{"id":636,"date":"2026-03-16T06:27:14","date_gmt":"2026-03-16T05:27:14","guid":{"rendered":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/"},"modified":"2026-03-16T06:27:14","modified_gmt":"2026-03-16T05:27:14","slug":"comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie","status":"publish","type":"post","link":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/","title":{"rendered":"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie"},"content":{"rendered":"<p><br \/>\n<\/p>\n<hr \/>\n<p><\/p>\n<h2>Introduction<\/h2>\n<p><\/p>\n<p>Les images conteneurs l\u00e9g\u00e8res \u2014 <code>alpine<\/code>, <code>distroless<\/code>, <code>scratch<\/code>, <code>slim<\/code> \u2014 sont devenues le standard de facto pour le d\u00e9ploiement moderne. Elles d\u00e9marrer plus vite, consomment moins de m\u00e9moire, r\u00e9duisent la surface d&rsquo;attaque. Pourtant, paradoxalement, adopter une image <em>slim<\/em> peut introduire des risques invisibles si l&rsquo;on ne suit pas quelques principes fondamentaux.<\/p>\n<p><\/p>\n<p>Cet article propose une approche pragmatique : s\u00e9curiser ses images l\u00e9g\u00e8res sans transformer chaque build en un exercice de compliance kafka\u00efen.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h2>1. Comprendre pourquoi les images l\u00e9g\u00e8res changent la donne s\u00e9curitaire<\/h2>\n<p><\/p>\n<h3>Une surface d&rsquo;attaque r\u00e9duite n&rsquo;est pas une surface d&rsquo;attaque nulle<\/h3>\n<p><\/p>\n<p>Une image bas\u00e9e sur <code>node:20-alpine<\/code> contient typiquement <strong>40 \u00e0 60 paquets<\/strong>. La m\u00eame image bas\u00e9e sur <code>node:20<\/code> (Debian full) en contient <strong>500 \u00e0 800<\/strong>. Chaque paquet absent est un CVE potentiel en moins.<\/p>\n<p><\/p>\n<p>Mais attention : une image <code>distroless<\/code> qui n&rsquo;a ni shell ni gestionnaire de paquets <strong>ne peut pas \u00eatre inspect\u00e9e facilement<\/strong> en production. Cela cr\u00e9e un faux sentiment de s\u00e9curit\u00e9 si le code qu&rsquo;elle contient n&rsquo;a jamais \u00e9t\u00e9 analys\u00e9.<\/p>\n<p><\/p>\n<p><strong>La r\u00e8gle : une image l\u00e9g\u00e8re est un avantage s\u00e9curitaire seulement si elle embarque un code sain.<\/strong><\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h2>2. Les cinq principes fondamentaux<\/h2>\n<p><\/p>\n<h3>Principe 1 : Scanner t\u00f4t, scanner souvent<\/h3>\n<p><\/p>\n<p>Le scan de vuln\u00e9rabilit\u00e9s doit intervenir <strong>pendant le CI, pas apr\u00e8s le d\u00e9ploiement<\/strong>.<\/p>\n<p><\/p>\n<pre><code class=\"language-yaml\"># Exemple \u2014 GitHub Actions avec Trivy<br \/>\n- name: Scan de vuln\u00e9rabilit\u00e9s<br \/>\n  uses: aquasecurity\/trivy-action@master<br \/>\n  with:<br \/>\n    image: mon-app:latest<br \/>\n    severity: 'CRITICAL,HIGH'<br \/>\n    exit-code: '1'   # Fait \u00e9chouer le build si vuln\u00e9rabilit\u00e9 critique<\/code><\/pre>\n<p><\/p>\n<p>Pourquoi Trivy et pas un autre ? Gratuit, open-source, rapide, couvre les CVE OS et les d\u00e9pendances applicatives (npm, pip, Go modules). Il n&rsquo;y a pas d&rsquo;excuse pour ne pas l&rsquo;int\u00e9grer.<\/p>\n<p><\/p>\n<p><strong>Astuce temps r\u00e9el :<\/strong> Activez le flag <code>--ignore-unfixed<\/code> pour ne bloquer le build que sur les vuln\u00e9rabilit\u00e9s <em>r\u00e9ellement corrig\u00e9es en amont<\/em>. Sinon, vous serez noy\u00e9 dans des faux positifs que personne ne peut traiter.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h3>Principe 2 : Le multi-stage build n&rsquo;est pas optionnel<\/h3>\n<p><\/p>\n<p>C&rsquo;est le levier le plus puissant, et le plus sous-utilis\u00e9. Le principe est simple : <strong>s\u00e9parer le monde de build du monde de runtime<\/strong>.