{"id":5162,"date":"2022-06-20T14:57:06","date_gmt":"2022-06-20T12:57:06","guid":{"rendered":"https:\/\/www.protect.airbus.com\/cybersecurite\/vulnerability-assessments-and-pentesting\/"},"modified":"2026-02-17T16:28:42","modified_gmt":"2026-02-17T15:28:42","slug":"vulnerability-assessments-and-pentesting","status":"publish","type":"page","link":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/","title":{"rendered":"\u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<span style=\"font-weight: 400;\">\u00a0wholly owned<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1681309057942{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<h2>Mettre au jour les vuln\u00e9rabilit\u00e9s cach\u00e9es et comprendre les \u00e9ventuels exploits du syst\u00e8me<\/h2>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpBig\u00a0\u00bb]<span style=\"font-weight: 400;\">Partout, les organisations poursuivent leur transformation digitale. Les nouvelles technologies IT et OT hyperconnect\u00e9es pr\u00e9sentent une surface d&rsquo;attaque bien plus \u00e9tendue que les technologies ant\u00e9rieures. Dans le but d&rsquo;\u00e9viter l&rsquo;exposition au point unique de vuln\u00e9rabilit\u00e9 (le maillon le plus faible de la cha\u00eene), il est indispensable de localiser les \u00e9ventuelles vuln\u00e9rabilit\u00e9s dans ces syst\u00e8mes complexes avant que des acteurs malveillants ne s&rsquo;engouffrent dans la br\u00e8che.<\/span>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1681309162133{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<h3><b>Ouvrir la voie<\/b><\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<span style=\"font-weight: 400;\">Nos services d\u2019\u00e9valuation des vuln\u00e9rabilit\u00e9s et de test d&rsquo;intrusion utilisent les m\u00eames outils et techniques que vos adversaires afin de d\u00e9terminer le v\u00e9ritable niveau de cybermaturit\u00e9 de votre organisation.<\/span>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1681309176717{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<h3><b>Notre approche<\/b><\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]Chez Airbus\u00a0Protect, nous nous distinguons par une approche personnalis\u00e9e. Nous adaptons nos tests d&rsquo;intrusion \u00e0 vos actifs et \u00e0 votre secteur. Nous ne nous contentons pas de souligner les probl\u00e8mes. Au contraire, nous vous offrons une feuille de route claire et actionnable pour combler les lacunes et rem\u00e9dier aux vuln\u00e9rabilit\u00e9s.[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<\/p>\n<h3><b>Pourquoi choisir Airbus\u00a0Protect\u00a0?<\/b><\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]Nous veillons \u00e0 ce que vous disposiez des outils et des m\u00e9thodes n\u00e9cessaires \u00e0 la d\u00e9tection et \u00e0 la gestion de vos vuln\u00e9rabilit\u00e9s. Nos atouts\u00a0:[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1681309368206{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Nous consacrons du temps \u00e0 la compr\u00e9hension des besoins uniques de votre entreprise<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Nous adaptons nos tests d&rsquo;intrusion \u00e0 vos actifs et \u00e0 votre secteur<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Nous cr\u00e9ons une feuille de route claire et actionnable pour combler les lacunes et rem\u00e9dier aux vuln\u00e9rabilit\u00e9s<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Une expertise certifi\u00e9e et souveraine:<\/h3>\n<p>Airbus Protect entretient un partenariat \u00e9troit et durable avec l&rsquo;<b>ANSSI<\/b> (France), le <b>BSI<\/b> (Allemagne) et le <b>NCSC<\/b> (Royaume-Uni). En conciliant les exigences de ces trois autorit\u00e9s nationales, Airbus Protect offre un bouclier de s\u00e9curit\u00e9 transnational unique qui combine l&rsquo;expertise r\u00e9glementaire locale et une vision europ\u00e9enne unifi\u00e9e.[\/vc_column_text][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][vc_single_image image=\u00a0\u00bb45187&Prime; img_size=\u00a0\u00bbmedium\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][vc_single_image image=\u00a0\u00bb45702&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][vc_single_image image=\u00a0\u00bb45938&Prime; img_size=\u00a0\u00bbmedium\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<\/p>\n<h3>Notre offre<\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<\/p>\n<h4><b>Tests d&rsquo;intrusion d&rsquo;ing\u00e9nierie sociale<\/b><\/h4>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]Ce type d\u2019attaque simul\u00e9e vise \u00e0 tester le comportement et le niveau de sensibilisation des collaborateurs en mati\u00e8re de s\u00e9curit\u00e9 de l\u2019information. Lors de ce test, les consultants Airbus\u00a0Protect se font g\u00e9n\u00e9ralement passer pour des coll\u00e8gues ou des personnes dignes de confiance.<\/p>\n<p>Les tests d&rsquo;intrusion d&rsquo;ing\u00e9nierie sociale pr\u00e9sentent de nombreux avantages, notamment les suivants\u00a0:[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">D\u00e9monstration de l\u2019efficacit\u00e9 des syst\u00e8mes de s\u00e9curit\u00e9 de l\u2019information dans votre organisation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aper\u00e7u pr\u00e9cis du niveau de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 de vos collaborateurs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00c9valuation de la conformit\u00e9 \u00e0 vos politiques de s\u00e9curit\u00e9 de l\u2019information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Formation des collaborateurs sur la nature des \u00e9ventuelles cybermenaces<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<\/p>\n<h4><b>S\u00e9curit\u00e9 offensive<\/b><\/h4>\n<p>L\u2019\u00e9quipe d\u2019Airbus\u00a0Protect sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9 offensive propose une large gamme de services visant \u00e0 d\u00e9tecter plus facilement les vuln\u00e9rabilit\u00e9s du syst\u00e8me, en priorit\u00e9 celles \u00e0 l\u2019impact le plus important sur l\u2019entreprise. Nos services couvrent les domaines suivants\u00a0:[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb bg_style=\u00a0\u00bbbgUniversGraphiqueIndustries\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1771327545939{background-image: