{"id":8891,"date":"2025-04-22T09:46:39","date_gmt":"2025-04-22T09:46:39","guid":{"rendered":"https:\/\/demo.casethemes.net\/consultio-business5\/?p=8891"},"modified":"2025-10-27T10:01:50","modified_gmt":"2025-10-27T09:01:50","slug":"unlocking-success-the-power-of-strategic-business-consulting-2","status":"publish","type":"post","link":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/","title":{"rendered":"ISO 27001 : Guide Complet de l&#8217;\u00c9valuation des Risques de S\u00e9curit\u00e9 de l&#8217;Information"},"content":{"rendered":"<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;\u00e9valuation des risques constitue le c\u0153ur battant de tout Syst\u00e8me de Management de la S\u00e9curit\u00e9 de l&#8217;Information (SMSI) conforme \u00e0 l&#8217;ISO 27001. Sans une analyse rigoureuse des menaces pesant sur vos actifs informationnels, il est impossible de d\u00e9ployer des contr\u00f4les de s\u00e9curit\u00e9 pertinents et proportionn\u00e9s.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Ce guide complet vous pr\u00e9sente une m\u00e9thodologie \u00e9prouv\u00e9e en 7 \u00e9tapes pour r\u00e9aliser une \u00e9valuation des risques ISO 27001 efficace, vous permettant de prot\u00e9ger vos donn\u00e9es critiques et d&#8217;obtenir votre certification.<\/p>\n<h2 id=\"introduction--pourquoi-lvaluation-des-risques-est\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Introduction : Pourquoi l&#8217;\u00c9valuation des Risques est au C\u0153ur de l&#8217;ISO 27001<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;ISO 27001 est la norme internationale de r\u00e9f\u00e9rence pour la s\u00e9curit\u00e9 de l&#8217;information. Contrairement \u00e0 des approches prescriptives qui imposent des contr\u00f4les fixes, elle repose sur une philosophie d&#8217;analyse des risques : chaque organisation doit identifier ses propres vuln\u00e9rabilit\u00e9s et menaces pour d\u00e9ployer les mesures de protection adapt\u00e9es.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>L&#8217;\u00e9valuation des risques permet de :<\/strong><\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Identifier les actifs informationnels critiques de votre organisation<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Comprendre les menaces et vuln\u00e9rabilit\u00e9s qui les affectent<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mesurer l&#8217;impact potentiel et la probabilit\u00e9 de ces risques<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Prioriser les investissements en s\u00e9curit\u00e9 selon un crit\u00e8re rationnel<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">D\u00e9montrer une approche syst\u00e9matique lors de l&#8217;audit de certification<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">La clause 6.1.2 de l&#8217;ISO 27001:2022 exige explicitement qu&#8217;une organisation \u00e9tablisse et maintienne un processus d&#8217;\u00e9valuation des risques de s\u00e9curit\u00e9 de l&#8217;information. Cette \u00e9valuation doit \u00eatre document\u00e9e, reproductible et r\u00e9guli\u00e8rement mise \u00e0 jour.<\/p>\n<h2 id=\"tape-1--tablir-un-cadre-de-gestion-des-risques\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">\u00c9tape 1 : \u00c9tablir un Cadre de Gestion des Risques<\/h2>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">D\u00e9finir votre m\u00e9thodologie<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Avant de commencer l&#8217;identification des risques, vous devez \u00e9tablir un cadre formel qui d\u00e9finit comment votre organisation va g\u00e9rer les risques de s\u00e9curit\u00e9 de l&#8217;information.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Les \u00e9l\u00e9ments cl\u00e9s \u00e0 d\u00e9finir :<\/strong><\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Approche qualitative ou quantitative :<\/strong>\u00a0Allez-vous \u00e9valuer les risques avec des \u00e9chelles descriptives (faible\/moyen\/\u00e9lev\u00e9) ou avec des valeurs num\u00e9riques chiffr\u00e9es ? L&#8217;approche qualitative est plus simple et suffisante pour la plupart des organisations.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Crit\u00e8res d&#8217;\u00e9valuation :<\/strong>\u00a0D\u00e9finissez les facteurs d&#8217;impact que vous allez mesurer (confidentialit\u00e9, int\u00e9grit\u00e9, disponibilit\u00e9), ainsi que les \u00e9chelles de probabilit\u00e9 et d&#8217;impact que vous utiliserez.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>App\u00e9tence pour le risque :<\/strong>\u00a0D\u00e9terminez le niveau de risque que votre organisation est pr\u00eate \u00e0 accepter. C&#8217;est un \u00e9l\u00e9ment strat\u00e9gique qui doit \u00eatre valid\u00e9 par la direction.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>R\u00f4les et responsabilit\u00e9s :<\/strong>\u00a0Qui identifie les risques ? Qui les \u00e9value ? Qui d\u00e9cide des traitements ? Clarifiez ces r\u00f4les d\u00e8s le d\u00e9but.