<\/p>\n<p><\/p>\n<pre><code class=\"language-dockerfile\"># \u00c9tape 1 \u2014 Build : tout est install\u00e9 ici<br \/>\nFROM golang:1.22-alpine AS builder<br \/>\nWORKDIR \/app<br \/>\nCOPY go.mod go.sum .\/<br \/>\nRUN go mod download<br \/>\nCOPY . .<br \/>\nRUN CGO_ENABLED=0 go build -ldflags=\"-s -w\" -o \/app\/server .<br># \u00c9tape 2 \u2014 Runtime : image minimale, aucune toolchain<br \/>\nFROM gcr.io\/distroless\/static-debian12:nonroot<br \/>\nCOPY --from=builder \/app\/server \/server<br \/>\nUSER nonroot:nonroot<br \/>\nENTRYPOINT [\"\/server\"]<\/code><\/pre>\n<p><\/p>\n<p>Ce pattern \u00e9limine <strong>automatiquement<\/strong> le compilateur, le gestionnaire de paquets, les headers de d\u00e9veloppement, et tous les outils qui n&rsquo;ont rien \u00e0 faire en production. R\u00e9sultat : image de ~15 Mo au lieu de ~800 Mo, et <strong>z\u00e9ro CVE de toolchain<\/strong>.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h3>Principe 3 : Ne jamais ex\u00e9cuter en root<\/h3>\n<p><\/p>\n<p>C&rsquo;est la r\u00e8gle la plus simple et la plus viol\u00e9e. Une image qui tourne en root, m\u00eame l\u00e9g\u00e8re, peut compromettre l&rsquo;h\u00f4te entier si une faille d&rsquo;\u00e9chappement existe.<\/p>\n<p><\/p>\n<pre><code class=\"language-dockerfile\"># Option A \u2014 Utilisateur d\u00e9di\u00e9 (Alpine)<br \/>\nRUN addgroup -S appgroup &amp;&amp; adduser -S appuser -G appgroup<br \/>\nUSER appuser<br># Option B \u2014 Utilisateur int\u00e9gr\u00e9 (Distroless)<br \/>\nUSER nonroot:nonroot<\/code><\/pre>\n<p><\/p>\n<p><strong>V\u00e9rification rapide :<\/strong><\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">docker run --rm mon-app:latest id<br \/>\n# Doit afficher uid=65534(nonroot) \u2014 pas uid=0(root)<\/code><\/pre>\n<p><\/p>\n<p>Si vous utilisez Kubernetes, ajoutez une <code>securityContext<\/code> pour rendre cela explicite et emp\u00eacher toute r\u00e9gression :<\/p>\n<p><\/p>\n<pre><code class=\"language-yaml\">securityContext:<br \/>\n  runAsNonRoot: true<br \/>\n  runAsUser: 65534<br \/>\n  readOnlyRootFilesystem: true<br \/>\n  allowPrivilegeEscalation: false<\/code><\/pre>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h3>Principe 4 : Signer ses images (sans douleur)<\/h3>\n<p><\/p>\n<p>La signature d&rsquo;images garantit l&rsquo;<strong>int\u00e9grit\u00e9<\/strong> et la <strong>provenance<\/strong>. Avec <code>cosign<\/code> de Sigstore, c&rsquo;est devenu triviale :<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\"># G\u00e9n\u00e9rer une paire de cl\u00e9s (une seule fois)<br \/>\ncosign generate-key-pair<br># Signer l'image au moment du push<br \/>\ncosign sign --key cosign.key mon-registry.com\/mon-app:v1.2.3<br># V\u00e9rifier avant le d\u00e9ploiement<br \/>\ncosign verify --key cosign.pub mon-registry.com\/mon-app:v1.2.3<\/code><\/pre>\n<p><\/p>\n<p>Pour aller plus loin : int\u00e9grez <code>cosign verify<\/code> dans votre admission controller Kubernetes (Kyverno ou Gatekeeper). R\u00e9sultat : <strong>aucune image non sign\u00e9e ne peut \u00eatre d\u00e9ploy\u00e9e<\/strong>, point final.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h3>Principe 5 : R\u00e9duire les secrets \u00e0 z\u00e9ro dans l&rsquo;image<\/h3>\n<p><\/p>\n<p>Les secrets dans les images Docker sont le p\u00e9ch\u00e9 originel du container security. Un <code>docker history mon-app<\/code> r\u00e9v\u00e8le chaque couche, y compris les secrets qui y ont \u00e9t\u00e9 copi\u00e9s \u2014 m\u00eame s&rsquo;ils ont \u00e9t\u00e9 supprim\u00e9s ensuite.