{
    "authors": [
        "The MONARC project"
    ],
    "label": "ISO/IEC 27002 [2013]",
    "language": "FR",
    "refs": [
        "https://www.iso.org/standard/54533.html"
    ],
    "uuid": "98ca84fb-db87-11e8-ac77-0800279aaa2b",
    "values": [
        {
            "category": "Politiques de s\u00e9curit\u00e9 de l'information",
            "code": "5.1.1",
            "label": "Politiques de s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fc596-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Politiques de s\u00e9curit\u00e9 de l'information",
            "code": "5.1.2",
            "label": "Revue des politiques de s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fc6a6-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "La s\u00e9curit\u00e9 des ressources humaines",
            "code": "7.2.1",
            "label": "Responsabilit\u00e9s de la direction",
            "uuid": "267fc6f7-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Organisation de la s\u00e9curit\u00e9 de l'information",
            "code": "6.1.1",
            "label": "Fonctions et responsabilit\u00e9s li\u00e9es \u00e0 la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fc73c-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 des communications",
            "code": "13.2.4",
            "label": "Engagements de confidentialit\u00e9 ou de non-divulgation",
            "uuid": "267fc77e-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Organisation de la s\u00e9curit\u00e9 de l'information",
            "code": "6.1.3",
            "label": "Relations avec les autorit\u00e9s",
            "uuid": "267fc7c0-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Organisation de la s\u00e9curit\u00e9 de l'information",
            "code": "6.1.4",
            "label": "Relations avec des groupes de travail sp\u00e9cialis\u00e9s",
            "uuid": "267fc80f-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.2.1",
            "label": "Revue ind\u00e9pendante de la s\u00e9curit\u00e9 de l'information",
            "uuid": "267fc84f-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Relations avec le fournisseurs",
            "code": "15.1.1",
            "label": "Politique de s\u00e9curit\u00e9 de l\u2019information dans les relations avec les fournisseurs",
            "uuid": "267fc88e-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Relations avec le fournisseurs",
            "code": "15.1.2",
            "label": "La s\u00e9curit\u00e9 dans les accords conclus avec les fournisseurs",
            "uuid": "267fc8cc-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.1.1",
            "label": "Inventaire des actifs",
            "uuid": "267fc90c-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.1.2",
            "label": "Propri\u00e9t\u00e9 des actifs",
            "uuid": "267fc94c-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.1.3",
            "label": "Utilisation correcte des actifs",
            "uuid": "267fc989-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.2.1",
            "label": "Classification des informations",
            "uuid": "267fc9c9-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.2.2",
            "label": "Marquage des informations",
            "uuid": "267fca19-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "La s\u00e9curit\u00e9 des ressources humaines",
            "code": "7.1.1",
            "label": "S\u00e9lection des candidats",
            "uuid": "267fca6b-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "La s\u00e9curit\u00e9 des ressources humaines",
            "code": "7.1.2",
            "label": "Termes et conditions d'embauche",
            "uuid": "267fcaad-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "La s\u00e9curit\u00e9 des ressources humaines",
            "code": "7.2.2",
            "label": "Sensibilisation, qualification et formations en mati\u00e8re de s\u00e9curit\u00e9 de l'information",
            "uuid": "267fcaeb-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "La s\u00e9curit\u00e9 des ressources humaines",
            "code": "7.2.3",
            "label": "Processus disciplinaire",
            "uuid": "267fcb29-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "La s\u00e9curit\u00e9 des ressources humaines",
            "code": "7.3.1",
            "label": "Ach\u00e8vement ou modification des responsabilit\u00e9s associ\u00e9es au contrat de travail",
            "uuid": "267fcb79-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.1.4",
            "label": "Restitution des actifs",
            "uuid": "267fcbce-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.2.6",
            "label": "Suppression ou adaptation des droits d\u2019acc\u00e8s",
            "uuid": "267fcc3c-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.1.1",
            "label": "P\u00e9rim\u00e8tre de s\u00e9curit\u00e9 physique",
            "uuid": "267fcca4-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.1.2",
            "label": "Contr\u00f4les physiques des acc\u00e8s",
            "uuid": "267fcce9-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.1.3",
            "label": "S\u00e9curisation des bureaux, des salles et des \u00e9quipements",
            "uuid": "267fcd30-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.1.4",
            "label": "Protection contre les menaces ext\u00e9rieures et environnementales",
            "uuid": "267fcd6f-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.1.5",
            "label": "Travail dans les zones s\u00e9curis\u00e9es",
