[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$foa-vRhU3dt_PYb8HuI27hlIpHS8vT_qi4JgrkeO24e8":3},{"sections":4,"resultAnalysis":1205,"id":1206,"version":1207,"newVersion":21,"label":1208,"isPinned":21,"isShared":45,"sharingToken":1209,"isRevision":21,"isBlockAnalysisShared":45,"nbReferences":1210,"referenceId":9,"nbResponses":11,"parentId":9,"revisionDescription":9,"logoUrl":1211,"description":1212,"scheduleIntervalDays":9,"versionNumber":39,"dateCreation":1213,"dateUpdate":1214,"dateArchived":9,"archived":21,"type":1215,"typeIndex":39,"typeColor":9,"typeIcon":9,"typeText":1216,"creator":1217,"objectType":1225,"objectTypeIndex":1226,"objectTypeColor":1227,"objectTypeIcon":1228,"objectTypeText":1229,"defaultOwners":1230,"tags":1238,"privacyHubs":9,"nbQuestions":1255,"nbQuestionsRequired":1256,"nbDatas":11,"deadLineDays":9},[5,66,296,548,638,869,977,1043,1097],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":13,"sections":65},"eddbf922-4fe4-419f-b8bf-a07f76fa1888","recommandation-generale","Recommandation générale",null,"Default",0,"SectionType_Default",[14,47],{"id":15,"slug":16,"label":17,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":22,"displayConditions":9,"answers":23,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"e1393a23-f865-47e0-9bb9-8c9b08dd0c55","si-le-traitement-comporte-des-risques-specifiques-est-ce-que-des-mesures-complementaires-adaptees-sont-prevues-","Si le traitement comporte des risques spécifiques, est ce que des mesures complémentaires adaptées sont prévues ?","Radio",7,"Liste de cases à cocher (une seule réponse)",false,[],[24,30,35,41],{"id":25,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":29},"11968fcf-550b-421f-a640-8008c7d4045c","#1ab586","Oui",2,[],{"id":31,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":34},"1debdc04-7bdc-47c5-88d8-59696529eb87","#dc3545","Non",[],{"id":36,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":40},"77c1a3da-d6d4-404d-8faa-4495bf65cf5c","#E7630A","En cours",1,[],{"id":42,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":46},"35a19583-2977-4195-ac30-7ab9c48102c2","#727a94","Non concerné",true,[],{"id":48,"slug":49,"label":50,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":51,"displayConditions":9,"answers":52,"listQuestions":9,"required":45,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"36c0ef80-4d5e-4ccd-9840-789b80773259","est-ce-que-des-mesures-complementaires-sont-prevues-pour-les-categories-dutilisateurs-a-risques-tels-que-les-administrateurs-informatiques-","Est-ce que des mesures complémentaires sont prévues pour les catégories d’utilisateurs à risques (tels que les administrateurs informatiques) ?",[],[53,56,59,62],{"id":54,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":55},"533f003d-e955-45ac-96b9-05522cb2a656",[],{"id":57,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":58},"2594fea4-66e5-4fd7-984a-0cf896a0d69e",[],{"id":60,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":61},"75a4f7b7-73d3-4090-9648-befe10fc92ca",[],{"id":63,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":64},"50c08ca6-8d54-4b8e-b056-75b7b3241623",[],[],{"id":67,"slug":68,"label":69,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":70,"questions":71,"sections":249},"62ce00e1-7a40-4963-ba7f-2e02d15200c7","gouvernance","Gouvernance","",[72,84,96,108,120,135,153,168,186,198,210,222,234],{"id":73,"slug":74,"label":75,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":76,"displayConditions":9,"answers":77,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"14f47474-08cc-4c19-abfd-24820840d448","une-politique-de-gestion-des-mots-de-passe-a-t-elle-ete-formalisee-et-validee-","Une politique de gestion des mots de passe a-t-elle été formalisée et validée ? ",[],[78,81],{"id":79,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":80},"901b3749-7595-4212-9733-f093747f5753",[],{"id":82,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":83},"3c716cd3-13bd-46e4-a7cb-7df2fb59ea0f",[],{"id":85,"slug":86,"label":87,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":88,"displayConditions":9,"answers":89,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"6431548b-160d-437c-a2cd-5b3edae43133","les-acces-des-personnels-sont-ils-revus-au-moins-une-fois-par-an-","Les accès des personnels sont-ils revus au moins une fois par an ?",[],[90,93],{"id":91,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":92},"8610e0d6-7f89-441f-92fb-fe899015df12",[],{"id":94,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":95},"7b64f441-5057-4804-b2a3-ee9684531f58",[],{"id":97,"slug":98,"label":99,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":100,"displayConditions":9,"answers":101,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"cebb7c2e-f245-46e9-b483-379094a6a7f6","lapplication-effective-de-la-politique-de-gestion-des-mots-de-passe-est-elle-verifiee-au-moins-une-fois-par-an-","L’application effective de la politique de gestion des mots de passe est-elle vérifiée au moins une fois par an ?",[],[102,105],{"id":103,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":104},"ba5a85fd-1978-4738-81d6-41b09587fbcf",[],{"id":106,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":107},"a53e8c80-9993-431c-9a37-1fe6a8442d1e",[],{"id":109,"slug":110,"label":111,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":112,"displayConditions":9,"answers":113,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"93c9d7d6-e3f4-4fd9-8d11-2904c3ad3d92","la-politique-de-gestion-des-mots-de-passe-en-particulier-ses-mesures-techniques-est-elle-revue-au-moins-une-fois-par-an-afin-devaluer-la-necessite-dune-mise-a-jour-","La politique de gestion des mots de passe, en particulier ses mesures techniques, est-elle revue au moins une fois par an afin d’évaluer la nécessité d’une mise à jour ?",[],[114,117],{"id":115,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":116},"bf0f27df-f8bf-4953-8e4b-023d458c88f0",[],{"id":118,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":119},"47694792-2e95-421b-9c77-157f5541b488",[],{"id":121,"slug":122,"label":123,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":124,"displayConditions":9,"answers":125,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"0cff75e1-bde2-404b-aed3-02ecfde8e2fa","les-personnes-concernees-sont-elles-destinataires-des-parties-de-la-politique-de-gestion-des-mots-de-passe-qui-les-concerne-","Les personnes concernées sont-elles destinataires des parties de la politique de gestion des mots de passe qui les concerne ?",[],[126,129,132],{"id":127,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":128},"e41c1346-297f-4c27-9147-63499505e3a6",[],{"id":130,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":131},"994b2146-53c2-498c-a39e-ebb2691c884c",[],{"id":133,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":134},"2ffadf4a-abb4-42ee-bedb-4bc89fd4de8b",[],{"id":136,"slug":137,"label":138,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":139,"displayConditions":9,"answers":140,"listQuestions":9,"required":45,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"b199cbac-fdef-4966-96c8-c566e901abba","lensemble-des-personnels-ont-ils-ete-formes-ou-sensibilises-a-la-gestion-de-leurs-mots-de-passes-","L’ensemble des personnels ont-ils été formés ou sensibilisés à la gestion de leurs mots de passes ?",[],[141,144,147,150],{"id":142,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":143},"5c267959-5454-4e53-a1ee-898abc92eba9",[],{"id":145,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":146},"6c933e90-3fc3-4552-b991-cb81f2c59480",[],{"id":148,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":149},"56ca5d82-bd0d-43c2-840e-09991a721866",[],{"id":151,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":152},"0a58b28f-8ec8-458e-b39b-06986037100f",[],{"id":154,"slug":155,"label":156,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":157,"displayConditions":9,"answers":158,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"1ba08153-9743-4bb4-8e83-cad1757c80d8","un-gestionnaire-de-mots-de-passe-est-il-propose-aux-personnels-","Un gestionnaire de mots de passe est-il proposé aux personnels ?",[],[159,162,165],{"id":160,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":161},"c22db413-0a78-4a12-9516-c212b0a02e3b",[],{"id":163,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":164},"ac1fad60-619c-410c-9310-6684d656671e",[],{"id":166,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":167},"c37eecff-a152-44b3-8fa0-cbc1506b755c",[],{"id":169,"slug":170,"label":171,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":172,"displayConditions":9,"answers":173,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"d3d9c9cc-601f-4871-9cf7-70123a50cdcf","est-ce-que-lensemble-des-mecanismes-cryptographiques-mis-en-uvre-respectent-les-regles-et-recommandations-decrites-dans-les-annexes-b1-et-b2-du-rgs-ou-le-guide-mecanismes-cryptographiques-de-lanssi-","Est-ce