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Aligner sur ISO 31000<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Nous recommandons de vous appuyer sur la norme ISO 31000 qui fournit un cadre g\u00e9n\u00e9rique de management des risques parfaitement compatible avec l&#8217;ISO 27001. Elle offre des principes, un processus et une terminologie structur\u00e9s.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Votre m\u00e9thodologie doit \u00eatre document\u00e9e dans une politique ou proc\u00e9dure de gestion des risques SI, valid\u00e9e par la direction.<\/p>\n<h2 id=\"tape-2--identifier-les-scnarios-de-risques-et-les\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">\u00c9tape 2 : Identifier les Sc\u00e9narios de Risques et les Actifs<\/h2>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Deux approches compl\u00e9mentaires<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Il existe deux principales approches pour identifier les risques de s\u00e9curit\u00e9 de l&#8217;information :<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Approche par les actifs (Asset-based)<\/strong><\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Commencez par \u00e9tablir un inventaire exhaustif de vos actifs informationnels :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Donn\u00e9es et informations<\/strong>\u00a0: bases de donn\u00e9es clients, propri\u00e9t\u00e9 intellectuelle, documents confidentiels<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Applications<\/strong>\u00a0: ERP, CRM, applications m\u00e9tier critiques<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Infrastructure<\/strong>\u00a0: serveurs, r\u00e9seaux, \u00e9quipements de s\u00e9curit\u00e9<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Personnes<\/strong>\u00a0: comp\u00e9tences cl\u00e9s, administrateurs syst\u00e8me<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Processus<\/strong>\u00a0: processus m\u00e9tier d\u00e9pendants du SI<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Pour chaque actif, identifiez :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Sa valeur pour l&#8217;organisation<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Les menaces qui pourraient l&#8217;affecter (cyberattaque, panne, erreur humaine, d\u00e9sastre naturel)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Les vuln\u00e9rabilit\u00e9s existantes (logiciels non patch\u00e9s, absence de chiffrement, contr\u00f4les d&#8217;acc\u00e8s faibles)<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Approche par sc\u00e9narios (Scenario-based)<\/strong><\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Partez de sc\u00e9narios de risques concrets qui pourraient impacter votre organisation :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Ransomware chiffrant vos donn\u00e9es de production<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Vol de donn\u00e9es clients par un employ\u00e9 malveillant<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Attaque DDoS rendant vos services indisponibles<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Divulgation accidentelle d&#8217;informations confidentielles<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Espionnage industriel par un concurrent<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Cette approche est plus rapide et souvent plus parlante pour les parties prenantes m\u00e9tier.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Notre recommandation : combinez les deux approches.<\/strong>\u00a0Commencez par les sc\u00e9narios les plus critiques, puis compl\u00e9tez avec une revue syst\u00e9matique des actifs pour ne rien oublier.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Utiliser l&#8217;Annexe A comme checklist<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;Annexe A de l&#8217;ISO 27001:2022 liste 93 contr\u00f4les de s\u00e9curit\u00e9 r\u00e9partis en 4 th\u00e8mes. Utilisez cette liste comme un guide pour identifier syst\u00e9matiquement les domaines de risques potentiels :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Organisationnel<\/strong>\u00a0: politiques de s\u00e9curit\u00e9, organisation des r\u00f4les<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Personnes<\/strong>\u00a0: sensibilisation, gestion des acc\u00e8s<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Physique<\/strong>\u00a0: s\u00e9curit\u00e9 des locaux, protection du mat\u00e9riel<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Technologique<\/strong>\u00a0: gestion des vuln\u00e9rabilit\u00e9s, cryptographie, s\u00e9curit\u00e9 r\u00e9seau<\/li>\n<\/ul>\n<h2 id=\"tape-3--analyser-les-risques-impact-et-probabilit\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">\u00c9tape 3 : Analyser les Risques (Impact et Probabilit\u00e9)<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Une fois les risques identifi\u00e9s, vous devez les analyser pour comprendre leur niveau de criticit\u00e9.