            "uuid": "267fcdac-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.1.6",
            "label": "Zones de livraison et de chargement",
            "uuid": "267fcdec-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.1",
            "label": "Emplacement et protection du mat\u00e9riel",
            "uuid": "267fce44-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.2",
            "label": "Services g\u00e9n\u00e9raux",
            "uuid": "267fce8a-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.3",
            "label": "S\u00e9curit\u00e9 du c\u00e2blage",
            "uuid": "267fcecb-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.4",
            "label": "Maintenance du mat\u00e9riel",
            "uuid": "267fcf0a-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.6",
            "label": "S\u00e9curit\u00e9 du mat\u00e9riel et des actifs hors des locaux",
            "uuid": "267fcf4f-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.7",
            "label": "Mise au rebut ou recyclage s\u00e9curis\u00e9(e) du mat\u00e9riel",
            "uuid": "267fcf90-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.5",
            "label": "Sortie des actifs",
            "uuid": "267fcfdf-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.1.1",
            "label": "Proc\u00e9dures d\u2019exploitation document\u00e9es",
            "uuid": "267fd029-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.1.2",
            "label": "Gestion des changements",
            "uuid": "267fd073-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Organisation de la s\u00e9curit\u00e9 de l'information",
            "code": "6.1.2",
            "label": "S\u00e9paration des t\u00e2ches",
            "uuid": "267fd0b1-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.1.4",
            "label": "S\u00e9paration des environnements de d\u00e9veloppement, de test et d\u2019exploitation",
            "uuid": "267fd0ef-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Relations avec le fournisseurs",
            "code": "15.2.1",
            "label": "Surveillance et revue des services des fournisseurs",
            "uuid": "267fd12f-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Relations avec le fournisseurs",
            "code": "15.2.2",
            "label": "Gestion des changements apport\u00e9s dans les services des fournisseurs",
            "uuid": "267fd16b-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.1.3",
            "label": "Dimensionnement",
            "uuid": "267fd1a8-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.9",
            "label": "Test de conformit\u00e9 du syst\u00e8me",
            "uuid": "267fd1ea-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.2.1",
            "label": "Mesures contre les logiciels malveillants",
            "uuid": "267fd22e-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.3.1",
            "label": "Sauvegarde des informations",
            "uuid": "267fd272-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 des communications",
            "code": "13.1.1",
            "label": "Contr\u00f4le des r\u00e9seaux",
            "uuid": "267fd2b1-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 des communications",
            "code": "13.1.2",
            "label": "S\u00e9curit\u00e9 des services de r\u00e9seau",
            "uuid": "267fd2ee-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.3.1",
            "label": "Gestion des supports amovibles",
            "uuid": "267fd32a-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.3.2",
            "label": "Mise au rebut des supports",
            "uuid": "267fd369-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 des communications",
            "code": "13.2.1",
            "label": "Politiques et proc\u00e9dures de transfert de l\u2019information",
            "uuid": "267fd3a6-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 des communications",
            "code": "13.2.2",
            "label": "Accords en mati\u00e8re de transfert d\u2019information",
            "uuid": "267fd3e3-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.3.3",
            "label": "Transfert physique des supports",
            "uuid": "267fd421-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 des communications",
            "code": "13.2.3",
            "label": "Messagerie \u00e9lectronique",
            "uuid": "267fd462-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.1.2",
            "label": "S\u00e9curisation des services d\u2019application sur les r\u00e9seaux publics",
            "uuid": "267fd4ac-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.1.3",
            "label": "Protection des transactions li\u00e9es aux services d\u2019application",
            "uuid": "267fd4ed-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.4.1",
            "label": "Journalisation des \u00e9v\u00e9nements",
            "uuid": "267fd529-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.4.2",
            "label": "Protection de l\u2019information journalis\u00e9e",
            "uuid": "267fd567-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.4.3",
            "label": "Journaux administrateur et op\u00e9rateur",
            "uuid": "267fd5ae-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.4.4",
            "label": "Synchronisation des horloges",
            "uuid": "267fd610-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.1.1",