que l’ensemble des mécanismes cryptographiques mis en œuvre respectent les règles et recommandations décrites dans les annexes B1 et B2 du RGS ou le guide mécanismes cryptographiques de l’ANSSI ?",[],[174,177,180,183],{"id":175,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":176},"9c3602af-c1c5-446b-9063-0139556da86f",[],{"id":178,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":179},"c8baf626-978d-4111-a1d4-2ba23b238e0d",[],{"id":181,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":182},"04379c7a-0c0a-4048-886c-9728a89598ba",[],{"id":184,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":185},"e8e107ee-6655-43ee-892d-4dd7b7e88176",[],{"id":187,"slug":188,"label":189,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":190,"displayConditions":9,"answers":191,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f073ebaa-9514-4566-b853-590dd5b33faa","est-ce-que-les-logiciels-et-composants-logiciels-utilises-mettent-en-uvre-des-versions-a-jour-en-ce-qui-concerne-la-securite-","Est-ce que les logiciels et composants logiciels utilisés mettent en œuvre des versions à jour en ce qui concerne la sécurité ?",[],[192,195],{"id":193,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":194},"f11d0185-e6a8-42a8-b297-29c79a5f7934",[],{"id":196,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":197},"0ae54a51-55ae-413f-9919-49a448973dae",[],{"id":199,"slug":200,"label":201,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":202,"displayConditions":9,"answers":203,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"9a971886-c70f-448b-a2f5-bb72ee04bc5c","est-ce-quune-veille-sur-les-mises-a-jour-et-les-vulnerabilites-publies-est-mise-en-uvre-pour-lensemble-des-logiciels-et-composants-logiciels-utilises-","Est-ce qu’une veille sur les mises-à-jour et les vulnérabilités publiés est mise en œuvre pour l’ensemble des logiciels et composants logiciels utilisés ?",[],[204,207],{"id":205,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":206},"697e89bf-875e-4cc8-be37-2bd6c51311e6",[],{"id":208,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":209},"f97c1f2b-3c2a-4986-bf91-35b275c07fc6",[],{"id":211,"slug":212,"label":213,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":214,"displayConditions":9,"answers":215,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"7ad2afba-9269-44a8-ad33-6ac2182d9379","sil-est-fait-usage-de-cles-privees-ces-dernieres-sont-elles-conservees-de-maniere-securisee-","S’il est fait usage de clés privées, ces dernières sont-elles conservées de manière sécurisée ?",[],[216,219],{"id":217,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":218},"50513008-d60b-4699-b47a-49b475ac4201",[],{"id":220,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":221},"40f2cc07-f19b-467b-bf25-493688c90c70",[],{"id":223,"slug":224,"label":225,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":226,"displayConditions":9,"answers":227,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"9bec389c-ffcc-4322-a017-2c83b8c0a862","est-ce-quaucun-mot-de-passe-napparait-ni-en-clair-ni-hache-dans-les-url-","Est-ce qu’aucun mot de passe n’apparait ni en clair ni haché dans les URL ?",[],[228,231],{"id":229,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":230},"aa676683-7e39-45a3-a061-9a1003e7de40",[],{"id":232,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":233},"342706aa-e3d3-42cf-a7a2-0b290714d6a3",[],{"id":235,"slug":236,"label":237,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":238,"displayConditions":9,"answers":239,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"3c3c3146-e77f-4124-8aa1-02d39c7ca0f3","si-lauthentification-seffectue-sur-une-page-web-est-ce-que-cette-page-ne-contient-ni-publicite-ni-appel-a-des-sites-tiers-","Si l’authentification s’effectue sur une page web, est-ce que cette page ne contient ni publicité ni appel à des sites tiers ?",[],[240,243,246],{"id":241,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":242},"f3eebdb5-e793-4cab-b83a-2adeb22c510f",[],{"id":244,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":245},"f60dbdfd-b9e5-433f-a186-04c156b4f355",[],{"id":247,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":248},"866c105e-1a75-4e9d-88c6-909a956ae54d",[],[250],{"id":251,"slug":252,"label":253,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":70,"questions":254,"sections":295},"8ad39781-dfe2-4e65-9645-a0a0f4fecccb","serveur-dauthentification","Serveur d'authentification",[255,271,283],{"id":256,"slug":257,"label":258,"tooltipHtml":9,"descriptionHtml":259,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":260,"displayConditions":9,"answers":261,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"bafe89f0-b764-4825-a3c7-e8b7dea40240","est-ce-que-la-page-dauthentification-est-securisee-par-le-protocole-tls-de-maniere-conforme-aux-recommandations-de-lanssi-dans-son-document-sdent-35-anssi-sde-np1-intitule-recommandations-de-securite-relatives-a-tls-","Est-ce que la page d’authentification est sécurisée par le protocole TLS de manière conforme aux recommandations de l’ANSSI dans ses recommandations de sécurité relatives à TLS ?","\u003Cp>Les recommandations sont accessibles ici : \u003Ca href=\"https://www.ssi.gouv.fr/guide/recommandations-de-securite-relatives-a-tls/\" rel=\"noopener noreferrer nofollow\">https://www.ssi.gouv.fr/guide/recommandations-de-securite-relatives-a-tls/\u003C/a>\u003C/p>",[],[262,265,268],{"id":263,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":264},"ef094bfd-64b1-4af5-9dc4-f0f9e39e7e22",[],{"id":266,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":267},"50fe2725-a998-44aa-bf06-eacd9a238c35",[],{"id":269,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":270},"bbd0f8ac-a96c-45cf-b685-ce3f4fc0df83",[],{"id":272,"slug":273,"label":274,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":275,"displayConditions":9,"answers":276,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"c473daa5-33cb-4a5d-8d67-a33cfbf4de02","lidentite-du-serveur-dauthentification-est-elle-controlee-de-maniere-sure-par-exemple-par-un-certificat-de-securite-","L’identité du serveur d’authentification est-elle contrôlée de manière sûre, par exemple par un certificat de sécurité ?",[],[277,280],{"id":278,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":279},"991fe80a-a201-493d-b15b-9543794e8c0d",[],{"id":281,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":282},"13cdc989-eddc-49ed-bf8a-23490168164e",[],{"id":284,"slug":285,"label":286,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":287,"displayConditions":9,"answers":288,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f50e6942-5682-4e25-8d4b-cc88bab61a5f","la-communication-entre-le-client-et-le-serveur-dauthentification-est-elle-chiffree-","La communication entre le client et le serveur d’authentification est-elle chiffrée ?",[],[289,292],{"id":290,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":291},"60c7c2c6-f8e6-424d-a4ce-db22f33ab65b",[],{"id":293,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":294},"f500dbd7-beeb-4f25-8376-21e9076f24ec",[],[],{"id":297,"slug":298,"label":299,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":300,"sections":421},"ec643b22-6ffa-4a73-8bce-89458b12706b","choix-de-la-pmp-password-management-platform","Choix de la PMP (Password management platform)",[301,319,331,346,358,370,382,394,409],{"id":302,"slug":303,"label":304,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":305,"displayConditions":9,"answers":306,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f033b6f0-e02f-4c06-a6e6-71f50f0912ab","dans-le-cas-ou-les-utilisateurs-ont-la-liberte-de-choisir-des-mots-de-passe-non-aleatoire-est-ce-que-les-risques-sur-les-personnes-dune-usurpation-didentite-ont-ete-identifies-","Dans le cas où les utilisateurs ont la liberté de choisir des mots de passe non aléatoire, est-ce que les risques sur les personnes d’une usurpation d’identité ont été identifiés ?",[],[307,310,313,316],{"id":308,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":309},"18d14fb0-4f93-40bd-9fb2-e05090399e06",[],{"id":311,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":312},"45b0bb95-18ef-4652-a90c-3075054dca23",[],{"id":314,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":315},"a0b06cf5-a2ac-47be-9984-c534fd81d3a6",[],{"id":317,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":318},"e6225e3b-1cf3-4fe2-aa18-0c9cb51d968d",[],{"id":320,"slug":321,"label":322,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":323,"displayConditions":9,"answers":324,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"075fde63-5c91-4f62-a27d-73326f1dbea4","si-les-risques-sur-les-personnes-etablis-a-la-question-precedente-ne-sont-pas-negligeables-est-ce-que-la-politique-mis-en-uvre-demande-des-mots-de-passe-tres-longs-plutot-que-complexes-","Si