{"id":9789,"date":"2020-11-26T13:56:40","date_gmt":"2020-11-26T12:56:40","guid":{"rendered":"https:\/\/dpoassociates.eu\/comment-elaborer-un-plan-de-securite-de-linformation\/"},"modified":"2025-03-04T16:48:31","modified_gmt":"2025-03-04T15:48:31","slug":"comment-elaborer-un-plan-de-securite-de-linformation","status":"publish","type":"post","link":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/","title":{"rendered":"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l&rsquo;information ?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9789\" class=\"elementor elementor-9789 elementor-5722\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a367975 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a367975\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10366bc\" data-id=\"10366bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-112da14 elementor-widget elementor-widget-text-editor\" data-id=\"112da14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La cr\u00e9ation d&rsquo;un plan de s\u00e9curit\u00e9 de l&rsquo;information passe par l&rsquo;\u00e9laboration d&rsquo;un document qui clarifie les mesures de protection \u00e0 prendre en ce qui concerne les technologies de l&rsquo;information utilis\u00e9es au sein d&rsquo;une organisation.<\/p>\n<p>Une fois que l&rsquo;on a une vue d&rsquo;ensemble de ces mesures de protection de l&rsquo;infrastructure informatique, on passe aux points suivants, \u00e9tape par \u00e9tape ;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-5725\" src=\"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/\" alt=\"\" width=\"2240\" height=\"1260\"><\/p>\n<ul>\n<li>\n<h3><strong>Identifiez les personnes qui ont des int\u00e9r\u00eats dans votre organisation.<br \/><\/strong><\/h3>\n<p>Quelles sont les personnes impliqu\u00e9es dans le projet de plan de s\u00e9curit\u00e9, par exemple la personne charg\u00e9e des technologies de l&rsquo;information, qu&rsquo;elle travaille en interne ou en externe, ou le responsable des technologies de l&rsquo;information. D\u00e9finissez \u00e9galement leur r\u00f4le dans le plan de s\u00e9curit\u00e9 afin que les gens sachent qui a quelle autorit\u00e9.<strong> <\/strong>Identifiez les personnes impliqu\u00e9es dans votre plan de s\u00e9curit\u00e9. Veillez \u00e9galement \u00e0 d\u00e9terminer qui est responsable en cas d&rsquo;incident.<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<h3><strong>D\u00e9terminer ce qui doit \u00eatre s\u00e9curis\u00e9.  <br \/><\/strong><\/h3>\n<p>Pour d\u00e9terminer ce qui doit \u00eatre correctement s\u00e9curis\u00e9, il convient de dresser une liste des lieux o\u00f9 les donn\u00e9es sont conserv\u00e9es, des r\u00e9seaux utilis\u00e9s et des serveurs actifs. Une fois cette liste compl\u00e9t\u00e9e, nous pouvons d\u00e9terminer quelles sont les donn\u00e9es les plus importantes. Ces donn\u00e9es peuvent r\u00e9sider sur un serveur, dans le nuage et aussi, par exemple, sur un syst\u00e8me ERP ou CRM, ou encore sur un serveur de courrier \u00e9lectronique.<\/p>\n<p>Il convient d&rsquo;accorder une attention particuli\u00e8re aux \u00ab\u00a0donn\u00e9es personnelles particuli\u00e8res\u00a0\u00bb, telles que les donn\u00e9es relatives aux patients ou les donn\u00e9es financi\u00e8res.<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<h3><strong>Quels syst\u00e8mes de s\u00e9curit\u00e9 appliquer ?<br \/><\/strong><\/h3>\n<p>Il s&rsquo;agit ici de v\u00e9rifier si l&rsquo;\u00e9quipement de s\u00e9curit\u00e9 utilis\u00e9 par l&rsquo;organisation est suffisant pour assurer une s\u00e9curit\u00e9 optimale. C&rsquo;est l\u00e0 qu&rsquo;intervient le plan de s\u00e9curit\u00e9 de l&rsquo;information. Par s\u00e9curit\u00e9 de l&rsquo;information ou cybers\u00e9curit\u00e9, nous entendons les \u00e9quipements tels que les applications anti-malware, la mani\u00e8re dont les sauvegardes sont effectu\u00e9es, le type de pare-feu utilis\u00e9 et l&rsquo;utilisation ou non de connexions VPN.<strong> <\/strong><\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<h3><strong>Prendre des mesures pour reconna\u00eetre les failles de s\u00e9curit\u00e9.