forked from intuitem/ciso-assistant-community
-
Notifications
You must be signed in to change notification settings - Fork 0
/
anssi-guide-hygiene.yaml
2629 lines (2523 loc) · 164 KB
/
anssi-guide-hygiene.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
urn: urn:intuitem:risk:library:anssi-guide-hygiene
locale: fr
ref_id: ANSSI-GUIDE-HYGIENE
name: "ANSSI - Guide d'hygi\xE8ne informatique"
description: "Renforcer la s\xE9curit\xE9 de son syst\xE8me d\u2019information en\
\ 42 mesures\n https://cyber.gouv.fr/sites/default/files/2017/01/guide_hygiene_informatique_anssi.pdf"
copyright: Licence Ouverte/Open Licence (Etalab - V1)
version: 2
provider: ANSSI
packager: intuitem
translations:
en:
name: Guideline for a healthy information system
description: 'Strengthen Information System Security in 42 Measures
https://cyber.gouv.fr/sites/default/files/2013/01/guideline-for-a-healthy-information-system-in-42-measures_v2.pdf'
objects:
framework:
urn: urn:intuitem:risk:framework:anssi-guide-hygiene
ref_id: ANSSI-GUIDE-HYGIENE
name: "ANSSI - Guide d'hygi\xE8ne informatique"
description: "Renforcer la s\xE9curit\xE9 de son syst\xE8me d\u2019information\
\ en 42 mesures"
translations:
en:
name: Guideline for a healthy information system
description: 'Strengthen Information System Security in 42 Measures
https://cyber.gouv.fr/sites/default/files/2013/01/guideline-for-a-healthy-information-system-in-42-measures_v2.pdf'
implementation_groups_definition:
- ref_id: S
name: standard
description: null
translations:
en:
name: standard
description: null
- ref_id: R
name: "renforc\xE9"
description: null
translations:
en:
name: strengthened
description: null
requirement_nodes:
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:i
assessable: false
depth: 1
ref_id: I
name: Sensibiliser et former
translations:
en:
name: Raise awareness and train
description: null
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:1
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:i
ref_id: '1'
name: "Former les \xE9quipes op\xE9rationnelles \xE0 la s\xE9curit\xE9 des syst\xE8\
mes d\u2019information"
description: "Les \xE9quipes op\xE9rationnelles (administrateurs r\xE9seau,\
\ s\xE9curit\xE9 et syst\xE8me, chefs de projet, d\xE9veloppeurs, RSSI) ont\
\ des acc\xE8s privil\xE9gi\xE9s au syst\xE8me d\u2019information. Elles peuvent,\
\ par inadvertance ou par m\xE9connaissance des cons\xE9quences de certaines\
\ pratiques, r\xE9aliser des op\xE9rations g\xE9n\xE9ratrices de vuln\xE9\
rabilit\xE9s.\nCitons par exemple l\u2019affectation de comptes disposant\
\ de trop nombreux privil\xE8ges par rapport \xE0 la t\xE2che \xE0 r\xE9aliser,\
\ l\u2019utilisation de comptes personnels pour ex\xE9cuter des services ou\
\ t\xE2ches p\xE9riodiques, ou encore le choix de mots de passe peu robustes\
\ donnant acc\xE8s \xE0 des comptes privil\xE9gi\xE9s.\nLes \xE9quipes op\xE9\
rationnelles, pour \xEAtre \xE0 l\u2019\xE9tat de l\u2019art de la s\xE9curit\xE9\
\ des syst\xE8mes d\u2019information, doivent donc suivre - \xE0 leur prise\
\ de poste puis \xE0 intervalles r\xE9guliers - des formations sur :\n> la\
\ l\xE9gislation en vigueur ;\n> les principaux risques et menaces ;\n> le\
\ maintien en condition de s\xE9curit\xE9 ;\n> l\u2019authentification et\
\ le contr\xF4le d\u2019acc\xE8s ;\n> le param\xE9trage fin et le durcissement\
\ des syst\xE8mes ; > le cloisonnement r\xE9seau ; > et la journalisation.\
\ \nCette liste doit \xEAtre pr\xE9cis\xE9e selon le m\xE9tier des collaborateurs\
\ en consid\xE9rant des aspects tels que l\u2019int\xE9gration de la s\xE9\
curit\xE9 pour les chefs de projet, le d\xE9veloppement s\xE9curis\xE9 pour\
\ les d\xE9veloppeurs, les r\xE9f\xE9rentiels de s\xE9curit\xE9 pour les RSSI,\
\ etc. \nIl est par ailleurs n\xE9cessaire de faire mention de clauses sp\xE9\
cifiques dans les contrats de prestation pour garantir une formation r\xE9\
guli\xE8re \xE0 la s\xE9curit\xE9 des syst\xE8mes d\u2019information du personnel\
\ externe et notamment les infog\xE9rants."