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u00c9valuer l&#8217;impact<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;impact repr\u00e9sente les cons\u00e9quences n\u00e9gatives si le risque se mat\u00e9rialise. \u00c9valuez l&#8217;impact selon plusieurs dimensions :<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Confidentialit\u00e9<\/strong>\u00a0: Quel serait l&#8217;impact d&#8217;une divulgation non autoris\u00e9e de cette information ?<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mineur : informations publiques<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mod\u00e9r\u00e9 : informations internes<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Majeur : donn\u00e9es clients<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Critique : secrets commerciaux<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Int\u00e9grit\u00e9<\/strong>\u00a0: Quelles seraient les cons\u00e9quences d&#8217;une modification ou destruction de ces donn\u00e9es ?<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mineur : reconstitution facile<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mod\u00e9r\u00e9 : perte de temps significative<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Majeur : impact op\u00e9rationnel important<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Critique : impossibilit\u00e9 de fonctionner<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Disponibilit\u00e9<\/strong>\u00a0: Quel serait l&#8217;impact d&#8217;une indisponibilit\u00e9 du syst\u00e8me ou des donn\u00e9es ?<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mineur : g\u00eane temporaire<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mod\u00e9r\u00e9 : ralentissement activit\u00e9<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Majeur : arr\u00eat d&#8217;activit\u00e9 partiel<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Critique : arr\u00eat complet des op\u00e9rations<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Consid\u00e9rez \u00e9galement les impacts financiers, r\u00e9glementaires (amendes RGPD), r\u00e9putationnels et contractuels.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u00c9valuer la probabilit\u00e9<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">La probabilit\u00e9 mesure la vraisemblance que le risque se produise. Prenez en compte :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Les menaces actuelles<\/strong>\u00a0: ce type d&#8217;attaque est-il fr\u00e9quent dans votre secteur ?<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Les vuln\u00e9rabilit\u00e9s existantes<\/strong>\u00a0: avez-vous des protections en place ?<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>L&#8217;attractivit\u00e9 de la cible<\/strong>\u00a0: vos donn\u00e9es int\u00e9ressent-elles les cybercriminels ?<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>L&#8217;historique<\/strong>\u00a0: ce type d&#8217;incident s&#8217;est-il d\u00e9j\u00e0 produit ?<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Utilisez une \u00e9chelle simple :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Rare<\/strong>\u00a0: probabilit\u00e9 &lt; 10% sur 3 ans<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Possible<\/strong>\u00a0: probabilit\u00e9 10-40% sur 3 ans<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Probable<\/strong>\u00a0: probabilit\u00e9 40-70% sur 3 ans<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Quasi-certain<\/strong>\u00a0: probabilit\u00e9 &gt; 70% sur 3 ans<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Calculer le niveau de risque<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Combinez impact et probabilit\u00e9 pour obtenir le niveau de risque, g\u00e9n\u00e9ralement repr\u00e9sent\u00e9 dans une matrice :<\/p>\n<table width=\"542\">\n<tbody>\n<tr>\n<td width=\"222\">Impact<\/td>\n<td width=\"80\">Mineur<\/td>\n<td width=\"80\">Mod\u00e9r\u00e9<\/td>\n<td width=\"80\">Majeur<\/td>\n<td width=\"80\">Critique<\/td>\n<\/tr>\n<tr>\n<td>Quasi-certain<\/td>\n<td>M<\/td>\n<td>E<\/td>\n<td>E<\/td>\n<td>E<\/td>\n<\/tr>\n<tr>\n<td>Probable<\/td>\n<td>F<\/td>\n<td>M<\/td>\n<td>E<\/td>\n<td>E<\/td>\n<\/tr>\n<tr>\n<td>Possible<\/td>\n<td>F<\/td>\n<td>F<\/td>\n<td>M<\/td>\n<td>E<\/td>\n<\/tr>\n<tr>\n<td>Rare<\/td>\n<td>F<\/td>\n<td>F<\/td>\n<td>M<\/td>\n<td>M<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"w-full md:max-w-[90vw]\">\n<div class=\"codeWrapper text-light selection:text-super selection:bg-super\/10 my-md relative flex flex-col rounded font-mono text-sm font-normal bg-subtler\">\n<div class=\"-mt-xl\">\n<div>F = Faible | M = Moyen | E = \u00c9lev\u00e9<\/div>\n<div><\/div>\n<div><span style=\"font-size: revert;\">Cette matrice vous permet de prioriser visuellement vos risques.