[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f05xwXIopLR25Ic4Hf9KWm-uaPRo-YkdV2oUwBYD_3eU":3},{"sections":4,"resultAnalysis":268,"id":269,"version":270,"newVersion":23,"label":271,"isPinned":41,"isShared":41,"sharingToken":272,"isRevision":23,"isBlockAnalysisShared":41,"nbReferences":273,"referenceId":9,"nbResponses":11,"parentId":9,"revisionDescription":9,"logoUrl":274,"description":275,"scheduleIntervalDays":9,"versionNumber":30,"dateCreation":276,"dateUpdate":277,"dateArchived":9,"archived":23,"type":278,"typeIndex":30,"typeColor":9,"typeIcon":9,"typeText":279,"creator":280,"objectType":9,"defaultOwners":288,"tags":297,"privacyHubs":9,"nbQuestions":307,"nbQuestionsRequired":307,"nbDatas":11,"deadLineDays":9},[5],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":13,"questions":14,"sections":267},"0c77bc62-cbf0-48f7-a4c7-1ba32e9e0f7f","initial","First Section",null,"Default",0,"SectionType_Default","\u003Cp>\u003Cstrong>Evaluation of the security level of the website\u003C/strong>\u003C/p>",[15,43,59,75,91,107,123,139,155,171,187,203,219,235,251],{"id":16,"slug":17,"label":18,"tooltipHtml":9,"descriptionHtml":19,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":24,"displayConditions":9,"answers":25,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"6a3fe666-9ef4-494b-b42f-a053cc9f9837","les-acces-a-mon-site-internet-sont-ils-filtres-par-un-pare-feu-","Is access to the website filtered by a firewall?","\u003Cp>A firewall is a device that limits access to only authorized services and machines\u003C/p>","Radio",7,"Unique choice list",false,[],[26,32,37],{"id":27,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":31},"b37b81a3-0390-4f3c-879b-5415656f564c","#084887","Yes",1,[],{"id":33,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":36},"519bcd12-1a1c-4581-b385-809c5bf05485","#E7630A","No",[],{"id":38,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":42},"d13f99dd-5891-4bc6-9adf-bb437c051d68","#727a94","Don't know",true,[],{"id":44,"slug":45,"label":46,"tooltipHtml":9,"descriptionHtml":47,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":48,"displayConditions":9,"answers":49,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"31b11784-dba1-499e-992d-51b0b3a3d670","mon-site-internet-est-il-protege-contre-les-attaques-en-deni-de-service-","Is the website protected against denial of service attacks?","\u003Cp>The operator and/or the host can implement solutions to absorb the traffic overload of this type of cyber attack\u003C/p>",[],[50,53,56],{"id":51,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":52},"13675a0c-870a-4894-b973-0c56ce561f14",[],{"id":54,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":55},"fb006a25-5072-4a6f-a554-c013a2fcd773",[],{"id":57,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":58},"1110fa93-bf93-43d8-a374-1789df96eca0",[],{"id":60,"slug":61,"label":62,"tooltipHtml":9,"descriptionHtml":63,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":64,"displayConditions":9,"answers":65,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"9ecf4b36-8fd2-41b8-b7ea-23d5ecdf672b","le-site-internet-est-il-protege-par-un-antivirus-","Is the website protected by an antivirus?","\u003Cp>Antivirus software can detect and block malicious programs that may be deposited or stored on the site\u003C/p>",[],[66,69,72],{"id":67,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":68},"b29364ae-64ff-40c7-ae9c-a5d2d7d80cf1",[],{"id":70,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":71},"534b7313-9a49-4471-94aa-315e6708abb4",[],{"id":73,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":74},"648b5b5e-d0e6-446b-8408-5caf15376e9f",[],{"id":76,"slug":77,"label":78,"tooltipHtml":9,"descriptionHtml":79,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":80,"displayConditions":9,"answers":81,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"c0a7789e-816c-4036-a8ea-f65e06a0eb33","5863e37d-504c-4049-8733-6e01b0ac181b","Is the website regularly updated with all hardware and software security patches?","\u003Cp>Applying security updates to all components of your site will remove known security vulnerabilities\u003C/p>",[],[82,85,88],{"id":83,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":84},"795e9a43-6750-4294-9420-a7beaf9950b2",[],{"id":86,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":87},"eed9c0bb-1c9a-4baa-9944-b0b66203e3e6",[],{"id":89,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":90},"d94c4023-4a9f-46e0-a96b-c38255e25f0a",[],{"id":92,"slug":93,"label":94,"tooltipHtml":9,"descriptionHtml":95,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":96,"displayConditions":9,"answers":97,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"8a6edad8-521c-42ae-a6b9-c9934953684b","f63b5e99-5120-462d-966b-58d2474fbec9","Is the website regularly backed up and its backups tested?","\u003Cp>An operational backup is essential to be able to restore the website to the state before an incident.