{"id":10720,"date":"2023-01-20T06:22:19","date_gmt":"2023-01-20T05:22:19","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=10720"},"modified":"2023-01-07T11:38:08","modified_gmt":"2023-01-07T10:38:08","slug":"cyberattaques-continuer-lactivite-et-reconstruire-le-systeme-dinformation-guide-afnor-spec-2208","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=10720","title":{"rendered":"Cyberattaques : continuer l\u2019activit\u00e9 et reconstruire le syst\u00e8me d\u2019information (guide AFNOR Spec 2208)"},"content":{"rendered":"<p style=\"text-align: justify;\">Les chiffres sont effrayants&nbsp;: d\u2019apr\u00e8s le barom\u00e8tre CESIN 2022, plus d\u2019une entreprise fran\u00e7aise sur deux a v\u00e9cu au moins une cyberattaque au cours de l\u2019ann\u00e9e 2021. Et chacune de ces attaques occasionne un manque-\u00e0-gagner de 27 % sur le chiffre d\u2019affaires&nbsp;! Aucun acteur \u00e9conomique, grand ou petit, public ou priv\u00e9, n\u2019est \u00e0 l\u2019abri, ni ne doit fermer les yeux sur ce qu\u2019il faut mettre en place pour pr\u00e9venir les attaques.<\/p>\n<p style=\"text-align: justify;\">Pour savoir comment s\u2019organiser, AFNOR publie le guide \u00ab Cyber-r\u00e9silience, reconstruction du SI et <strong>continuit\u00e9 d\u2019activit\u00e9 m\u00e9tiers en cas de cyberattaque<\/strong> paralysante \u00bb. Disponible gratuitement dans la collection AFNOR Editions sous le libell\u00e9 <strong>AFNOR Spec 2208<\/strong>, il centralise les <strong>recommandations et bonnes pratiques<\/strong> d\u2019une quarantaine d\u2019acteurs dont beaucoup ont v\u00e9cu des cyberattaques : PME, ETI, start-up, grands groupe, h\u00f4pitaux, etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10722\" style=\"text-align: justify;\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR.png\" alt=\"Guide AFNOR\" width=\"613\" height=\"848\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR.png 613w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR-217x300.png 217w\" sizes=\"auto, (max-width: 613px) 100vw, 613px\" \/><\/p>\n<p style=\"text-align: justify;\">Aux fonctions DSI ou RSSI, ce guide donne des lignes directrices et des recommandations op\u00e9rationnelles pour<strong> anticiper le traitement d\u2019une cyberattaque<\/strong>, ou y faire face en fonction de la nature de l\u2019activit\u00e9, de la maturit\u00e9 (3 niveaux sont d\u00e9finis) et des moyens de l\u2019organisme. \u00ab Les cyberattaques peuvent mettre des organisations au tapis pendant des dur\u00e9es longues : plusieurs semaines, plusieurs mois. Nous sommes donc partis sur le concept de <strong>cyberattaque paralysante<\/strong>. Cela pose certes la question de comment reconstruire le syst\u00e8me d\u2019information, apr\u00e8s coup, mais surtout celle d\u2019assurer une continuit\u00e9 d\u2019activit\u00e9, sur un temps long, en l\u2019<strong>absence d\u2019outils informatiques<\/strong> ou en pr\u00e9sence d\u2019outils fonctionnant en <strong>mode d\u00e9grad\u00e9<\/strong>, d\u00e9crit Xavier Hartout, consultant chez Adenium BRG, qui a coanim\u00e9 le groupe de r\u00e9dacteurs du guide AFNOR. Vu sous cet angle, un <strong>plan de continuit\u00e9 d\u2019activit\u00e9<\/strong> (PCA) s\u2019av\u00e8re la premi\u00e8re chose \u00e0 mettre en place. Ce guide explique comment le b\u00e2tir, \u00e0 quelles actions donner la priorit\u00e9 en mode d\u00e9grad\u00e9, comme le paiement des salaires hors logiciel de paie, par exemple. Avec l\u2019id\u00e9e qu\u2019un bon PCA permet une bonne r\u00e9silience. \u00bb Le guide comporte quatre parties :<\/p>\n<ul>\n<li style=\"text-align: justify;\">Recommandations en cas de survenance d\u2019une cyberattaque paralysante<\/li>\n<li style=\"text-align: justify;\">Sp\u00e9cifications techniques pour la reconstruction du syst\u00e8me d\u2019information<\/li>\n<li style=\"text-align: justify;\">Pr\u00e9conisations pour la continuit\u00e9 d\u2019activit\u00e9 m\u00e9tiers<\/li>\n<li style=\"text-align: justify;\">Sortie de crise, retour d\u2019exp\u00e9rience et capitalisation apr\u00e8s une cyberattaque<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10721\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR-2.png\" alt=\"Guide AFNOR 2\" width=\"773\" height=\"440\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR-2.png 773w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR-2-300x171.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR-2-768x437.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/12\/Guide-AFNOR-2-730x416.png 730w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/p>\n<p style=\"text-align: justify;\">Ce guide est t\u00e9l\u00e9chargeable gratuitement sur <a href=\"https:\/\/www.afnor.org\/actualites\/cyberattaques-afnor-organise-la-parade\/\">le site de l&#8217;AFNOR<\/a>.<\/p>\n<div id=\"sconnect-is-installed\" style=\"display: none; text-align: justify;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Cyberattaques%20%3A%20continuer%20l%E2%80%99activit%C3%A9%20et%20reconstruire%20le%20syst%C3%A8me%20d%E2%80%99information%20%28guide%20AFNOR%20Spec%202208%29\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Les chiffres sont effrayants&nbsp;: d\u2019apr\u00e8s le barom\u00e8tre CESIN 2022, plus d\u2019une entreprise fran\u00e7aise sur deux a v\u00e9cu au moins une cyberattaque au cours de l\u2019ann\u00e9e 2021. Et chacune de ces attaques occasionne un manque-\u00e0-gagner de 27 % sur le chiffre d\u2019affaires&nbsp;! Aucun acteur \u00e9conomique, grand ou petit, public ou priv\u00e9, n\u2019est \u00e0 l\u2019abri, ni ne &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=10720\" class=\"more-link\">Continue reading &lsquo;Cyberattaques : continuer l\u2019activit\u00e9 et reconstruire le syst\u00e8me d\u2019information (guide AFNOR Spec 2208)&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Cyberattaques%20%3A%20continuer%20l%E2%80%99activit%C3%A9%20et%20reconstruire%20le%20syst%C3%A8me%20d%E2%80%99information%20%28guide%20AFNOR%20Spec%202208%29\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[29,35,24],"tags":[2824,507,2234,2825,2181,2668,737,2826,2664,318,502,146,2827,2829,2828,92,314,1628,1074],"class_list":["post-10720","post","type-post","status-publish","format-standard","hentry","category-livres-ouvrages","category-securite-informatique","category-systeme-dinformation","tag-afnor","tag-bonnes-pratiques","tag-cartographie","tag-continuite-dactivite-metiers","tag-continuite-du-service","tag-crise-cyber","tag-cyber-attaque","tag-cyber-resilience","tag-cybermenace","tag-dsi","tag-intrusion","tag-malveillance","tag-mode-degrade","tag-pca","tag-plan-de-continuite-dactivite","tag-plan-de-crise","tag-politique-de-prevention","tag-securite-informatique","tag-vulnerabilites"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10720"}],"version-history":[{"count":5,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10720\/revisions"}],"predecessor-version":[{"id":10724,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10720\/revisions\/10724"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}