<br \/><\/strong><\/h3>\n<p>L&rsquo;identification des failles n\u00e9cessite \u00e9galement des mesures pour reconna\u00eetre une menace ou une tentative de piratage. Vous pouvez surveiller votre r\u00e9seau de diff\u00e9rentes mani\u00e8res ou installer un logiciel qui envoie automatiquement des alertes en cas d&rsquo;irr\u00e9gularit\u00e9s, comme la d\u00e9tection d&rsquo;attaques DOS, de tentatives d&rsquo;hame\u00e7onnage, la reconnaissance d&rsquo;identifiants de connexion compromis ou d&rsquo;attaques par force brute&#8230;<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<h3><strong>D\u00e9terminer les m\u00e9thodes de travail optimales.<br \/><\/strong><\/h3>\n<p>La plupart des erreurs peuvent \u00eatre \u00e9vit\u00e9es en sensibilisant le personnel interne, car une violation de donn\u00e9es ne passe pas forc\u00e9ment par l&rsquo;infrastructure informatique, l&rsquo;erreur humaine pouvant survenir. L&rsquo;\u00e9tablissement de directives d&rsquo;utilisation internes afin que le personnel soit bien inform\u00e9 peut d\u00e9j\u00e0 pr\u00e9venir de nombreuses violations. Pour ce faire, des lignes directrices doivent \u00eatre suivies et contr\u00f4l\u00e9es. L&rsquo;utilisation de l&rsquo;AMF (autorisation multifactorielle) et de codes uniques par contr\u00f4leur, d\u00e9finis par le responsable de la protection de la vie priv\u00e9e, est d\u00e9j\u00e0 un bon d\u00e9but. Notez \u00e9galement dans le plan de s\u00e9curit\u00e9 de l&rsquo;information que les employ\u00e9s ne doivent pas acc\u00e9der au r\u00e9seau WIFI de l&rsquo;entreprise avec leurs propres appareils, mais qu&rsquo;ils doivent cr\u00e9er un r\u00e9seau WIFI invit\u00e9 \u00e0 cette fin.<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<h3><strong>\u00c9tablir des proc\u00e9dures de s\u00e9curit\u00e9.  <br \/><\/strong><\/h3>\n<p>Il convient d&rsquo;\u00e9tablir des proc\u00e9dures telles que savoir ce qu&rsquo;il faut faire en cas de violation de donn\u00e9es ou de tentative d&rsquo;intrusion pour voler des donn\u00e9es \u00e0 caract\u00e8re personnel. Ainsi, la personne qui d\u00e9tecte une violation sait imm\u00e9diatement quelle mesure prendre, par exemple alerter le consultant en s\u00e9curit\u00e9 ou un num\u00e9ro de contact interne. Pr\u00e9parez \u00e9galement des instructions pour les employ\u00e9s lorsqu&rsquo;une violation de donn\u00e9es est identifi\u00e9e, afin que le probl\u00e8me ou la tentative de probl\u00e8me puisse \u00eatre trait\u00e9 de mani\u00e8re ad\u00e9quate.<\/p>\n<\/li>\n<li>\n<h3><strong>Effectuer r\u00e9guli\u00e8rement un audit.  <br \/><\/strong><\/h3>\n<p>Tout syst\u00e8me peut \u00eatre pirat\u00e9, ne serait-ce que par un ancien employ\u00e9 m\u00e9content qui peut encore se connecter. Il convient donc de proc\u00e9der \u00e0 des audits r\u00e9guliers, tant sur les op\u00e9rations commerciales que sur l&rsquo;infrastructure informatique et l&rsquo;utilisation des communications. Les vuln\u00e9rabilit\u00e9s peuvent \u00e9galement \u00eatre identifi\u00e9es au cours de ces audits, ce qui cr\u00e9e un nouveau <span style=\"text-decoration: underline;\"><br \/>\n  <a href=\"\/informatiebeveiliging-door-de-pdca-cyclus-wat-is-de-pdca\/\">cycle PDCA<\/a><br \/>\n<\/span> peut \u00eatre \u00e9labor\u00e9.<\/p>\n<\/li>\n<li>\n<h3><strong>Former votre personnel \u00e0 la s\u00e9curit\u00e9 de l&rsquo;information.<br \/><\/strong><\/h3>\n<p>Mieux vaut pr\u00e9venir que gu\u00e9rir, c&rsquo;est un fait connu, et pas seulement dans le domaine de la s\u00e9curit\u00e9 informatique. Organisez r\u00e9guli\u00e8rement des journ\u00e9es d&rsquo;information pour les membres du personnel et sensibilisez-les aux dangers et aux pratiques en mati\u00e8re de s\u00e9curit\u00e9, que ce soit en ligne ou hors ligne. Un homme averti en vaut deux ! Le fait de cliquer sur des courriels suspects peut d\u00e9j\u00e0 repr\u00e9senter un grand danger pour votre organisation.<\/p>\n<\/li>\n<li>\n<h3><strong>Poursuivre le suivi du plan de s\u00e9curit\u00e9 de l&rsquo;information.