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2 id=\"tape-4--valuer-les-risques-selon-votre-apptence\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">\u00c9tape 4 : \u00c9valuer les Risques Selon Votre App\u00e9tence<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;\u00e9valuation consiste \u00e0 comparer le niveau de risque calcul\u00e9 avec vos crit\u00e8res d&#8217;acceptation pr\u00e9d\u00e9finis.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Risques acceptables<\/strong>\u00a0: Niveau de risque suffisamment faible pour \u00eatre accept\u00e9 en l&#8217;\u00e9tat, sans mesures suppl\u00e9mentaires. Typiquement les risques \u00ab Faibles \u00bb de votre matrice.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Risques n\u00e9cessitant un traitement<\/strong>\u00a0: Tous les risques \u00ab Moyens \u00bb et \u00ab \u00c9lev\u00e9s \u00bb doivent faire l&#8217;objet d&#8217;un plan de traitement pour les r\u00e9duire \u00e0 un niveau acceptable.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Cette \u00e9valuation doit \u00eatre document\u00e9e dans un\u00a0<strong>registre des risques<\/strong>\u00a0qui centralise :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">La description de chaque risque<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Les actifs concern\u00e9s<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Les menaces et vuln\u00e9rabilit\u00e9s<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;\u00e9valuation (impact, probabilit\u00e9, niveau)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Le traitement envisag\u00e9<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Le responsable du risque (risk owner)<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Ce registre est un document vivant qui sera r\u00e9guli\u00e8rement mis \u00e0 jour.<\/p>\n<h2 id=\"tape-5--traiter-les-risques-accepter-rduire-viter\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">\u00c9tape 5 : Traiter les Risques (Accepter, R\u00e9duire, \u00c9viter, Transf\u00e9rer)<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Pour chaque risque identifi\u00e9, vous devez d\u00e9finir une strat\u00e9gie de traitement. L&#8217;ISO 27001 reconna\u00eet 4 options :<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">1. R\u00e9duire le risque (Mitigation)<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">C&#8217;est l&#8217;option la plus courante : mettre en place des mesures de s\u00e9curit\u00e9 pour diminuer soit la probabilit\u00e9, soit l&#8217;impact du risque.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Exemples :<\/strong><\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">D\u00e9ployer un antivirus et un pare-feu (r\u00e9duit la probabilit\u00e9 d&#8217;infection malware)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Impl\u00e9menter des sauvegardes automatiques quotidiennes (r\u00e9duit l&#8217;impact d&#8217;une perte de donn\u00e9es)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Former les utilisateurs au phishing (r\u00e9duit la probabilit\u00e9 de compromission)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mettre en place l&#8217;authentification multi-facteurs (r\u00e9duit la probabilit\u00e9 d&#8217;acc\u00e8s non autoris\u00e9)<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Les contr\u00f4les \u00e0 mettre en \u0153uvre sont choisis dans l&#8217;Annexe A ou peuvent \u00eatre des mesures sp\u00e9cifiques \u00e0 votre contexte.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">2. Accepter le risque (Acceptance)<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Si le niveau de risque r\u00e9siduel est dans votre zone d&#8217;acceptation, ou si le co\u00fbt des mesures est disproportionn\u00e9 par rapport au b\u00e9n\u00e9fice, vous pouvez d\u00e9cider d&#8217;accepter le risque.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Attention :<\/strong>\u00a0L&#8217;acceptation des risques doit \u00eatre une d\u00e9cision formelle de la direction, document\u00e9e et justifi\u00e9e. On ne peut pas \u00ab accepter \u00bb un risque par n\u00e9gligence.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">3. \u00c9viter le risque (Avoidance)<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Modifier l&#8217;activit\u00e9 pour \u00e9liminer compl\u00e8tement le risque.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Exemples :<\/strong><\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Ne pas stocker de donn\u00e9es de cartes bancaires (\u00e9vite le risque de vol de ces donn\u00e9es)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Ne pas offrir de service accessible depuis Internet (\u00e9vite les risques d&#8217;attaques externes)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Renoncer \u00e0 un projet trop risqu\u00e9<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Cette option n&#8217;est pas toujours possible car elle peut impacter le mod\u00e8le d&#8217;affaires.