{"id":424,"date":"2010-09-29T09:51:50","date_gmt":"2010-09-29T08:51:50","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=424"},"modified":"2011-09-22T00:30:43","modified_gmt":"2011-09-21T22:30:43","slug":"controle-des-acces-aux-donnees-l%e2%80%99administrateur-systeme-est-il-au-dessus-des-regles-de-controle-interne","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=424","title":{"rendered":"Contr\u00f4le des acc\u00e8s aux donn\u00e9es : l\u2019Administrateur syst\u00e8me est-il au dessus des r\u00e8gles de contr\u00f4le interne ?"},"content":{"rendered":"<p style=\"text-align: justify;\">Le contr\u00f4le des acc\u00e8s aux donn\u00e9es (comptables, commerciales, sociales, messagerie&#8230;) fait l&#8217;objet d&#8217;habilitations. Ces habilitations conjugu\u00e9es \u00e0 un syst\u00e8me de tra\u00e7abilit\u00e9 (enregistrement dans un journal des identifiants de l&#8217;utilisateur acc\u00e9dant aux donn\u00e9es) permet de suivre les traitements et de d\u00e9gager ult\u00e9rieurement les responsabilit\u00e9s en cas d&#8217;erreurs ou de fautes. Cette supervision s&#8217;inscrit dans le cadre plus g\u00e9n\u00e9ral du processus de contr\u00f4le interne.<\/p>\n<p style=\"text-align: justify;\">Mais qu&#8217;en est-il de l&#8217;Administrateur syst\u00e8me ?<\/p>\n<p style=\"text-align: justify;\">Ce messie a souvent tout pouvoir sur le syst\u00e8me sans partage&#8230; et sans contr\u00f4le (y compris de la part de la direction g\u00e9n\u00e9rale) dans la plupart des entreprises. La m\u00e9saventure de Google (cf lien en bas) doit alerter les directions d&#8217;entreprise sur le contr\u00f4le qu&#8217;elles doivent imp\u00e9rativement \u00e9tablir sur les administrateurs afin de prot\u00e9ger leurs donn\u00e9es (notamment les donn\u00e9es identifiant des personnes physiques, des cartes de paiement, des informations confidentielles ou sensibles&#8230;) et \u00e9viter toute mise en cause ult\u00e9rieure n\u00e9faste \u00e0 leur cr\u00e9dibilit\u00e9.<\/p>\n<p style=\"text-align: justify;\"><em>Lien vers l&#8217;article : Google licencie un ing\u00e9nieur qui acc\u00e9dait aux donn\u00e9es des utilisateurs<\/em><br \/>\n<a href=\"http:\/\/www.developpez.com\/actu\/21068\/Google-licencie-un-ingenieur-qui-accedait-aux-donnees-privees-des-utilisateurs-et-ce-n-est-pas-une-premiere-inquietant\" target=\"_blank\">www.developpez.com\/actu\/21068\/Google-licencie-un-ingenieur-qui-accedait-aux-donnees-privees-des-utilisateurs-et-ce-n-est-pas-une-premiere-inquietant<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Contr%C3%B4le%20des%20acc%C3%A8s%20aux%20donn%C3%A9es%20%3A%20l%E2%80%99Administrateur%20syst%C3%A8me%20est-il%20au%20dessus%20des%20r%C3%A8gles%20de%20contr%C3%B4le%20interne%20%3F\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Le contr\u00f4le des acc\u00e8s aux donn\u00e9es (comptables, commerciales, sociales, messagerie&#8230;) fait l&#8217;objet d&#8217;habilitations. Ces habilitations conjugu\u00e9es \u00e0 un syst\u00e8me de tra\u00e7abilit\u00e9 (enregistrement dans un journal des identifiants de l&#8217;utilisateur acc\u00e9dant aux donn\u00e9es) permet de suivre les traitements et de d\u00e9gager ult\u00e9rieurement les responsabilit\u00e9s en cas d&#8217;erreurs ou de fautes. Cette supervision s&#8217;inscrit dans le cadre &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=424\" class=\"more-link\">Continue reading &lsquo;Contr\u00f4le des acc\u00e8s aux donn\u00e9es : l\u2019Administrateur syst\u00e8me est-il au dessus des r\u00e8gles de contr\u00f4le interne ?&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Contr%C3%B4le%20des%20acc%C3%A8s%20aux%20donn%C3%A9es%20%3A%20l%E2%80%99Administrateur%20syst%C3%A8me%20est-il%20au%20dessus%20des%20r%C3%A8gles%20de%20contr%C3%B4le%20interne%20%3F\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,6,35,24,33],"tags":[481,1622,17,137,26,1628,44,1624,1627],"class_list":["post-424","post","type-post","status-publish","format-standard","hentry","category-breves","category-mission-du-commissaire-aux-comptes","category-securite-informatique","category-systeme-dinformation","category-systeme-informatique","tag-administrateur","tag-controle-interne","tag-demarche-daudit","tag-politique-de-securite","tag-prevention-de-la-fraude","tag-securite-informatique","tag-separation-des-fonctions","tag-systeme-dinformation","tag-systeme-informatique"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=424"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/424\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}