{"id":391,"date":"2010-05-02T22:32:52","date_gmt":"2010-05-02T21:32:52","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=391"},"modified":"2011-09-25T18:45:33","modified_gmt":"2011-09-25T16:45:33","slug":"maitriser-le-risque-de-fraude-a-laide-de-la-tracabilite-de-linformation","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=391","title":{"rendered":"Ma\u00eetriser le risque de fraude \u00e0 l&#8217;aide de la tra\u00e7abilit\u00e9 de l&#8217;information"},"content":{"rendered":"<p style=\"text-align: justify;\">La tra\u00e7abilit\u00e9 est le fait de pouvoir conna\u00eetre l&#8217;origine et de suivre le parcours d&#8217;un produit. Les num\u00e9ros de lot, num\u00e9ros de s\u00e9rie permettent de suivre des produits agricoles, pharmaceutiques, \u00e9lectroniques&#8230; lors de chaque \u00e9tape de leur fabrication et \u00e9ventuellement de les rappeler apr\u00e8s leur commercialisation.<\/p>\n<div style=\"text-align: justify;\">\n<p>Dans un syst\u00e8me d&#8217;information, la tra\u00e7abilit\u00e9 consiste \u00e0 ce que chacune des \u00e9tapes de traitement de l&#8217;information (collecte, uniformisation, calcul, extraction, modification, suppression&#8230;) s&#8217;accompagne de l&#8217;enregistrement de la source de l&#8217;information (un num\u00e9ro de facture par exemple&#8230;) facilitant ainsi la remont\u00e9e de la piste d&#8217;audit et de l&#8217;identifiant de l&#8217;utilisateur \u00e0 l&#8217;origine de l&#8217;action facilitant la mise en lumi\u00e8re ult\u00e9rieure des responsabilit\u00e9s.<\/p>\n<p>La tra\u00e7abilit\u00e9 est un moyen compl\u00e9mentaire aux m\u00e9thodes habituelles contribuant \u00e0 la protection de l&#8217;int\u00e9grit\u00e9 des donn\u00e9es du syst\u00e8me d&#8217;information. La tra\u00e7abilit\u00e9 va de pair avec la s\u00e9curisation des acc\u00e8s aux donn\u00e9es et aux processus \u00e0 l&#8217;aide d&#8217;identifiants et de la s\u00e9paration des pouvoirs. La tra\u00e7abilit\u00e9 est un alli\u00e9 fort lors de la recherche de fraude. En effet, la d\u00e9tection des transactions litigieuses en fonction d&#8217;indicateurs (issus des r\u00e8gles fonctionnement du syst\u00e8me d&#8217;information) mettra en \u00e9vidence leurs auteurs. Il en est de m\u00eame avec les erreurs, le tra\u00e7age du processus d\u00e9cisionnel (autorisation de l&#8217;engagement des d\u00e9penses, du paiement des factures&#8230;) ressortant automatiquement le responsable.<\/p>\n<p>L&#8217;acc\u00e8s aux donn\u00e9es (saisie, modification, effacement&#8230;) g\u00e9n\u00e8re l&#8217;enregistrement de l&#8217;identifiant de l&#8217;utilisateur et l&#8217;horodatage de l&#8217;\u00e9v\u00e8nement dans un journal (ou log). La difficult\u00e9 r\u00e9side dans l&#8217;h\u00e9t\u00e9rog\u00e9n\u00e9it\u00e9 des applications composant le syst\u00e8me informatique constituant g\u00e9n\u00e9ralement chacune leur propre fichier de journalisation.<\/p>\n<p>La mise en oeuvre d&#8217;un sch\u00e9ma de tra\u00e7abilit\u00e9 implique la d\u00e9mat\u00e9rialisation de l&#8217;information et des flux. En effet, les documents papiers sont plus facilement falsifiables et leur contr\u00f4le syst\u00e9matique moins rapide que le contr\u00f4le de donn\u00e9es informatiques.<\/p>\n<p>Par ailleurs, la tra\u00e7abilit\u00e9 des transactions informatiques va de pair avec une gestion s\u00e9curis\u00e9e des acc\u00e8s des utilisateurs au syst\u00e8me informatique (identifiants et mots de passe infalsifiables) et un suivi en temps r\u00e9el des accr\u00e9ditations (par exemple radiation des identifiants d&#8217;un salari\u00e9 ayant quitt\u00e9 l&#8217;entreprise) afin d&#8217;enregistrer avec la plus grande fiabilit\u00e9 les identifiants du responsable d&#8217;une transaction et de garantir la piste d&#8217;audit.<\/p>\n<p>En responsabilisant les diff\u00e9rents intervenants, la tra\u00e7abilit\u00e9 contribue \u00e0 la s\u00e9curisation du processus de traitement de l&#8217;information et de prise de d\u00e9cision.