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">4. Transf\u00e9rer le risque (Transfer)<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Partager le risque avec une tierce partie, g\u00e9n\u00e9ralement par le biais d&#8217;une assurance ou d&#8217;un contrat.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Exemples :<\/strong><\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Souscrire une cyber-assurance<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Externaliser l&#8217;h\u00e9bergement \u00e0 un cloud provider certifi\u00e9 ISO 27001<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Faire appel \u00e0 un MSSP (Managed Security Service Provider)<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Le transfert ne supprime pas le risque mais en partage les cons\u00e9quences financi\u00e8res.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Documenter le plan de traitement<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Pour chaque risque n\u00e9cessitant un traitement, documentez :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Le(s) contr\u00f4le(s) \u00e0 impl\u00e9menter<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Le responsable de la mise en \u0153uvre<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;\u00e9ch\u00e9ance de mise en \u0153uvre<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Le budget allou\u00e9<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Le niveau de risque r\u00e9siduel attendu<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Ce plan de traitement des risques (Risk Treatment Plan) est un livrable cl\u00e9 pour l&#8217;audit ISO 27001.<\/p>\n<h2 id=\"tape-6--mettre-en-uvre-les-contrles-de-lannexe-a\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">\u00c9tape 6 : Mettre en \u0152uvre les Contr\u00f4les de l&#8217;Annexe A<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Une fois votre plan de traitement d\u00e9fini, passez \u00e0 l&#8217;impl\u00e9mentation concr\u00e8te des contr\u00f4les de s\u00e9curit\u00e9.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">S\u00e9lectionner les contr\u00f4les pertinents<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;Annexe A de l&#8217;ISO 27001:2022 contient 93 contr\u00f4les organis\u00e9s en 4 cat\u00e9gories. Vous n&#8217;\u00eates pas oblig\u00e9 de tous les impl\u00e9menter : s\u00e9lectionnez ceux qui sont pertinents pour traiter vos risques identifi\u00e9s.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Quelques contr\u00f4les essentiels fr\u00e9quemment s\u00e9lectionn\u00e9s :<\/strong><\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.5.1 Politiques de s\u00e9curit\u00e9 de l&#8217;information<\/strong>\u00a0: Documenter votre SMSI<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.5.15 Contr\u00f4le d&#8217;acc\u00e8s<\/strong>\u00a0: G\u00e9rer qui acc\u00e8de \u00e0 quoi<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.5.23 S\u00e9curit\u00e9 dans l&#8217;utilisation des services cloud<\/strong><\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.8.2 Droits d&#8217;acc\u00e8s privil\u00e9gi\u00e9s<\/strong>\u00a0: Prot\u00e9ger les comptes administrateurs<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.8.5 Authentification s\u00e9curis\u00e9e<\/strong>\u00a0: MFA, politiques de mots de passe robustes<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.8.7 Protection contre les malwares<\/strong>\u00a0: Antivirus, EDR<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.8.11 Sauvegarde<\/strong>\u00a0: Sauvegardes r\u00e9guli\u00e8res et test\u00e9es<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.8.16 Gestion des vuln\u00e9rabilit\u00e9s techniques<\/strong>\u00a0: Patch management<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>A.8.23 Filtrage Web<\/strong>\u00a0: Protection contre les sites malveillants<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Cr\u00e9er une D\u00e9claration d&#8217;Applicabilit\u00e9 (SoA)<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">La Statement of Applicability est un document obligatoire qui :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Liste les 93 contr\u00f4les de l&#8217;Annexe A<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Indique pour chacun s&#8217;il est applicable ou non dans votre contexte<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Justifie les choix (r\u00e9f\u00e9rence aux risques trait\u00e9s)<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">D\u00e9crit l&#8217;\u00e9tat d&#8217;impl\u00e9mentation<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">La SoA est l&#8217;un des documents les plus scrut\u00e9s lors de l&#8217;audit de certification.<\/p>\n<h2 id=\"tape-7--surveiller-et-rviser-rgulirement-les-risqu\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">\u00c9tape 7 : Surveiller et R\u00e9viser R\u00e9guli\u00e8rement les Risques<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">La gestion des risques n&#8217;est jamais termin\u00e9e. Le paysage des menaces \u00e9volue constamment, de nouvelles vuln\u00e9rabilit\u00e9s apparaissent, et votre organisation change.