[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fOdsfwp71Hpun9MHGACMVg39NJDOQ_fnaVR8v7ojSIfs":3},{"sections":4,"resultAnalysis":268,"id":269,"version":270,"newVersion":23,"label":271,"isPinned":23,"isShared":41,"sharingToken":272,"isRevision":23,"isBlockAnalysisShared":41,"nbReferences":273,"referenceId":9,"nbResponses":11,"parentId":9,"revisionDescription":9,"logoUrl":274,"description":275,"scheduleIntervalDays":9,"versionNumber":30,"dateCreation":276,"dateUpdate":277,"dateArchived":9,"archived":23,"type":278,"typeIndex":30,"typeColor":9,"typeIcon":9,"typeText":279,"creator":280,"objectType":9,"defaultOwners":287,"tags":296,"privacyHubs":9,"nbQuestions":306,"nbQuestionsRequired":306,"nbDatas":11,"deadLineDays":9},[5],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":13,"questions":14,"sections":267},"0c77bc62-cbf0-48f7-a4c7-1ba32e9e0f7f","initial","Première section",null,"Default",0,"SectionType_Default","\u003Cp>\u003Cstrong>Evaluation du niveau de sécurité du site internet\u003C/strong>\u003C/p>",[15,43,59,75,91,107,123,139,155,171,187,203,219,235,251],{"id":16,"slug":17,"label":18,"tooltipHtml":9,"descriptionHtml":19,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":24,"displayConditions":9,"answers":25,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"6a3fe666-9ef4-494b-b42f-a053cc9f9837","les-acces-a-mon-site-internet-sont-ils-filtres-par-un-pare-feu-","Les accès au site internet sont-ils filtrés par un pare-feu ?","\u003Cp>Un pare-feu est un équipement qui permet de limiter les accès aux seuls services et machines autorisées\u003C/p>","Radio",7,"Liste de cases à cocher (une seule réponse)",false,[],[26,32,37],{"id":27,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":31},"b37b81a3-0390-4f3c-879b-5415656f564c","#084887","Oui",1,[],{"id":33,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":36},"519bcd12-1a1c-4581-b385-809c5bf05485","#E7630A","Non",[],{"id":38,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":42},"d13f99dd-5891-4bc6-9adf-bb437c051d68","#727a94","Ne sait pas",true,[],{"id":44,"slug":45,"label":46,"tooltipHtml":9,"descriptionHtml":47,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":48,"displayConditions":9,"answers":49,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"31b11784-dba1-499e-992d-51b0b3a3d670","mon-site-internet-est-il-protege-contre-les-attaques-en-deni-de-service-","Le site internet est-il protégé contre les attaques en déni de service ?","\u003Cp>L'opérateur et/ou l'hébergeur peuvent mettre en place des solutions pour absorber la surcharge de trafic de ce type de cyberattaque\u003C/p>",[],[50,53,56],{"id":51,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":52},"13675a0c-870a-4894-b973-0c56ce561f14",[],{"id":54,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":55},"fb006a25-5072-4a6f-a554-c013a2fcd773",[],{"id":57,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":58},"1110fa93-bf93-43d8-a374-1789df96eca0",[],{"id":60,"slug":61,"label":62,"tooltipHtml":9,"descriptionHtml":63,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":64,"displayConditions":9,"answers":65,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"9ecf4b36-8fd2-41b8-b7ea-23d5ecdf672b","le-site-internet-est-il-protege-par-un-antivirus-","Le site internet est-il protégé par un antivirus ?","\u003Cp>Un antivirus peut détecter et bloquer des programmes malveillants qui pourraient être déposés ou stockés sur le site\u003C/p>",[],[66,69,72],{"id":67,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":68},"b29364ae-64ff-40c7-ae9c-a5d2d7d80cf1",[],{"id":70,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":71},"534b7313-9a49-4471-94aa-315e6708abb4",[],{"id":73,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":74},"648b5b5e-d0e6-446b-8408-5caf15376e9f",[],{"id":76,"slug":77,"label":78,"tooltipHtml":9,"descriptionHtml":79,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":80,"displayConditions":9,"answers":81,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"c0a7789e-816c-4036-a8ea-f65e06a0eb33","5863e37d-504c-4049-8733-6e01b0ac181b","Le