\u003C/p>",[],[98,101,104],{"id":99,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":100},"d884efb9-7df6-4d08-a855-a05091eeb7d5",[],{"id":102,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":103},"8d1ffdd1-e280-4140-a617-f87d10e9bd98",[],{"id":105,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":106},"08ae2e1b-7dc1-4a21-b376-19efcfb65351",[],{"id":108,"slug":109,"label":110,"tooltipHtml":9,"descriptionHtml":111,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":112,"displayConditions":9,"answers":113,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"4f9325e4-fe10-4267-bad9-7eb736a3c5c0","079d856e-a70d-412e-9bc8-55571e4feb33","Are the services available on the website limited to what is strictly necessary?","\u003Cp>Each service opened on the website is a possible entry point for a cybercriminal. It is therefore important to limit them to the essentials.\u003C/p>",[],[114,117,120],{"id":115,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":116},"44a17535-e57e-41ae-bfb4-5d3487746a25",[],{"id":118,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":119},"5fcb9e2a-13c5-4709-9578-aefef0ff9117",[],{"id":121,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":122},"27934e18-d7c5-4fe1-a16f-fe97d8187152",[],{"id":124,"slug":125,"label":126,"tooltipHtml":9,"descriptionHtml":127,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":128,"displayConditions":9,"answers":129,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"0cccb754-b7c2-49bc-a590-c61467fc8797","8661c941-f17a-4a95-a907-4cbf25bdc3be","Is access in administration or publication on the website limited to authorized persons and machines?","\u003Cp>The accesses allowing to manage the website or to modify it must be differentiated and be subject to a reinforced control\u003C/p>",[],[130,133,136],{"id":131,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":132},"0aca7d00-efeb-44e7-a54e-9e3296950da7",[],{"id":134,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":135},"ef790990-54fc-4696-8b49-34d5ac790101",[],{"id":137,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":138},"41a6d5c7-6df0-4190-888c-0b6d81075448",[],{"id":140,"slug":141,"label":142,"tooltipHtml":9,"descriptionHtml":143,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":144,"displayConditions":9,"answers":145,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"2480022e-4a53-4adb-b555-ada6981d3b0a","16301e56-5e06-42b0-ab47-5b1a6c06ca93","Are the website access passwords \"strong\" and \"unique\" for each authorized person?","\u003Cp>Poor password management is one of the primary causes of cyberattacks\u003C/p>",[],[146,149,152],{"id":147,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":148},"b954a5fc-d546-4cae-9bc7-7d74554b6430",[],{"id":150,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":151},"492bd6a8-5b00-42cd-91d4-c2ebe6ef4408",[],{"id":153,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":154},"679e1b78-fabd-4d2a-b067-2d6dcf2cbf12",[],{"id":156,"slug":157,"label":158,"tooltipHtml":9,"descriptionHtml":159,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":160,"displayConditions":9,"answers":161,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"025e3093-7fc5-4ff4-bcd4-d112ea0ab17a","163efb66-8200-4286-85a4-e7482a85f915","Is the access in administration or publication on the website protected by a double authentication?","\u003Cp>Two-step authentication strengthens password security by requiring a confirmation code at each new login.\u003C/p>",[],[162,165,168],{"id":163,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":164},"97494171-7e11-4573-bc32-db7ccd5127ed",[],{"id":166,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":167},"8ca5c908-beca-46bb-bb76-0fa9661f113c",[],{"id":169,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":170},"731414dc-052e-4ab4-9f3d-a41ad10e21f7",[],{"id":172,"slug":173,"label":174,"tooltipHtml":9,"descriptionHtml":175,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":176,"displayConditions":9,"answers":177,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"d5462ffc-08b1-4f74-9f70-23ec08c55c3d","d531b173-d03c-4bfb-9744-ada20ab847c2","Are the communications with the website secured in HTTPS?","\u003Cp>The HTTPS protocol makes it possible to protect the information exchanged between the user stations and the Internet site from interception.\u003C/p>",[],[178,181,184],{"id":179,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":180},"50ba0030-e9f9-479a-876b-194459586773",[],{"id":182,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":183},"f959e819-3b37-417a-b4bb-53c0b52a500a",[],{"id":185,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":186},"c2f604eb-3681-4814-8cb1-656bded15302",[],{"id":188,"slug":189,"label":190,"tooltipHtml":9,"descriptionHtml":191,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":192,"displayConditions":9,"answers":193,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"64227e45-4a55-4ded-80d9-6677873e4963","0da15e41-e058-4b34-8f94-6005e709baa9","Is the domain name of the website protected (INPI deposit, use of a registry lock...)