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">R\u00e9visions r\u00e9guli\u00e8res<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Planifiez des r\u00e9visions de votre \u00e9valuation des risques :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>R\u00e9vision compl\u00e8te annuelle<\/strong>\u00a0: r\u00e9\u00e9valuez l&#8217;ensemble du registre des risques<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>R\u00e9visions cibl\u00e9es trimestrielles<\/strong>\u00a0: focus sur les risques \u00e9lev\u00e9s et les changements majeurs<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>R\u00e9visions ad hoc<\/strong>\u00a0: en cas d&#8217;incident, de changement organisationnel important ou de nouvelle menace<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Indicateurs de suivi<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Mettez en place des indicateurs (KRI &#8211; Key Risk Indicators) pour surveiller l&#8217;\u00e9volution de vos risques :<\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Nombre de tentatives d&#8217;intrusion d\u00e9tect\u00e9es<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Taux de syst\u00e8mes non patch\u00e9s<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Incidents de s\u00e9curit\u00e9 par mois<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Pourcentage d&#8217;utilisateurs form\u00e9s \u00e0 la s\u00e9curit\u00e9<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">Am\u00e9lioration continue<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Les r\u00e9sultats des audits internes, des tests de s\u00e9curit\u00e9 (pentests) et des incidents doivent alimenter votre \u00e9valuation des risques. C&#8217;est le cycle PDCA (Plan-Do-Check-Act) en action.<\/p>\n<h2 id=\"les-piges--viter-dans-votre-valuation-des-risques\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Les Pi\u00e8ges \u00e0 \u00c9viter dans Votre \u00c9valuation des Risques<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Pi\u00e8ge 1 : \u00c9valuation trop th\u00e9orique<\/strong><br \/>\nNe vous contentez pas de remplir des tableaux. Impliquez les responsables m\u00e9tier, les \u00e9quipes IT et la direction pour obtenir une vision r\u00e9aliste des risques.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Pi\u00e8ge 2 : Analyse insuffisante<\/strong><br \/>\nPrendre le temps d&#8217;identifier les menaces et vuln\u00e9rabilit\u00e9s. Une analyse b\u00e2cl\u00e9e conduit \u00e0 des contr\u00f4les inadapt\u00e9s.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Pi\u00e8ge 3 : Registre fig\u00e9<\/strong><br \/>\nLe registre des risques doit \u00e9voluer en permanence. Un registre qui ne bouge pas depuis des mois n&#8217;a plus de valeur.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Pi\u00e8ge 4 : Manque de priorisation<\/strong><br \/>\nAvec des ressources limit\u00e9es, concentrez-vous sur les risques les plus critiques plut\u00f4t que de disperser vos efforts.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Pi\u00e8ge 5 : D\u00e9connexion avec les contr\u00f4les<\/strong><br \/>\nChaque contr\u00f4le impl\u00e9ment\u00e9 doit r\u00e9pondre \u00e0 au moins un risque identifi\u00e9. \u00c9vitez de d\u00e9ployer des mesures \u00ab parce qu&#8217;il faut \u00bb sans lien avec votre analyse.<\/p>\n<h2 id=\"conclusion--construire-une-approche-proactive-de-l\" class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0 md:text-lg [hr+&amp;]:mt-4\">Conclusion : Construire une Approche Proactive de la S\u00e9curit\u00e9<\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;\u00e9valuation des risques ISO 27001 n&#8217;est pas un exercice bureaucratique mais un outil strat\u00e9gique pour prot\u00e9ger les actifs informationnels de votre organisation de mani\u00e8re rationnelle et proportionn\u00e9e.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>En suivant cette m\u00e9thodologie en 7 \u00e9tapes, vous :<\/strong><\/p>\n<ul>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Obtenez une vision claire et partag\u00e9e de vos risques cyber<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Priorisez vos investissements s\u00e9curit\u00e9 selon un crit\u00e8re objectif<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">D\u00e9montrez une approche professionnelle lors de l&#8217;audit ISO 27001<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">R\u00e9duisez concr\u00e8tement votre exposition aux cybermenaces<\/li>\n<li class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Renforcez la confiance de vos clients et partenaires<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">L&#8217;\u00e9valuation des risques est le fondement de votre SMSI. Investissez le temps et l&#8217;expertise n\u00e9cessaires pour la r\u00e9aliser correctement : c&#8217;est ce qui diff\u00e9rencie un SMSI efficace d&#8217;un simple exercice de conformit\u00e9.