{"id":5808222,"date":"2024-11-13T13:20:00","date_gmt":"2024-11-13T13:20:00","guid":{"rendered":"https:\/\/www.oodrive.com\/?p=5808222"},"modified":"2024-11-13T13:20:00","modified_gmt":"2024-11-13T13:20:00","slug":"audit-si","status":"publish","type":"post","link":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/","title":{"rendered":"L\u2019audit SI, une brique essentielle pour s\u00e9curiser son syst\u00e8me d\u2019information"},"content":{"rendered":"\n<p>Comment s\u00e9curiser son syst\u00e8me d\u2019information si l\u2019on ne dispose pas d\u2019une photographie d\u00e9taill\u00e9e de son fonctionnement, \u00e0 la fois d\u2019un point de vue technique et organisationnel&nbsp;? <strong>C\u2019est l\u00e0 tout l\u2019enjeu d\u2019un audit SI&nbsp;: pouvoir disposer d\u2019un \u00e9tat des lieux du fonctionnement de son SI et de ses \u00e9ventuelles vuln\u00e9rabilit\u00e9s afin d\u2019\u00e9lever son niveau de s\u00e9curit\u00e9.<\/strong><\/p>\n\n\n\n<p>L\u2019\u00e9tat d\u2019un syst\u00e8me d\u2019information est loin d\u2019\u00eatre une question purement technique. Les activit\u00e9s et les processus \u00e9tant aujourd\u2019hui fortement digitalis\u00e9s, <strong>un syst\u00e8me d\u2019information mal connu ou dysfonctionnel peut nuire au fonctionnement, \u00e0 la r\u00e9putation ou encore aux r\u00e9sultats d\u2019une entreprise<\/strong>.<\/p>\n\n\n\n<p>\u00c0 l\u2019inverse, <strong>les entreprises qui prennent le temps d\u2019auditer ou de faire auditer leur SI en acqui\u00e8rent une meilleure connaissance<\/strong>. Elles sont ainsi capables de diagnostiquer et de corriger plus rapidement d\u2019\u00e9ventuels probl\u00e8mes, sans affecter leurs activit\u00e9s. Voici un aper\u00e7u des principaux \u00e9l\u00e9ments \u00e0 conna\u00eetre au sujet de l\u2019audit SI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Qu\u2019est-ce qu\u2019un audit SI&nbsp;?<\/h2>\n\n\n\n<p>L\u2019audit d\u2019un syst\u00e8me d\u2019information identifie d\u2019\u00e9ventuelles vuln\u00e9rabilit\u00e9s afin d\u2019\u00e9lever le niveau de s\u00e9curit\u00e9 du SI.<\/p>\n\n\n\n<p>Un audit SI est une \u00e9tude approfondie du fonctionnement d\u2019un <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/quelle-solution-pour-proteger-les-systemes-informatiques-des-etablissements-bancaires\/\">syst\u00e8me d\u2019information<\/a> afin de gagner en visibilit\u00e9, d\u2019\u00e9tablir un diagnostic, et de s\u2019assurer du niveau de s\u00e9curit\u00e9 de ce SI. Cet audit peut analyser \u00e0 la fois la fiabilit\u00e9, la disponibilit\u00e9, les performances, la conformit\u00e9 et la s\u00e9curit\u00e9 du SI.<\/p>\n\n\n\n<p>L\u2019audit IT peut porter sur l\u2019ensemble du syst\u00e8me d\u2019information, ou sur des points sp\u00e9cifiques&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Audit d\u2019architecture,<\/li>\n\n\n\n<li>Audit de configuration,<\/li>\n\n\n\n<li>Audit de code source,<\/li>\n\n\n\n<li>Test d\u2019intrusion (pentest),<\/li>\n\n\n\n<li>Audit organisationnel et physique,<\/li>\n\n\n\n<li>Etc.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Quel est l\u2019objectif d\u2019un audit SI&nbsp;?<\/h2>\n\n\n\n<p>Pour l\u2019ANSSI, un audit SI permet <em>\u00ab&nbsp;de mettre en \u00e9vidence les forces mais surtout les faiblesses et les vuln\u00e9rabilit\u00e9s du syst\u00e8me d\u2019information&nbsp;\u00bb<\/em>. <strong>Les conclusions de l\u2019audit d\u00e9terminent des axes d\u2019am\u00e9lioration et proposent des recommandations, toujours dans l\u2019objectif d\u2019\u00e9lever son niveau de s\u00e9curit\u00e9.<\/strong><\/p>\n\n\n\n<p>L\u2019objectif \u00e9tant d\u2019avoir un avis ext\u00e9rieur sur son syst\u00e8me d\u2019information, il est recommand\u00e9 de faire r\u00e9aliser cette \u00e9tude par un expert externe (cabinet d\u2019audit, consultant, etc.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quand r\u00e9aliser l\u2019audit de son syst\u00e8me d\u2019information&nbsp;?