9gration de pointe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conception de l\u2019architecture\" \/>\n<meta property=\"og:description\" content=\"Nos experts s\u00e9curisent les produits et syst\u00e8mes IT et OT gr\u00e2ce \u00e0 des services de conception d&#039;architecture et d&#039;int\u00e9gration de pointe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"Airbus Protect\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T14:15:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2022\/06\/header-sustainability-sous-page.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"358\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/\"},\"headline\":\"3 questions, 1 experts : Christian Siemers, consultant OT (certifi\u00e9 CISSP)\",\"description\":\"\",\"author\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/#organization\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/#organization\"},\"image\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/3-questions-1-expert-Christian-Siemers_image-en-avant.png\",\"datePublished\":\"2022-06-20T12:43:41+00:00\",\"dateModified\":\"2025-09-24T14:15:31+00:00\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/\",\"name\":\"Cybersecurity: Conception de l\u2019architecture | Airbus Protect\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/header-sustainability-sous-page.jpg\",\"datePublished\":\"2022-06-20T12:43:41+00:00\",\"dateModified\":\"2025-09-24T14:15:31+00:00\",\"description\":\"Nos experts s\u00e9curisent les produits et syst\u00e8mes IT et OT gr\u00e2ce \u00e0 des services de conception d'architecture et d'int\u00e9gration de pointe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/header-sustainability-sous-page.jpg\",\"contentUrl\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/header-sustainability-sous-page.jpg\",\"width\":1920,\"height\":358},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/conception-architecture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Conception de l\u2019architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/\",\"name\":\"Airbus Protect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#organization\",\"name\":\"Airbus Protect\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-airbus-protect-696-696.png\",\"contentUrl\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-airbus-protect-696-696.png\",\"width\":696,\"height\":696,\"caption\":\"Airbus Protect\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/airbus-protect\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@airbusprotect7483\"],\"contactPoint\":{\"@type\":\"ContactPoint\",\"email\":\"protect@airbus.com\",\"contactType\":\"customer service\",\"areaServed\":[\"GB\",\"FR\",\"ES\",\"DE\",\"BE\",\"CH\",\"PT\",\"DK\",\"AT\"],\"availableLanguage\":[\"en\",\"fr\",\"de\"]}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity: Conception de l\u2019architecture | Airbus Protect","description":"Nos experts s\u00e9curisent les produits et syst\u00e8mes IT et OT gr\u00e2ce \u00e0 des services de conception d'architecture et d'int\u00e9gration de pointe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/","og_locale":"fr_FR","og_type":"article","og_title":"Conception de l\u2019architecture","og_description":"Nos experts s\u00e9curisent les produits et syst\u00e8mes IT et OT gr\u00e2ce \u00e0 des services de conception d'architecture et d'int\u00e9gration de pointe.","og_url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/","og_site_name":"Airbus Protect","article_modified_time":"2025-09-24T14:15:31+00:00","og_image":[{"width":1920,"height":358,"url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2022\/06\/header-sustainability-sous-page.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/"},"headline":"3 questions, 1 experts : Christian Siemers, consultant OT (certifi\u00e9 CISSP)","description":"","author":{"@id":"https:\/\/www.protect.airbus.com\/#organization"},"publisher":{"@id":"https:\/\/www.protect.airbus.com\/#organization"},"image":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2022\/12\/3-questions-1-expert-Christian-Siemers_image-en-avant.png","datePublished":"2022-06-20T12:43:41+00:00","dateModified":"2025-09-24T14:15:31+00:00"},{"@type":"WebPage","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/","url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/","name":"Cybersecurity: Conception de l\u2019architecture | Airbus Protect","isPartOf":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/#primaryimage"},"image":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2022\/06\/header-sustainability-sous-page.jpg","datePublished":"2022-06-20T12:43:41+00:00","dateModified":"2025-09-24T14:15:31+00:00","description":"Nos experts s\u00e9curisent les produits et syst\u00e8mes IT et OT gr\u00e2ce \u00e0 des services de conception d'architecture et d'int\u00e9gration de pointe.","breadcrumb":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/#primaryimage","url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2022\/06\/header-sustainability-sous-page.jpg","contentUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2022\/06\/header-sustainability-sous-page.jpg","width":1920,"height":358},{"@type":"BreadcrumbList","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/conception-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.protect.airbus.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/"},{"@type":"ListItem","position":3,"name":"Conception de l\u2019architecture"}]},{"@type":"WebSite","@id":"https:\/\/www.protect.airbus.com\/fr\/#website","url":"https:\/\/www.protect.airbus.com\/fr\/","name":"Airbus Protect","description":"","publisher":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.protect.airbus.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.protect.airbus.com\/fr\/#organization","name":"Airbus Protect","url":"https:\/\/www.protect.airbus.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png","contentUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png","width":696,"height":696,"caption":"Airbus Protect"},"image":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/airbus-protect\/","https:\/\/www.youtube.com\/@airbusprotect7483"],"contactPoint":{"@type":"ContactPoint","email":"protect@airbus.com","contactType":"customer service","areaServed":["GB","FR","ES","DE","BE","CH","PT","DK","AT"],"availableLanguage":["en","fr","de"]}}]}},"_links":{"self":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/comments?post=5157"}],"version-history":[{"count":10,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5157\/revisions"}],"predecessor-version":[{"id":38361,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5157\/revisions\/38361"}],"up":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/6938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/media\/821"}],"wp:attachment":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/media?parent=5157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}