implementation_groups:
- S
translations:
en:
name: Train the operational teams in information system security
description: "The operational teams (network, security and system administrators,\
\ project managers, developers, chief information security officer (CISO))\
\ have special access to the information system. They can, inadvertently\
\ or through not understanding the consequences of certain practices,\
\ carry out operations creating vulnerabilities.\nWe can cite for example,\
\ granting accounts with too many privileges in relation to the task to\
\ be carried out, the use of personal accounts to carry out services or\
\ periodical tasks, or even choosing passwords that are not sufficiently\
\ robust granting access to privileged accounts.\nThe operational teams,\
\ to comply with information system security accepted practice, must therefore\
\ undertake - upon taking on their role and, subsequently, at regular\
\ intervals - training on:\n> the legislation in effect;\n> the main risks\
\ and threats;\n> security maintenance;\n> authentication and access control;\n\
> the detailed configuration and hardening of systems;\n> network partitioning;\n\
> and logging.\nThis list must be specified according to the employee\u2019\
s job , considering aspects such as security integration for project managers,\
\ secure development for developers, the security reference documents\
\ for ISSMs, etc.\nMoreover, it is necessary to mention specific clauses\
\ in service agreements in order to guarantee regular training in information\
\ system security for external staff and especially outsourcers."
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:2
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:i
ref_id: '2'
name: "Sensibiliser les utilisateurs aux bonnes pratiques \xE9l\xE9mentaires\
\ de s\xE9curit\xE9 informatique"
description: "Chaque utilisateur est un maillon \xE0 part enti\xE8re de la cha\xEE\
ne des syst\xE8mes d\u2019information. \xC0 ce titre et d\xE8s son arriv\xE9\
e dans l\u2019entit\xE9, il doit \xEAtre inform\xE9 des enjeux de s\xE9curit\xE9\
, des r\xE8gles \xE0 respecter et des bons comportements \xE0 adopter en mati\xE8\
re de s\xE9curit\xE9 des syst\xE8mes d\u2019information \xE0 travers des actions\
\ de sensibilisation et de formation.\nCes derni\xE8res doivent \xEAtre r\xE9\
guli\xE8res, adapt\xE9es aux utilisateurs cibl\xE9s, peuvent prendre diff\xE9\
rentes formes (mails, affichage, r\xE9unions, espace intranet d\xE9di\xE9\
, etc.) et aborder au minimum les sujets suivants :\n> les objectifs et enjeux\
\ que rencontre l\u2019entit\xE9 en mati\xE8re de s\xE9curit\xE9 des syst\xE8\
mes d\u2019information ;\n> les informations consid\xE9r\xE9es comme sensibles\
\ ;\n> les r\xE9glementations et obligations l\xE9gales ;\n> les r\xE8gles\
\ et consignes de s\xE9curit\xE9 r\xE9gissant l\u2019activit\xE9 quotidienne\
\ : respect de la politique de s\xE9curit\xE9, non-connexion d\u2019\xE9quipements\
\ personnels au r\xE9seau de l\u2019entit\xE9, non-divulgation de mots de\
\ passe \xE0 un tiers, non-r\xE9utilisation de mots de passe professionnels\
\ dans la sph\xE8re priv\xE9e et inversement, signalement d\u2019\xE9v\xE9\
nements suspects, etc. ;\n> les moyens disponibles et participant \xE0 la\
\ s\xE9curit\xE9 du syst\xE8me : verrouillage syst\xE9matique de la session\
\ lorsque l\u2019utilisateur quitte son poste, outil de protection des mots\
\ de passe, etc. "
implementation_groups:
- S
translations:
en:
name: "Raise users\u2019 awareness about basic information security"
description: 'Each user is a part of the information system chain. To this
end, as he enters the organization, he must be informed of the security
stakes, the rules to
respect and the proper behaviour to adopt in terms of information system
security by awareness raising and training actions.