<br \/><\/strong><\/h3>\n<p>Les pirates informatiques sont des personnes inventives qui s&rsquo;amusent \u00e0 cr\u00e9er sans cesse de nouveaux moyens de voler des informations. C&rsquo;est pourquoi le plan de s\u00e9curit\u00e9 de l&rsquo;information doit \u00eatre constamment contr\u00f4l\u00e9 et renouvel\u00e9. D\u00e9signer une personne charg\u00e9e de surveiller et de communiquer ces menaces \u00e0 tous les employ\u00e9s. Si vous \u00eates tr\u00e8s impliqu\u00e9 dans la s\u00e9curit\u00e9 de votre entreprise, vous pouvez r\u00e9diger ce document avec tr\u00e8s peu d&rsquo;apport des autres parties prenantes. Toutefois, si vous faites appel \u00e0 un fournisseur de services informatiques pour la gestion de la cybers\u00e9curit\u00e9, vous aurez peut-\u00eatre besoin de son aide pour pr\u00e9parer votre plan.<\/p>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc471fc elementor-align-left elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"dc471fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/dpoassociates.eu\/fr\/audit-informatique\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">IT-AUDIT<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La cr\u00e9ation d&rsquo;un plan de s\u00e9curit\u00e9 de l&rsquo;information passe par l&rsquo;\u00e9laboration d&rsquo;un document qui clarifie les mesures de protection \u00e0 prendre en [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":""},"categories":[60],"tags":[],"class_list":["post-9789","post","type-post","status-publish","format-standard","hentry","category-non-classifiee"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l&#039;information ?<\/title>\n<meta name=\"description\" content=\"R\u00e9diger un document sur les mesures \u00e0 prendre en ce qui concerne les technologies de l&#039;information utilis\u00e9es dans une organisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l&#039;information ?\" \/>\n<meta property=\"og:description\" content=\"R\u00e9diger un document sur les mesures \u00e0 prendre en ce qui concerne les technologies de l&#039;information utilis\u00e9es dans une organisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/\" \/>\n<meta property=\"og:site_name\" content=\"DPO Associates\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100083400514207\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-26T12:56:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T15:48:31+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649\"},\"headline\":\"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l&rsquo;information ?\",\"datePublished\":\"2020-11-26T12:56:40+00:00\",\"dateModified\":\"2025-03-04T15:48:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/\"},\"wordCount\":1019,\"publisher\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/\",\"articleSection\":[\"Non classifi\u00e9(e)\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/\",\"url\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/\",\"name\":\"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l'information ?\",\"isPartOf\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/\",\"datePublished\":\"2020-11-26T12:56:40+00:00\",\"dateModified\":\"2025-03-04T15:48:31+00:00\",\"description\":\"R\u00e9diger un document sur les mesures \u00e0 prendre en ce qui concerne les technologies de l'information utilis\u00e9es dans une organisation.\",\"breadcrumb\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage\",\"url\":\"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/\",\"contentUrl\":\"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dpoassociates.eu\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l&#8217;information ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#website\",\"url\":\"https:\/\/dpoassociates.eu\/fr\/\",\"name\":\"DPO Associates\",\"description\":\"Protect, Detect, Respond\",\"publisher\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dpoassociates.eu\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#organization\",\"name\":\"DPO Associates\",\"url\":\"https:\/\/dpoassociates.eu\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png\",\"contentUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png\",\"width\":651,\"height\":651,\"caption\":\"DPO Associates\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100083400514207\",\"https:\/\/www.linkedin.com\/company\/dpo-associates-da\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/dpoassociates.eu\"],\"url\":\"https:\/\/dpoassociates.eu\/fr\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l'information ?","description":"R\u00e9diger un document sur les mesures \u00e0 prendre en ce qui concerne les technologies de l'information utilis\u00e9es dans une organisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l'information ?","og_description":"R\u00e9diger un document sur les mesures \u00e0 prendre en ce qui concerne les technologies de l'information utilis\u00e9es dans une organisation.","og_url":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/","og_site_name":"DPO Associates","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100083400514207","article_published_time":"2020-11-26T12:56:40+00:00","article_modified_time":"2025-03-04T15:48:31+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#article","isPartOf":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/"},"author":{"name":"admin","@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649"},"headline":"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l&rsquo;information ?","datePublished":"2020-11-26T12:56:40+00:00","dateModified":"2025-03-04T15:48:31+00:00","mainEntityOfPage":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/"},"wordCount":1019,"publisher":{"@id":"https:\/\/dpoassociates.eu\/fr\/#organization"},"image":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage"},"thumbnailUrl":"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/","articleSection":["Non classifi\u00e9(e)"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/","url":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/","name":"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l'information ?","isPartOf":{"@id":"https:\/\/dpoassociates.eu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage"},"image":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage"},"thumbnailUrl":"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/","datePublished":"2020-11-26T12:56:40+00:00","dateModified":"2025-03-04T15:48:31+00:00","description":"R\u00e9diger un document sur les mesures \u00e0 prendre en ce qui concerne les technologies de l'information utilis\u00e9es dans une organisation.","breadcrumb":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#primaryimage","url":"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/","contentUrl":"https:\/\/dpoassociates.eu\/hoe-een-informatiebeveiligingsplan-opmaken\/"},{"@type":"BreadcrumbList","@id":"https:\/\/dpoassociates.eu\/fr\/comment-elaborer-un-plan-de-securite-de-linformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dpoassociates.eu\/fr\/"},{"@type":"ListItem","position":2,"name":"Comment \u00e9laborer un plan de s\u00e9curit\u00e9 de l&#8217;information ?"}]},{"@type":"WebSite","@id":"https:\/\/dpoassociates.eu\/fr\/#website","url":"https:\/\/dpoassociates.eu\/fr\/","name":"DPO Associates","description":"Protect, Detect, Respond","publisher":{"@id":"https:\/\/dpoassociates.eu\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dpoassociates.eu\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/dpoassociates.eu\/fr\/#organization","name":"DPO Associates","url":"https:\/\/dpoassociates.eu\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png","contentUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png","width":651,"height":651,"caption":"DPO Associates"},"image":{"@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100083400514207","https:\/\/www.linkedin.com\/company\/dpo-associates-da\/"]},{"@type":"Person","@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/dpoassociates.eu"],"url":"https:\/\/dpoassociates.eu\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/posts\/9789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/comments?post=9789"}],"version-history":[{"count":1,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/posts\/9789\/revisions"}],"predecessor-version":[{"id":20579,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/posts\/9789\/revisions\/20579"}],"wp:attachment":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/media?parent=9789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/categories?post=9789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/tags?post=9789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}