{"id":56683,"date":"2022-05-04T16:19:26","date_gmt":"2022-05-04T14:19:26","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/?page_id=56683"},"modified":"2024-06-13T15:46:57","modified_gmt":"2024-06-13T13:46:57","slug":"securite-du-code-sur-ibm-i","status":"publish","type":"page","link":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/","title":{"rendered":"S\u00e9curit\u00e9 du code sur IBM i"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling main-product arcad-for-ibm-i-modernization\" style=\"--awb-background-position:center top;--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:75px;--awb-padding-bottom:0px;--awb-padding-top-small:20px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-background-image:linear-gradient(180deg, #e1edf8 0%,rgba(255,255,255,0.01) 73%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:10px;--awb-padding-bottom-small:0px;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.9\" data-animationOffset=\"bottom-in-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:370px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"400\" height=\"220\" alt=\"Code Security on IBM i\" title=\"Code Security on IBM i\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png\" class=\"img-responsive wp-image-56664\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i-200x110.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png 400w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-bottom-small:0px;--awb-font-size:45px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:45;line-height:1.16;\">S\u00e9curit\u00e9 du code sur IBM i <span style=\"font-size: 18px; font-weight: 300;\">(AS\/400 &#8211; AS400)<\/span><\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;--fontSize:30;line-height:1.2;\">Comment utiliser les CVEs pour s\u00e9curiser votre application IBM i ?<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling main-product arcad-for-ibm-i-modernization\" style=\"--awb-background-position:center top;--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:75px;--awb-padding-top-small:20px;--awb-padding-right-small:20px;--awb-padding-bottom-small:40px;--awb-padding-left-small:20px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column solution-description\" style=\"--awb-padding-bottom-small:40px;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:40px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Au cours des six derni\u00e8res ann\u00e9es, la s\u00e9curit\u00e9 est rest\u00e9e la principale pr\u00e9occupation des entreprises IBM i. Bien que l&#8217;IBM i soit l&#8217;une des plateformes les plus s\u00fbres, la modernisation et l&#8217;int\u00e9gration \u00e0 des applications et \u00e9quipements externes l&#8217;exposent \u00e0 de nouveaux risques tels que l&#8217;injection SQL et les API non s\u00e9curis\u00e9es. \u00c0 mesure que les applications IBM i \u00e9voluent vers le web ou les microservices, il devient indispensable de s\u00e9curiser et prot\u00e9ger ses actifs.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Que sont les CVEs et comment s\u2019appliquent-ils aux applications IBM i ?<\/h3><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Pour aider les organisations \u00e0 faire face aux risques croissants en mati\u00e8re de s\u00e9curit\u00e9, le programme \u00e0 but non lucratif Common Vulnerabilities and Exposures (CVE) a \u00e9t\u00e9 lanc\u00e9 pour cataloguer les vuln\u00e9rabilit\u00e9s logicielles dans un \u00ab dictionnaire \u00bb public et librement accessible. Chaque CVE r\u00e9pertorie une vuln\u00e9rabilit\u00e9 ou une exposition sp\u00e9cifique et utilise un syst\u00e8me de notation commun des vuln\u00e9rabilit\u00e9s (CVSS) pour \u00e9valuer le \u00ab niveau de menace \u00bb.<\/p>\n<p>Chaque vuln\u00e9rabilit\u00e9 se voit attribuer un score de base CVSS compris entre 0,0 et 10,0 \u2013 un score de 0,0 ne repr\u00e9sente aucun risque et 9,0 \u2013 10,0 est un score de risque critique.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Comment identifier ces risques de s\u00e9curit\u00e9 ?<\/h3><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>DevSecOps a fait de la s\u00e9curit\u00e9 une responsabilit\u00e9 partag\u00e9e tout au long du cycle de vie informatique. Les contr\u00f4les de s\u00e9curit\u00e9 continus sont d\u00e9sormais int\u00e9gr\u00e9s au processus de d\u00e9veloppement des applications.<\/p>\n<p>Con\u00e7u sp\u00e9cifiquement pour IBM i, <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> est un \u00e9l\u00e9ment cl\u00e9 de toute impl\u00e9mentation DevSecOps. L&#8217;outil automatise la d\u00e9tection des failles de s\u00e9curit\u00e9 dans le code RPG et CL. Il agit comme une \u00ab barri\u00e8re de qualit\u00e9 \u00bb autonome qui peut \u00eatre int\u00e9gr\u00e9e dans n\u2019importe quel cycle DevOps.<\/p>\n<p><a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> s\u2019int\u00e8gre \u00e0 RDi, permettant aux d\u00e9veloppeurs de v\u00e9rifier facilement les failles de s\u00e9curit\u00e9 pendant qu\u2019ils codent. Vous pouvez \u00e9galement l&#8217;utiliser avec Jenkins pour automatiser les contr\u00f4les de s\u00e9curit\u00e9 IBM i standard dans un cycle CI\/CD standard.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Comment fonctionne ARCAD CodeChecker ?<\/h3><\/div><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-font-size:18px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> fonctionne en analysant le code source par rapport \u00e0 un ensemble de r\u00e8gles, de m\u00e9triques et de mod\u00e8les m\u00e9triques. Des r\u00e8gles standard sont fournies d\u2019embl\u00e9e et peuvent \u00eatre personnalis\u00e9es ou am\u00e9lior\u00e9es pour r\u00e9pondre aux besoins sp\u00e9cifiques. Chaque r\u00e8gle de s\u00e9curit\u00e9 dans <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> correspond \u00e0 un ou plusieurs CVEs, ou dans certains cas, est ind\u00e9pendante de tout CVE.