{"id":11183,"date":"2023-04-17T06:47:24","date_gmt":"2023-04-17T04:47:24","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=11183"},"modified":"2023-11-05T12:22:01","modified_gmt":"2023-11-05T11:22:01","slug":"sauvegarde","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=11183","title":{"rendered":"Les r\u00e8gles d&#8217;or de la sauvegarde"},"content":{"rendered":"<p style=\"text-align: justify;\">Les sauvegardes sont incontournables pour constituer un <strong>dispositif de cybers\u00e9curit\u00e9 r\u00e9silient<\/strong>. Leur prise en compte est d\u00e9terminante pour b\u00e2tir et prot\u00e9ger un syst\u00e8me d\u2019information, mais aussi pour <strong>anticiper et r\u00e9agir en situation de crise<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11184\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/03\/ANSSI-REGLES-OR-SAUVEGARDE.png\" alt=\"ANSSI REGLES OR SAUVEGARDE\" width=\"1225\" height=\"847\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/03\/ANSSI-REGLES-OR-SAUVEGARDE.png 1225w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/03\/ANSSI-REGLES-OR-SAUVEGARDE-300x207.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/03\/ANSSI-REGLES-OR-SAUVEGARDE-1024x708.png 1024w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/03\/ANSSI-REGLES-OR-SAUVEGARDE-768x531.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/03\/ANSSI-REGLES-OR-SAUVEGARDE-730x505.png 730w\" sizes=\"auto, (max-width: 1225px) 100vw, 1225px\" \/><\/p>\n<p style=\"text-align: justify;\">Pour en savoir plus : <a href=\"https:\/\/www.ssi.gouv.fr\/les-regles-dor-de-la-sauvegarde\/\">consulter le site de l&#8217;ANSSI<\/a><\/p>\n<p style=\"text-align: justify;\">Approfondir le sujet : Journ\u00e9e mondiale de la sauvegarde des donn\u00e9es informatiques : <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/evenements\/journee-mondiale-de-la-sauvegarde-des-donnees-informatiques\" target=\"_blank\" rel=\"noopener\">consulter les fiches conseils<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11962\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/04\/SVG-SUR-SERVEUR.jpg\" alt=\"SVG SUR SERVEUR\" width=\"584\" height=\"500\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/04\/SVG-SUR-SERVEUR.jpg 584w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/04\/SVG-SUR-SERVEUR-300x257.jpg 300w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/p>\n<p style=\"text-align: justify;\"><em><strong>Logiciels de sauvegarde<\/strong> :<\/em><\/p>\n<p style=\"text-align: justify;\">Il existe de <strong>nombreuses solutions<\/strong> de sauvegarde.<\/p>\n<p style=\"text-align: justify;\">L&#8217;<a href=\"https:\/\/www.cobiansoft.com\/cobianbackup.html\" target=\"_blank\" rel=\"noopener\">\u00e9diteur CobianSoft<\/a> propose une <strong>solution gratuite<\/strong> qui m\u00e9rite de s&#8217;y attarder. Son logiciel de sauvegarde Cobian Reflector propose de <strong>planifier des sauvegardes<\/strong> y compris vers des sites distants (en sFTP).<\/p>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20r%C3%A8gles%20d%27or%20de%20la%20sauvegarde\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Les sauvegardes sont incontournables pour constituer un dispositif de cybers\u00e9curit\u00e9 r\u00e9silient. Leur prise en compte est d\u00e9terminante pour b\u00e2tir et prot\u00e9ger un syst\u00e8me d\u2019information, mais aussi pour anticiper et r\u00e9agir en situation de crise. Pour en savoir plus : consulter le site de l&#8217;ANSSI Approfondir le sujet : Journ\u00e9e mondiale de la sauvegarde des donn\u00e9es &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=11183\" class=\"more-link\">Continue reading &lsquo;Les r\u00e8gles d&#8217;or de la sauvegarde&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20r%C3%A8gles%20d%27or%20de%20la%20sauvegarde\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[36,24],"tags":[1076,507,2932,2918,2668,2826,2324,2917,2425,2064,621,2931],"class_list":["post-11183","post","type-post","status-publish","format-standard","hentry","category-protection-des-donnees","category-systeme-dinformation","tag-anssi","tag-bonnes-pratiques","tag-cobiansoft","tag-compromission","tag-crise-cyber","tag-cyber-resilience","tag-cybersecurite","tag-donnees-critiques","tag-ftp","tag-operations-sensibles","tag-sauvegarde-des-donnees","tag-sftp"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/11183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11183"}],"version-history":[{"count":6,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/11183\/revisions"}],"predecessor-version":[{"id":11187,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/11183\/revisions\/11187"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}