{"id":7111,"date":"2024-03-22T11:13:21","date_gmt":"2024-03-22T10:13:21","guid":{"rendered":"https:\/\/ipsip.eu\/?p=7111"},"modified":"2025-07-08T11:32:41","modified_gmt":"2025-07-08T09:32:41","slug":"cartographie-des-donnees-sensibles","status":"publish","type":"post","link":"https:\/\/ipsip.eu\/en\/cartographie-des-donnees-sensibles\/","title":{"rendered":"Mapping of Sensitive and Confidential Data."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7111\" class=\"elementor elementor-7111\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bda508a elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1bda508a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-933fbe0\" data-id=\"933fbe0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b219115 elementor-widget elementor-widget-spacer\" data-id=\"b219115\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-325641c elementor-widget elementor-widget-heading\" data-id=\"325641c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mapping sensitive data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-617af8d4 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"617af8d4\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2627ac18 elementor-invisible\" data-id=\"2627ac18\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed454d4 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ed454d4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/research.typeform.com\/to\/dd0DBiyt\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact IPSIP<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f7ad25 elementor-widget elementor-widget-spacer\" data-id=\"7f7ad25\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-320966c elementor-widget elementor-widget-text-editor\" data-id=\"320966c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IPSIP - March 2024<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-151e009 elementor-widget elementor-widget-heading\" data-id=\"151e009\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mapping of Sensitive and Confidential Data. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e08b7d elementor-widget elementor-widget-spacer\" data-id=\"7e08b7d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a095bb1 elementor-widget elementor-widget-text-editor\" data-id=\"a095bb1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\"><strong>Did you know?<\/strong> 53% of French companies feel \u2018not very\u2019 or \u2018not at all\u2019 prepared for a cyberattack. More than half do not have a formal IT security strategy in place.<\/p><p class=\" translation-block\">In this article, we present a simple methodological approach to <strong>understanding, evaluating, and securing your company's vital information<\/strong>.\n<br>By following our advice, you will be able to:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64da6d3 elementor-widget elementor-widget-text-editor\" data-id=\"64da6d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Identify sensitive data of your company<\/li><li>Assess the risks involved<\/li><li>Implement an appropriate protection strategy<\/li><li>Minimise the risk of cyber attacks<\/li><li>Protect your reputation and your revenue<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c9337a elementor-widget elementor-widget-spacer\" data-id=\"7c9337a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74803fc elementor-widget elementor-widget-heading\" data-id=\"74803fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Panorama de la Data : Analyser pour mieux prot\u00e9ger<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df3e03e elementor-widget elementor-widget-spacer\" data-id=\"df3e03e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dcc3cf elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8dcc3cf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\">This first step involves compiling a <strong>comprehensive inventory<\/strong> of all the data you possess. This means identifying all the data stored by your company, regardless of the medium: servers, cloud, laptops, etc.<\/p><p>Please note that it is important to collect the most accurate information possible about each piece of data, such as:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed9cb5b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ed9cb5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\"><strong>The type of data.<\/strong><br>Personal data, financial data, sensitive data, etc.<\/p><p class=\" translation-block\"><strong>Data location.<\/strong><br>Internal data storage, storage by a third-party service provider, etc.<\/p><p class=\" translation-block\"><strong>The level of data criticality.<\/strong><br>Importance of data for the company's business.<\/p><p class=\" translation-block\"><strong>Persons with access to the data.<\/strong><br>Persons assigned or not assigned to view, modify or delete the data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebadb95 elementor-widget elementor-widget-spacer\" data-id=\"ebadb95\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b14bb6f elementor-widget elementor-widget-heading\" data-id=\"b14bb6f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data hierarchy: Evaluate to prioritise<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eececf0 elementor-widget elementor-widget-spacer\" data-id=\"eececf0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-704ae1d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"704ae1d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\">This overview of your data will now enable you to move on to the second step.\nYou have analysed your existing data and know exactly what type of data your company has. You now need to prioritise your data according to its criticality.<\/p><p>To prioritise your data, you can ask yourself the following questions:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bf1772 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7bf1772\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\">Is the data vital to the company's business?<br>Am I exposed to legal risks in the event of loss or theft of this data?<br>Could the loss of this data damage the company's reputation?<br>Could a data breach affect the trust of customers and partners?<\/p><p><span style=\"font-weight: 400;\">This prioritisation will enable you to focus your efforts on the most at-risk data.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc36280 elementor-widget elementor-widget-spacer\" data-id=\"bc36280\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e51cd7c elementor-widget elementor-widget-heading\" data-id=\"e51cd7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The threats you face: Understanding to prevent\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e223788 elementor-widget elementor-widget-spacer\" data-id=\"e223788\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4baf41 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c4baf41\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\">When discussing risks, you need to be aware of the <strong>threats<\/strong> to which your data is exposed. Be as specific as possible, as this step is crucial in determining whether you are adequately equipped and identifying any <strong>potential shortcomings.