<\/h2>\n\n\n\n<p>Certaines entreprises lancent l\u2019audit de leur syst\u00e8me d\u2019information en r\u00e9ponse \u00e0 un incident de s\u00e9curit\u00e9. Elles esp\u00e8rent ainsi retrouver les causes de cet incident, qui peuvent \u00eatre d\u2019origine technologique et\/ou organisationnelle. Cependant, mieux vaut ne pas attendre d\u2019avoir \u00e0 subir un incident pour faire un \u00e9tat de lieux de son SI.<\/p>\n\n\n\n<p>Dans d\u2019autres cas, les entreprises lancent l\u2019audit de leur syst\u00e8me d\u2019information dans le cadre d\u2019une transformation importante \u00e0 mener, avec un impact sur le SI. L\u2019audit leur permet alors de d\u00e9terminer si le fonctionnement actuel de leur SI leur permet bien de supporter cette transformation. Si ce n\u2019est pas le cas, l\u2019audit d\u00e9termine alors quels sont les \u00e9ventuels probl\u00e8mes \u00e0 r\u00e9soudre et les grandes \u00e9tapes \u00e0 suivre pour faire concorder le projet avec le SI.<\/p>\n\n\n\n<a href=\"https:\/\/www.oodrive.com\/fr\/secnumcloud\/\" class=\"product__section\" id=\"snc-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">SecNumCloud : label de confiance<\/p><p class=\"product__section-description\">Le r\u00e9f\u00e9rentiel qui garantit le plus haut niveau de s\u00e9curit\u00e9 pour la protection de vos donn\u00e9es sensibles.<\/p><img decoding=\"async\" src=\"https:\/\/www.oodrive.com\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/bg-banner_work.svg\" class=\"product__section-bg\"\/><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"https:\/\/www.oodrive.com\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/logo-snc.svg\" class=\"product__section-logo\" alt=\"oodrive snc\"\/><div class=\"cta\"><span>En savoir plus<\/span><\/div><\/div><\/a>\n\n\n\n<p>Enfin, la r\u00e9alisation d\u2019un audit de <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/resilience-informatique\/\">s\u00e9curit\u00e9 informatique<\/a> peut \u00eatre obligatoire pour certaines organisations soumises \u00e0 des r\u00e9glementations sp\u00e9cifiques.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment auditer un SI&nbsp;? Les grandes \u00e9tapes<\/h2>\n\n\n\n<p>Un audit SI se d\u00e9compose en diff\u00e9rentes \u00e9tapes successives.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Cadrage de l\u2019audit informatique<\/h3>\n\n\n\n<p>L\u2019auditeur et l\u2019entreprise d\u00e9finissent ensemble la nature, le p\u00e9rim\u00e8tre et les objectifs de l\u2019audit IT, adapt\u00e9s au contexte de l\u2019entreprise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Planification, pr\u00e9paration, collecte de donn\u00e9es<\/h3>\n\n\n\n<p>L\u2019auditeur \u00e9labore son plan d\u2019audit d\u00e9taill\u00e9. Il commence \u00e0 recueillir des informations relatives \u00e0 l\u2019infrastructure, aux politiques et aux proc\u00e9dures en place.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Analyse et audit du syst\u00e8me d\u2019information<\/h3>\n\n\n\n<p>Le prestataire r\u00e9alise l\u2019audit \u00e0 proprement parler en utilisant les m\u00e9thodes appropri\u00e9es. Il documente ses constats et assure la tra\u00e7abilit\u00e9 des actions effectu\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. R\u00e9daction d\u2019un rapport d\u2019audit et pr\u00e9sentation au client<\/h3>\n\n\n\n<p>L\u2019auditeur \u00e9labore un rapport d\u2019audit, d\u00e9crivant de mani\u00e8re d\u00e9taill\u00e9e et structur\u00e9e ses constats et les recommandations permettant de rem\u00e9dier aux faiblesses identifi\u00e9es. Il les pr\u00e9sente \u00e0 l\u2019entreprise cliente lors d\u2019une restitution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Mise en place des recommandations de l\u2019audit et suivi<\/h3>\n\n\n\n<p>Enfin, l\u2019entreprise applique les recommandations qui lui ont \u00e9t\u00e9 faites. L\u2019audit d\u2019un SI ne sera pleinement efficace que si les