{"id":824,"date":"2017-01-27T14:01:31","date_gmt":"2017-01-27T13:01:31","guid":{"rendered":"http:\/\/pcll.ac-dijon.fr\/pcll\/?p=824"},"modified":"2017-01-27T14:05:50","modified_gmt":"2017-01-27T13:05:50","slug":"renforcer-securite-de-systeme-dinformation-anssi","status":"publish","type":"post","link":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/","title":{"rendered":"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION"},"content":{"rendered":"<p><strong>GUIDE D\u2019HYGI\u00c8NE INFORMATIQUE : 42 Mesures preconis\u00e9es par L&rsquo;<a href=\"https:\/\/www.ssi.gouv.fr\/\" target=\"_blank\">ANSSI<\/a><br \/>\n<\/strong><\/p>\n<p>Extrait Avant-Propos :<\/p>\n<blockquote><p>Paru en janvier 2013 dans sa premi\u00e8re version, le Guide d\u2019hygi\u00e8ne informatique \u00e9dit\u00e9 par l\u2019ANSSI s\u2019adresse aux entit\u00e9s publiques ou priv\u00e9es dot\u00e9es d\u2019une direction des syst\u00e8mes d\u2019information (DSI) ou de professionnels dont la mission est de veiller \u00e0 leur s\u00e9curit\u00e9. Il est n\u00e9 du constat que si les mesures qu&rsquo;y sont \u00e9dict\u00e9es avaient \u00e9t\u00e9 appliqu\u00e9es par les entit\u00e9s concern\u00e9es, la majeure partie des attaques informatiques ayant requis une intervention de l\u2019agence aurait pu \u00eatre \u00e9vit\u00e9e.<\/p>\n<p>Cette nouvelle version a fait l\u2019objet d\u2019une mise \u00e0 jour portant \u00e0 la fois sur les technologies et pratiques \u2013 nouvelles ou croissantes \u2013 avec lesquelles il s\u2019agit de composer en mati\u00e8re de s\u00e9curit\u00e9 (nomadisme, s\u00e9paration des usages, etc.) mais aussi sur la mise \u00e0 disposition d\u2019outils (indicateurs de niveau standard ou renforc\u00e9) pour \u00e9clairer le lecteur dans l\u2019appr\u00e9ciation des mesures \u00e9nonc\u00e9es.<br \/>\nSi l\u2019objet de ce guide n\u2019est pas la s\u00e9curit\u00e9 de l\u2019information en tant que telle, appliquer les mesures propos\u00e9es maximise la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information, berceau des donn\u00e9es de votre entit\u00e9.<br \/>\nLa s\u00e9curit\u00e9 n\u2019est plus une option. \u00c0 ce titre, les enjeux de s\u00e9curit\u00e9 num\u00e9rique doivent se rapprocher des pr\u00e9occupations \u00e9conomiques, strat\u00e9giques ou encore d\u2019image qui sont celles des d\u00e9cideurs. En contextualisant le besoin, en rappelant l\u2019objectif poursuivi et en y r\u00e9pondant par la mesure concr\u00e8te correspondante, ce guide d\u2019hygi\u00e8ne informatique est une feuille de route qui \u00e9pouse les int\u00e9r\u00eats de toute entit\u00e9 consciente de la valeur de ses donn\u00e9es.<\/p><\/blockquote>\n<a href=\"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/guide_hygiene_informatique_anssi.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">guide_hygiene_informatique_anssi<\/a>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2017\/01\/guide_hygiene_informatique_anssi.pdf\" target=\"_blank\">Sur le site officiel ANSSI<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>nouvelle version du GUIDE D\u2019HYGI\u00c8NE INFORMATIQUE : 42 Mesures de s\u00e9curit\u00e9 propos\u00e9es par L&rsquo;ANSSI<\/p>\n","protected":false},"author":1,"featured_media":832,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,11],"tags":[],"class_list":["post-824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classe","category-publications"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION - P\u00f4le Logiciels Libres<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION - P\u00f4le Logiciels Libres\" \/>\n<meta property=\"og:description\" content=\"nouvelle version du GUIDE D\u2019HYGI\u00c8NE INFORMATIQUE : 42 Mesures de s\u00e9curit\u00e9 propos\u00e9es par L&#039;ANSSI\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/\" \/>\n<meta property=\"og:site_name\" content=\"P\u00f4le Logiciels Libres\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-27T13:01:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-27T13:05:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"452\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luc Bourdot\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luc Bourdot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/\"},\"author\":{\"name\":\"Luc Bourdot\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/44c4b111638ca2a22e7d76fd9a48f25e\"},\"headline\":\"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION\",\"datePublished\":\"2017-01-27T13:01:31+00:00\",\"dateModified\":\"2017-01-27T13:05:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/\"},\"wordCount\":325,\"image\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg\",\"articleSection\":{\"1\":\"Publications\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/\",\"url\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/\",\"name\":\"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION - P\u00f4le Logiciels Libres\",\"isPartOf\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg\",\"datePublished\":\"2017-01-27T13:01:31+00:00\",\"dateModified\":\"2017-01-27T13:05:50+00:00\",\"author\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/44c4b111638ca2a22e7d76fd9a48f25e\"},\"breadcrumb\":{\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage\",\"url\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg\",\"contentUrl\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg\",\"width\":640,\"height\":452},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/#website\",\"url\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/\",\"name\":\"P\u00f4le Logiciels Libres\",\"description\":\"Ensemble Ouvert Libre Evolutif\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/44c4b111638ca2a22e7d76fd9a48f25e\",\"name\":\"Luc Bourdot\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5d9e34243af9ae99addd072493e93573f7be7e07903fe5e1a0e4e2c688f0739?