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Besoin d&#8217;accompagnement pour votre \u00e9valuation des risques ISO 27001 ?<\/strong> Notre \u00e9quipe d&#8217;experts en s\u00e9curit\u00e9 de l&#8217;information et d&#8217;auditeurs certifi\u00e9s Lead Auditor ISO 27001 vous accompagne dans toutes les \u00e9tapes de votre projet de certification. Contactez-nous pour une \u00e9valuation pr\u00e9liminaire gratuite.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At vero eos et accusamus et iustoodio digni goikussimos ducimus qui blanp ditiis praesum voluum. <\/p>\n","protected":false},"author":1,"featured_media":10063,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,1],"tags":[71,74,73,70,76,72,75,69,68],"class_list":["post-8891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-audit","category-certification","tag-analyse-des-risques","tag-annexe-a","tag-cybersecurite","tag-evaluation-des-risques","tag-gestion-des-risques-si","tag-iso-27001","tag-risk-assessment","tag-securite-de-linformation","tag-smsi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ISO 27001 : Guide Complet de l&#039;\u00c9valuation des Risques de S\u00e9curit\u00e9 de l&#039;Information - Skills Campus - Audit &amp; Consulting<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001 : Guide Complet de l&#039;\u00c9valuation des Risques de S\u00e9curit\u00e9 de l&#039;Information - Skills Campus - Audit &amp; Consulting\" \/>\n<meta property=\"og:description\" content=\"At vero eos et accusamus et iustoodio digni goikussimos ducimus qui blanp ditiis praesum voluum.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Skills Campus - Audit &amp; Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-22T09:46:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-27T09:01:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin_sg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_sg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/\"},\"author\":{\"name\":\"admin_sg\",\"@id\":\"https:\/\/skillsconsulting.ma\/#\/schema\/person\/15220e164f8138cd42de9dc435861058\"},\"headline\":\"ISO 27001 : Guide Complet de l&#8217;\u00c9valuation des Risques de S\u00e9curit\u00e9 de l&#8217;Information\",\"datePublished\":\"2025-04-22T09:46:39+00:00\",\"dateModified\":\"2025-10-27T09:01:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/\"},\"wordCount\":2383,\"image\":{\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png\",\"keywords\":[\"analyse des risques\",\"Annexe A\",\"cybers\u00e9curit\u00e9\",\"\u00e9valuation des risques\",\"gestion des risques SI\",\"ISO 27001\",\"risk assessment\",\"s\u00e9curit\u00e9 de l'information\",\"SMSI\"],\"articleSection\":[\"Audit et S\u00e9curit\u00e9 SI\",\"Certification des Syst\u00e8mes de Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/\",\"url\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/\",\"name\":\"ISO 27001 : Guide Complet de l'\u00c9valuation des Risques de S\u00e9curit\u00e9 de l'Information - Skills Campus - Audit &amp; Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/skillsconsulting.ma\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png\",\"datePublished\":\"2025-04-22T09:46:39+00:00\",\"dateModified\":\"2025-10-27T09:01:50+00:00\",\"author\":{\"@id\":\"https:\/\/skillsconsulting.ma\/#\/schema\/person\/15220e164f8138cd42de9dc435861058\"},\"breadcrumb\":{\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage\",\"url\":\"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png\",\"contentUrl\":\"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png\",\"width\":760,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/skillsconsulting.ma\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISO 27001 : Guide Complet de l&#8217;\u00c9valuation des Risques de S\u00e9curit\u00e9 de l&#8217;Information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/skillsconsulting.ma\/#website\",\"url\":\"https:\/\/skillsconsulting.ma\/\",\"name\":\"Skills Campus - Audit &amp; Consulting\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/skillsconsulting.ma\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/skillsconsulting.ma\/#\/schema\/person\/15220e164f8138cd42de9dc435861058\",\"name\":\"admin_sg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c1f2000689ea005d888023fb0ddf5e066062cee6b4405a1f1b5bc546b41e40bc?