These actions must be regular and adapted to the users targeted. It may
take different forms (emails, displays, meetings, dedicated intranet space,
etc.) and, as a minimum, deal with the following issues:
> the objectives and stakes that the organization encounters in terms
of information system security;
> the information considered as sensitive;
> the regulations and legal obligations;
> the rules and security instructions governing daily activity: adhering
to the security policy, not connecting personal devices to the network
of the
organization, not divulging passwords to a third party, not reusing professional
passwords in the private sphere or the other way round, reporting suspicious
events, etc.;
> the means available and involved in computer security: systematically
locking the session when the user leaves his device, password protection
tool, etc.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:2.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:i
ref_id: 2.R
name: "Sensibiliser les utilisateurs aux bonnes pratiques \xE9l\xE9mentaires\
\ de s\xE9curit\xE9 informatique (renforc\xE9)"
description: "Pour renforcer ces mesures, l\u2019\xE9laboration et la signature\
\ d\u2019une charte des moyens informatiques pr\xE9cisant les r\xE8gles et\
\ consignes que doivent respecter les utilisateurs peut \xEAtre envisag\xE9\
e."
implementation_groups:
- R
translations:
en:
name: "Raise users\u2019 awareness about basic information security (strengthened)"
description: To strengthen these measures, the creation and signature of
an IT resource charter specifying the rules and instructions that must
be adhered to by users may be considered.
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:3
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:i
ref_id: '3'
name: "Ma\xEEtriser les risques de l\u2019infog\xE9rance"
description: "Lorsqu\u2019une entit\xE9 souhaite externaliser son syst\xE8me\
\ d\u2019information ou ses donn\xE9es, elle doit en amont \xE9valuer les\
\ risques sp\xE9cifiques \xE0 l\u2019infog\xE9rance (ma\xEEtrise du syst\xE8\
me d\u2019information, actions \xE0 distance, h\xE9bergement mutualis\xE9\
, etc.) afin de prendre en compte, d\xE8s la r\xE9daction des exigences applicables\
\ au futur prestataire, les besoins et mesures de s\xE9curit\xE9 adapt\xE9\
s. \nLes risques SSI inh\xE9rents \xE0 ce type de d\xE9marche peuvent \xEA\
tre li\xE9s au contexte de l\u2019op\xE9ration d\u2019externalisation mais\
\ aussi \xE0 des sp\xE9cifications contractuelles d\xE9ficientes ou incompl\xE8\
tes.\nEn faveur du bon d\xE9roulement des op\xE9rations, il s\u2019agit donc\
\ :\n> d\u2019\xE9tudier attentivement les conditions des offres, la possibilit\xE9\
\ de les adapter \xE0 des besoins sp\xE9cifiques et les limites de responsabilit\xE9\
\ du prestataire ;\n> d\u2019imposer une liste d\u2019exigences pr\xE9cises\
\ au prestataire : r\xE9versibilit\xE9 du contrat, r\xE9alisation d\u2019\
audits, sauvegarde et restitution des donn\xE9es dans un format ouvert normalis\xE9\
, maintien \xE0 niveau de la s\xE9curit\xE9 dans le temps, etc.\nPour formaliser\
\ ces engagements, le prestataire fournira au commanditaire un plan d\u2019\
assurance s\xE9curit\xE9 (PAS) pr\xE9vu par l\u2019appel d\u2019offre. Il\
\ s\u2019agit d\u2019un document contractuel d\xE9crivant l\u2019ensemble\
\ des dispositions sp\xE9cifiques que les candidats s\u2019engagent \xE0 mettre\
\ en \u0153uvre pour garantir le respect des exigences de s\xE9curit\xE9 sp\xE9\
cifi\xE9es par l\u2019entit\xE9.\nLe recours \xE0 des solutions ou outils\
\ non ma\xEEtris\xE9s (par exemple h\xE9berg\xE9s dans le nuage) n\u2019est\
\ pas ici consid\xE9r\xE9 comme \xE9tant du ressort de l\u2019infog\xE9rance\
\ et par ailleurs d\xE9conseill\xE9 en cas de traitement d\u2019informations\
\ sensibles."
implementation_groups:
- S
translations:
en:
name: Control outsourced services
description: "When an organization wants to outsource its information system\
\ or data, it must assess, in advance, the risks specific to outsourced\
\ services (controlling the information system, remote actions, shared\
\ hosting, etc.) in order to take into account the needs ans suitable\
\ security measures when creating the requirements applicable to the future\
\ service provider.\nThe information security system risks inherent in\
\ this type of approach may be linked to the context of the outsourcing\
\ operation, but also deficient or\nincomplete contractual specifications.\n\
Therefore, in order to run smoothly the operations, it is important to:\n\
> carefully study the offers\u2019 conditions, the option of adapting\
\ them to the specific needs and the limits of the service provider\u2019\
s responsibility;\n> impose a list of specific requirements on the service\
\ provider: contract reversibility, the carrying out of audits, backup\
\ and data recovery in a\n> standardised open format, security maintenance\
\ over time, etc.\nTo formalise these commitments, the service provider\
\ will provide the customer with a security insurance plan detailed in\
\ the bid. This is a contractual\ndocument describing all of the specific\
\ measures that the applicants commit to implementing in order to guarantee\
\ the security requirements specified\nby the organization are met.\n\
The use of digital solutions or tools (hosted in the Cloud for example)\
\ is not considered here as it comes under the area of managed services\
\ and, moreover, is not advisable when processing sensitive data."