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5d9e34243af9ae99addd072493e93573f7be7e07903fe5e1a0e4e2c688f0739?s=96&d=mm&r=g\",\"caption\":\"Luc Bourdot\"},\"url\":\"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/author\/admin-eole\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION - P\u00f4le Logiciels Libres","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/","og_locale":"fr_FR","og_type":"article","og_title":"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION - P\u00f4le Logiciels Libres","og_description":"nouvelle version du GUIDE D\u2019HYGI\u00c8NE INFORMATIQUE : 42 Mesures de s\u00e9curit\u00e9 propos\u00e9es par L'ANSSI","og_url":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/","og_site_name":"P\u00f4le Logiciels Libres","article_published_time":"2017-01-27T13:01:31+00:00","article_modified_time":"2017-01-27T13:05:50+00:00","og_image":[{"width":640,"height":452,"url":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg","type":"image\/jpeg"}],"author":"Luc Bourdot","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Luc Bourdot","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#article","isPartOf":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/"},"author":{"name":"Luc Bourdot","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/44c4b111638ca2a22e7d76fd9a48f25e"},"headline":"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION","datePublished":"2017-01-27T13:01:31+00:00","dateModified":"2017-01-27T13:05:50+00:00","mainEntityOfPage":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/"},"wordCount":325,"image":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage"},"thumbnailUrl":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg","articleSection":{"1":"Publications"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/","url":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/","name":"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION - P\u00f4le Logiciels Libres","isPartOf":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage"},"image":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage"},"thumbnailUrl":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg","datePublished":"2017-01-27T13:01:31+00:00","dateModified":"2017-01-27T13:05:50+00:00","author":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/44c4b111638ca2a22e7d76fd9a48f25e"},"breadcrumb":{"@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#primaryimage","url":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg","contentUrl":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg","width":640,"height":452},{"@type":"BreadcrumbList","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/2017\/01\/renforcer-securite-de-systeme-dinformation-anssi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pcll.ac-dijon.fr\/pcll\/"},{"@type":"ListItem","position":2,"name":"RENFORCER LA S\u00c9CURIT\u00c9 DE SON SYST\u00c8ME D\u2019INFORMATION"}]},{"@type":"WebSite","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/#website","url":"https:\/\/pcll.ac-dijon.fr\/pcll\/","name":"P\u00f4le Logiciels Libres","description":"Ensemble Ouvert Libre Evolutif","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pcll.ac-dijon.fr\/pcll\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/44c4b111638ca2a22e7d76fd9a48f25e","name":"Luc Bourdot","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pcll.ac-dijon.fr\/pcll\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5d9e34243af9ae99addd072493e93573f7be7e07903fe5e1a0e4e2c688f0739?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5d9e34243af9ae99addd072493e93573f7be7e07903fe5e1a0e4e2c688f0739?s=96&d=mm&r=g","caption":"Luc Bourdot"},"url":"https:\/\/pcll.ac-dijon.fr\/pcll\/blog\/author\/admin-eole\/"}]}},"jetpack_featured_media_url":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-content\/uploads\/sites\/3\/2017\/01\/castle-538722_640.jpg","_links":{"self":[{"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/posts\/824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/comments?post=824"}],"version-history":[{"count":7,"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/posts\/824\/revisions"}],"predecessor-version":[{"id":831,"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/posts\/824\/revisions\/831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/media\/832"}],"wp:attachment":[{"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/media?parent=824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/categories?post=824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pcll.ac-dijon.fr\/pcll\/wp-json\/wp\/v2\/tags?post=824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}