<\/p>\n<\/div>\n<div style=\"text-align: justify;\"><em>Extrait d&#8217;un fichier de journalisation d&#8217;acc\u00e8s \u00e0 un serveur de FTP (les adresses IP ont \u00e9t\u00e9 anonymis\u00e9es) :<\/em><\/div>\n<p><em><span style=\"font-size: xx-small;\">(000654) 27\/04\/2010 09:14:04 &#8211; benoit.riviere (XXX.YYY.2.57)&gt; 150 Opening data channel for file transfer.<\/span><\/em><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"font-size: xx-small;\">(000654) 27\/04\/2010 09:14:04 &#8211; benoit.riviere (XXX.YYY.2.57)&gt; 226 Transfer OK<\/span><\/em><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"font-size: xx-small;\">(000654) 27\/04\/2010 09:14:04 &#8211; benoit.riviere (XXX.YYY.2.57)&gt; CWD \/Sauvegarde\/benoit\/CACF20091231-20091231\/cible<\/span><\/em><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"font-size: xx-small;\">(000654) 27\/04\/2010 09:14:04 &#8211; benoit.riviere (XXX.YYY.2.57)&gt; 550 CWD failed. &#8220;\/Sauvegarde\/benoit\/CACF20091231-20091231\/cible&#8221;: directory not found.<\/span><\/em><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"font-size: xx-small;\">(000654) 27\/04\/2010 09:14:04 &#8211; benoit.riviere (XXX.YYY.2.57)&gt; PWD<\/span><\/em><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"font-size: xx-small;\">(000654) 27\/04\/2010 09:14:04 &#8211; benoit.riviere (XXX.YYY.2.57)&gt; 257 &#8220;\/Sauvegarde\/benoit\/CACF20091231-20091231&#8221; is current directory.<\/span><\/em><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"font-size: xx-small;\">(000654) 27\/04\/2010 09:14:04 &#8211; benoit.riviere (XXX.YYY.2.57)&gt; CWD \/Sauvegarde\/benoit\/CACF20091231-20091231\/cible<\/span><\/em><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Ma%C3%AEtriser%20le%20risque%20de%20fraude%20%C3%A0%20l%27aide%20de%20la%20tra%C3%A7abilit%C3%A9%20de%20l%27information\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>La tra\u00e7abilit\u00e9 est le fait de pouvoir conna\u00eetre l&#8217;origine et de suivre le parcours d&#8217;un produit. Les num\u00e9ros de lot, num\u00e9ros de s\u00e9rie permettent de suivre des produits agricoles, pharmaceutiques, \u00e9lectroniques&#8230; lors de chaque \u00e9tape de leur fabrication et \u00e9ventuellement de les rappeler apr\u00e8s leur commercialisation. Dans un syst\u00e8me d&#8217;information, la tra\u00e7abilit\u00e9 consiste \u00e0 ce &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=391\" class=\"more-link\">Continue reading &lsquo;Ma\u00eetriser le risque de fraude \u00e0 l&#8217;aide de la tra\u00e7abilit\u00e9 de l&#8217;information&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Ma%C3%AEtriser%20le%20risque%20de%20fraude%20%C3%A0%20l%27aide%20de%20la%20tra%C3%A7abilit%C3%A9%20de%20l%27information\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[50,7,10,4,46,36,35,24],"tags":[163,1634,155,153,162,1621,157,161,160,43,66,152,137,26,158,1629,154,89,156,1628,1624,56,159],"class_list":["post-391","post","type-post","status-publish","format-standard","hentry","category-audit-de-donnees","category-breves","category-controle-interne","category-fraude","category-integrite-des-donnees-systeme-informatique","category-protection-des-donnees","category-securite-informatique","category-systeme-dinformation","tag-accreditation","tag-audit-de-donnees","tag-chaine-de-linformation","tag-erreur","tag-falsification","tag-fraude","tag-habilitations","tag-heterogeneite-des-applications","tag-horodatage","tag-integrite-des-donnees","tag-journalisation","tag-log","tag-politique-de-securite","tag-prevention-de-la-fraude","tag-processus-decisionnel","tag-protection-des-donnees","tag-responsabilisation","tag-responsabilite","tag-securisation-des-acces","tag-securite-informatique","tag-systeme-dinformation","tag-tracabilite","tag-transactions-litigieuses"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=391"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/391\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}