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:ii
assessable: false
depth: 1
ref_id: II
name: "Conna\xEEtre le syst\xE8me d'information"
translations:
en:
name: Know the Information System
description: null
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:4
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:ii
ref_id: '4'
name: " Identifier les informations et serveurs les plus sensibles et maintenir\
\ un sch\xE9ma du r\xE9seau"
description: "Chaque entit\xE9 poss\xE8de des donn\xE9es sensibles. Ces derni\xE8\
res peuvent porter sur son activit\xE9 propre (propri\xE9t\xE9 intellectuelle,\
\ savoir-faire, etc.) ou sur ses clients, administr\xE9s ou usagers (donn\xE9\
es personnelles, contrats, etc.). Afin de pouvoir les prot\xE9ger efficacement,\
\ il est indispensable de les identifier.\n\xC0 partir de cette liste de donn\xE9\
es sensibles, il sera possible de d\xE9terminer sur quels composants du syst\xE8\
me d\u2019information elles se localisent (bases de donn\xE9es, partages de\
\ fichiers, postes de travail, etc.). Ces composants correspondent aux serveurs\
\ et postes critiques pour l\u2019entit\xE9. \xC0 ce titre, ils devront faire\
\ l\u2019objet de mesures de s\xE9curit\xE9 sp\xE9cifiques pouvant porter\
\ sur la sauvegarde, la journalisation, les acc\xE8s, etc.\nIl s\u2019agit\
\ donc de cr\xE9er et de maintenir \xE0 jour un sch\xE9ma simplifi\xE9 du\
\ r\xE9seau (ou cartographie) repr\xE9sentant les diff\xE9rentes zones IP\
\ et le plan d\u2019adressage associ\xE9, les \xE9quipements de routage et\
\ de s\xE9curit\xE9 (pare-feu, relais applicatifs, etc.) et les interconnexions\
\ avec l\u2019ext\xE9rieur (Internet, r\xE9seaux priv\xE9s, etc.) et les partenaires.\
\ Ce sch\xE9ma doit \xE9galement permettre de localiser les serveurs d\xE9\
tenteurs d\u2019informations sensibles de l\u2019entit\xE9."
implementation_groups:
- S
translations:
en:
name: Identify the most sensitive information and servers and maintain a
network diagram
description: "Each organization has sensitive data. This data can be on\
\ its own activity (intellectual property, expertise, etc.) or its customers,\
\ individuals or users\n(personal data, contracts, etc.). In order to\
\ effectively protect your data, identifying it is essential.\nFrom this\
\ list of sensitive data, it will be possible to determine in which areas\
\ of the information system it is located (databases, file sharing, workstations,\n\
etc.). These components correspond to the servers and critical devices\
\ of the organization. To this end, they must be subject to specific security\
\ measures that may concern backup, logging, access, etc.\nTherefore,\
\ this involves creating and maintaining a simplified network diagram\
\ (or mapping) representing the different IP areas and the associated\n\
addressing plan, the routing and security devices (firewall, application\
\ relays, etc.) and the networks with the outside (Internet, private networks,\
\ etc.) and\npartners. This diagram must also be able to locate the servers\
\ holding the entity\u2019s sensitive information."
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:5
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:ii
ref_id: '5'
name: "Disposer d\u2019un inventaire exhaustif des comptes privil\xE9gi\xE9\
s et le maintenir \xE0 jour"
description: "Les comptes b\xE9n\xE9ficiant de droits sp\xE9cifiques sont des\
\ cibles privil\xE9gi\xE9es par les attaquants qui souhaitent obtenir un acc\xE8\
s le plus large possible au syst\xE8me d\u2019information. Ils doivent donc\
\ faire l\u2019objet d\u2019une attention toute particuli\xE8re. Il s\u2019\
agit pour cela d\u2019effectuer un inventaire de ces comptes, de le mettre\
\ \xE0 jour r\xE9guli\xE8rement et d\u2019y renseigner les informations suivantes\
\ :\n> les utilisateurs ayant un compte administrateur ou des droits sup\xE9\
rieurs \xE0 ceux d\u2019un utilisateur standard sur le syst\xE8me d\u2019\
information ;\n> les utilisateurs disposant de suffisamment de droits pour\
\ acc\xE9der aux r\xE9pertoires de travail des responsables ou de l\u2019\
ensemble des utilisateurs ;\n> les utilisateurs utilisant un poste non administr\xE9\
\ par le service informatique et qui ne fait pas l\u2019objet de mesures de\
\ s\xE9curit\xE9 \xE9dict\xE9es par la politique de s\xE9curit\xE9 g\xE9n\xE9\
rale de l\u2019entit\xE9. \nIl est fortement recommand\xE9 de proc\xE9der\
\ \xE0 une revue p\xE9riodique de ces comptes afin de s\u2019assurer que les\
\ acc\xE8s aux \xE9l\xE9ments sensibles (notamment les r\xE9pertoires de travail\
\ et la messagerie \xE9lectronique des responsables) soient maitris\xE9s.\
\ Ces revues permettront \xE9galement de supprimer les acc\xE8s devenus obsol\xE8\
tes suite au d\xE9part d\u2019un utilisateur par exemple. \nEnfin, il est\
\ souhaitable de d\xE9finir et d\u2019utiliser une nomenclature simple et\
\ claire pour identifier les comptes de services et les comptes d\u2019administration.\
\ \nCela facilitera notamment leur revue et la d\xE9tection d\u2019intrusion."