<\/p>\n<p><a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> indique comment votre code source est conforme ou non aux r\u00e8gles d\u00e9finies. Pour vous aider \u00e0 \u00e9valuer votre niveau de vuln\u00e9rabilit\u00e9 ou d\u2019exposition et \u00e0 conna\u00eetre les mesures correctives appropri\u00e9es \u00e0 appliquer, <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> documente \u00e9galement chaque violation de r\u00e8gle, y compris :<\/p>\n<\/div><ul style=\"--awb-size:18px;--awb-margin-bottom:20px;--awb-item-padding-top:3px;--awb-item-padding-bottom:3px;--awb-iconcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#ffffff;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 type-icons blue-checklist blue-checklist-right\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>description du risque<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>exemples de code conforme et non conforme<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>une \u00e9valuation pour d\u00e9terminer si vous \u00eates \u00ab expos\u00e9 \u00e0 un risque \u00bb<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>liens directs vers les descriptions CVEs correspondantes sur le site du programme CVE\u00ae<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1006\" height=\"598\" alt=\"ARCAD CodeChecker Compliant &amp; Non compliant code\" title=\"ARCAD CodeChecker Compliant &#038; Non compliant code\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code.png\" class=\"img-responsive wp-image-56617\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-200x119.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-400x238.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-600x357.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-800x476.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code.png 1006w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Comment rendre compte des risques de s\u00e9curit\u00e9 dans votre application IBM i ?<\/h3><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> g\u00e9n\u00e8re un rapport de r\u00e9sultats de campagne, organis\u00e9 par gravit\u00e9. Selon les jeux de r\u00e8gles que vous avez choisis pour votre campagne, le rapport de r\u00e9sultats fournira une vue synth\u00e9tique de haut niveau des violations de qualit\u00e9 et des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 identifi\u00e9es.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1224\" height=\"512\" alt=\"ARCAD CodeChecker Campaign Results\" title=\"ARCAD CodeChecker Campaign Results\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report.png\" class=\"img-responsive wp-image-56645\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-200x84.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-400x167.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-600x251.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-800x335.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-1200x502.png 1200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report.png 1224w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Cliquez depuis le rapport sur la documentation de la r\u00e8gle sp\u00e9cifique pour comprendre la cause de la violation et le plan d\u2019action recommand\u00e9, y compris les liens CVE externes.<\/p>\n<p>Le rapport sur les r\u00e9sultats de s\u00e9curit\u00e9 offre un moyen simple et rapide de d\u00e9terminer \u00ab suis-je \u00e0 risque ? \u00bb et de prouver votre conformit\u00e9 aux normes de codage sectorielles et locales sur IBM i.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Comment anticiper les risques de s\u00e9curit\u00e9 auxquels je suis confront\u00e9 ?<\/h3><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Pour vous aider \u00e0 en savoir plus sur les nouveaux risques de s\u00e9curit\u00e9, <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> permet de parcourir facilement la documentation des r\u00e8gles, class\u00e9e par ensemble de r\u00e8gles.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1305\" height=\"787\" alt=\"ARCAD CodeChecker Rule Set\" title=\"ARCAD CodeChecker Rule Set\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set.png\" class=\"img-responsive wp-image-56646\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-200x121.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-400x241.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-600x362.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-800x482.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-1200x724.png 1200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set.png 1305w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Gr\u00e2ce \u00e0 la documentation des r\u00e8gles d\u2019<a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a>, les d\u00e9veloppeurs peuvent s\u2019informer rapidement des bonnes pratiques de codage sur IBM i et des sch\u00e9mas \u00e0 \u00e9viter.<\/p>\n<p>Gr\u00e2ce aux connaissances sp\u00e9cifiques \u00e0 l\u2019IBM i contenues dans <a href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\">ARCAD CodeChecker<\/a> et aux liens rapides vers les CVEs externes, les organisations peuvent rapidement prendre des mesures pr\u00e9ventives pour sauvegarder la s\u00e9curit\u00e9 de leur code source et de leurs donn\u00e9es IBM i critiques.