<\/p>\n<p><\/p>\n<p><strong>Ce qu&rsquo;il ne faut JAMAIS faire :<\/strong><\/p>\n<p><\/p>\n<pre><code class=\"language-dockerfile\"># \u274c Catastrophe<br \/>\nCOPY .env \/app\/.env<br \/>\nENV DATABASE_URL=postgres:\/\/user:p4ss@host\/db<\/code><\/pre>\n<p><\/p>\n<p><strong>Ce qu&rsquo;il faut faire :<\/strong><\/p>\n<p><\/p>\n<ul><\/p>\n<li>Injecter les secrets au runtime via des variables d&rsquo;environnement (orchestrateur)<\/li>\n<p><\/p>\n<li>Utiliser un gestionnaire de secrets (Vault, AWS Secrets Manager, SOPS)<\/li>\n<p><\/p>\n<li>Scanner les images avec <code>gitleaks<\/code> ou <code>trufflehog<\/code> dans le CI pour d\u00e9tecter les fuites accidentelles<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<pre><code class=\"language-yaml\"># Kubernetes \u2014 Injection propre<br \/>\ncontainers:<br \/>\n  - name: app<br \/>\n    env:<br \/>\n      - name: DATABASE_URL<br \/>\n        valueFrom:<br \/>\n          secretKeyRef:<br \/>\n            name: db-credentials<br \/>\n            key: url<\/code><\/pre>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h2>3. Le workflow en pratique : le pipeline s\u00e9curis\u00e9 en 6 \u00e9tapes<\/h2>\n<p><\/p>\n<table><\/p>\n<thead><\/p>\n<tr><\/p>\n<th>\u00c9tape<\/th>\n<p><\/p>\n<th>Action<\/th>\n<p><\/p>\n<th>Outil sugg\u00e9r\u00e9<\/th>\n<p>\n<\/tr>\n<p>\n<\/thead>\n<p><\/p>\n<tbody><\/p>\n<tr><\/p>\n<td>1<\/td>\n<p><\/p>\n<td>\u00c9crire un Dockerfile multi-stage<\/td>\n<p><\/p>\n<td>Docker<\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>2<\/td>\n<p><\/p>\n<td>Scanner l&rsquo;image localement<\/td>\n<p><\/p>\n<td><code>trivy image mon-app:dev<\/code><\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>3<\/td>\n<p><\/p>\n<td>Scanner dans le CI<\/td>\n<p><\/p>\n<td>Trivy \/ Grype (GitHub Actions)<\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>4<\/td>\n<p><\/p>\n<td>Signer l&rsquo;image<\/td>\n<p><\/p>\n<td>Cosign + Sigstore<\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>5<\/td>\n<p><\/p>\n<td>V\u00e9rifier la signature au d\u00e9ploiement<\/td>\n<p><\/p>\n<td>Kyverno \/ Gatekeeper<\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>6<\/td>\n<p><\/p>\n<td>Surveiller en production<\/td>\n<p><\/p>\n<td>Falco \/ runtime scanning<\/td>\n<p>\n<\/tr>\n<p>\n<\/tbody>\n<p>\n<\/table>\n<p><\/p>\n<p>Le tout, int\u00e9gr\u00e9 sur 30 minutes un vendredi apr\u00e8s-midi.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h2>4. Ce qu&rsquo;il faut \u00e9viter \u2014 Les fausses bonnes id\u00e9es<\/h2>\n<p><\/p>\n<table><\/p>\n<thead><\/p>\n<tr><\/p>\n<th>Id\u00e9e re\u00e7ue<\/th>\n<p><\/p>\n<th>R\u00e9alit\u00e9<\/th>\n<p>\n<\/tr>\n<p>\n<\/thead>\n<p><\/p>\n<tbody><\/p>\n<tr><\/p>\n<td>\u00ab Alpine est toujours plus s\u00fbr que Debian \u00bb<\/td>\n<p><\/p>\n<td>Alpine utilise <code>musl<\/code> et <code>busybox<\/code> \u2014 certains outils de s\u00e9curit\u00e9 ou biblioth\u00e8ques peuvent mal se comporter. Testez toujours.<\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>\u00ab Distroless = invuln\u00e9rable \u00bb<\/td>\n<p><\/p>\n<td>Non. Cela supprime le bruit, pas les vuln\u00e9rabilit\u00e9s du code applicatif ou des d\u00e9pendances.<\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>\u00ab Scanner une fois suffit \u00bb<\/td>\n<p><\/p>\n<td>Les CVE sont publi\u00e9es quotidiennement. Un scan il y a trois mois est un scan p\u00e9rim\u00e9.<\/td>\n<p>\n<\/tr>\n<p><\/p>\n<tr><\/p>\n<td>\u00ab Les images officielles sont s\u00fbres \u00bb<\/td>\n<p><\/p>\n<td><code>node:20<\/code> officiel contient r\u00e9guli\u00e8rement des CVE critiques. <em>Officiel<\/em> ne signifie pas <em>s\u00e9curis\u00e9<\/em>.<\/td>\n<p>\n<\/tr>\n<p>\n<\/tbody>\n<p>\n<\/table>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>S\u00e9curiser ses images l\u00e9g\u00e8res n&rsquo;est pas un projet \u2014 c&rsquo;est une discipline. Les cinq principes ci-dessus (scanner, multi-stage, non-root, signer, pas de secrets) forment un socle suffisant pour 95% des cas d&rsquo;usage.