url(https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2026\/02\/Fichier-1.png?id=47710) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; css=\u00a0\u00bb.vc_custom_1771000580451{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb48053&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">R\u00e9seaux externes<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; css=\u00a0\u00bb.vc_custom_1771000647444{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb48056&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">R\u00e9seaux internes<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; css=\u00a0\u00bb.vc_custom_1771002973253{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb48044&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\">Application web<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb48059&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Infrastructure cloud<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb bg_style=\u00a0\u00bbbgUniversGraphiqueIndustries\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1771327537281{background-image: url(https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2026\/02\/Fichier-1.png?id=47710) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1771000580451{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb48062&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\">Environnements sans fil<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1771000647444{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb48065&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\">Syst\u00e8mes int\u00e9gr\u00e9s<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1771002973253{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb48068&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\">Applications mobiles<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb bg_style=\u00a0\u00bbbgUniversGraphiqueIndustries\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_single_image image=\u00a0\u00bb13620&Prime; img_size=\u00a0\u00bblarge\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb h3_couleur=\u00a0\u00bbh3BleuProtect\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<h3><strong>T\u00e9moignage client<\/strong> : Audit cyber pour la Nuclear Decommissioning Authority<\/h3>\n<p>D\u00e9couvrez comment Airbus Protect a s\u00e9curis\u00e9 les infrastructures critiques du secteur \u00e9nerg\u00e9tique gr\u00e2ce \u00e0 nos experts en tests d&rsquo;intrusion et \u00e0 Airbus CyberRange.<\/p>\n<p>&nbsp;[\/vc_column_text]<div class=\"divBtCTA btAlignCenter\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/cyber-audit-nda\/\"  class=\"button btAuto\">Lire le t\u00e9moignage client<\/a><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<div class=\"vc_row wpb_row vc_row-fluid\">\n<div class=\"wpb_column vc_column_container vc_col-sm-12\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element pHighlight h2 h3\">\n<div class=\"wpb_wrapper\">\n<p>Outre les tests d\u2019intrusion, l\u2019\u00e9quipe de s\u00e9curit\u00e9 offensive soutient aussi les activit\u00e9s suivantes :<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb bg_style=\u00a0\u00bbbgUniversGraphiqueIndustries\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1771002997572{background-image: url(https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png?id=6467) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1771000580451{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb47706&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Services compromis pr\u00e9sum\u00e9s \u2013 dont le pivoting, le mouvement lat\u00e9ral, l\u2019exfiltration des donn\u00e9es et bien plus<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1771000647444{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb47700&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Analyse des renseignements de sources ouvertes<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1771002973253{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;border-color: #ffffff !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb47697&Prime; alignment=\u00a0\u00bbcenter\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpIntermediaire\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\">Exercices de red teaming<\/p>\n<p>[\/vc_column_text]<div class=\"divBtCTA btAlignCenter\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/red-team\/\"  class=\"button btGeneral\">En savoir plus<\/a><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb][vc_column]<div class=\"blocMoreInfo\">\n    <h2 class=\"h2Big\">En savoir plus sur la [Cybers\u00e9curit\u00e9]<\/h2>[vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]Nos experts peuvent vous aider \u00e0 \u00e9valuer les vuln\u00e9rabilit\u00e9s et \u00e0 effectuer des tests de p\u00e9n\u00e9tration :[\/vc_column_text]<div class=\"divBtCTA btAlignCenter\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/contact\/\"  class=\"button btAuto\">Contactez un expert<\/a><\/div>    <\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]\u00a0wholly owned[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1681309057942{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb] Mettre au jour les vuln\u00e9rabilit\u00e9s cach\u00e9es et comprendre les \u00e9ventuels exploits du syst\u00e8me [\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb p_style=\u00a0\u00bbpBig\u00a0\u00bb]Partout, les organisations poursuivent leur transformation digitale. Les nouvelles technologies IT et OT hyperconnect\u00e9es pr\u00e9sentent une surface d&rsquo;attaque bien plus \u00e9tendue que les technologies ant\u00e9rieures. Dans le but d&rsquo;\u00e9viter l&rsquo;exposition au point [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6467,"parent":6938,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-5162","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity: \u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest | Airbus Protect<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les \u00e9valuations de vuln\u00e9rabilit\u00e9 et les services de Pentest qui r\u00e9v\u00e8lent la maturit\u00e9 cybern\u00e9tique de votre organisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les \u00e9valuations de vuln\u00e9rabilit\u00e9 