site internet est-il régulièrement mis à jour de tous les correctifs de sécurité matériels et logiciels ?","\u003Cp>L’application des mises à jour de sécurité sur toutes les composantes de votre site permet de supprimer les failles de sécurité connue\u003C/p>",[],[82,85,88],{"id":83,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":84},"795e9a43-6750-4294-9420-a7beaf9950b2",[],{"id":86,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":87},"eed9c0bb-1c9a-4baa-9944-b0b66203e3e6",[],{"id":89,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":90},"d94c4023-4a9f-46e0-a96b-c38255e25f0a",[],{"id":92,"slug":93,"label":94,"tooltipHtml":9,"descriptionHtml":95,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":96,"displayConditions":9,"answers":97,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"8a6edad8-521c-42ae-a6b9-c9934953684b","f63b5e99-5120-462d-966b-58d2474fbec9","Le site internet est-il régulièrement sauvegardé et ses sauvegardes testées ?","\u003Cp>Une sauvegarde opérationnelle est indispensable pour pouvoir rétablir le site internet dans l’état antérieur à un incident.\u003C/p>",[],[98,101,104],{"id":99,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":100},"d884efb9-7df6-4d08-a855-a05091eeb7d5",[],{"id":102,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":103},"8d1ffdd1-e280-4140-a617-f87d10e9bd98",[],{"id":105,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":106},"08ae2e1b-7dc1-4a21-b376-19efcfb65351",[],{"id":108,"slug":109,"label":110,"tooltipHtml":9,"descriptionHtml":111,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":112,"displayConditions":9,"answers":113,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"4f9325e4-fe10-4267-bad9-7eb736a3c5c0","079d856e-a70d-412e-9bc8-55571e4feb33","Les services ouverts sur le site internet sont-ils limités au strict nécessaire ?","\u003Cp>Chaque service ouvert sur le site internet est une porte d’entrée possible pour un cybercriminel. Il convient donc de les limiter à l’indispensable.\u003C/p>",[],[114,117,120],{"id":115,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":116},"44a17535-e57e-41ae-bfb4-5d3487746a25",[],{"id":118,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":119},"5fcb9e2a-13c5-4709-9578-aefef0ff9117",[],{"id":121,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":122},"27934e18-d7c5-4fe1-a16f-fe97d8187152",[],{"id":124,"slug":125,"label":126,"tooltipHtml":9,"descriptionHtml":127,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":128,"displayConditions":9,"answers":129,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"0cccb754-b7c2-49bc-a590-c61467fc8797","8661c941-f17a-4a95-a907-4cbf25bdc3be","L’accès en administration ou publication sur le site internet est-il limité aux seules personnes et machines autorisées ?","\u003Cp>Les accès permettant de gérer le site internet ou de le modifier doivent être différenciés et faire l’objet d’un contrôle renforcé\u003C/p>",[],[130,133,136],{"id":131,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":132},"0aca7d00-efeb-44e7-a54e-9e3296950da7",[],{"id":134,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":135},"ef790990-54fc-4696-8b49-34d5ac790101",[],{"id":137,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":138},"41a6d5c7-6df0-4190-888c-0b6d81075448",[],{"id":140,"slug":141,"label":142,"tooltipHtml":9,"descriptionHtml":143,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":144,"displayConditions":9,"answers":145,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"2480022e-4a53-4adb-b555-ada6981d3b0a","16301e56-5e06-42b0-ab47-5b1a6c06ca93","Les mots de passe d’accès au site internet sont-ils « solides » et « uniques » pour chaque personne autorisée ?","\u003Cp>Une mauvaise gestion des mots de passe est l’une des premières causes des