implementation_groups:
- S
translations:
en:
name: Have an exhaustive inventory of privileged accounts and keep it updated
description: 'Accounts benefiting from specific permissions are preferred
targets for the attackers who want to obtain as wide an access as possible
to the information system. They must therefore be subject to very specific
attention. This
involves carrying out an inventory of these accounts, updating it regularly
and entering the following informations into it:
> users with an administrator account or higher rights than those of a
standard user in the information system;
> users with rights enough to access the work folders of top managers
or all users;
> users using an unmanaged workstation which is not subject to the security
measures detailed in the general security policy of the organization.
Carrying out a periodical review of these accounts is strongly recommended
in order to ensure that the accesses to sensitive items (notably the work
folders and electronic mailboxes of top managers) are controlled. These
reviews will also be the opportunity to remove access rights that have
become obsolete following the departure of a user, for example.
Lastly, defining and using a simple, clear nomenclature to identify system
accounts and administration accounts is desirable. This will make review
and intrusion detection easier.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:6
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:ii
ref_id: '6'
name: " Organiser les proc\xE9dures d\u2019arriv\xE9e, de d\xE9part et de changement\
\ de fonction des utilisateurs"
description: "Les effectifs d\u2019une entit\xE9, qu\u2019elle soit publique\
\ ou priv\xE9e, \xE9voluent sans cesse : arriv\xE9es, d\xE9parts, mobilit\xE9\
\ interne. Il est par cons\xE9quent n\xE9cessaire que les droits et les acc\xE8\
s au syst\xE8me d\u2019information soient mis \xE0 jour en fonction de ces\
\ \xE9volutions. Il est notamment essentiel que l\u2019ensemble des droits\
\ affect\xE9s \xE0 une personne soient r\xE9voqu\xE9s lors de son d\xE9part\
\ ou en cas de changement de fonction. Les proc\xE9dures d\u2019arriv\xE9\
e et de d\xE9part doivent donc \xEAtre d\xE9finies, en lien avec la fonction\
\ ressources humaines. Elles doivent au minimum prendre en compte :\n> la\
\ cr\xE9ation et la suppression des comptes informatiques et bo\xEEtes aux\
\ lettres associ\xE9es ;\n> les droits et acc\xE8s \xE0 attribuer et retirer\
\ \xE0 une personne dont la fonction change ;\n> la gestion des acc\xE8s physiques\
\ aux locaux (attribution, restitution des badges et des cl\xE9s, etc.) ;\n\
> l\u2019affectation des \xE9quipements mobiles (ordinateur portable, cl\xE9\
\ USB, disque dur, ordiphone, etc.) ;\n> la gestion des documents et informations\
\ sensibles (transfert de mots de passe, changement des mots de passe ou des\
\ codes sur les syst\xE8mes existants)."
implementation_groups:
- S
translations:
en:
name: Organise the procedures relating to users joining, departing and changing
positions
description: 'The staff of an organization, whether public or private, is
constantly changing: arrivals, departures, internal mobility. Therefore
it is necessary to update
the rights and accesses to the information system in accordance with these
developments. It is essential that all of the rights granted to an individual
are revoked when he or she leaves or changes position. The arrival and
departure procedures must therefore be defined, in accordance with the
human resources department. They must, as a minimum, take into account:
> the creation and deletion of IT accounts and their corresponding mailboxes;
> the rights and accesses to grant to, or remove from, an individual whose
role changes;
> the management of physical accesses to premises (granting and return
of badges and keys, etc.);
> the allocation of mobile devices (laptops, USB sticks, hard drives,
smartphone, etc.);
> the management of sensitive documents and information (transferring
passwords, changing passwords or codes in existing systems).'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:6.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:ii
ref_id: 6.R
name: " Organiser les proc\xE9dures d\u2019arriv\xE9e, de d\xE9part et de changement\
\ de fonction des utilisateurs (renforc\xE9)"
description: "Les proc\xE9dures doivent \xEAtre formalis\xE9es et mises \xE0\
\ jour en fonction du contexte."
implementation_groups:
- R
translations:
en:
name: Organise the procedures relating to users joining, departing and changing
positions (strengthened)
description: The procedures must be formalised and updated according to
the context.