<\/strong><\/p><p>In most cases, sensitive data is exposed to numerous threats, including:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-235c9e7 elementor-widget__width-initial elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"235c9e7\" data-element_type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-235c9e7\" data-scroll-on-click=\"\" data-scroll-speed=\"300\" data-accordion-id=\"235c9e7\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n    <div class=\"eael-accordion-list\">\n                <div id=\"le-vol-de-donnes\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-3701\"><span class=\"eael-accordion-tab-title\">Data theft<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3701\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"le-vol-de-donnes\"><p class=\" translation-block\"><span style=\"font-weight: 400\">Data theft, also known as data leakage or data breach, is the unauthorised acquisition of sensitive or confidential data.<br><strong>Some examples:<br><strong>Phishing<\/strong>: fraudulent emails\/text messages encouraging users to disclose information or download malicious software.<br><strong>SQL injection<\/strong>: exploiting vulnerabilities in websites to access databases.<br><strong>Ransomware<\/strong>: encrypting data and demanding a ransom to unlock it.<br><strong>Internal data leaks<\/strong>: disclosure of sensitive data by disgruntled or negligent employees.<br><strong>Brute force attacks<\/strong>: use of tools to guess passwords and access accounts.<br><strong>To protect yourself, you can use (non-exhaustive list)<\/strong>: strong passwords, two-factor authentication, vigilance against suspicious emails\/SMS messages, security software, software updates.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"la-perte-de-donnes\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-3702\"><span class=\"eael-accordion-tab-title\">Data loss<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3702\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"la-perte-de-donnes\"><p class=\" translation-block\">Data loss is the temporary or permanent disappearance of digital information stored on a computer medium. It can be caused by computer failures, human error (accidental deletion of files, poor backup management, etc.) or malicious acts such as hacking, theft or espionage.<br><br>The consequences of data loss can be very significant: financial damage, damage to reputation, loss of productivity, legal risks, etc.<br><br>It is therefore necessary to put measures in place to prevent data loss and to be able to recover data in the event of a disaster.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"la-corruption-de-donnes\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-3703\"><span class=\"eael-accordion-tab-title\">Data corruption<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3703\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"la-corruption-de-donnes\"><p>Data corruption is the alteration or destruction of digital information stored on a computer medium. This can render the data inaccessible, unreadable or unusable.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"lespionnage-industriel\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-3704\"><span class=\"eael-accordion-tab-title\">Industrial espionage<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3704\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"lespionnage-industriel\"><p>Commercial espionage is the illegal acquisition of sensitive or confidential information from a competing company. This may include information about the company's products, services, customers, finances, strategies or technologies.<\/p><\/div>\n                <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3c0282 elementor-widget elementor-widget-spacer\" data-id=\"e3c0282\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-830669d elementor-widget elementor-widget-heading\" data-id=\"830669d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Implementing solutions to address these threats: Protect to reassure \n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f5ea3f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5f5ea3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\">Finally, once you have identified your sensitive data and understood the potential threats, it is time to implement <strong>appropriate security solutions<\/strong>.<\/p><p class=\" translation-block\">Among the most effective solutions are <strong>cryptography<\/strong> to encrypt sensitive data, <strong>anonymisation<\/strong> to mask personal information, and regular<strong> audits<\/strong> to detect and correct vulnerabilities.<\/p><p class=\" translation-block\">To give you an idea, IPSIP steps in to help you see things more clearly and support you in protecting your infrastructure at all levels. We offer a <strong>cybersecurity<\/strong> audit to help you better understand your digital environment.<\/p><p>As an example, below are some cybersecurity solutions you can integrate to protect yourself and understand what is happening on your network:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed03ed6 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"ed03ed6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ipsip.eu\/firewall\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Firewall: your network's first line of defence against cyberattacks.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe386ca elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"fe386ca\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ipsip.eu\/xdr\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">XDR: The solution to help businesses secure endpoints.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3c1e15 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"e3c1e15\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ipsip.eu\/pam-bastion\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">PAM\/BASTION: Manage and protect privileged access by understanding who can access your data and how.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50c08f0 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"50c08f0\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ipsip.eu\/ndr\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">The NDR solution to detect threats and secure your networks.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-927ec95 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"927ec95\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ipsip.eu\/la-solution-de-chiffrement-de-vos-donnees-confidentielles\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">The encryption key management solution to keep control over your data.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d79f5dc elementor-widget elementor-widget-heading\" data-id=\"d79f5dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">To sum up: <\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1171a5a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1171a5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">By understanding and assessing your sensitive data, and implementing appropriate security solutions, you can significantly reduce the risk of data breaches and strengthen customer trust and your relationship with your business partners. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15d9ebd elementor-widget elementor-widget-spacer\" data-id=\"15d9ebd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a73ad8b elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"a73ad8b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/research.typeform.com\/to\/dd0DBiyt\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact IPSIP<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b14738 elementor-widget elementor-widget-spacer\" data-id=\"2b14738\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Data Mapping: How to Know if Your Data Is Really Safe from Prying Eyes?<\/p>","protected":false},"author":4,"featured_media":7200,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[14],"class_list":["post-7111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","tag-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cartographie des donn\u00e9es sensibles et confidentielles - Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT<\/title>\n<meta name=\"description\" content=\"Cartographie des donn\u00e9es sensibles : comment savoir si vos donn\u00e9es sont r\u00e9ellement \u00e0 l\u2019abri des regards indiscrets ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ipsip.eu\/en\/cartographie-des-donnees-sensibles\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cartographie des donn\u00e9es sensibles et confidentielles - Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT\" \/>\n<meta property=\"og:description\" content=\"Cartographie des donn\u00e9es sensibles : comment savoir si vos donn\u00e9es sont r\u00e9ellement \u00e0 l\u2019abri des regards indiscrets ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ipsip.eu\/en\/cartographie-des-donnees-sensibles\/\" \/>\n<meta property=\"og:site_name\" content=\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-22T10:13:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-08T09:32:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Lucie Cazanave Pin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucie Cazanave Pin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/\"},\"author\":{\"name\":\"Lucie Cazanave Pin\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\"},\"headline\":\"Cartographie des donn\u00e9es sensibles et confidentielles\",\"datePublished\":\"2024-03-22T10:13:21+00:00\",\"dateModified\":\"2025-07-08T09:32:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/\"},\"wordCount\":1139,\"image\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp\",\"keywords\":[\"blog\"],\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/\",\"name\":\"Cartographie des donn\u00e9es sensibles et confidentielles - Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\\\/7, solutions IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp\",\"datePublished\":\"2024-03-22T10:13:21+00:00\",\"dateModified\":\"2025-07-08T09:32:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\"},\"description\":\"Cartographie des donn\u00e9es sensibles : comment savoir si vos donn\u00e9es sont r\u00e9ellement \u00e0 l\u2019abri des regards indiscrets ?\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/cartographie-des-donnees-sensibles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp\",\"contentUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp\",\"width\":640,\"height\":426,\"caption\":\"Cartographie des risques\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/\",\"name\":\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\\\/7, solutions IT\",\"description\":\"Make IT Easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ipsip.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\",\"name\":\"Lucie Cazanave Pin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"caption\":\"Lucie Cazanave Pin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cartographie des donn\u00e9es sensibles et confidentielles - Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","description":"Cartographie des donn\u00e9es sensibles : comment savoir si vos donn\u00e9es sont r\u00e9ellement \u00e0 l\u2019abri des regards indiscrets ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ipsip.eu\/en\/cartographie-des-donnees-sensibles\/","og_locale":"en_GB","og_type":"article","og_title":"Cartographie des donn\u00e9es sensibles et confidentielles - Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","og_description":"Cartographie des donn\u00e9es sensibles : comment savoir si vos donn\u00e9es sont r\u00e9ellement \u00e0 l\u2019abri des regards indiscrets ?","og_url":"https:\/\/ipsip.eu\/en\/cartographie-des-donnees-sensibles\/","og_site_name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","article_published_time":"2024-03-22T10:13:21+00:00","article_modified_time":"2025-07-08T09:32:41+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp","type":"image\/webp"}],"author":"Lucie Cazanave Pin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lucie Cazanave Pin","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/#article","isPartOf":{"@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/"},"author":{"name":"Lucie Cazanave Pin","@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a"},"headline":"Cartographie des donn\u00e9es sensibles et confidentielles","datePublished":"2024-03-22T10:13:21+00:00","dateModified":"2025-07-08T09:32:41+00:00","mainEntityOfPage":{"@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/"},"wordCount":1139,"image":{"@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp","keywords":["blog"],"articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/","url":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/","name":"Cartographie des donn\u00e9es sensibles et confidentielles - Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","isPartOf":{"@id":"https:\/\/ipsip.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/#primaryimage"},"image":{"@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp","datePublished":"2024-03-22T10:13:21+00:00","dateModified":"2025-07-08T09:32:41+00:00","author":{"@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a"},"description":"Cartographie des donn\u00e9es sensibles : comment savoir si vos donn\u00e9es sont r\u00e9ellement \u00e0 l\u2019abri des regards indiscrets ?","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ipsip.eu\/fr\/cartographie-des-donnees-sensibles\/#primaryimage","url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp","contentUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/glenn-carstens-peters-npxXWgQ33ZQ-unsplash-_1_.webp","width":640,"height":426,"caption":"Cartographie des risques"},{"@type":"WebSite","@id":"https:\/\/ipsip.eu\/#website","url":"https:\/\/ipsip.eu\/","name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","description":"Make IT Easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsip.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a","name":"Lucie Cazanave Pin","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","caption":"Lucie Cazanave Pin"}}]}},"_links":{"self":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/posts\/7111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/comments?post=7111"}],"version-history":[{"count":197,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/posts\/7111\/revisions"}],"predecessor-version":[{"id":8850,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/posts\/7111\/revisions\/8850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/media\/7200"}],"wp:attachment":[{"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/media?parent=7111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/categories?post=7111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipsip.eu\/en\/wp-json\/wp\/v2\/tags?post=7111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}