les risques sur les personnes établis à la question précédente ne sont pas négligeables, est-ce que la politique mis en œuvre demande des mots de passe (très) longs plutôt que complexes ?",[],[325,328],{"id":326,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":327},"db17e60f-4b0d-4991-9cad-bbb4359366c5",[],{"id":329,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":330},"ceb3e4f8-1c1d-4c58-a33d-6182cd7f82e1",[],{"id":332,"slug":333,"label":334,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":335,"displayConditions":9,"answers":336,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"cc76c058-838b-457a-ac6f-31caf4bde472","si-les-risques-sur-les-personnes-etablis-en-17-sont-au-moins-importants-est-ce-que-des-mesures-supplementaires-sont-mises-en-uvre-ex-augmentation-de-lentropie-2fa-etc-","Si les risques sur les personnes établis à la question 1 de cette section sont, au moins, importants, est-ce que des mesures supplémentaires sont mises en œuvre (ex : augmentation de l’entropie, 2FA, etc.) ?",[],[337,340,343],{"id":338,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":339},"966b6231-fe8b-41d2-ba18-a6d38bb59516",[],{"id":341,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":342},"a338af65-2f19-47f6-844c-af9a978a4722",[],{"id":344,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":345},"c2606315-fd3c-4ff8-8f14-6cb3de240e2a",[],{"id":347,"slug":348,"label":349,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":350,"displayConditions":9,"answers":351,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"2919e453-3bde-4610-84ed-2b18cc7e1673","si-le-mot-de-passe-est-destine-a-etre-utilise-pour-un-traitement-sensible-a-la-soumission-abusive-de-mots-de-passe-notamment-les-traitements-accessibles-via-internet-existe-t-il-une-taille-maximale-possible-pour-le-mot-de-passe-","Si le mot de passe est destiné à être utilisé pour un traitement sensible à la soumission abusive de mots de passe (notamment les traitements accessibles via Internet), existe-t-il une taille maximale possible pour le mot de passe ?",[],[352,355],{"id":353,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":354},"5df6eafa-a3bf-459b-9088-9ab7dd3b3de7",[],{"id":356,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":357},"fdf3c237-2c8d-4b73-b21f-582b92c9971d",[],{"id":359,"slug":360,"label":361,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":362,"displayConditions":9,"answers":363,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f18b3a07-ae10-4459-a8af-9169edcfecdb","sil-ne-sagit-pas-de-codes-de-deverrouillage-la-taille-maximale-definie-est-elle-superieure-a-50-caracteres-","S’il ne s’agit pas de codes de déverrouillage, la taille maximale définie est-elle supérieure à 50 caractères ?",[],[364,367],{"id":365,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":366},"f7f5047a-ccc2-455b-af52-c25c214b13f5",[],{"id":368,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":369},"12e0080c-7ad1-47d6-a89f-498799af1628",[],{"id":371,"slug":372,"label":373,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":374,"displayConditions":9,"answers":375,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"21e0dee1-0105-4abb-af55-5f6b20f9a1cf","les-mots-de-passe-les-plus-courants-sont-ils-interdits-","Les mots de passe les plus courants sont-ils interdits ?",[],[376,379],{"id":377,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":378},"649db5d0-523a-4c5a-8b13-a383bd2dd0ff",[],{"id":380,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":381},"4057dad5-30bb-42ee-9e10-6df65685ed57",[],{"id":383,"slug":384,"label":385,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":386,"displayConditions":9,"answers":387,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"3033e71f-a0ed-4b1c-88cd-3988e5cd8850","la-comparaison-avec-les-mots-de-passe-les-plus-courants-est-elle-non-sensible-a-la-casse-","La comparaison avec les mots de passe les plus courants est-elle non-sensible à la casse ?",[],[388,391],{"id":389,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":390},"89fa6943-24e8-41e7-be02-7f6841389954",[],{"id":392,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":393},"b7a31725-8128-488b-862c-79053a46262a",[],{"id":395,"slug":396,"label":397,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":398,"displayConditions":9,"answers":399,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"61169273-8599-45e8-a438-dfbac69a56af","le-cas-dusage-et-le-public-cible-a-t-il-ete-pris-en-compte-dans-le-choix-des-criteres-a-imposer-dans-la-politique-de-gestion-des-mots-de-passe-","Le cas d’usage et le public ciblé a-t-il été pris en compte dans le choix des critères à imposer dans la politique de gestion des mots de passe ?",[],[400,403,406],{"id":401,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":402},"ea8e84a1-e395-4c25-a415-2e8c1fe9e4f5",[],{"id":404,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":405},"31fb6e13-2399-40fa-a3d8-013cbf24e5b7",[],{"id":407,"color":37,"rangeValue":9,"label":38,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":408},"f417e9d2-81bf-47e9-b188-bd1487cb37f8",[],{"id":410,"slug":411,"label":412,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":413,"displayConditions":9,"answers":414,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"289e35b8-bb64-4821-a5dd-1aeb277d52a1","est-ce-que-la-politique-de-mots-de-passe-propose-aux-utilisateurs-une-politique-de-mot-de-passe-correspondant-a-un-des-cas-de-la-recommandation-ou-un-niveau-plus-eleve-","Est-ce que la politique de mots de passe propose aux utilisateurs une politique de mot de passe correspondant à un des cas de la recommandation ou un niveau plus élevé ?",[],[415,418],{"id":416,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":417},"f3246191-6514-40b6-9826-ea16697b641f",[],{"id":419,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":420},"c9d6e781-c847-4426-954a-4eee7e05b6b8",[],[422],{"id":423,"slug":424,"label":425,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":426,"sections":547},"3dc3e23c-a262-4668-bc35-043e21ac1c94","cas-de-la-politique-de-mots-de-passe","Cas de la politique de mots de passe ",[427,442,457,472,487,502,517,532],{"id":428,"slug":429,"label":430,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":431,"displayConditions":9,"answers":432,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"d2e0e2a1-d19a-4ba5-a9e1-23aa2531a904","cas-1-la-politique-correspond-elle-a-un-niveau-equivalent-ou-superieur-a-80-bits-","Cas 1 : La politique correspond -elle à un niveau équivalent ou supérieur à 80 bits ?",[],[433,436,439],{"id":434,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":435},"79ce5a4d-7a0e-481f-b17c-7704d4abf6a4",[],{"id":437,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":438},"c1ef5ddf-5bec-4515-ab7a-8a4016cc5bed",[],{"id":440,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":441},"1f4f08ce-16f1-43c7-a8b3-130b8d838e32",[],{"id":443,"slug":444,"label":445,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":446,"displayConditions":9,"answers":447,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"89d3c691-fbf3-4e3c-82c4-b0d6315f9c6c","cas-1-est-ce-que-mesures-particulieres-ont-ete-prises-pour-aider-les-utilisateurs-a-atteindre-le-niveau-de-securite-par-exemple-outil-de-visualisation-de-la-resistance-du-mot-de-passe-","Cas 1 : Est-ce que mesures particulières ont été prises pour aider les utilisateurs à atteindre le niveau de sécurité (par exemple : outil de visualisation de la résistance du mot de passe) ?",[],[448,451,454],{"id":449,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":450},"7909355e-8a70-4ec5-8a4e-fc1f907b6c56",[],{"id":452,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":453},"7945f389-fe4a-4f6b-a7e8-4513207b9371",[],{"id":455,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":456},"9ad39f6f-363f-4993-9426-81ec2ec47a9c",[],{"id":458,"slug":459,"label":460,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":461,"displayConditions":9,"answers":462,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f9a14b48-e4e3-4f7d-8cbd-dadd56b79db0","cas-2-la-politique-correspond-elle-a-un-niveau-equivalent-ou-superieur-a-50-bits-","Cas 2 : La politique correspond -elle à un niveau équivalent ou supérieur à 50 bits ?",[],[463,466,469],{"id":464,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":465},"4eb7eb4e-9487-4f1f-856a-1eb289ca70c1",[],{"id":467,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":468},"3c6580ad-80f4-4372-b3ec-3b14ad290e78",[],{"id":470,"color":43,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":471},"805d11fd-aed1-436a-b689-8957a9284a4a",[],{"id":473,"slug":474,"label":475,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":476,"displayConditions":9,"answers":477,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"33e072dc-c193-4016-a7fd-19e4a8db63dc","cas-2-est-ce-quun-mecanisme-permettant-de-se-premunir-contre-les-soumissions-automatisees-et-intensives-de-tentatives-est-mis-en-uvre-","Cas 2 : Est-ce qu’un mécanisme permettant de se prémunir contre les soumissions automatisées et intensives de tentatives est mis en œuvre ?",[],[478,481,484],{"id":479,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":480},"5f582ab0-a843-4b10-a831-76fc5f5b390c",[],{"id":482,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":483},"bd7386dd-de6d-4697-8055-df60b3d3ebfc",[],{"id":485,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":486},"ebd007b8-374b-4202-b2fa-4d2f356087bf",[],{"id":488,"slug":489,"label":490,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":491,"displayConditions":9,"answers":492,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"baad84b6-3548-48ec-a295-1217207d638c","cas-2-limpact-de-lindisponibilite-de-leur-compte-sur-les-utilisateurs-consideres-a-t-il-ete-evalue-comme-limite-ou-negligeable-","Cas 2 : L’impact de l’indisponibilité de leur compte sur les utilisateurs considérés a-t-il été évalué comme limité ou négligeable ?",[],[493,496,499],{"id":494,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":495},"e63a97e4-b79b-4319-b2be-56662f2420c6",[],{"id":497,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":498},"465c7aa3-c089-418e-9e71-bc1e5ab0301a",[],{"id":500,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":501},"92d74e54-5bbe-4c18-ab89-457e0f048047",[],{"id":503,"slug":504,"label":505,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":506,"displayConditions":9,"answers":507,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"a5c7a7d6-b573-40b3-a9c1-1fa9063f7fe5","cas-3-la-politique-pour-le-mot-de-passe-correspond-elle-a-un-niveau-equivalent-ou-superieur-a-13-bits-","Cas 3 : La politique pour le mot de passe correspond -elle à un niveau équivalent ou supérieur à 13 bits ?",[],[508,511,514],{"id":509,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":510},"0efd9942-56a4-445f-b407-9bad9ef48099",[],{"id":512,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":513},"d1575dd0-3f01-43de-8403-65c265ee41bc",[],{"id":515,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":516},"52b07d44-a6d6-4e28-a68e-fc82ae8e18e5",[],{"id":518,"slug":519,"label":520,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":521,"displayConditions":9,"answers":522,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"92be0e54-56e2-41ca-9547-148de86292d2","cas-3-lauthentification-concerne-t-il-un-materiel-detenu-en-propre-par-une-personne-","Cas 3 : L’authentification concerne-t-il un matériel détenu en propre par une personne ?",[],[523,526,529],{"id":524,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":525},"b987f7c2-8b58-462f-8592-d4d781c523ad",[],{"id":527,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":528},"9945e463-1e3b-4e82-848a-b0372d0c696a",[],{"id":530,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":531},"70d13c16-7809-4505-bdba-8888aa6f97e7",[],{"id":533,"slug":534,"label":535,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":536,"displayConditions":9,"answers":537,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"fb208554-b34e-4498-a304-a035e7568aa2","cas-3-est-ce-que-le-nombre-dessai-dauthentification-est-limite-a-au-plus-3-","Cas 3 : Est-ce que le nombre d’essai d’authentification est limité à (au plus) 3 ?",[],[538,541,544],{"id":539,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":540},"9d786d97-bf79-4bc1-81e1-5ed13a2a491c",[],{"id":542,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":543},"dbd68e3a-52c3-4773-8e7b-930948eae7d3",[],{"id":545,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":546},"9720a7fd-cd62-4cc2-a1c4-abfe583b043f",[],[],{"id":549,"slug":550,"label":551,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":552,"sections":637},"f526ddc9-908c-41bc-a3fa-096080504b42","modalites-pratiques-generales","Modalités pratiques générales",[553,565,577,589,601,613,625],{"id":554,"slug":555,"label":556,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":557,"displayConditions":9,"answers":558,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"24a838ed-e42e-4461-9cca-e933c78069d0","les-mots-de-passe-sont-ils-masques-par-defaut-lors-de-leur-saisie-","Les mots de passe sont-ils masqués par défaut lors de leur saisie ?",[],[559,562],{"id":560,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":561},"be387090-5429-43ed-b05b-c39d7144a61b",[],{"id":563,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":564},"1a88154c-af88-461c-b902-d5631d906b68",[],{"id":566,"slug":567,"label":568,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":569,"displayConditions":9,"answers":570,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"97d4b502-ccd0-4490-91c1-dd34939e9bf4","lors-dun-echec-dauthentification-le-message-derreur-ne-donne-t-il-aucune-information-sur-la-cause-de-lechec-","Lors d’un échec d’authentification, le message d’erreur ne donne-t-il aucune information sur la cause de l’échec ?",[],[571,574],{"id":572,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":573},"f5502ba7-354f-4cd4-aaee-bfcc49bad17a",[],{"id":575,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":576},"841bec42-f329-4a3c-97c5-be1be6129ad6",[],{"id":578,"slug":579,"label":580,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":581,"displayConditions":9,"answers":582,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"ea7e0c48-8bc9-4395-a6de-96c37ad21f2d","sil-existe-un-mot-de-passe-par-defaut-est-il-impose-a-lutilisateur-de-changer-ce-dernier-lors-de-sa-premiere-connexion-","S’il existe un mot de passe par défaut, est-il imposé à l’utilisateur de changer ce dernier lors de sa première connexion ?",[],[583,586],{"id":584,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":585},"a39a579e-5ace-4e2e-9974-2584eaa87a83",[],{"id":587,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":588},"357d4c7d-7039-4c8d-ba4e-d902b0668a1e",[],{"id":590,"slug":591,"label":592,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":593,"displayConditions":9,"answers":594,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"a3f4a66e-ad99-4df1-b6cc-0ec8ffd69186","est-ce-que-lutilisateur-est-en-mesure-de-coller-un-mot-de-passe-dans-le-champ-prevu-a-cet-effet-depuis-le-presse-papier-de-son-systeme-dexploitation-","Est-ce que l’utilisateur est en mesure de coller un mot de passe dans le champ prévu à cet effet depuis le presse-papier de son système d’exploitation ?",[],[595,598],{"id":596,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":597},"0ce09164-cbd8-4729-91e3-8df89c193c6e",[],{"id":599,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":600},"c1d4afa4-51e5-43bf-8b9d-bede0aca435c",[],{"id":602,"slug":603,"label":604,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":605,"displayConditions":9,"answers":606,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"7c6f5637-3ef2-464b-8753-a637d8ee4469","pour-les-mots-de-passes-envoyes-par-voie-postale-est-ce-que-des-mesures-pour-detecter-leur-interception-ou-empecher-leur-utilisation-sont-prevus-","Pour les mots de passes envoyés par voie postale, est-ce que des mesures pour détecter leur interception ou empêcher leur utilisation sont prévus ?",[],[607,610],{"id":608,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":609},"500b8081-fce0-4bb4-bac9-80c988467da1",[],{"id":611,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":612},"5f3f985e-46bc-4d18-8be6-ef616b55e44d",[],{"id":614,"slug":615,"label":616,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":617,"displayConditions":9,"answers":618,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f8026989-0a7e-4e28-b598-6174fa3cbf1c","pour-tous-les-autres-canaux-est-ce-quaucun-mot-de-passe-nest-transmis-en-clair-a-lutilisateur-","Pour tous les autres canaux, est-ce qu’aucun mot de passe n’est transmis en clair à l’utilisateur ?",[],[619,622],{"id":620,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":621},"4c05f24b-4d47-4f98-82a4-3f43e12f0796",[],{"id":623,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":624},"60f57183-1e76-4c8a-9f58-c580ea87b434",[],{"id":626,"slug":627,"label":628,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":629,"displayConditions":9,"answers":630,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"2d5a78a7-9f92-4ccf-b223-2a599b8a6fdd","est-ce-que-tous-les-mots-de-passes-fournis-a-lutilisateur-sont-soit-temporaires-soit-a-usage-unique-","Est-ce