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:7
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:ii
ref_id: '7'
name: "Autoriser la connexion au r\xE9seau de l\u2019entit\xE9 aux seuls \xE9\
quipements ma\xEEtris\xE9s"
description: "Pour garantir la s\xE9curit\xE9 de son syst\xE8me d\u2019information,\
\ l\u2019entit\xE9 doit ma\xEEtriser les \xE9quipements qui s\u2019y connectent,\
\ chacun constituant un point d\u2019entr\xE9e potentiellement vuln\xE9rable.\
\ Les \xE9quipements personnels (ordinateurs portables, tablettes, ordiphones,\
\ etc.) sont, par d\xE9finition, difficilement ma\xEEtrisables dans la mesure\
\ o\xF9 ce sont les utilisateurs qui d\xE9cident de leur niveau de s\xE9curit\xE9\
. De la m\xEAme mani\xE8re, la s\xE9curit\xE9 des \xE9quipements dont sont\
\ dot\xE9s les visiteurs \xE9chappe \xE0 tout contr\xF4le de l\u2019entit\xE9\
.\nSeule la connexion de terminaux ma\xEEtris\xE9s par l\u2019entit\xE9 doit\
\ \xEAtre autoris\xE9e sur ses diff\xE9rents r\xE9seaux d\u2019acc\xE8s, qu\u2019\
ils soient filaire ou sans fil. Cette recommandation, avant tout d\u2019ordre\
\ organisationnel, est souvent per\xE7ue comme inacceptable ou r\xE9trograde.\
\ Cependant, y d\xE9roger fragilise le r\xE9seau de l\u2019entit\xE9 et sert\
\ ainsi les int\xE9r\xEAts d\u2019un potentiel attaquant.\nLa sensibilisation\
\ des utilisateurs doit donc s\u2019accompagner de solutions pragmatiques\
\ r\xE9pondant \xE0 leurs besoins. Citons par exemple la mise \xE0 disposition\
\ d\u2019un r\xE9seau Wi-Fi avec SSID d\xE9di\xE9 pour les terminaux personnels\
\ ou visiteurs."
implementation_groups:
- S
translations:
en:
name: Only allow controlled devices to connect to the network of the organization
description: "To guarantee the security of the information system, the organization\
\ must control the devices which connect to it, each one being a potentially\
\ vulnerable entry point. Personal devices (laptops, tablets, smartphones,\
\ etc.) are, by definition, difficult to control since it is the users\
\ who decide on their level of security. In the same way, the security\
\ of visitors\u2019 devices is completely out of the organization\u2019\
s control.\nOnly the connection with terminals managed by the entity must\
\ be authorised over its different access networks, whether wired or wireless.\
\ This recommendation, above all of an organisational nature, is often\
\ perceived as unacceptable and even retrograde. However, unless this\
\ is adhered to, the task of a hacker is made very much easier by making\
\ an organization\u2019s network vulnerable.\nRaising users\u2019 awareness\
\ must therefore be accompanied by pragmatic solutions responding to their\
\ needs. For example, the provision of a Wi-Fi network with dedicated\
\ SSID for personal and visitor devices"
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:7.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:ii
ref_id: 7.R
name: "Autoriser la connexion au r\xE9seau de l\u2019entit\xE9 aux seuls \xE9\
quipements ma\xEEtris\xE9s (renforc\xE9)"
description: "Ces am\xE9nagements peuvent \xEAtre compl\xE9t\xE9s par des mesures\
\ techniques telles que l\u2019authentification des postes sur le r\xE9seau\
\ (par exemple \xE0 l\u2019aide du standard 802.1X ou d\u2019un \xE9quivalent)."
implementation_groups:
- R
translations:
en:
name: Only allow controlled devices to connect to the network of the organization
(strengthened)
description: These developments can be supplemented by technical measures
such as the authentication of devices on the network (for example thanks
to 802.1X standard or an equivalent).
