{"id":7762,"date":"2019-06-06T09:00:09","date_gmt":"2019-06-06T13:00:09","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7762"},"modified":"2022-07-20T10:43:04","modified_gmt":"2022-07-20T14:43:04","slug":"dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/","title":{"rendered":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie &#8211;  Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes"},"content":{"rendered":"\n<p><em>par Ken Linscott<\/em><\/p>\n\n\n\n<p>Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux 10&nbsp;facteurs de vuln\u00e9rabilit\u00e9 de l\u2019infrastructure DNS aux cyberattaques, parmi lesquelles&nbsp;:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Empoisonnement\ndu cache DNS<\/li><li>Mauvaise\ngestion des noms de domaine<\/li><li>Piratage DNS<\/li><li>Domain-shadowing<\/li><li>Interruption\nde services DNS<\/li><li>Malware<\/li><li>Tunnels DNS<\/li><li>Attaques\nzero-day<\/li><li>Attaques par\nd\u00e9ni de service (DDoS)<\/li><li>Mauvaise\ngestion des certificats num\u00e9riques.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg\" alt=\"\" class=\"wp-image-7763\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/06\/Slide11-FR-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/06\/Slide11-FR-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/06\/Slide11-FR.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Pour limiter ces risques, la strat\u00e9gie de \u00ab d\u00e9fense en profondeur \u00bb &#8211; une approche multicouche pour garantir la s\u00e9curit\u00e9 des actifs num\u00e9riques &#8211; toute soci\u00e9t\u00e9 doit inclure une politique de s\u00e9curit\u00e9 DNS clairement d\u00e9finie :<\/p>\n\n\n\n<p><strong>1. Employer des fonctionnalit\u00e9s de s\u00e9curit\u00e9 avanc\u00e9es pour les noms de domaine critiques de l\u2019entreprise<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Le protocole DNSSEC (Domain Name\nSystem Security Extension) est un outil important de\nla protection globale des vuln\u00e9rabilit\u00e9s DNS parce qu\u2019il chiffre la requ\u00eate\nenvoy\u00e9e au fournisseur de services Internet et a \u00e9galement un effet visuel\ndissuasif pour les cybercriminels, puisqu\u2019il est indiqu\u00e9 dans le WHOIS. La signature\n\u00e9lectronique de la zone racine signifie que le client peut \u00eatre certain\nd\u2019atteindre le site web l\u00e9gitime de l\u2019entreprise&nbsp;; les pirates ne seront\npas capables de rediriger le trafic vers un site contrefait en vue de\nrecueillir les noms d\u2019utilisateur et les mots de passe. <\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Le\nverrouillage du registre arr\u00eate les modifications automatiques des\nenregistrements DNS, ce qui emp\u00eache l\u2019ex\u00e9cution des requ\u00eates non autoris\u00e9es,\nqu\u2019elles viennent d\u2019un acc\u00e8s compromis au portail de gestion de vos noms de\ndomaine ou aux syst\u00e8mes de votre registrar. Ces verrous sont mentionn\u00e9s dans la\nbase de donn\u00e9es WHOIS, ce qui ajoute un autre \u00e9l\u00e9ment dissuasif visible par les\ncriminels.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Les\ncertificats num\u00e9riques chiffrent les donn\u00e9es en ligne pour s\u00e9curiser les\ntransactions e-commerce et les communications via Internet. De plus en plus,\nchaque site web actif a besoin d\u2019un certificat num\u00e9rique valide renouvel\u00e9\nr\u00e9guli\u00e8rement pour \u00e9viter d\u2019\u00eatre signal\u00e9 comme potentiellement dangereux pour\nses visiteurs. Google\u00ae, en particulier, bloque automatiquement les sites web\nqui ne sont pas prot\u00e9g\u00e9s par un certificat num\u00e9rique.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Le protocole\nDMARC (Domain-based message authentication, reporting, and conformance) est un\nprotocole d\u2019authentification des e-mails qui prot\u00e8ge les organisations contre\nl\u2019utilisation non autoris\u00e9e de leurs noms de domaine, commun\u00e9ment d\u00e9sign\u00e9e par\n\u00ab&nbsp;spoofing e-mail&nbsp;\u00bb. Le protocole DMARC emp\u00eache les attaques sur la\nmessagerie d\u2019entreprise, les e-mails de phishing, les scams et autres\ncybermenaces.