que tous les mots de passes fournis à l’utilisateur sont soit temporaires soit à usage unique ?",[],[631,634],{"id":632,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":633},"88f0f972-594f-4d54-a189-2245ffed4302",[],{"id":635,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":636},"66271bea-9d46-432e-a281-e37bed259f87",[],[],{"id":639,"slug":640,"label":641,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":642,"sections":868},"451cef5c-8e8c-4589-b7f8-f76ed15a5ff0","creation-modification-ou-renouvellement-dun-mot-de-passe","Création, modification ou renouvellement d’un mot de passe",[643,655,667,679,691,703,715,727,739,754,766,778,793,808,823,838,853],{"id":644,"slug":645,"label":646,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":647,"displayConditions":9,"answers":648,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"7464d17c-a014-4d98-9f51-5a5413c831b5","des-mesures-techniques-aident-elles-a-lutilisateur-de-renseigner-un-mot-de-passe-robuste-","Des mesures techniques aident-elles à l’utilisateur de renseigner un mot de passe robuste ?",[],[649,652],{"id":650,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":651},"d0ff1860-94e4-48f1-b755-0b9f25e8a85c",[],{"id":653,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":654},"aa171e09-13c8-407e-bbdd-fd64754000b9",[],{"id":656,"slug":657,"label":658,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":659,"displayConditions":9,"answers":660,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"c8187f4a-1ab6-499d-b1fa-b05f79852bee","les-conditions-dacceptabilite-du-mot-de-passe-sont-elles-clairement-affichees-a-lutilisateur-et-cela-de-facon-comprehensible-par-celui-ci-","Les conditions d’acceptabilité du mot de passe sont-elles clairement affichées à l’utilisateur et cela de façon compréhensible par celui-ci ?",[],[661,664],{"id":662,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":663},"eeec9a81-a9b3-4db7-ad7c-8c1af5e91f2f",[],{"id":665,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":666},"528739e7-cc91-4bf7-a3c7-578099d69bcc",[],{"id":668,"slug":669,"label":670,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":671,"displayConditions":9,"answers":672,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"60b06ea7-121f-4d9c-b836-9200da1ccf5f","les-utilisateurs-sont-ils-guides-dans-le-processus-de-selection-de-leurs-mots-de-passe-afin-de-facilement-determiner-un-mot-de-passe-robuste-et-conforme-a-la-politique-","Les utilisateurs sont-ils guidés dans le processus de sélection de leurs mots de passe afin de facilement déterminer un mot de passe robuste et conforme à la politique ?",[],[673,676],{"id":674,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":675},"bce9cef8-3d01-4b83-9a67-d403241c984f",[],{"id":677,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":678},"464242f6-a9d8-4d93-a0f6-a6780bcf02a5",[],{"id":680,"slug":681,"label":682,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":683,"displayConditions":9,"answers":684,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"7da7ba53-d3cb-4178-b156-8fa3fdf81166","en-cas-de-selection-dun-mot-de-passe-non-conforme-est-il-clairement-affiche-a-lutilisateur-la-regle-ayant-entraine-le-rejet-du-mot-de-passe-","En cas de sélection d’un mot de passe non-conforme, est-il clairement affiché à l’utilisateur la règle ayant entraîné le rejet du mot de passe ?",[],[685,688],{"id":686,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":687},"52a1a3b3-fb9e-4521-9041-b8436d3b0a3a",[],{"id":689,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":690},"1e9ad20c-0d5e-41aa-b413-e9c2c970b3ae",[],{"id":692,"slug":693,"label":694,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":695,"displayConditions":9,"answers":696,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"2055e663-b85f-4e08-bb69-be4c2ee35501","lutilisateur-est-il-en-mesure-de-modifier-son-mot-de-passe-lui-meme-en-toute-autonomie-","L’utilisateur est-il en mesure de modifier son mot de passe lui-même, en toute autonomie ?",[],[697,700],{"id":698,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":699},"39b32fc6-dc8b-4ebc-8810-4c5b18c358ea",[],{"id":701,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":702},"bd852f2c-8192-4ee8-9827-d89fb4ba2ad9",[],{"id":704,"slug":705,"label":706,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":707,"displayConditions":9,"answers":708,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"7a9c0ee7-89f1-43df-80e2-be78493c92b4","est-ce-quil-nest-pas-impose-aux-utilisateurs-de-modifier-leur-mot-de-passe-de-maniere-periodique-","Est-ce qu’il n’est pas imposé aux utilisateurs de modifier leur mot de passe de manière périodique ?",[],[709,712],{"id":710,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":711},"74e57f3c-6a90-4d03-8895-a6f478ad6747",[],{"id":713,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":714},"a4a35f9f-7d5b-44f8-a93d-09126d2dc8d3",[],{"id":716,"slug":717,"label":718,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":719,"displayConditions":9,"answers":720,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"d787639f-bb87-4fff-8696-12b396ed18cb","est-ce-quil-est-impose-aux-comptes-a-privilege-de-modifier-leur-mot-de-passe-de-maniere-periodique-","Est-ce qu’il est imposé aux comptes à privilège de modifier leur mot de passe de manière périodique ?",[],[721,724],{"id":722,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":723},"54b1c6d0-852c-4075-9cd8-cf68e67c2d6d",[],{"id":725,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":726},"1bf45c0d-4654-417f-ae6d-e1acadc5ad2c",[],{"id":728,"slug":729,"label":730,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":731,"displayConditions":9,"answers":732,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"fdd69e49-8dfe-474c-be2c-eab4298c04c2","lorsquune-reinitialisation-est-demandee-par-lutilisateur-est-ce-que-seul-un-message-du-type-si-un-compte-existe-alors-une-information-est-envoyee-est-affiche-","Lorsqu’une réinitialisation est demandée par l’utilisateur, est-ce que seul un message du type « si un compte existe, alors une information est envoyée » est affiché ?",[],[733,736],{"id":734,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":735},"c7353caf-fc6b-4d9e-a640-d35c8d93e37b",[],{"id":737,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":738},"c8716d87-45fb-4067-916a-2b4c58a2194c",[],{"id":740,"slug":741,"label":742,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":743,"displayConditions":9,"answers":744,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"9aed3869-a827-4621-af71-fb36ea114824","si-le-renouvellement-du-mot-de-passe-se-fait-par-lenvoi-dun-lien-ou-dun-jeton-par-un-autre-canal-est-ce-que-cela-se-fait-via-un-canal-prealablement-valide-","Si le renouvellement du mot de passe se fait par l’envoi d’un lien ou d’un jeton par un autre canal, est-ce que cela se fait via un canal préalablement validé ?",[],[745,748,751],{"id":746,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":747},"d04bbec2-b6b0-4a85-96d4-9f6102940bdc",[],{"id":749,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":750},"25ebcb4a-9285-433d-83fa-9d4b6127d74d",[],{"id":752,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":753},"ea793bb1-4b18-4465-822e-31746f46a219",[],{"id":755,"slug":756,"label":757,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":758,"displayConditions":9,"answers":759,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"77c6e1ee-49df-4f68-a680-71f4eea08085","est-ce-que-les-canaux-de-communication-recemment-ajoutes-ou-modifies-sont-exclus-de-ces-envois-","Est-ce que les canaux de communication récemment ajoutés ou modifiés sont exclus de ces envois ?",[],[760,763],{"id":761,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":762},"8140a0a3-86fe-4e74-9127-2189911e22ee",[],{"id":764,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":765},"f2cf4ae0-c95f-4a41-82ec-50f8f19a7b6a",[],{"id":767,"slug":768,"label":769,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":770,"displayConditions":9,"answers":771,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"22baa515-9bd6-4ae6-9d6a-ebfd8f62d882","est-ce-quun-ajout-une-modification-ou-une-suppression-des-canaux-de-communication-est-systematiquement-notifie-a-lutilisateur-","Est-ce qu’un ajout, une modification ou une suppression des canaux de communication est systématiquement notifié à l’utilisateur ?",[],[772,775],{"id":773,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":774},"015a6963-4e8b-4480-8617-fddac61d3c2f",[],{"id":776,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":777},"d087b96c-6153-4ad6-8933-a5050e678f61",[],{"id":779,"slug":780,"label":781,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":782,"displayConditions":9,"answers":783,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"a8449c7f-e100-4ffd-9275-975f40cf2d40","sil-est-envoye-un-lien-ou-un-jeton-a-lutilisateur-ce-lien-ou-jeton-est-il-a-usage-unique-","S’il est envoyé un lien ou un jeton à l’utilisateur, ce lien ou jeton est-il à usage unique ?",[],[784,787,790],{"id":785,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":786},"7c4f4623-e5f3-4593-9367-22cb9c4eebee",[],{"id":788,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":789},"de34c627-8b18-45ca-b5c2-c2e584e89ae1",[],{"id":791,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":792},"11228068-c337-486a-8ce1-2d366400e1d1",[],{"id":794,"slug":795,"label":796,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":797,"displayConditions":9,"answers":798,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"2a0df83f-a630-48e4-b026-6f158ae8d7fd","sil-est-envoye-un-lien-ou-un-jeton-a-lutilisateur-ce-lien-ou-jeton-a-t-il-une-duree-de-validite-dau-maximum-24-heures-","S’il est envoyé un lien ou un jeton à l’utilisateur, ce lien ou jeton a-t-il une durée de validité d’au maximum 24 heures ?",[],[799,802,805],{"id":800,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":801},"06466c49-5f75-49b6-aa8e-dd11e19d6ab3",[],{"id":803,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":804},"c038c977-ce3e-4c61-b34b-f38a111bc44b",[],{"id":806,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":807},"e7fd43ab-b3bb-4ef3-bd87-b6df745d5dd5",[],{"id":809,"slug":810,"label":811,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":812,"displayConditions":9,"answers":813,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"547bec12-71a6-468b-8eb2-fc52b7f01fb5","sil-est-envoye-un-lien-ou-un-jeton-a-lutilisateur-les-liens-ou-jetons-precedemment-envoyes-sont-ils-automatiquement-revoques-","S’il est envoyé un lien ou un jeton à l’utilisateur, les liens ou jetons précédemment envoyés sont-ils automatiquement révoqués ?",[],[814,817,820],{"id":815,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":816},"bffc1b69-9053-41e5-bdb2-0938a3954004",[],{"id":818,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":819},"d6bb0a1e-daf2-4495-b798-d36e2d4b6499",[],{"id":821,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":822},"8e47e72c-8677-481b-9655-24a3d7afbafb",[],{"id":824,"slug":825,"label":826,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":827,"displayConditions":9,"answers":828,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"6fc760e8-79dd-4482-a1be-b3b730be5409","si-le-renouvellement-necessite-la-reponse-a-des-questions-secretes-est-ce-que-les-informations-habituellement-publiques-nom-des-parents-lieu-detude-nom-des-animaux-de-compagnie-etc-sont-exclues-","Si le renouvellement nécessite la réponse à des questions secrètes, est-ce que les informations habituellement publiques (nom des parents, lieu d’étude, nom des animaux de compagnie, etc.) sont exclues ?",[],[829,832,835],{"id":830,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":831},"9bba9542-e842-469f-b7de-c3a41bb78bc6",[],{"id":833,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":834},"2d18f59e-e12d-4508-aa1a-fc8e1cc6b475",[],{"id":836,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":837},"2d1ccbfe-a9ea-4c59-b3ed-fa09ffd9ba20",[],{"id":839,"slug":840,"label":841,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":842,"displayConditions":9,"answers":843,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"1f0a6502-ef86-462b-b83b-3b477c2bbde7","les-reponses-a-ces-questions-secretes-sont-elles-conservees-dans-un-endroit-different-du-mot-de-passe-ou-bien-chiffrees-","Les réponses à ces questions secrètes sont-elles conservées dans un endroit différent du mot de passe ou bien chiffrées ?",[],[844,847,850],{"id":845,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":846},"7e9046ee-c529-4918-b99c-61287673b505",[],{"id":848,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":849},"6ead4f64-d7ea-43f6-9518-00eb6284bc2d",[],{"id":851,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":852},"86ea7d1a-f6d5-4f5f-8047-0549a8e59aa8",[],{"id":854,"slug":855,"label":856,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":857,"displayConditions":9,"answers":858,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"93823a96-fcc5-466e-97d9-33aee30eebb8","est-ce-quun-ajout-une-modification-ou-une-suppression-de-ces-questions-secretes-est-systematiquement-notifie-a-lutilisateur-","Est-ce qu’un ajout, une modification ou une suppression de ces questions secrètes est systématiquement notifié à l’utilisateur ?",[],[859,862,865],{"id":860,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":861},"0fac2d81-3adf-4ae8-a7be-bd41aefb043d",[],{"id":863,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":864},"39c0817a-797a-49fc-b209-ee5c269f566a",[],{"id":866,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":867},"aadcb876-735e-4bdd-a71d-a5f8b75a6306",[],[],{"id":870,"slug":871,"label":872,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":873,"sections":976},"e2dc191c-123a-429b-a686-1f8741bffedf","stockage-des-mots-de-passe","Stockage des mots de passe",[874,886,901,913,925,937,949,961],{"id":875,"slug":876,"label":877,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":878,"displayConditions":9,"answers":879,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"cee434e9-10bf-49ec-86a6-328810525963","les-mots-de-passe-ne-sont-ils-jamais-stockes-en-clair-","Les mots de passe ne sont-ils jamais stockés en clair ?",[],[880,883],{"id":881,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":882},"9dbea9b8-134c-4ee4-9950-52efc3c702fb",[],{"id":884,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":885},"7d1eab65-5c25-44b8-89c3-d648b5674068",[],{"id":887,"slug":888,"label":889,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":890,"displayConditions":9,"answers":891,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f10f3e8b-ec36-4791-909d-b7c96118db3f","si-un-pake-est-mis-en-uvre-sagit-il-dun-schema-public-et-prouve-sur-","Si un PAKE est mis en œuvre, s’agit-il d’un schéma public et prouvé sûr ?",[],[892,895,898],{"id":893,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":894},"b5ff7068-65ed-432e-a049-1bfd803a5f27",[],{"id":896,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":897},"6c5bfbde-4f9d-46e3-8cb4-906fe24d0c60",[],{"id":899,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":900},"730ae26f-5da3-434b-8309-a9132d26fe33",[],{"id":902,"slug":903,"label":904,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":905,"displayConditions":9,"answers":906,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"b6f97300-9a36-4317-9aba-40a59fb163e9","dans-le-cadre-du-mecanisme-dauthentification-les-mots-de-passe-stockes-sont-ils-conserves-sous-forme-hachee-avec-une-fonction-specialisee-pour-le-stockage-des-mots-de-passe-","Dans le cadre du mécanisme d’authentification, les mots de passe stockés sont-ils conservés sous forme hachée avec une fonction spécialisée pour le stockage des mots de passe ?",[],[907,910],{"id":908,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":909},"aedcedad-0d37-45e3-af5e-1ffdd8131ee8",[],{"id":911,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":912},"33bbd1f2-4e53-4ab3-a761-75b3059c2f42",[],{"id":914,"slug":915,"label":916,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":917,"displayConditions":9,"answers":918,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"71fdbd6d-942f-4635-bec5-25563254dfee","la-fonction-de-stockage-de-mots-de-passe-choisie-utilise-t-elle-au-moins-un-parametre-de-configuration-du-cout-en-temps-au-moins-un-parametre-de-configuration-du-cout-en-memoire-et-un-sel-","La fonction de stockage de mots de passe choisie utilise-t-elle au moins un paramètre de configuration du coût en temps, au moins un paramètre de configuration du coût en mémoire et un sel ?",[],[919,922],{"id":920,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":921},"59223cab-3d55-4947-817e-309fcabfdb0b",[],{"id":923,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":924},"c084c2b2-eb9d-4829-bd7f-963366f7eb09",[],{"id":926,"slug":927,"label":928,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":929,"displayConditions":9,"answers":930,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"5e35964e-efae-424a-96b0-8ab15a954453","le-sel-est-il-genere-aleatoirement-et-fait-il-au-moins-128-bits-","Le