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
assessable: false
depth: 1
ref_id: III
name: "Authentifier et contr\xF4ler les acc\xE8s"
translations:
en:
name: Authenticate and control accesses
description: null
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:8
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: '8'
name: "Identifier nomm\xE9ment chaque personne acc\xE9dant au syst\xE8me et\
\ distinguer les r\xF4les utilisateur/administrateur"
description: "Afin de faciliter l\u2019attribution d\u2019une action sur le\
\ syst\xE8me d\u2019information en cas d\u2019incident ou d\u2019identifier\
\ d\u2019\xE9ventuels comptes compromis, les comptes d\u2019acc\xE8s doivent\
\ \xEAtre nominatifs.\nL\u2019utilisation de comptes g\xE9n\xE9riques (ex\
\ : admin, user) doit \xEAtre marginale et ceuxci doivent pouvoir \xEAtre\
\ rattach\xE9s \xE0 un nombre limit\xE9 de personnes physiques.\nBien entendu,\
\ cette r\xE8gle n\u2019interdit pas le maintien de comptes de service, rattach\xE9\
s \xE0 un processus informatique (ex : apache, mysqld).\nDans tous les cas,\
\ les comptes g\xE9n\xE9riques et de service doivent \xEAtre g\xE9r\xE9s selon\
\ une politique au moins aussi stricte que celle des comptes nominatifs. Par\
\ ailleurs, un compte d\u2019administration nominatif, distinct du compte\
\ utilisateur, doit \xEAtre attribu\xE9 \xE0 chaque administrateur. Les identifiants\
\ et secrets d\u2019authentification doivent \xEAtre diff\xE9rents (ex : pmartin\
\ comme identifiant utilisateur, adm-pmartin comme identifiant administrateur).\
\ Ce compte d\u2019administration, disposant de plus de privil\xE8ges, doit\
\ \xEAtre d\xE9di\xE9 exclusivement aux actions d\u2019administration. De\
\ plus, il doit \xEAtre utilis\xE9 sur des environnements d\xE9di\xE9s \xE0\
\ l\u2019administration afin de ne pas laisser de traces de connexion ni de\
\ condensat de mot de passe sur un environnement plus expos\xE9."
implementation_groups:
- S
translations:
en:
name: Identify each individual accessing the system by name and distinguish
the user/administrator roles
description: 'In the event of an incident, in order to facilitate the attribution
of an action within the information system or the identification of possible
compromised accounts easier, access accounts must be nominative.
The use of generic accounts (e.g : admin, user) must be marginal and they
must be able to be associated with a limited number of individuals.
Of course, this rule does not stop you from retaining service accounts
attributed to an IT process (e.g : apache, mysqld).
In any event, generic and service accounts must be managed according to
a policy that is at least as stringent as the one for nominative accounts.
Moreover, a nominative administration account, different from the user
account, must be attributed to each administrator. The usernames and authentication
secrets must be different (e.g : pmartin as a username, adm-pmartin as
an admin username). This admin account, having more privileges, must be
exclusively dedicated to administration actions. Furthermore, it must
be used in environments dedicated to administration in order that no connection
traces or password hashes are left in a more exposed environment.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:8.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: 8.R
name: "Identifier nomm\xE9ment chaque personne acc\xE9dant au syst\xE8me et\
\ distinguer les r\xF4les utilisateur/administrateur (renforc\xE9)"
description: "D\xE8s que possible la journalisation li\xE9e aux comptes (ex\
\ : relev\xE9 des connexions r\xE9ussies/\xE9chou\xE9es) doit \xEAtre activ\xE9\
e."
implementation_groups:
- R
translations:
en:
name: Identify each individual accessing the system by name and distinguish
the user/administrator roles (strengthened)
description: 'As soon as possible, the logging linked to accounts (e.g.:
list of successful/failed connections) must be activated.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:9
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: '9'
name: "Attribuer les bons droits sur les ressources sensibles du syst\xE8me\
\ d\u2019information"
description: "Certaines des ressources du syst\xE8me peuvent constituer une\
\ source d\u2019information pr\xE9cieuse aux yeux d\u2019un attaquant (r\xE9\
pertoires contenant des donn\xE9es sensibles, bases de donn\xE9es, bo\xEE\
tes aux lettres \xE9lectroniques, etc.). Il est donc primordial d\u2019\xE9\
tablir une liste pr\xE9cise de ces ressources et pour chacune d\u2019entre\
\ elles :\n> de d\xE9finir quelle population peut y avoir acc\xE8s ;\n> de\
\ contr\xF4ler strictement son acc\xE8s, en s\u2019assurant que les utilisateurs\
\ sont authentifi\xE9s et font partie de la population cibl\xE9e ;\n> d\u2019\
\xE9viter sa dispersion et sa duplication \xE0 des endroits non ma\xEEtris\xE9\
s ou soumis \xE0 un contr\xF4le d\u2019acc\xE8s moins strict.\nPar exemple,\
\ les r\xE9pertoires des administrateurs regroupant de nombreuses informations\
\ sensibles doivent faire l\u2019objet d\u2019un contr\xF4le d\u2019acc\xE8\
s pr\xE9cis. Il en va de m\xEAme pour les informations sensibles pr\xE9sentes\
\ sur des partages r\xE9seau : exports de fichiers de configuration, documentation\
\ technique du syst\xE8me d\u2019information, bases de donn\xE9es m\xE9tier,\
\ etc. Une revue r\xE9guli\xE8re des droits d\u2019acc\xE8s doit par ailleurs\
\ \xEAtre r\xE9alis\xE9e afin d\u2019identifier les acc\xE8s non autoris\xE9\
s."