            "label": "Politique de contr\u00f4le d\u2019acc\u00e8s",
            "uuid": "267fd659-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.2.3",
            "label": "Gestion des privil\u00e8ges d\u2019acc\u00e8s",
            "uuid": "267fd69f-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.2.4",
            "label": "Gestion des informations secr\u00e8tes d\u2019authentification des utilisateurs",
            "uuid": "267fd6e4-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.2.5",
            "label": "Revue des droits d\u2019acc\u00e8s utilisateur",
            "uuid": "267fd723-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.3.1",
            "label": "Utilisation d\u2019informations secr\u00e8tes d\u2019authentification",
            "uuid": "267fd761-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.8",
            "label": "Mat\u00e9riel utilisateur laiss\u00e9 sans surveillance",
            "uuid": "267fd7a0-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 physique et environnementale",
            "code": "11.2.9",
            "label": "Politique du bureau propre et de l\u2019\u00e9cran vide",
            "uuid": "267fd7dd-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.1.2",
            "label": "Acc\u00e8s aux r\u00e9seaux et aux services en r\u00e9seau",
            "uuid": "267fd81b-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 des communications",
            "code": "13.1.3",
            "label": "Cloisonnement des r\u00e9seaux",
            "uuid": "267fd85b-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.2.1",
            "label": "Enregistrement et d\u00e9sinscription des utilisateurs",
            "uuid": "267fd899-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.4.3",
            "label": "Syst\u00e8me de gestion des mots de passe",
            "uuid": "267fd8d8-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.4.4",
            "label": "Utilisation de programmes utilitaires \u00e0 privil\u00e8ges",
            "uuid": "267fd917-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.4.2",
            "label": "S\u00e9curiser les proc\u00e9dures de connexion",
            "uuid": "267fd954-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.4.1",
            "label": "Restriction d\u2019acc\u00e8s \u00e0 l\u2019information",
            "uuid": "267fd993-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Organisation de la s\u00e9curit\u00e9 de l'information",
            "code": "6.2.1",
            "label": "Politique en mati\u00e8re d'appareils mobiles",
            "uuid": "267fd9d0-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Organisation de la s\u00e9curit\u00e9 de l'information",
            "code": "6.2.2",
            "label": "T\u00e9l\u00e9travail",
            "uuid": "267fda0e-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.1.1",
            "label": "Analyse et sp\u00e9cification des exigences de s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fda50-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Cryptographie",
            "code": "10.1.1",
            "label": "Politique d\u2019utilisation des mesures cryptographiques",
            "uuid": "267fda8c-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Cryptographie",
            "code": "10.1.2",
            "label": "Gestion des cl\u00e9s",
            "uuid": "267fdacc-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.5.1",
            "label": "Installation de logiciels sur des syst\u00e8mes en exploitation",
            "uuid": "267fdb18-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.3.1",
            "label": "Protection des donn\u00e9es de test",
            "uuid": "267fdb78-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.4.5",
            "label": "Contr\u00f4le d\u2019acc\u00e8s au code source des programmes",
            "uuid": "267fdbf1-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.2",
            "label": "Proc\u00e9dures de contr\u00f4le des changements apport\u00e9s au syst\u00e8me",
            "uuid": "267fdc38-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.3",
            "label": "Revue technique des applications apr\u00e8s changement apport\u00e9 \u00e0 la plateforme d\u2019exploitation",
            "uuid": "267fdc8c-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.4",
            "label": "Restrictions relatives aux changements apport\u00e9s aux progiciels",
            "uuid": "267fdcf3-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.7",
            "label": "D\u00e9veloppement externalis\u00e9",
            "uuid": "267fdd55-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.6.1",
            "label": "Gestion des vuln\u00e9rabilit\u00e9s techniques",
            "uuid": "267fdda3-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'information",
            "code": "16.1.2",
            "label": "Signalement des \u00e9v\u00e9nements li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fddeb-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'information",
            "code": "16.1.3",
            "label": "Signalement des failles li\u00e9es \u00e0 la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fde31-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'information",
            "code": "16.1.1",
            "label": "Responsabilit\u00e9s et proc\u00e9dures",
            "uuid": "267fde78-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'information",
            "code": "16.1.6",