cyberattaques\u003C/p>",[],[146,149,152],{"id":147,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":148},"b954a5fc-d546-4cae-9bc7-7d74554b6430",[],{"id":150,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":151},"492bd6a8-5b00-42cd-91d4-c2ebe6ef4408",[],{"id":153,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":154},"679e1b78-fabd-4d2a-b067-2d6dcf2cbf12",[],{"id":156,"slug":157,"label":158,"tooltipHtml":9,"descriptionHtml":159,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":160,"displayConditions":9,"answers":161,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"025e3093-7fc5-4ff4-bcd4-d112ea0ab17a","163efb66-8200-4286-85a4-e7482a85f915","L’accès en administration ou publication sur du site internet est-il protégé par une double authentification ?","\u003Cp>L’authentification en deux étapes renforce la sécurité des mots de passe en demandant un code de confirmation à chaque nouvelle connexion.\u003C/p>",[],[162,165,168],{"id":163,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":164},"97494171-7e11-4573-bc32-db7ccd5127ed",[],{"id":166,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":167},"8ca5c908-beca-46bb-bb76-0fa9661f113c",[],{"id":169,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":170},"731414dc-052e-4ab4-9f3d-a41ad10e21f7",[],{"id":172,"slug":173,"label":174,"tooltipHtml":9,"descriptionHtml":175,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":176,"displayConditions":9,"answers":177,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"d5462ffc-08b1-4f74-9f70-23ec08c55c3d","d531b173-d03c-4bfb-9744-ada20ab847c2","Les communications avec le site internet sont-elles sécurisées en HTTPS ?","\u003Cp>Le protocole HTTPS permet de protéger d’une interception les informations échangées entre les postes utilisateurs et le site Internet.\u003C/p>",[],[178,181,184],{"id":179,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":180},"50ba0030-e9f9-479a-876b-194459586773",[],{"id":182,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":183},"f959e819-3b37-417a-b4bb-53c0b52a500a",[],{"id":185,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":186},"c2f604eb-3681-4814-8cb1-656bded15302",[],{"id":188,"slug":189,"label":190,"tooltipHtml":9,"descriptionHtml":191,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":192,"displayConditions":9,"answers":193,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"64227e45-4a55-4ded-80d9-6677873e4963","0da15e41-e058-4b34-8f94-6005e709baa9","Le nom de domaine de du site internet est-il protégé (dépôt INPI, utilisation d’un verrou de registre…) ?","\u003Cp>Il est important d’utiliser les solutions disponibles pour éviter le vol ou le détournement du nom du site internet\u003C/p>",[],[194,197,200],{"id":195,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":196},"7890dfba-e666-4efc-82bf-4b7c9706367b",[],{"id":198,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":199},"f35ac406-20f0-4702-82df-8f93dec783ee",[],{"id":201,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":202},"8b5efd41-dc9a-4a8d-a59e-23528f4b40c8",[],{"id":204,"slug":205,"label":206,"tooltipHtml":9,"descriptionHtml":207,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":208,"displayConditions":9,"answers":209,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"455fa74e-74b8-4b37-8427-f3453c8f044d","a98de1b7-974b-4120-9d7e-4b85071e82ba","Les extensions logicielles utilisées sur le site internet sont-elles indispensables et réputées sûres ?","\u003Cp>Ces extensions peuvent améliorer les fonctionnalités du site, mais sont également des portes d’entrée possibles pour les cybercriminels.\u003C/p>",[],[210,213,216],{"id":211,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":212},"0b2a154b-fea9-4653-987e-cf029fb9a99e",[],{"id":214,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":215},"16dd0ac5-6e05-4d1c-8691-0174bad58ee3",[],{"id":217,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":218},"2b33ffe2-655e-4ffb-90be-253cfd0cd0c6",[],{"id":220,"slug":221,"label":222,"tooltipHtml":9,"descriptionHtml":223,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":224,"displayConditions":9,"answers":225,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"362c7997-11c5-457c-994a-0c861e52acfb","ba0fb225-0b7c-4228-bbb5-ef3b4778af4e","Tous les accès au site internet sont-ils bien enregistrés ou journalisés ?","\u003Cp>La journalisation des accès permet d’identifier des accès illégitimes et de retracer la chronologie d’une attaque.