pr\u00e9conisations sont suivies dans le temps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les bonnes pratiques pour r\u00e9ussir un audit SI<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Choisir un prestataire de confiance<\/h3>\n\n\n\n<p>L\u2019ANSSI recommande de s\u00e9lectionner un prestataire qualifi\u00e9 PASSI (prestataire d\u2019audit de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information), notamment pour les organisations soumises \u00e0 des obligations r\u00e9glementaires. L\u2019entreprise \u00e0 l\u2019initiative de l\u2019audit doit s\u2019assurer que l\u2019\u00e9quipe s\u00e9lectionn\u00e9e dispose des comp\u00e9tences requises pour le p\u00e9rim\u00e8tre \u00e0 auditer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Suivre des conseils m\u00e9thodologiques<\/h3>\n\n\n\n<p>D\u2019un point de vue m\u00e9thodologique, il est recommand\u00e9 notamment de&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Combiner plusieurs types d\u2019audits compl\u00e9mentaires (audit d\u2019architecture et audit de configuration, par exemple) plut\u00f4t qu\u2019un seul.<\/li>\n\n\n\n<li>Privil\u00e9gier les tests d\u2019intrusion sur un environnement de pr\u00e9-production.<\/li>\n\n\n\n<li>R\u00e9aliser les audits de configuration et d\u2019architecture sur l\u2019environnement de production.<\/li>\n\n\n\n<li>Effectuer des <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/sauvegarde\/sauvegarde-donnees\/pourquoi-sauvegarder-en-ligne-ses-donnees-dentreprise\/\">sauvegardes pr\u00e9alables des syst\u00e8mes<\/a>.<\/li>\n\n\n\n<li>Documenter et tracer l\u2019ensemble des actions effectu\u00e9es.<\/li>\n\n\n\n<li>Conserver les preuves des vuln\u00e9rabilit\u00e9s identifi\u00e9es.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Soigner la collaboration avec le prestataire charg\u00e9 de l\u2019audit<\/h3>\n\n\n\n<p>L\u2019audit d\u2019un SI est g\u00e9n\u00e9ralement une mission externalis\u00e9e. Afin de maintenir la qualit\u00e9 de la relation entre l\u2019entreprise commanditaire et son prestataire, il est recommand\u00e9 de mettre en place des moyens de communication d\u00e9di\u00e9s et s\u00e9curis\u00e9s.<\/p>\n\n\n\n<p>L\u2019auditeur doit \u00eatre inform\u00e9 des actions r\u00e9alis\u00e9es sur le syst\u00e8me durant l\u2019audit. De son c\u00f4t\u00e9, il est tenu de notifier rapidement les vuln\u00e9rabilit\u00e9s critiques d\u00e9couvertes. Des points r\u00e9guliers sur l\u2019avancement de la mission permettent de maintenir le lien durant la dur\u00e9e de l\u2019audit.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Entrer dans une d\u00e9marche d\u2019am\u00e9lioration continue<\/h3>\n\n\n\n<p>L\u2019audit de s\u00e9curit\u00e9 informatique \u00e0 lui tout seul n\u2019est pas suffisant pour s\u00e9curiser son SI, encore faut-il appliquer concr\u00e8tement les recommandations et pr\u00e9conisations du rapport d\u2019audit. Il peut \u00eatre judicieux de planifier un audit de contr\u00f4le afin de v\u00e9rifier la bonne mise en \u0153uvre des recommandations.<\/p>\n\n\n\n<p>Enrichir la cartographie de son SI, mettre \u00e0 jour son analyse de risques ou encore ajuster sa politique de <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/zero-trust\/\">s\u00e9curit\u00e9 du syst\u00e8me d\u2019information<\/a> sont autant d\u2019\u00e9tapes indispensables pour maintenir une dynamique d\u2019am\u00e9lioration continue.<\/p>\n\n\n\n<div class=\"wp-block-jet-engine-section jet-section wp-block-jet-engine-section jet-section--layout-fullwidth has-blue-work-2-background-color\"><div class=\"jet-section__content\">\n<h2 class=\"wp-block-heading\">Les \u00e9l\u00e9ments \u00e0 retenir sur l\u2019audit du SI<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>L\u2019audit SI \u00e9value la s\u00e9curit\u00e9 et la conformit\u00e9 d\u2019un syst\u00e8me d\u2019information.