{"version":"1.0","provider_name":"Tech Posts French - Latest Trends in AI, Software, and Digital Innovation","provider_url":"https:\/\/www.tech-posts.com\/fr","author_name":"vpadmin","author_url":"https:\/\/www.tech-posts.com\/fr\/author\/vpadmin\/","title":"Cartographie du flux de s\u00e9curit\u00e9 et de conformit\u00e9 avec les diagrammes de flux de donn\u00e9es \ud83d\udee1\ufe0f","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"kvmj93iqRB\"><a href=\"https:\/\/www.tech-posts.com\/fr\/security-compliance-flow-mapping-data-flow-diagrams\/\">Guide DFD : Cartographie des flux de s\u00e9curit\u00e9 et de conformit\u00e9 \u00e0 l&#8217;aide des diagrammes de flux de donn\u00e9es<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tech-posts.com\/fr\/security-compliance-flow-mapping-data-flow-diagrams\/embed\/#?secret=kvmj93iqRB\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Guide DFD : Cartographie des flux de s\u00e9curit\u00e9 et de conformit\u00e9 \u00e0 l&#8217;aide des diagrammes de flux de donn\u00e9es\u00a0\u00bb &#8212; Tech Posts French - Latest Trends in AI, Software, and Digital Innovation\" data-secret=\"kvmj93iqRB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tech-posts.com\/fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.tech-posts.com\/fr\/wp-content\/uploads\/sites\/6\/2026\/03\/security-compliance-dfd-infographic-line-art.jpg","thumbnail_width":1664,"thumbnail_height":928,"description":"Apprenez \u00e0 utiliser les diagrammes de flux de donn\u00e9es pour les audits de s\u00e9curit\u00e9 et la cartographie de la conformit\u00e9. Guide pour la documentation du RGPD, de la HIPAA et du SOC 2. \ud83d\udcca"}