<\/p>\n<p><\/p>\n<p>Le pi\u00e8ge est de chercher la perfection absolue : un pipeline de 15 \u00e9tapes, un mesh de politiques impossible \u00e0 maintenir, des outils que personne ne comprend. La s\u00e9curit\u00e9 durable est celle que les d\u00e9veloppeurs <strong>acceptent<\/strong> parce qu&rsquo;elle ne les ralentit pas.<\/p>\n<p><\/p>\n<p>Commencez simple. Automatisez. It\u00e9rez.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<p><em>Note : Les outils et versions mentionn\u00e9s refl\u00e8tent les pratiques courantes \u00e0 ma date de connaissance (mai 2025). Les versions exactes et vuln\u00e9rabilit\u00e9s peuvent avoir \u00e9volu\u00e9 \u2014 v\u00e9rifiez toujours aupr\u00e8s des sources officielles.<\/em><\/p>\n<a href=\"https:\/\/lockpassgen.com\">G\u00e9n\u00e9rateur de mots de passe gratuit<\/a><br\/>\r\n<a href=\"https:\/\/fourcalculator.com\">Calculatrice multifonction<\/a><br\/>\r\n<a href=\"https:\/\/qrcodeready.com\">G\u00e9n\u00e9rez un code QR gratuitement<\/a><br\/>\r\n<a href=\"https:\/\/appointworks.com\">Cr\u00e9ez votre lien de r\u00e9servation public, g\u00e9rez les disponibilit\u00e9s, le personnel et les rendez-vous.<\/a><br\/>\r\n<a href=\"https:\/\/cheapesimcard.com\/\">Reste connect\u00e9 partout avec la bonne eSIM, au bon prix.<\/a>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Les images conteneurs l\u00e9g\u00e8res \u2014 alpine, distroless, scratch, slim \u2014 sont devenues le standard de facto pour le d\u00e9ploiement moderne. Elles d\u00e9marrer plus vite, consomment moins de m\u00e9moire, r\u00e9duisent la surface d&rsquo;attaque. Pourtant, paradoxalement,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[1],"tags":[594],"class_list":["post-636","post","type-post","status-publish","format-standard","hentry","category-articles","tag-comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie - Compresser image<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie - Compresser image\" \/>\n<meta property=\"og:description\" content=\"Introduction Les images conteneurs l\u00e9g\u00e8res \u2014 alpine, distroless, scratch, slim \u2014 sont devenues le standard de facto pour le d\u00e9ploiement moderne. Elles d\u00e9marrer plus vite, consomment moins de m\u00e9moire, r\u00e9duisent la surface d&rsquo;attaque. Pourtant, paradoxalement,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/\" \/>\n<meta property=\"og:site_name\" content=\"Compresser image\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-16T05:27:14+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#\\\/schema\\\/person\\\/1b7c152d430d086e6534426bac5bca56\"},\"headline\":\"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie\",\"datePublished\":\"2026-03-16T05:27:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/\"},\"wordCount\":878,\"publisher\":{\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#organization\"},\"keywords\":[\"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/\",\"url\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/\",\"name\":\"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie - Compresser image\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#website\"},\"datePublished\":\"2026-03-16T05:27:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/\",\"name\":\"QR Code Generator\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#organization\",\"name\":\"QR Code Ready\",\"url\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shorturl.ma\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo-qrcode.png\",\"contentUrl\":\"https:\\\/\\\/shorturl.ma\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo-qrcode.png\",\"width\":622,\"height\":173,\"caption\":\"QR Code Ready\"},\"image\":{\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/#\\\/schema\\\/person\\\/1b7c152d430d086e6534426bac5bca56\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/shorturl.ma\\\/blog\"],\"url\":\"https:\\\/\\\/compresserimage.