{"id":35503,"date":"2025-10-27T03:00:07","date_gmt":"2025-10-27T07:00:07","guid":{"rendered":"https:\/\/www.rsa.com\/?p=35503"},"modified":"2026-03-24T17:05:48","modified_gmt":"2026-03-24T21:05:48","slug":"compliance-isnt-security-why-identity-governance-needs-a-risk-lens","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/","title":{"rendered":"La conformit\u00e9 n'est pas la s\u00e9curit\u00e9 : Pourquoi la gouvernance des identit\u00e9s doit-elle prendre en compte les risques ?"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":35504,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[166],"tags":[],"class_list":["post-35503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-governance-and-administration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens - RSA<\/title>\n<meta name=\"description\" content=\"Read the RSA blog to learn why viewing identity governance as a compliance function exposes organizations to identity security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens\" \/>\n<meta property=\"og:description\" content=\"Read the RSA blog to learn why viewing governance as a compliance function exposes organizations to identity security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-27T07:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T21:05:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens\" \/>\n<meta name=\"twitter:description\" content=\"Read the RSA blog to learn why viewing governance as a compliance function exposes organizations to identity security risks.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-social.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens\",\"datePublished\":\"2025-10-27T07:00:07+00:00\",\"dateModified\":\"2026-03-24T21:05:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/\"},\"wordCount\":11,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp\",\"articleSection\":[\"Identity Governance &amp; Administration\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/\",\"name\":\"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp\",\"datePublished\":\"2025-10-27T07:00:07+00:00\",\"dateModified\":\"2026-03-24T21:05:48+00:00\",\"description\":\"Read the RSA blog to learn why viewing identity governance as a compliance function exposes organizations to identity security risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp\",\"width\":1200,\"height\":741,\"caption\":\"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La conformit\u00e9 n'est pas la s\u00e9curit\u00e9 : Pourquoi la gouvernance des identit\u00e9s a besoin d'une vision du risque - RSA","description":"Lisez le blog de RSA pour savoir pourquoi le fait de consid\u00e9rer la gouvernance des identit\u00e9s comme une fonction de conformit\u00e9 expose les organisations \u00e0 des risques en mati\u00e8re de s\u00e9curit\u00e9 des identit\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/","og_locale":"fr_FR","og_type":"article","og_title":"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens","og_description":"Read the RSA blog to learn why viewing governance as a compliance function exposes organizations to identity security risks.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/","og_site_name":"RSA","article_published_time":"2025-10-27T07:00:07+00:00","article_modified_time":"2026-03-24T21:05:48+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens","twitter_description":"Read the RSA blog to learn why viewing governance as a compliance function exposes organizations to identity security risks.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-social.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens","datePublished":"2025-10-27T07:00:07+00:00","dateModified":"2026-03-24T21:05:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/"},"wordCount":11,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp","articleSection":["Identity Governance &amp; Administration"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/","url":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/","name":"La conformit\u00e9 n'est pas la s\u00e9curit\u00e9 : Pourquoi la gouvernance des identit\u00e9s a besoin d'une vision du risque - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp","datePublished":"2025-10-27T07:00:07+00:00","dateModified":"2026-03-24T21:05:48+00:00","description":"Lisez le blog de RSA pour savoir pourquoi le fait de consid\u00e9rer la gouvernance des identit\u00e9s comme une fonction de conformit\u00e9 expose les organisations \u00e0 des risques en mati\u00e8re de s\u00e9curit\u00e9 des identit\u00e9s.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens-rsa-blog.webp","width":1200,"height":741,"caption":"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/compliance-isnt-security-why-identity-governance-needs-a-risk-lens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Compliance Isn\u2019t Security: Why Identity Governance Needs a Risk Lens"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"Ben Lebeaux","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/comments?post=35503"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35503\/revisions"}],"predecessor-version":[{"id":37431,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35503\/revisions\/37431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/35504"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=35503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/categories?post=35503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/tags?post=35503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}