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c1f2000689ea005d888023fb0ddf5e066062cee6b4405a1f1b5bc546b41e40bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c1f2000689ea005d888023fb0ddf5e066062cee6b4405a1f1b5bc546b41e40bc?s=96&d=mm&r=g\",\"caption\":\"admin_sg\"},\"sameAs\":[\"https:\/\/skillsconsulting.ma\/\"],\"url\":\"https:\/\/skillsconsulting.ma\/index.php\/author\/admin_sg\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISO 27001 : Guide Complet de l'\u00c9valuation des Risques de S\u00e9curit\u00e9 de l'Information - Skills Campus - Audit &amp; Consulting","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"ISO 27001 : Guide Complet de l'\u00c9valuation des Risques de S\u00e9curit\u00e9 de l'Information - Skills Campus - Audit &amp; Consulting","og_description":"At vero eos et accusamus et iustoodio digni goikussimos ducimus qui blanp ditiis praesum voluum.","og_url":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/","og_site_name":"Skills Campus - Audit &amp; Consulting","article_published_time":"2025-04-22T09:46:39+00:00","article_modified_time":"2025-10-27T09:01:50+00:00","og_image":[{"width":760,"height":555,"url":"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png","type":"image\/png"}],"author":"admin_sg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin_sg","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#article","isPartOf":{"@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/"},"author":{"name":"admin_sg","@id":"https:\/\/skillsconsulting.ma\/#\/schema\/person\/15220e164f8138cd42de9dc435861058"},"headline":"ISO 27001 : Guide Complet de l&#8217;\u00c9valuation des Risques de S\u00e9curit\u00e9 de l&#8217;Information","datePublished":"2025-04-22T09:46:39+00:00","dateModified":"2025-10-27T09:01:50+00:00","mainEntityOfPage":{"@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/"},"wordCount":2383,"image":{"@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage"},"thumbnailUrl":"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png","keywords":["analyse des risques","Annexe A","cybers\u00e9curit\u00e9","\u00e9valuation des risques","gestion des risques SI","ISO 27001","risk assessment","s\u00e9curit\u00e9 de l'information","SMSI"],"articleSection":["Audit et S\u00e9curit\u00e9 SI","Certification des Syst\u00e8mes de Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/","url":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/","name":"ISO 27001 : Guide Complet de l'\u00c9valuation des Risques de S\u00e9curit\u00e9 de l'Information - Skills Campus - Audit &amp; Consulting","isPartOf":{"@id":"https:\/\/skillsconsulting.ma\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage"},"image":{"@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage"},"thumbnailUrl":"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png","datePublished":"2025-04-22T09:46:39+00:00","dateModified":"2025-10-27T09:01:50+00:00","author":{"@id":"https:\/\/skillsconsulting.ma\/#\/schema\/person\/15220e164f8138cd42de9dc435861058"},"breadcrumb":{"@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#primaryimage","url":"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png","contentUrl":"https:\/\/skillsconsulting.ma\/wp-content\/uploads\/2025\/04\/ISO-27001-Guide-Complet-de-l-Evaluation-des-Risques.png","width":760,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/skillsconsulting.ma\/index.php\/2025\/04\/22\/unlocking-success-the-power-of-strategic-business-consulting-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/skillsconsulting.ma\/"},{"@type":"ListItem","position":2,"name":"ISO 27001 : Guide Complet de l&#8217;\u00c9valuation des Risques de S\u00e9curit\u00e9 de l&#8217;Information"}]},{"@type":"WebSite","@id":"https:\/\/skillsconsulting.ma\/#website","url":"https:\/\/skillsconsulting.ma\/","name":"Skills Campus - Audit &amp; Consulting","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skillsconsulting.ma\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/skillsconsulting.ma\/#\/schema\/person\/15220e164f8138cd42de9dc435861058","name":"admin_sg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c1f2000689ea005d888023fb0ddf5e066062cee6b4405a1f1b5bc546b41e40bc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c1f2000689ea005d888023fb0ddf5e066062cee6b4405a1f1b5bc546b41e40bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c1f2000689ea005d888023fb0ddf5e066062cee6b4405a1f1b5bc546b41e40bc?s=96&d=mm&r=g","caption":"admin_sg"},"sameAs":["https:\/\/skillsconsulting.ma\/"],"url":"https:\/\/skillsconsulting.ma\/index.php\/author\/admin_sg\/"}]}},"_links":{"self":[{"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/posts\/8891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/comments?post=8891"}],"version-history":[{"count":1,"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/posts\/8891\/revisions"}],"predecessor-version":[{"id":10069,"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/posts\/8891\/revisions\/10069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/media\/10063"}],"wp:attachment":[{"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/media?parent=8891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/categories?post=8891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skillsconsulting.ma\/index.php\/wp-json\/wp\/v2\/tags?post=8891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}