?","\u003Cp>It is important to use the available solutions to avoid theft or misappropriation of the website name\u003C/p>",[],[194,197,200],{"id":195,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":196},"7890dfba-e666-4efc-82bf-4b7c9706367b",[],{"id":198,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":199},"f35ac406-20f0-4702-82df-8f93dec783ee",[],{"id":201,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":202},"8b5efd41-dc9a-4a8d-a59e-23528f4b40c8",[],{"id":204,"slug":205,"label":206,"tooltipHtml":9,"descriptionHtml":207,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":208,"displayConditions":9,"answers":209,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"455fa74e-74b8-4b37-8427-f3453c8f044d","a98de1b7-974b-4120-9d7e-4b85071e82ba","Are the software extensions used on the website essential and deemed safe?","\u003Cp>These extensions can improve the functionality of the site, but are also possible entry points for cybercriminals.\u003C/p>",[],[210,213,216],{"id":211,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":212},"0b2a154b-fea9-4653-987e-cf029fb9a99e",[],{"id":214,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":215},"16dd0ac5-6e05-4d1c-8691-0174bad58ee3",[],{"id":217,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":218},"2b33ffe2-655e-4ffb-90be-253cfd0cd0c6",[],{"id":220,"slug":221,"label":222,"tooltipHtml":9,"descriptionHtml":223,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":224,"displayConditions":9,"answers":225,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"362c7997-11c5-457c-994a-0c861e52acfb","ba0fb225-0b7c-4228-bbb5-ef3b4778af4e","Are all website accesses recorded or logged?","\u003Cp>Access logging makes it possible to identify illegitimate access and to trace the chronology of an attack.\u003C/p>",[],[226,229,232],{"id":227,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":228},"51691753-d3f7-4405-8cc9-99d6eab48c35",[],{"id":230,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":231},"4ad4cb60-5902-448c-868f-c6c5aedbc6f0",[],{"id":233,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":234},"7c54cc20-32d7-4e92-a327-bf87cc337ef0",[],{"id":236,"slug":237,"label":238,"tooltipHtml":9,"descriptionHtml":239,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":240,"displayConditions":9,"answers":241,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"a099c9b1-9fc4-40eb-9147-02319e6497d1","08df094e-0c6d-41c6-b19f-48526538a4c9","Is the website activity regularly monitored for hacking?","\u003Cp>Monitoring of connections and changes to the site allows for early detection and response to cyberattack attempts\u003C/p>",[],[242,245,248],{"id":243,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":244},"a081e59e-c00d-4f39-b33c-0baa79ece1ac",[],{"id":246,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":247},"7a2071e9-faf4-4bd2-99f6-e95becd00294",[],{"id":249,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":250},"00dee803-aa42-42ae-9b21-4294e7c926f5",[],{"id":252,"slug":253,"label":254,"tooltipHtml":9,"descriptionHtml":255,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":256,"displayConditions":9,"answers":257,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"98fa4b2a-7ccb-49bf-859e-8f47847096df","c071cdfc-974b-44f7-b979-2807dbd934dc","Is the security of the website regularly checked?","\u003Cp>A website is constantly evolving. The maintenance of its security level must therefore be regularly controlled (audit) by specialists.\u003C/p>",[],[258,261,264],{"id":259,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":260},"16548a5f-5c9c-4240-ad8a-c303e3a41776",[],{"id":262,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":263},"b1275296-130e-4242-abbf-352348edc813",[],{"id":265,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":266},"d7be51b8-b9dd-4850-befa-d3d03e949532",[],[],[],"75b73a96-67f8-49b4-aa7f-08db045c00d1","1.0","Website security audit ","sQrGbAsg6qpZd8bfxESSn4jQgwT8p8xIuBQqqXiARgVqP2rBoHU9tfNzl8Mi",4,"https://static.dastra.eu/tenant-3/audit/UJIXij9NlXINMW/icon-audit500x-150.png","Evaluation of the level of cybersecurity of a website\n(source : www.cybermalveillance.gouv.fr)","2023-02-01T21:23:49.8563954","2024-08-29T12:38:44.7430021","Compliance","Cyver compliance",{"id":281,"displayName":282,"familyName":283,"givenName":284,"email":285,"active":41,"color":286,"avatarUrl":287,"tenantId":11},69,"Dastro Naute","Naute","Dastro","contact@dastra.eu","#784000","https://static.dastra.eu/tenant-3/avatar/69/assistant-150.png",[289],{"id":290,"displayName":291,"familyName":292,"givenName":293,"email":294,"active":41,"color":295,"avatarUrl":296,"tenantId":11},31,"Jérôme de Mercey","de Mercey","Jérôme","jerome.demercey@dastra.eu","#99C691","https://static.dastra.eu/tenant-10/avatar/31/Zuh7XFZe5EnnTo/design-sans-titre-2-150.png",[298],{"id":299,"label":300,"type":301,"typeIndex":302,"typeColor":303,"typeIcon":304,"typeText":305,"color":306},"23899e36-9a05-446a-918b-6d4f61c45ed5","Cybersecurity","AuditTemplate",9,"#83d162","ds-icon-audit","Questionnaire template","#E18D7F",15]