sel est-il généré aléatoirement et fait-il au moins 128 bits ?",[],[931,934],{"id":932,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":933},"01286f45-e65d-4b98-a824-8dceaabb71b6",[],{"id":935,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":936},"4a9372b4-f7ef-4552-9dde-edd7049f9262",[],{"id":938,"slug":939,"label":940,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":941,"displayConditions":9,"answers":942,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"2ec5f93a-2196-408e-a85b-491db67845bb","les-parametres-sont-ils-revus-au-moins-une-fois-par-an-","Les paramètres sont-ils revus au moins une fois par an ?",[],[943,946],{"id":944,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":945},"e84245bb-ebad-483a-a15a-68f7202324e0",[],{"id":947,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":948},"f15a090e-11d9-4b78-bd65-99f38036bf78",[],{"id":950,"slug":951,"label":952,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":953,"displayConditions":9,"answers":954,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"5bee0c88-a257-4824-8103-32bee59ffd99","le-choix-de-la-fonction-de-hachage-est-il-reevalue-au-moins-une-fois-par-an-","Le choix de la fonction de hachage est-il réévalué au moins une fois par an ?",[],[955,958],{"id":956,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":957},"9467f079-7c3f-4d1b-804d-06be6002d106",[],{"id":959,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":960},"b08cab9a-5fa7-4d6b-b47c-950ca8600449",[],{"id":962,"slug":963,"label":964,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":965,"displayConditions":9,"answers":966,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"b81586dd-6c5a-4bcc-85d0-3492e45c4bf2","pour-les-gestionnaires-de-mots-de-passe-les-mots-de-passe-sont-ils-stockes-chiffres-avec-un-algorithme-public-repute-sur-ie-conforme-aux-annexes-b1-et-b2-du-rgs-","Pour les gestionnaires de mots de passe, les mots de passe sont-ils stockés chiffrés avec un algorithme public réputé sûr (ie. conforme aux annexes B1 et B2 du RGS) ?",[],[967,970,973],{"id":968,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":969},"393f0036-ec18-4840-b5d2-e12e958a7589",[],{"id":971,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":972},"4e4291d6-f4f3-4454-ab07-2b0144c0154f",[],{"id":974,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":975},"ba54cbef-fb8d-4ce6-a582-1d5f9f846611",[],[],{"id":978,"slug":979,"label":980,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":981,"sections":1042},"866a7e70-fb39-41b4-b59d-4b97a164f0bc","gestion-des-compromissions","Gestion des compromissions",[982,994,1006,1018,1030],{"id":983,"slug":984,"label":985,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":986,"displayConditions":9,"answers":987,"listQuestions":9,"required":45,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"de823b43-e9b8-4ec2-a4e0-664ca9572653","les-utilisateurs-sont-ils-systematiquement-notifies-en-cas-de-compromission-averee-ou-suspectee-de-ses-moyens-dauthentification-","Les utilisateurs sont-ils systématiquement notifiés en cas de compromission avérée ou suspectée de ses moyens d’authentification ?",[],[988,991],{"id":989,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":990},"50429363-ec9e-4639-a3ef-347b8da97cde",[],{"id":992,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":993},"79eb92c5-ec0b-4987-8833-7e929dd9049e",[],{"id":995,"slug":996,"label":997,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":998,"displayConditions":9,"answers":999,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"6e7f7cce-752a-4f1e-8fdf-0ae735c90397","en-cas-de-compromission-averee-ou-suspectee-est-ce-quune-evaluation-du-risque-dusurpation-de-compte-et-de-ses-impacts-est-prevue-afin-de-decider-de-la-necessite-de-bloquer-temporairement-les-comptes-ou-de-renforcer-lidentification-des-utilisateurs-","En cas de compromission avérée ou suspectée, est-ce qu’une évaluation du risque d’usurpation de compte et de ses impacts est prévue afin de décider de la nécessité de bloquer temporairement les comptes ou de renforcer l’identification des utilisateurs ?",[],[1000,1003],{"id":1001,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1002},"62e257b3-446c-4307-af40-0830e3b6f163",[],{"id":1004,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1005},"89911620-d7cf-4918-b7cd-1b5be6b0adf1",[],{"id":1007,"slug":1008,"label":1009,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1010,"displayConditions":9,"answers":1011,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"bd4bea8d-e9e1-45f9-8d20-0535b60af62d","en-cas-de-compromission-averee-ou-suspectee-lutilisateur-est-il-oblige-de-renouveler-son-mot-de-passe-","En cas de compromission avérée ou suspectée, l’utilisateur est-il obligé de renouveler son mot de passe ?",[],[1012,1015],{"id":1013,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1014},"b94a2383-192e-4b15-84f5-3d1f58a80495",[],{"id":1016,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1017},"b2520092-67f7-4920-99d7-a6c449f08029",[],{"id":1019,"slug":1020,"label":1021,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1022,"displayConditions":9,"answers":1023,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"fc100964-91d2-4dae-bc92-8e257ab7973f","sil-est-fait-usage-dune-information-complementaire-cas-no-3-cette-derniere-est-elle-obligatoirement-renouvelee-en-cas-de-compromission-averee-ou-suspectee-","S’il est fait usage d’une information complémentaire (cas no 3), cette dernière est-elle obligatoirement renouvelée en cas de compromission avérée ou suspectée ?",[],[1024,1027],{"id":1025,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1026},"19d5b4d9-e08c-4da4-b33a-980f60796389",[],{"id":1028,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1029},"31479eec-70ed-4e07-8a6e-cbd4afb5354d",[],{"id":1031,"slug":1032,"label":1033,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1034,"displayConditions":9,"answers":1035,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"86f42ab1-dd4d-42c1-b916-be39d5508a8a","sil-est-fait-usage-de-questions-secretes-ces-dernieres-et-leurs-reponses-sont-elles-obligatoirement-renouvelees-en-cas-de-compromission-averee-ou-suspectee-","S’il est fait usage de questions secrètes, ces dernières et leurs réponses sont-elles obligatoirement renouvelées en cas de compromission avérée ou suspectée ?",[],[1036,1039],{"id":1037,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1038},"fa1c9ff2-66d5-45f6-aa2b-2e5ae5b1f060",[],{"id":1040,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1041},"e9f4093a-a21a-4e49-a484-372c0fe56fcc",[],[],{"id":1044,"slug":1045,"label":1046,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":1047,"sections":1096},"0efd64cf-f165-40fe-8eeb-a692a9118807","journalisation","Journalisation",[1048,1060,1072,1084],{"id":1049,"slug":1050,"label":1051,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1052,"displayConditions":9,"answers":1053,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"67150990-6756-4097-9ddb-6aa22fb40a59","les-authentifications-reussies-sont-elles-journalisees-","Les authentifications réussies sont-elles journalisées ?",[],[1054,1057],{"id":1055,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1056},"93fe7b88-b2e8-4bdb-8f3e-40463d16fe85",[],{"id":1058,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1059},"27f80e74-e64e-4c67-95c3-38cc5a90d0da",[],{"id":1061,"slug":1062,"label":1063,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1064,"displayConditions":9,"answers":1065,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"57d41dd0-e72a-4ada-865c-e4f31753bb95","les-echecs-dauthentification-sont-ils-journalises-","Les échecs d’authentification sont-ils journalisés ?",[],[1066,1069],{"id":1067,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1068},"04174fbc-5b8c-46d8-91ad-407c4a6c3b27",[],{"id":1070,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1071},"9a194fd9-ab28-4eb7-bd77-847b9defe13a",[],{"id":1073,"slug":1074,"label":1075,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1076,"displayConditions":9,"answers":1077,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"f0f18072-4ab9-4219-a02b-b06f97644f56","est-ce-que-les-mots-de-passe-utilises-sont-exclus-de-toute-journalisation-","Est-ce que les mots de passe utilisés sont exclus de toute journalisation ?",[],[1078,1081],{"id":1079,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1080},"434a98bc-9a4f-47e8-a39c-481dc4ac6084",[],{"id":1082,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1083},"0fab7d7f-a327-45de-a10e-5ea2cf6c602a",[],{"id":1085,"slug":1086,"label":1087,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1088,"displayConditions":9,"answers":1089,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"1a88fd9b-23a1-4574-9a52-62c86636a3bf","est-ce-que-les-identifiants-inconnus-du-systeme-sont-exclus-de-la-journalisation-","Est-ce