\u003C/p>",[],[226,229,232],{"id":227,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":228},"51691753-d3f7-4405-8cc9-99d6eab48c35",[],{"id":230,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":231},"4ad4cb60-5902-448c-868f-c6c5aedbc6f0",[],{"id":233,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":234},"7c54cc20-32d7-4e92-a327-bf87cc337ef0",[],{"id":236,"slug":237,"label":238,"tooltipHtml":9,"descriptionHtml":239,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":240,"displayConditions":9,"answers":241,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"a099c9b1-9fc4-40eb-9147-02319e6497d1","08df094e-0c6d-41c6-b19f-48526538a4c9","L’activité du site internet est-elle régulièrement surveillée pour détecter un piratage ?","\u003Cp>La surveillance des connexions et des modifications du site permet de détecter et de réagir au plus tôt aux tentatives de cyberattaque\u003C/p>",[],[242,245,248],{"id":243,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":244},"a081e59e-c00d-4f39-b33c-0baa79ece1ac",[],{"id":246,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":247},"7a2071e9-faf4-4bd2-99f6-e95becd00294",[],{"id":249,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":250},"00dee803-aa42-42ae-9b21-4294e7c926f5",[],{"id":252,"slug":253,"label":254,"tooltipHtml":9,"descriptionHtml":255,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":256,"displayConditions":9,"answers":257,"listQuestions":9,"required":41,"requiredJustification":23,"suggestTask":23,"riskEnabled":41,"native":23},"98fa4b2a-7ccb-49bf-859e-8f47847096df","c071cdfc-974b-44f7-b979-2807dbd934dc","La sécurité du site internet est-elle régulièrement vérifiée ?","\u003Cp>Un site internet évolue sans cesse. Le maintien de son niveau de sécurité doit donc être régulièrement contrôlé (audit) par des spécialistes.\u003C/p>",[],[258,261,264],{"id":259,"color":28,"rangeValue":9,"label":29,"slug":9,"description":9,"score":30,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":260},"16548a5f-5c9c-4240-ad8a-c303e3a41776",[],{"id":262,"color":34,"rangeValue":9,"label":35,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":263},"b1275296-130e-4242-abbf-352348edc813",[],{"id":265,"color":39,"rangeValue":9,"label":40,"slug":9,"description":9,"score":9,"nonApplicable":41,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":266},"d7be51b8-b9dd-4850-befa-d3d03e949532",[],[],[],"85f84f08-043a-47db-a91b-08da5b69cef3","1.0","Audit sécurité site internet ","ZD2vwoYAEFw1FfZFlyG4YRARCCEXQQ3qFpRCCMDdIU2aJD6k1Wnx5Exj4vi7",26,"https://static.dastra.eu/tenant-3/audit/IqtCRUrKxFzENr/icon-audit500x-150.png","Evaluation du niveau de cybersécurité d'un site Internet\n(source : www.cybermalveillance.gouv.fr)","2022-07-01T13:58:42.809218","2024-08-30T14:02:53.1394896","Compliance","Conformité cyber",{"id":281,"displayName":282,"familyName":283,"givenName":284,"email":285,"active":41,"color":286,"avatarUrl":9,"tenantId":11},799,"Nicolas DEVOUCOUX","DEVOUCOUX","Nicolas","nicolas.devoucoux@cdg58.fr","#D8081A",[288],{"id":289,"displayName":290,"familyName":291,"givenName":292,"email":293,"active":41,"color":294,"avatarUrl":295,"tenantId":11},31,"Jérôme de Mercey","de Mercey","Jérôme","jerome.demercey@dastra.eu","#99C691","https://static.dastra.eu/tenant-10/avatar/31/Zuh7XFZe5EnnTo/design-sans-titre-2-150.png",[297],{"id":298,"label":299,"type":300,"typeIndex":301,"typeColor":302,"typeIcon":303,"typeText":304,"color":305},"87389301-daf5-4fd5-81b1-2835b213b01e","Sécurité","AuditTemplate",9,"#83d162","ds-icon-audit","Modèle de questionnaire","#CDAAC9",15]