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie - Compresser image","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie - Compresser image","og_description":"Introduction Les images conteneurs l\u00e9g\u00e8res \u2014 alpine, distroless, scratch, slim \u2014 sont devenues le standard de facto pour le d\u00e9ploiement moderne. Elles d\u00e9marrer plus vite, consomment moins de m\u00e9moire, r\u00e9duisent la surface d&rsquo;attaque. Pourtant, paradoxalement,...","og_url":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/","og_site_name":"Compresser image","article_published_time":"2026-03-16T05:27:14+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/#article","isPartOf":{"@id":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/"},"author":{"name":"admin","@id":"https:\/\/compresserimage.com\/blog\/#\/schema\/person\/1b7c152d430d086e6534426bac5bca56"},"headline":"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie","datePublished":"2026-03-16T05:27:14+00:00","mainEntityOfPage":{"@id":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/"},"wordCount":878,"publisher":{"@id":"https:\/\/compresserimage.com\/blog\/#organization"},"keywords":["Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie"],"articleSection":["Articles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/","url":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/","name":"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie - Compresser image","isPartOf":{"@id":"https:\/\/compresserimage.com\/blog\/#website"},"datePublished":"2026-03-16T05:27:14+00:00","breadcrumb":{"@id":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/compresserimage.com\/blog\/comment-securiser-sa-images-legeres-sans-se-compliquer-la-vie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/compresserimage.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Comment s\u00e9curiser sa images l\u00e9g\u00e8res sans se compliquer la vie"}]},{"@type":"WebSite","@id":"https:\/\/compresserimage.com\/blog\/#website","url":"https:\/\/compresserimage.com\/blog\/","name":"QR Code Generator","description":"","publisher":{"@id":"https:\/\/compresserimage.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compresserimage.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/compresserimage.com\/blog\/#organization","name":"QR Code Ready","url":"https:\/\/compresserimage.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/compresserimage.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shorturl.ma\/blog\/wp-content\/uploads\/2025\/05\/logo-qrcode.png","contentUrl":"https:\/\/shorturl.ma\/blog\/wp-content\/uploads\/2025\/05\/logo-qrcode.png","width":622,"height":173,"caption":"QR Code Ready"},"image":{"@id":"https:\/\/compresserimage.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/compresserimage.com\/blog\/#\/schema\/person\/1b7c152d430d086e6534426bac5bca56","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/shorturl.ma\/blog"],"url":"https:\/\/compresserimage.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/posts\/636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/comments?post=636"}],"version-history":[{"count":0,"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/posts\/636\/revisions"}],"wp:attachment":[{"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/media?parent=636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/categories?post=636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compresserimage.com\/blog\/wp-json\/wp\/v2\/tags?post=636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}