{"id":35831,"date":"2025-12-05T12:00:25","date_gmt":"2025-12-05T17:00:25","guid":{"rendered":"https:\/\/www.rsa.com\/?page_id=35831"},"modified":"2025-12-05T12:00:25","modified_gmt":"2025-12-05T17:00:25","slug":"defining-identity-security-posture-management-ispm","status":"publish","type":"page","link":"https:\/\/www.rsa.com\/fr_ca\/defining-identity-security-posture-management-ispm\/","title":{"rendered":"D\u00e9finir la gestion de la s\u00e9curit\u00e9 des identit\u00e9s (ISPM)"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":34089,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-ungated-page.blade.php","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"class_list":["post-35831","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defining Identity Security Posture Management (ISPM) - RSA<\/title>\n<meta name=\"description\" content=\"This in-depth report defines ISPM, outlines the risks that it accounts for, and offers a framework for security leaders to benchmark their readiness to adopt and implement ISPM.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defining Identity Security Posture Management (ISPM) - RSA\" \/>\n<meta property=\"og:description\" content=\"This in-depth report defines ISPM, outlines the risks that it accounts for, and offers a framework for security leaders to benchmark their readiness to adopt and implement ISPM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/defining-identity-security-posture-management-ispm\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/identity-security-postur-management-card-featured-image.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"741\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/\",\"name\":\"Defining Identity Security Posture Management (ISPM) - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/identity-security-postur-management-card-featured-image.webp\",\"datePublished\":\"2025-12-05T17:00:25+00:00\",\"description\":\"This in-depth report defines ISPM, outlines the risks that it accounts for, and offers a framework for security leaders to benchmark their readiness to adopt and implement ISPM.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/identity-security-postur-management-card-featured-image.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/identity-security-postur-management-card-featured-image.webp\",\"width\":1200,\"height\":741,\"caption\":\"Defining Identity Security Posture Management (ISPM): A Framework for Securing the Modern Identity Landscape - RSA Report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/defining-identity-security-posture-management-ispm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defining Identity Security Posture Management (ISPM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9finition de la gestion de la s\u00e9curit\u00e9 de l'identit\u00e9 (ISPM) - RSA","description":"Ce rapport approfondi d\u00e9finit la NIMP, d\u00e9crit les risques qu'elle prend en compte et propose un cadre permettant aux responsables de la s\u00e9curit\u00e9 d'\u00e9valuer leur \u00e9tat de pr\u00e9paration \u00e0 l'adoption et \u00e0 la mise en \u0153uvre de la NIMP.","robots":{"index":"noindex","follow":"follow"},"og_locale":"fr_CA","og_type":"article","og_title":"Defining Identity Security Posture Management (ISPM) - RSA","og_description":"This in-depth report defines ISPM, outlines the risks that it accounts for, and offers a framework for security leaders to benchmark their readiness to adopt and implement ISPM.","og_url":"https:\/\/www.rsa.com\/fr_ca\/defining-identity-security-posture-management-ispm\/","og_site_name":"RSA","og_image":[{"width":1200,"height":741,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/identity-security-postur-management-card-featured-image.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/","url":"https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/","name":"D\u00e9finition de la gestion de la s\u00e9curit\u00e9 de l'identit\u00e9 (ISPM) - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/identity-security-postur-management-card-featured-image.webp","datePublished":"2025-12-05T17:00:25+00:00","description":"Ce rapport approfondi d\u00e9finit la NIMP, d\u00e9crit les risques qu'elle prend en compte et propose un cadre permettant aux responsables de la s\u00e9curit\u00e9 d'\u00e9valuer leur \u00e9tat de pr\u00e9paration \u00e0 l'adoption et \u00e0 la mise en \u0153uvre de la NIMP.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/identity-security-postur-management-card-featured-image.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/identity-security-postur-management-card-featured-image.webp","width":1200,"height":741,"caption":"Defining Identity Security Posture Management (ISPM): A Framework for Securing the Modern Identity Landscape - RSA Report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/defining-identity-security-posture-management-ispm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Defining Identity Security Posture Management (ISPM)"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages\/35831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=35831"}],"version-history":[{"count":2,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages\/35831\/revisions"}],"predecessor-version":[{"id":35833,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages\/35831\/revisions\/35833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/34089"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=35831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}