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-color:#d2d3d4;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:50px;--awb-background-color:var(--awb-color5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_4 3_4 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.2;\">Adoptez ARCAD CodeChecker !<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-padding-right:30px;--awb-padding-left:30px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-section-separator section-separator triangle fusion-section-separator-1\" style=\"--awb-border-bottom:1px solid var(--awb-color5);--awb-spacer-height:1px;--awb-svg-margin-left:0;--awb-svg-margin-right:0;--awb-icon-color:#0e6ace;\"><div class=\"fusion-section-separator-svg\"><div class=\"divider-candy-arrow bottom\" style=\"top:0px;border-top-color: var(--awb-color5);\"><\/div><div class=\"divider-candy bottom\" style=\"bottom:-21px;border-bottom:1px solid var(--awb-color5);border-left:1px solid var(--awb-color5);\"><\/div><\/div><div class=\"fusion-section-separator-spacer\"><div class=\"fusion-section-separator-spacer-height\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:110px;--awb-padding-bottom:60px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-animated\" style=\"--awb-padding-right:35px;--awb-padding-bottom:55px;--awb-padding-left:35px;--awb-overflow:hidden;--awb-bg-image:linear-gradient(180deg, var(--awb-color1) 15%,#437cb4 15%);--awb-bg-size:cover;--awb-border-radius:5px 5px 5px 5px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:90px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"167\" height=\"166\" alt=\"Picto ARCAD CodeChecker\" title=\"Picto ARCAD CodeChecker\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker.png\" class=\"img-responsive wp-image-43763\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker-66x66.png 66w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker-150x150.png 150w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker.png 167w\" sizes=\"(max-width: 167px) 100vw, 167px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;--fontSize:24;line-height:1.36;\">ARCAD CodeChecker<\/h4><\/div><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:20px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Identifiez les d\u00e9fauts de qualit\u00e9 &amp; les risques de s\u00e9curit\u00e9 dans votre code IBM i<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color5);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color5);--button_gradient_bottom_color_hover:var(--awb-color5);\" target=\"_self\" href=\"\/arcad\/produits\/arcad-code-checker-controleur-de-la-qualite-des-sources\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD CodeChecker<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-animated\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:30px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.9\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;--fontSize:24;line-height:1.36;\">Garantie de la s\u00e9curit\u00e9 sur IBM i<\/h4><\/div><ul style=\"--awb-size:18px;--awb-item-padding-top:3px;--awb-item-padding-bottom:3px;--awb-iconcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#ffffff;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-2 type-icons blue-checklist blue-checklist-right\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>DevSecOps : d\u00e9tecte les injections SQL, APIs vuln\u00e9rables, SQL dynamique,..<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Plus de 100 r\u00e8gles personnalisables pour le contr\u00f4le de la qualit\u00e9 du code sur IBM i<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>R\u00e9duisez la complexit\u00e9 du code et le risque de temps d\u2019arr\u00eat<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Ma\u00eetrisez les co\u00fbts et les d\u00e9lais de maintenance<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Facilitez l\u2019int\u00e9gration des nouveaux d\u00e9veloppeurs<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Prise en charge de l\u2019audit de code et du contr\u00f4le continu de la qualit\u00e9<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Solution autonome pouvant \u00eatre utilis\u00e9e avec n\u2019importe quel outil DevOps sur IBM i<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>S\u2019int\u00e8gre \u00e0 RDi, Jenkins et SonarQube pour la cr\u00e9ation de tableaux de bord.<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div id=\"demo\" class=\"fusion-container-anchor\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling quick-demo-section\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:25px;--awb-padding-left:0px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-image:linear-gradient(180deg, rgba(255,255,255,0) 23%,#437cb4 23%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:48px;--awb-spacing-right-small:0%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom-small:10px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"823\" height=\"754\" alt=\"Contact Us\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us.png\" class=\"img-responsive wp-image-39320\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-200x183.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-400x366.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-600x550.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-800x733.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us.png 823w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-10 fusion-text-no-margin title1\" style=\"--awb-font-size:20px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:30px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:200;\"><p>DEMANDEZ VOTRE D\u00c9MO<\/p>\n<\/div><div class=\"fusion-text fusion-text-11 fusion-text-no-margin title2\" style=\"--awb-font-size:45px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:8px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Parlons de votre projet !