que les identifiants inconnus du système sont exclus de la journalisation ?",[],[1090,1093],{"id":1091,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1092},"191f5070-7260-49b8-827e-c7562239f25b",[],{"id":1094,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1095},"8002c7bd-5600-4091-a29d-08449770c01d",[],[],{"id":1098,"slug":1099,"label":1100,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":1101,"sections":1204},"4249143f-72bb-419b-84df-dee8e7d49a3b","sous-traitants-et-editeurs-de-logiciels","Sous-traitants et éditeurs de logiciels",[1102,1114,1126,1138,1150,1162,1174,1189],{"id":1103,"slug":1104,"label":1105,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1106,"displayConditions":9,"answers":1107,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"c01f3791-b7d9-48dc-b696-0fe316617952","le-contrat-stipule-t-il-clairement-le-perimetre-des-responsabilites-","Le contrat stipule-t-il clairement le périmètre des responsabilités ?",[],[1108,1111],{"id":1109,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1110},"1b4cf7e9-bca6-46a6-83a1-639acefd99aa",[],{"id":1112,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1113},"f4c166a7-fc6c-4f74-9a9b-bf1fd2a6764e",[],{"id":1115,"slug":1116,"label":1117,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1118,"displayConditions":9,"answers":1119,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"48a96a14-4882-41ed-88fd-49139a0b20d0","le-contrat-stipule-t-il-clairement-le-niveau-de-securite-du-systeme-","Le contrat stipule-t-il clairement le niveau de sécurité du système ?",[],[1120,1123],{"id":1121,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1122},"ea116120-ea2b-45e2-8b25-cb8566a08dc1",[],{"id":1124,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1125},"f95c8d4f-90ca-4a18-8709-ef970544362c",[],{"id":1127,"slug":1128,"label":1129,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1130,"displayConditions":9,"answers":1131,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"d2205810-af58-447d-99e7-c90da42047f7","une-documentation-reprenant-lensemble-des-points-des-presentes-recommandations-techniques-indiquant-est-elle-mise-a-disposition-des-responsables-de-traitements-","Une documentation reprenant l’ensemble des points des présentes recommandations techniques indiquant est-elle mise à disposition des responsables de traitements ?",[],[1132,1135],{"id":1133,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1134},"6f18d044-4f79-414a-a724-1fe6e81ef2b7",[],{"id":1136,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1137},"37567877-ceb5-4731-8af4-c6aa1cd3df29",[],{"id":1139,"slug":1140,"label":1141,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1142,"displayConditions":9,"answers":1143,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"ea122c03-3ef3-46d3-a983-040eb5087512","pour-les-logiciels-une-documentation-precise-t-elle-les-modalites-de-generation-stockage-et-transmission-des-mots-de-passe-","Pour les logiciels, une documentation précise-t-elle les modalités de génération, stockage et transmission des mots de passe ?",[],[1144,1147],{"id":1145,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1146},"5365c36e-a8db-4502-b4c8-cd5eb9bd37f8",[],{"id":1148,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1149},"b4638a48-19dc-41fd-bf94-1f804a3c30fa",[],{"id":1151,"slug":1152,"label":1153,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1154,"displayConditions":9,"answers":1155,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"2f3a3b07-cd0b-4b2c-b0be-a4339bf88e95","la-solution-est-elle-configurable-de-maniere-a-respecter-lensemble-des-presentes-recommandations-techniques-","La solution est-elle configurable de manière à respecter l’ensemble des présentes recommandations techniques ?",[],[1156,1159],{"id":1157,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1158},"c006246a-817a-41cd-847a-3761331e7404",[],{"id":1160,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1161},"9670e8b8-19d9-47d5-9fe7-1da769e2718a",[],{"id":1163,"slug":1164,"label":1165,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1166,"displayConditions":9,"answers":1167,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"25963e20-19a9-417d-8f47-942380277d9b","la-solution-est-elle-configuree-par-defaut-de-maniere-a-respecter-lensemble-des-presentes-recommandations-techniques-","La solution est-elle configurée par défaut de manière à respecter l’ensemble des présentes recommandations techniques ?",[],[1168,1171],{"id":1169,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1170},"3ea9ccfe-bd02-40ae-b308-3d488451ca60",[],{"id":1172,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1173},"906bbff7-7750-428c-ae06-f11e40bb1fd8",[],{"id":1175,"slug":1176,"label":1177,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1178,"displayConditions":9,"answers":1179,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"dbe3b0fc-54f0-46ff-832d-7cd083cd6833","en-cas-dhebergement-pour-le-compte-dun-responsable-de-traitement-les-journaux-sont-ils-regulierement-audites-de-maniere-a-detecter-des-comportements-suspects-","En cas d’hébergement pour le compte d’un responsable de traitement, les journaux sont-ils régulièrement audités de manière à détecter des comportements suspects ?",[],[1180,1183,1186],{"id":1181,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1182},"89cad399-8998-4267-9c96-3f13e2ffcc0c",[],{"id":1184,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1185},"7cbfd323-b285-446e-be1b-03727f5a661b",[],{"id":1187,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1188},"0b04f2ff-508f-4061-8c44-be7c8e88fa6d",[],{"id":1190,"slug":1191,"label":1192,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":18,"typeIndex":19,"typeColor":9,"typeIcon":9,"typeText":20,"dynamicSelectType":9,"editableOptions":21,"complianceRules":1193,"displayConditions":9,"answers":1194,"listQuestions":9,"required":21,"requiredJustification":21,"suggestTask":21,"riskEnabled":45,"native":21},"c81c04ba-f8a7-4c30-8960-edcb79b2d11e","en-cas-dhebergement-pour-le-compte-dun-responsable-de-traitement-les-compromissions-averees-ou-suspectees-sont-elles-systematiquement-notifiees-au-responsable-de-traitement-","En cas d’hébergement pour le compte d’un responsable de traitement, les compromissions avérées ou suspectées sont-elles systématiquement notifiées au responsable de traitement ?",[],[1195,1198,1201],{"id":1196,"color":26,"rangeValue":9,"label":27,"slug":9,"description":9,"score":39,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1197},"e8cc5290-ef24-4db6-aad2-9ddd41fa4a06",[],{"id":1199,"color":32,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":21,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1200},"b34bce31-66eb-4a0d-ada7-bb8a8034fb18",[],{"id":1202,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":45,"tooltip":9,"goodAnswer":21,"redFlag":21,"impact":9,"probability":9,"taskSuggestions":1203},"d1de9a35-64e9-4913-b3c5-e63403e19dea",[],[],[],"08119a7b-a948-441a-aa88-08db045c00d1","1.0","Sécurité des mots de passe","Irspaq007WB0vsjoI09wgUMuQeVtpgGf0lCPfqCZRMyBI8VG5kTPKk0TXG7u",15,"https://static.dastra.eu/tenant-3/audit/abxX6ZmflR8n0m/sans-titre-8-150.png","Evaluation de la sécurité des mots de passe selon le référentiel de la CNIL","2023-02-01T21:50:34.8008957","2024-08-29T13:16:36.6040974","Compliance","Conformité cyber",{"id":1218,"displayName":1219,"familyName":1220,"givenName":1221,"email":1222,"active":45,"color":1223,"avatarUrl":1224,"tenantId":11},69,"Dastro Naute","Naute","Dastro","contact@dastra.eu","#784000","https://static.dastra.eu/tenant-3/avatar/69/assistant-150.png","SecurityMeasure",5,"#1cbc97","ds-icon-security-measure","Mesure de sécurité",[1231],{"id":1232,"displayName":1233,"familyName":1234,"givenName":1235,"email":1236,"active":45,"color":1237,"avatarUrl":9,"tenantId":11},39,"Antoine Bidault","Bidault","Antoine","antoine.bidault@dastra.eu","#197BBD",[1239,1248,1251],{"id":1240,"label":1241,"type":1242,"typeIndex":1243,"typeColor":1244,"typeIcon":1245,"typeText":1246,"color":1247},"87389301-daf5-4fd5-81b1-2835b213b01e","Sécurité","AuditTemplate",9,"#83d162","ds-icon-audit","Modèle de questionnaire","#CDAAC9",{"id":1249,"label":1250,"type":1242,"typeIndex":1243,"typeColor":1244,"typeIcon":1245,"typeText":1246,"color":32},"48db524d-e5d9-4140-b1f2-60a20ca38936","CNIL",{"id":1252,"label":1253,"type":1242,"typeIndex":1243,"typeColor":1244,"typeIcon":1245,"typeText":1246,"color":1254},"87b8e0f8-3e5f-435a-806f-f6011b1fa576","RGPD","#6610f2",84,3]