<\/li>\n\n\n\n<li>R\u00e9aliser un audit de syst\u00e8me d\u2019information est une d\u00e9marche structur\u00e9e en diff\u00e9rentes \u00e9tapes, depuis le cadrage de l\u2019audit jusqu\u2019\u00e0 la restitution des vuln\u00e9rabilit\u00e9s identifi\u00e9es et des pr\u00e9conisations pour les corriger.<\/li>\n\n\n\n<li>Il est recommand\u00e9 de faire auditer son SI \u00e0 intervalles r\u00e9guliers afin de disposer d\u2019une version toujours son patrimoine IT et de son \u00e9tat de fonctionnement.<\/li>\n\n\n\n<li>L\u2019audit des syst\u00e8mes d\u2019information n\u2019est pas une fin en soi. Appliquer les recommandations de l\u2019audit et suivre leur efficacit\u00e9 dans le temps constituent des d\u00e9marches tout aussi importantes.<\/li>\n<\/ul>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Comment s\u00e9curiser son syst\u00e8me d\u2019information si l\u2019on ne dispose pas d\u2019une photographie d\u00e9taill\u00e9e de son fonctionnement, \u00e0 la fois d\u2019un point de vue technique et organisationnel&nbsp;? C\u2019est l\u00e0 tout l\u2019enjeu d\u2019un audit SI&nbsp;: pouvoir disposer d\u2019un \u00e9tat des lieux du fonctionnement de son SI et de ses \u00e9ventuelles vuln\u00e9rabilit\u00e9s afin d\u2019\u00e9lever son niveau de s\u00e9curit\u00e9. [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":7009907,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1227],"class_list":["post-5808222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Audit SI\u00a0: \u00e9valuer et s\u00e9curiser son syst\u00e8me d\u2019information | Oodrive<\/title>\n<meta name=\"description\" content=\"L\u2019audit des syst\u00e8mes d\u2019information \u00e9value la s\u00e9curit\u00e9 et la conformit\u00e9 d\u2019un SI. Il identifie les vuln\u00e9rabilit\u00e9s \u00e0 corriger et les pratiques \u00e0 am\u00e9liorer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Audit SI\u00a0: \u00e9valuer et s\u00e9curiser son syst\u00e8me d\u2019information | Oodrive\" \/>\n<meta property=\"og:description\" content=\"L\u2019audit des syst\u00e8mes d\u2019information \u00e9value la s\u00e9curit\u00e9 et la conformit\u00e9 d\u2019un SI. Il identifie les vuln\u00e9rabilit\u00e9s \u00e0 corriger et les pratiques \u00e0 am\u00e9liorer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T13:20:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Maxime Geffray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maxime Geffray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/\"},\"author\":{\"name\":\"Maxime Geffray\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3\"},\"headline\":\"L\u2019audit SI, une brique essentielle pour s\u00e9curiser son syst\u00e8me d\u2019information\",\"datePublished\":\"2024-11-13T13:20:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/\"},\"wordCount\":1342,\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg\",\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/\",\"url\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/\",\"name\":\"Audit SI\u00a0: \u00e9valuer et s\u00e9curiser son syst\u00e8me d\u2019information | Oodrive\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg\",\"datePublished\":\"2024-11-13T13:20:00+00:00\",\"description\":\"L\u2019audit des syst\u00e8mes d\u2019information \u00e9value la s\u00e9curit\u00e9 et la conformit\u00e9 d\u2019un SI. Il identifie les vuln\u00e9rabilit\u00e9s \u00e0 corriger et les pratiques \u00e0 am\u00e9liorer.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg\",\"width\":1000,\"height\":563,\"caption\":\"L'audit SI pour s\u00e9curiser son syst\u00e8me d'information\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.oodrive.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"L\u2019audit SI, une brique essentielle pour s\u00e9curiser son syst\u00e8me d\u2019information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oodrive.com\/#website\",\"url\":\"https:\/\/www.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.\",\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/www.