<\/p>\n<\/div><div class=\"fusion-text fusion-text-12 fusion-text-no-margin title3\" style=\"--awb-font-size:35px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:300;\"><p>Nos experts vous conseillent<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-box-shadow:3px 3px 9px 0px rgba(0,0,0,0.27);;--awb-border-radius:5px 5px 5px 5px;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:35;line-height:1.2;\">D\u00e9mo personnalis\u00e9e<\/h2><\/div><div class=\"fusion-text fusion-text-13 fusion-no-small-visibility\" style=\"--awb-font-size:25px;--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Sollicitez nos experts<\/p>\n<\/div><!-- [if lte IE 8]><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script><![endif]--><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script><script>\n  hbspt.forms.create({\n\tportalId: \"4514828\",\n\tformId: \"d352c58c-07ec-4326-bd67-e84ffe254c14\",\n\tcss: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n        translations: {\n           fr: {\n             required: \"Ce champs est requis.\",\n             missingSelect: \"Ce champs est requis.\",\n             forbiddenEmailDomain: \"Veuillez saisir une adresse professionnelle\",\n             manuallyBlockedEmailDomain: \"Veuillez saisir une adresse professionnelle\", \n             submitText: \"Demander une D\u00e9mo\"\n           }\n       }\n});\n<\/script><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":56664,"parent":22731,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-56683","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVEs - Prot\u00e9gez la s\u00e9curit\u00e9 de votre application IBM i (AS400)<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment utiliser les CVE pour s\u00e9curiser votre application IBM i, ce qu&#039;ils sont et comment ils s&#039;appliquent aux applications IBM i (alias AS\/400 ou AS400).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVEs - Prot\u00e9gez la s\u00e9curit\u00e9 de votre application IBM i (AS400)\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment utiliser les CVE pour s\u00e9curiser votre application IBM i, ce qu&#039;ils sont et comment ils s&#039;appliquent aux applications IBM i (alias AS\/400 ou AS400).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T13:46:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/\",\"name\":\"CVEs - Prot\u00e9gez la s\u00e9curit\u00e9 de votre application IBM i (AS400)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/code-security-on-ibm-i.png\",\"datePublished\":\"2022-05-04T14:19:26+00:00\",\"dateModified\":\"2024-06-13T13:46:57+00:00\",\"description\":\"D\u00e9couvrez comment utiliser les CVE pour s\u00e9curiser votre application IBM i, ce qu'ils sont et comment ils s'appliquent aux applications IBM i (alias AS\\\/400 ou AS400).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/code-security-on-ibm-i.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/code-security-on-ibm-i.png\",\"width\":400,\"height\":220,\"caption\":\"Code Security on IBM i\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/securite-du-code-sur-ibm-i\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 du code sur IBM i\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVEs - Prot\u00e9gez la s\u00e9curit\u00e9 de votre application IBM i (AS400)","description":"D\u00e9couvrez comment utiliser les CVE pour s\u00e9curiser votre application IBM i, ce qu'ils sont et comment ils s'appliquent aux applications IBM i (alias AS\/400 ou AS400).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/","og_locale":"en_US","og_type":"article","og_title":"CVEs - Prot\u00e9gez la s\u00e9curit\u00e9 de votre application IBM i (AS400)","og_description":"D\u00e9couvrez comment utiliser les CVE pour s\u00e9curiser votre application IBM i, ce qu'ils sont et comment ils s'appliquent aux applications IBM i (alias AS\/400 ou AS400).","og_url":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_modified_time":"2024-06-13T13:46:57+00:00","og_image":[{"width":400,"height":220,"url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","type":"image\/png"}],"twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/","url":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/","name":"CVEs - Prot\u00e9gez la s\u00e9curit\u00e9 de votre application IBM i (AS400)","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","datePublished":"2022-05-04T14:19:26+00:00","dateModified":"2024-06-13T13:46:57+00:00","description":"D\u00e9couvrez comment utiliser les CVE pour s\u00e9curiser votre application IBM i, ce qu'ils sont et comment ils s'appliquent aux applications IBM i (alias AS\/400 ou AS400).","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","width":400,"height":220,"caption":"Code Security on IBM i"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/securite-du-code-sur-ibm-i\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 du code sur IBM i"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/56683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/comments?post=56683"}],"version-history":[{"count":5,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/56683\/revisions"}],"predecessor-version":[{"id":68676,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/56683\/revisions\/68676"}],"up":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/22731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media\/56664"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media?parent=56683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}