            "label": "Tirer des enseignements des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fdeb8-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'information",
            "code": "16.1.7",
            "label": "Recueil de preuves",
            "uuid": "267fdef6-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.5",
            "label": "Principes d\u2019ing\u00e9nierie de la s\u00e9curit\u00e9 des syst\u00e8mes",
            "uuid": "267fdf36-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Aspects de la s\u00e9curit\u00e9 de l'information dans la gestion de la continuit\u00e9 de l'activit\u00e9",
            "code": "17.1.1",
            "label": "Organisation de la continuit\u00e9 de la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fdf76-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Aspects de la s\u00e9curit\u00e9 de l'information dans la gestion de la continuit\u00e9 de l'activit\u00e9",
            "code": "17.1.2",
            "label": "Mise en oeuvre de la continuit\u00e9 de la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fdfbe-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Aspects de la s\u00e9curit\u00e9 de l'information dans la gestion de la continuit\u00e9 de l'activit\u00e9",
            "code": "17.1.3",
            "label": "V\u00e9rifier, revoir et \u00e9valuer la continuit\u00e9 de la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fe022-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.1.1",
            "label": "Identification de la l\u00e9gislation et des exigences contractuelles applicables",
            "uuid": "267fe08b-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.1.2",
            "label": "Droits de propri\u00e9t\u00e9 intellectuelle",
            "uuid": "267fe307-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.1.3",
            "label": "Protection des enregistrements",
            "uuid": "267fe37d-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.1.4",
            "label": "Protection de la vie priv\u00e9e et protection des donn\u00e9es \u00e0 caract\u00e8re personnel",
            "uuid": "267fe3de-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.1.5",
            "label": "R\u00e9glementation relative aux mesures cryptographiques",
            "uuid": "267fe510-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.2.2",
            "label": "Conformit\u00e9 avec les politiques et les normes de s\u00e9curit\u00e9",
            "uuid": "267fe58f-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Conformit\u00e9",
            "code": "18.2.3",
            "label": "Examen de la conformit\u00e9 technique",
            "uuid": "267fe600-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.7.1",
            "label": "Mesures relatives \u00e0 l\u2019audit des syst\u00e8mes d\u2019information",
            "uuid": "267fe660-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Organisation de la s\u00e9curit\u00e9 de l'information",
            "code": "6.1.5",
            "label": "La s\u00e9curit\u00e9 de l\u2019information dans la gestion de projet",
            "uuid": "267fe6b9-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des actifs",
            "code": "8.2.3",
            "label": "Manipulation des actifs",
            "uuid": "267fe71a-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Contr\u00f4le d'acc\u00e8s",
            "code": "9.2.2",
            "label": "Ma\u00eetrise de la gestion des acc\u00e8s utilisateur",
            "uuid": "267fe782-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.8",
            "label": "Phase de test de la s\u00e9curit\u00e9 du syst\u00e8me",
            "uuid": "267fe7e9-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.6",
            "label": "Environnement de d\u00e9veloppement s\u00e9curis\u00e9",
            "uuid": "267fe847-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Acquisition, d\u00e9veloppement et maintenance des syst\u00e8mes d'information",
            "code": "14.2.1",
            "label": "Politique de d\u00e9veloppement s\u00e9curis\u00e9",
            "uuid": "267fe8a1-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "S\u00e9curit\u00e9 li\u00e9e \u00e0 l'exploitation",
            "code": "12.6.2",
            "label": "Restrictions li\u00e9es \u00e0 l\u2019installation de logiciels",
            "uuid": "267fe8fe-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Relations avec le fournisseurs",
            "code": "15.1.3",
            "label": "Chaine d\u2019approvisionnement informatique",
            "uuid": "267fe959-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'information",
            "code": "16.1.4",
            "label": "Appr\u00e9ciation des \u00e9v\u00e9nements li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l\u2019information et prise de d\u00e9cision",
            "uuid": "267fe9b4-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Gestion des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'information",
            "code": "16.1.5",
            "label": "R\u00e9ponse aux incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l\u2019information",
            "uuid": "267fea11-f705-11e8-b555-0800279aaa2b"
        },
        {
            "category": "Aspects de la s\u00e9curit\u00e9 de l'information dans la gestion de la continuit\u00e9 de l'activit\u00e9",
            "code": "17.2.1",
            "label": "Disponibilit\u00e9 des moyens de traitement de l\u2019information",
            "uuid": "267fea72-f705-11e8-b555-0800279aaa2b"
        }
    ],
    "version": 1,
    "version_ext": "ISO/IEC 27002:2013"
}