<\/li><\/ul>\n\n\n\n<p><strong>2. Contr\u00f4ler les autorisations utilisateur<\/strong><\/p>\n\n\n\n<p>Les entreprises doivent \u00e9galement r\u00e9guli\u00e8rement passer en revue les autorisations des membres du personnel pour l\u2019acc\u00e8s au portail de gestion des serveurs DNS et des noms de domaine. Un bon prestataire professionnel devrait \u00eatre capable d\u2019alerter les entreprises afin qu\u2019elles modifient leurs autorisations. Seuls les utilisateurs de confiance devraient avoir acc\u00e8s aux niveaux d\u2019autorisation \u00e9lev\u00e9s. De m\u00eame, en cas de d\u00e9part d\u2019un employ\u00e9, les autorisations dont il dispose devraient \u00eatre supprim\u00e9es imm\u00e9diatement. Les utilisateurs qui disposent d&#8217;un niveau d\u2019autorisation \u00e9lev\u00e9 ont acc\u00e8s aux fonctions critiques des serveurs DNS qui peuvent permettre de perturber ou de pirater la pr\u00e9sence en ligne d\u2019une entreprise, y compris&nbsp;: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Faire expirer un nom de domaine<\/li><li>Transf\u00e9rer la propri\u00e9t\u00e9 d\u2019un nom de domaine<\/li><li>Modifier le serveur DNS<\/li><li>Modifier le fichier de zone<\/li><\/ul>\n\n\n\n<p><strong>3. S\u00e9curiser l\u2019acc\u00e8s au\nportail de gestion des serveurs DNS et des noms de domaine<\/strong><\/p>\n\n\n\n<p>Cette mesure est facilit\u00e9e lorsque la\ngestion des noms de domaine et des serveurs DNS est regroup\u00e9e chez un seul\nfournisseur professionnel, qui devrait \u00eatre un partenaire de confiance\nproposant l\u2019authentification \u00e0 deux facteurs (utilis\u00e9e par les plateformes de\nservices bancaires en ligne) et des identit\u00e9s f\u00e9d\u00e9r\u00e9es pour les environnements\navec authentification unique (SSO). Ces protections peu co\u00fbteuses, mais\nefficaces compliquent l\u2019acc\u00e8s aux noms de domaine vitaux de l\u2019entreprise par\nles pirates.<\/p>\n\n\n\n<p><strong>4. Regrouper les services DNS (domaine, DNS et certificats num\u00e9riques) aupr\u00e8s d\u2019un fournisseur professionnel<\/strong><\/p>\n\n\n\n<p>Lorsqu\u2019une entreprise fait appel \u00e0 un\nprestataire professionnel capable de g\u00e9rer les noms de domaine, les serveurs\nDNS et les certificats num\u00e9riques pour des marques de renom international,\ncelui-ci se charge de la surveillance et de la mise \u00e0 jour de toutes les\nmesures de protection cit\u00e9es dans ces billets de blog, ce qui minimise les\ncybermenaces. Dans l\u2019espace DNS, cela signifie choisir un fournisseur r\u00e9put\u00e9\npour garantir une disponibilit\u00e9 totale (100&nbsp;%) afin d\u2019emp\u00eacher les pannes\nde services DNS, quel que soit le type d&#8217;attaque DDoS.<\/p>\n\n\n\n<p>Un fournisseur doit \u00e9galement \u00eatre\ncapable d\u2019optimiser ses investissements en syst\u00e8mes et dispositifs de s\u00e9curit\u00e9,\ny compris avec une formation r\u00e9guli\u00e8re des membres de son personnel pour les\ninformer des diff\u00e9rents types de cyberattaques, parce l\u2019humain repr\u00e9sentera\ntoujours le point le plus vuln\u00e9rable. <\/p>\n\n\n\n<p>On ne saurait trop insister sur\nl\u2019importance de choisir un bon partenaire, et nous encourageons donc les\nentreprises \u00e0 impliquer leur \u00e9quipe charg\u00e9e de la s\u00e9curit\u00e9 pour qu\u2019elle\ninterroge les fournisseurs potentiels sur <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/digital-asset-checklist\/\">des\nquestions pr\u00e9cises concernant la s\u00e9curit\u00e9 informatique.<\/a><\/p>\n\n\n\n<p><strong>Prochain billet<\/strong><\/p>\n\n\n\n<p>Dans notre prochain billet, nous pr\u00e9ciserons \u00e0 quel\nniveau doivent \u00eatre prises les d\u00e9cisions concernant les politiques de s\u00e9curit\u00e9.\n<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/email-sign-up\/\">Abonnez-vous \u00e0\nnotre blog pour recevoir les notifications de publication des nouveaux billets.<\/a>\n<\/p>\n\n\n\n<p><strong>D\u2019autres billets de la s\u00e9rie&nbsp;:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-1e-partie\/\">&lt;&lt;&nbsp;1e Partie &#8211; Qu\u2019est-ce que le DNS et pourquoi est-il vuln\u00e9rable&nbsp;?