{"id":10054,"date":"2022-03-03T00:10:12","date_gmt":"2022-03-02T23:10:12","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=10054"},"modified":"2022-03-03T00:10:12","modified_gmt":"2022-03-02T23:10:12","slug":"conflit-ukraine-russie-mesures-cyber-preventives","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=10054","title":{"rendered":"Conflit Ukraine\/Russie : mesures cyber pr\u00e9ventives"},"content":{"rendered":"<p style=\"text-align: justify;\">Les tensions internationales actuelles caus\u00e9es par l\u2019invasion de l\u2019Ukraine par la Russie, s\u2019accompagnent d\u2019effets dans le cyberespace. Si les combats en Ukraine sont principalement conventionnels, l\u2019ANSSI constate l\u2019usage de cyberattaques dans le cadre du conflit. Dans un espace num\u00e9rique sans fronti\u00e8res, ces cyberattaques peuvent affecter des entit\u00e9s fran\u00e7aises et il convient sans c\u00e9der \u00e0 la panique de l\u2019anticiper et de s\u2019y pr\u00e9parer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10055\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/03\/ANSSI-Mesures-cyber-preventives.png\" alt=\"ANSSI Mesures cyber pr\u00e9ventives\" width=\"884\" height=\"492\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/03\/ANSSI-Mesures-cyber-preventives.png 884w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/03\/ANSSI-Mesures-cyber-preventives-300x167.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/03\/ANSSI-Mesures-cyber-preventives-768x427.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/03\/ANSSI-Mesures-cyber-preventives-730x406.png 730w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><\/p>\n<p style=\"text-align: justify;\">Aussi, afin de r\u00e9duire au maximum la probabilit\u00e9 de tels \u00e9v\u00e9nements et d\u2019en limiter les effets, l\u2019ANSSI incite donc les entreprises et les administrations \u00e0 consulter le <a href=\"https:\/\/cert.ssi.gouv.fr\/cti\/CERTFR-2022-CTI-001\/\" target=\"_blank\" rel=\"noopener\">bulletin du Centre gouvernemental de veille d\u2019alerte et de r\u00e9ponse aux attaques informatiques (CERT-FR)<\/a> qui est mis \u00e0 jour r\u00e9guli\u00e8rement et \u00e0 mettre en \u0153uvre les cinq mesures cyber pr\u00e9ventives prioritaires d\u00e9taill\u00e9es ci-dessous :<\/p>\n<ul>\n<li>renforcer l\u2019authentification sur les syst\u00e8mes d\u2019information ;<\/li>\n<li>accro\u00eetre la supervision de s\u00e9curit\u00e9 ;<\/li>\n<li>sauvegarder hors-ligne les donn\u00e9es et les applications critiques ;<\/li>\n<li>\u00e9tablir une liste prioris\u00e9e des services num\u00e9riques critiques de l\u2019entit\u00e9 ;<\/li>\n<li>s\u2019assurer de l\u2019existence d\u2019un dispositif de gestion de crise adapt\u00e9 \u00e0 une cyberattaque.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Ces mesures prioritaires de cybers\u00e9curit\u00e9 sont essentielles et leur mise en \u0153uvre \u00e0 court terme permet de limiter la probabilit\u00e9 d\u2019une cyberattaque ainsi que ses potentiels effets. Pour \u00eatre pleinement efficaces, elles doivent cependant s\u2019inscrire dans une d\u00e9marche de cybers\u00e9curit\u00e9 globale et de long terme.<\/p>\n<p>Plus d&#8217;informations sur le <a href=\"https:\/\/www.ssi.gouv.fr\/actualite\/tensions-internationales-renforcement-de-la-vigilance-cyber\/\" target=\"_blank\" rel=\"noopener\">site de l&#8217;ANSSI<\/a> et dans la note t\u00e9l\u00e9chargeable ci-apr\u00e8s.<\/p>\n<div id=\"sconnect-is-installed\" style=\"display: none; text-align: justify;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Conflit%20Ukraine%2FRussie%20%3A%20mesures%20cyber%20pr%C3%A9ventives\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Les tensions internationales actuelles caus\u00e9es par l\u2019invasion de l\u2019Ukraine par la Russie, s\u2019accompagnent d\u2019effets dans le cyberespace. Si les combats en Ukraine sont principalement conventionnels, l\u2019ANSSI constate l\u2019usage de cyberattaques dans le cadre du conflit. Dans un espace num\u00e9rique sans fronti\u00e8res, ces cyberattaques peuvent affecter des entit\u00e9s fran\u00e7aises et il convient sans c\u00e9der \u00e0 la &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=10054\" class=\"more-link\">Continue reading &lsquo;Conflit Ukraine\/Russie : mesures cyber pr\u00e9ventives&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Conflit%20Ukraine%2FRussie%20%3A%20mesures%20cyber%20pr%C3%A9ventives\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,35,33],"tags":[1076,2617,757,737,2616,621,1628],"class_list":["post-10054","post","type-post","status-publish","format-standard","hentry","category-breves","category-securite-informatique","category-systeme-informatique","tag-anssi","tag-application-critique","tag-authentification","tag-cyber-attaque","tag-guerre","tag-sauvegarde-des-donnees","tag-securite-informatique"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10054"}],"version-history":[{"count":3,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10054\/revisions"}],"predecessor-version":[{"id":10058,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10054\/revisions\/10058"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}