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3\",\"name\":\"Maxime Geffray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"caption\":\"Maxime Geffray\"},\"description\":\"Communication Manager at Oodrive\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Audit SI\u00a0: \u00e9valuer et s\u00e9curiser son syst\u00e8me d\u2019information | Oodrive","description":"L\u2019audit des syst\u00e8mes d\u2019information \u00e9value la s\u00e9curit\u00e9 et la conformit\u00e9 d\u2019un SI. Il identifie les vuln\u00e9rabilit\u00e9s \u00e0 corriger et les pratiques \u00e0 am\u00e9liorer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Audit SI\u00a0: \u00e9valuer et s\u00e9curiser son syst\u00e8me d\u2019information | Oodrive","og_description":"L\u2019audit des syst\u00e8mes d\u2019information \u00e9value la s\u00e9curit\u00e9 et la conformit\u00e9 d\u2019un SI. Il identifie les vuln\u00e9rabilit\u00e9s \u00e0 corriger et les pratiques \u00e0 am\u00e9liorer.","og_url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/","og_site_name":"Oodrive","article_published_time":"2024-11-13T13:20:00+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg","type":"image\/jpeg"}],"author":"Maxime Geffray","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Maxime Geffray","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#article","isPartOf":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/"},"author":{"name":"Maxime Geffray","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3"},"headline":"L\u2019audit SI, une brique essentielle pour s\u00e9curiser son syst\u00e8me d\u2019information","datePublished":"2024-11-13T13:20:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/"},"wordCount":1342,"publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg","articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/","url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/","name":"Audit SI\u00a0: \u00e9valuer et s\u00e9curiser son syst\u00e8me d\u2019information | Oodrive","isPartOf":{"@id":"https:\/\/www.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg","datePublished":"2024-11-13T13:20:00+00:00","description":"L\u2019audit des syst\u00e8mes d\u2019information \u00e9value la s\u00e9curit\u00e9 et la conformit\u00e9 d\u2019un SI. Il identifie les vuln\u00e9rabilit\u00e9s \u00e0 corriger et les pratiques \u00e0 am\u00e9liorer.","breadcrumb":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#primaryimage","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/audit_SI-1.jpeg","width":1000,"height":563,"caption":"L'audit SI pour s\u00e9curiser son syst\u00e8me d'information"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/audit-si\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.oodrive.com\/es\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/cybersecurite\/"},{"@type":"ListItem","position":4,"name":"L\u2019audit SI, une brique essentielle pour s\u00e9curiser son syst\u00e8me d\u2019information"}]},{"@type":"WebSite","@id":"https:\/\/www.oodrive.com\/#website","url":"https:\/\/www.oodrive.com\/","name":"Oodrive","description":"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.","publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/www.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3","name":"Maxime Geffray","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","caption":"Maxime Geffray"},"description":"Communication Manager at Oodrive"}]}},"_links":{"self":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/5808222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=5808222"}],"version-history":[{"count":0,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/5808222\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/7009907"}],"wp:attachment":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=5808222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=5808222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}