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-2e-partie\/\">&lt;&lt;&nbsp;2e Partie &#8211; Les quatre vuln\u00e9rabilit\u00e9s DNS que vous devez conna\u00eetre<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-3e-partie\/\">&lt;&lt; 3e Partie &#8211; Six vuln\u00e9rabilit\u00e9s DNS suppl\u00e9mentaires qui rendent la s\u00e9curit\u00e9 essentielle <\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/\">&lt;&lt; 4e Partie &#8211; La menace croissante des piratages DNS et du domain-shadowing<\/a><\/p>\n\n\n\n<h2>Share this post<\/h2>\n<a class=\"social\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\"\/><\/a><a class=\"social\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a><a class=\"social\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n","protected":false},"excerpt":{"rendered":"<p>par Ken Linscott Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux 10&nbsp;facteurs de vuln\u00e9rabilit\u00e9 de l\u2019infrastructure DNS aux cyberattaques, parmi lesquelles&nbsp;: Empoisonnement du cache DNS Mauvaise gestion des noms de domaine Piratage DNS Domain-shadowing Interruption de services DNS Malware Tunnels DNS Attaques [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[545],"tags":[],"class_list":["post-7762","post","type-post","status-publish","format-standard","hentry","category-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie - Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes | CSC<\/title>\n<meta name=\"description\" content=\"par Ken Linscott Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie - Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes | CSC\" \/>\n<meta property=\"og:description\" content=\"par Ken Linscott Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-06T13:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-20T14:43:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie &#8211; Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes\",\"datePublished\":\"2019-06-06T13:00:09+00:00\",\"dateModified\":\"2022-07-20T14:43:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/\"},\"wordCount\":1042,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Slide11-FR-1024x576.jpg\",\"articleSection\":[\"Fran\u00e7ais\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/\",\"name\":\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie - Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Slide11-FR-1024x576.jpg\",\"datePublished\":\"2019-06-06T13:00:09+00:00\",\"dateModified\":\"2022-07-20T14:43:04+00:00\",\"description\":\"par Ken Linscott Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Slide11-FR-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Slide11-FR-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie &#8211; Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie - Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes | CSC","description":"par Ken Linscott Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/","og_locale":"en_US","og_type":"article","og_title":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie - Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes | CSC","og_description":"par Ken Linscott Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux","og_url":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-06-06T13:00:09+00:00","article_modified_time":"2022-07-20T14:43:04+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie &#8211; Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes","datePublished":"2019-06-06T13:00:09+00:00","dateModified":"2022-07-20T14:43:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/"},"wordCount":1042,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg","articleSection":["Fran\u00e7ais"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/","url":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/","name":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie - Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg","datePublished":"2019-06-06T13:00:09+00:00","dateModified":"2022-07-20T14:43:04+00:00","description":"par Ken Linscott Jusqu\u2019\u00e0 maintenant, cette s\u00e9rie de billets s\u2019est int\u00e9ress\u00e9e \u00e0 l\u2019importance du DNS sur les activit\u00e9s en ligne des entreprises et aux","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/06\/Slide11-FR-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 5e Partie &#8211; Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7762"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7762\/revisions"}],"predecessor-version":[{"id":11546,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7762\/revisions\/11546"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}