et les services de Pentest qui r\u00e9v\u00e8lent la maturit\u00e9 cybern\u00e9tique de votre organisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/\" \/>\n<meta property=\"og:site_name\" content=\"Airbus Protect\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-17T15:28:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"582\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Service\",\"name\":\"\u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/\",\"provider\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/#organization\"},\"description\":\"\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/\",\"name\":\"Cybersecurity: \u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest | Airbus Protect\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/revslider\\\/header-cybersecurity-en\\\/bg-cybersecurity.png\",\"datePublished\":\"2022-06-20T12:57:06+00:00\",\"dateModified\":\"2026-02-17T15:28:42+00:00\",\"description\":\"D\u00e9couvrez les \u00e9valuations de vuln\u00e9rabilit\u00e9 et les services de Pentest qui r\u00e9v\u00e8lent la maturit\u00e9 cybern\u00e9tique de votre organisation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/revslider\\\/header-cybersecurity-en\\\/bg-cybersecurity.png\",\"contentUrl\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/revslider\\\/header-cybersecurity-en\\\/bg-cybersecurity.png\",\"width\":1920,\"height\":582},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/vulnerability-assessments-and-pentesting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/cybersecurite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/\",\"name\":\"Airbus Protect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#organization\",\"name\":\"Airbus Protect\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-airbus-protect-696-696.png\",\"contentUrl\":\"https:\\\/\\\/www.protect.airbus.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-airbus-protect-696-696.png\",\"width\":696,\"height\":696,\"caption\":\"Airbus Protect\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protect.airbus.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/airbus-protect\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@airbusprotect7483\"],\"contactPoint\":{\"@type\":\"ContactPoint\",\"email\":\"protect@airbus.com\",\"contactType\":\"customer service\",\"areaServed\":[\"GB\",\"FR\",\"ES\",\"DE\",\"BE\",\"CH\",\"PT\",\"DK\",\"AT\"],\"availableLanguage\":[\"en\",\"fr\",\"de\"]}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity: \u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest | Airbus Protect","description":"D\u00e9couvrez les \u00e9valuations de vuln\u00e9rabilit\u00e9 et les services de Pentest qui r\u00e9v\u00e8lent la maturit\u00e9 cybern\u00e9tique de votre organisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/","og_locale":"fr_FR","og_type":"article","og_title":"\u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest","og_description":"D\u00e9couvrez les \u00e9valuations de vuln\u00e9rabilit\u00e9 et les services de Pentest qui r\u00e9v\u00e8lent la maturit\u00e9 cybern\u00e9tique de votre organisation.","og_url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/","og_site_name":"Airbus Protect","article_modified_time":"2026-02-17T15:28:42+00:00","og_image":[{"width":1920,"height":582,"url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Service","name":"\u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest","url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/","provider":{"@id":"https:\/\/www.protect.airbus.com\/#organization"},"description":""},{"@type":"WebPage","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/","url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/","name":"Cybersecurity: \u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest | Airbus Protect","isPartOf":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/#primaryimage"},"image":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","datePublished":"2022-06-20T12:57:06+00:00","dateModified":"2026-02-17T15:28:42+00:00","description":"D\u00e9couvrez les \u00e9valuations de vuln\u00e9rabilit\u00e9 et les services de Pentest qui r\u00e9v\u00e8lent la maturit\u00e9 cybern\u00e9tique de votre organisation.","breadcrumb":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/#primaryimage","url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","contentUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","width":1920,"height":582},{"@type":"BreadcrumbList","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/vulnerability-assessments-and-pentesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.protect.airbus.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/"},{"@type":"ListItem","position":3,"name":"\u00c9valuations des vuln\u00e9rabilit\u00e9s et Pentest"}]},{"@type":"WebSite","@id":"https:\/\/www.protect.airbus.com\/fr\/#website","url":"https:\/\/www.protect.airbus.com\/fr\/","name":"Airbus Protect","description":"","publisher":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.protect.airbus.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.protect.airbus.com\/fr\/#organization","name":"Airbus Protect","url":"https:\/\/www.protect.airbus.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png","contentUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png","width":696,"height":696,"caption":"Airbus Protect"},"image":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/airbus-protect\/","https:\/\/www.youtube.com\/@airbusprotect7483"],"contactPoint":{"@type":"ContactPoint","email":"protect@airbus.com","contactType":"customer service","areaServed":["GB","FR","ES","DE","BE","CH","PT","DK","AT"],"availableLanguage":["en","fr","de"]}}]}},"_links":{"self":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/comments?post=5162"}],"version-history":[{"count":26,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5162\/revisions"}],"predecessor-version":[{"id":48081,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5162\/revisions\/48081"}],"up":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/6938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/media\/6467"}],"wp:attachment":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/media?parent=5162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}