implementation_groups:
- S
translations:
en:
name: "Allocate the appropriate rights to the information system\u2019s\
\ sensitive resources"
description: "Some of the system\u2019s resources can be a source of invaluable\
\ information from the hacher\u2019s point of view (folders containing\
\ sensitive data, databases, mailboxes, etc.). It is therefore essential\
\ to establish an accurate list of these resources and for each of them:\n\
> define which group can have access to them;\n> strictly control access,\
\ by ensuring that users are authenticated and are part of the target\
\ group;\n> avoid their circulation and duplication to uncontrolled areas\
\ or areas subject to a less strict access control.\nFor example, the\
\ folders of administrators bringing together various pieces of sensitive\
\ information must be subject to specific access control. The same goes\
\ for sensitive information present on network shares: exports of configuration\
\ files, information system technical documentation, business databases,\
\ etc.\nA regular review of the access rights must, moreover, be carried\
\ out, in order to identify any unauthorised access"
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:10
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: '10'
name: "D\xE9finir et v\xE9rifier des r\xE8gles de choix et de dimensionnement\
\ des mots de passe"
description: "L\u2019ANSSI \xE9nonce un ensemble de r\xE8gles et de bonnes pratiques\
\ en mati\xE8re de choix et de dimensionnement des mots de passe. Parmi les\
\ plus critiques de ces r\xE8gles figure la sensibilisation des utilisateurs\
\ aux risques li\xE9s au choix d\u2019un mot de passe qui serait trop facile\
\ \xE0 deviner, ou encore la r\xE9utilisation de mots de passe d\u2019une\
\ application \xE0 l\u2019autre et plus particuli\xE8rement entre messageries\
\ personnelles et professionnelles.\nPour encadrer et v\xE9rifier l\u2019\
application de ces r\xE8gles de choix et de dimensionnement, l\u2019entit\xE9\
\ pourra recourir \xE0 diff\xE9rentes mesures parmi lesquelles :\n> le blocage\
\ des comptes \xE0 l\u2019issue de plusieurs \xE9checs de connexion ;\n> la\
\ d\xE9sactivation des options de connexion anonyme ;\n> l\u2019utilisation\
\ d\u2019un outil d\u2019audit de la robustesse des mots de passe.\nEn amont\
\ de telles proc\xE9dures, un effort de communication visant \xE0 expliquer\
\ le sens de ces r\xE8gles et \xE9veiller les consciences sur leur importance\
\ est fondamental."
implementation_groups:
- S
translations:
en:
name: Set and verify rules for the choice and size of passwords
description: 'ANSSI sets out a collection of rules and best practices in
terms of the choice and size of passwords. The most critical one is to
make users aware of the risks involved in choosing a password that is
too easy to guess, and even the risks of reusing the same password from
one application to another, especially for personal and professional mailboxes.
To supervise and confirm that these choice and size rules are being applied,
the organization may use different measures, including:
> blocking accounts following several failed logins;
> deactivating anonymous login options;
> using a password robustness checking tool.
In advance of such procedures, communication aiming to explain the reason
for these rules and raise awareness of their importance is fundamental.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:11
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: '11'
name: "Prot\xE9ger les mots de passe stock\xE9s sur les syst\xE8mes"
description: "La complexit\xE9, la diversit\xE9 ou encore l\u2019utilisation\
\ peu fr\xE9quente de certains mots de passe, peuvent encourager leur stockage\
\ sur un support physique\n(m\xE9mo, post-it) ou num\xE9rique (fichiers de\
\ mots de passe, envoi par mail \xE0 soi-m\xEAme, recours aux boutons \xAB\
\ Se souvenir du mot de passe \xBB) afin de pallier\ntout oubli ou perte.\n\
Or, les mots de passe sont une cible privil\xE9gi\xE9e par les attaquants\
\ d\xE9sireux d\u2019acc\xE9der au syst\xE8me, que cela fasse suite \xE0 un\
\ vol ou \xE0 un \xE9ventuel partage du support de stockage. C\u2019est pourquoi\
\ ils doivent imp\xE9rativement \xEAtre prot\xE9g\xE9s au moyen de solutions\
\ s\xE9curis\xE9es au premier rang desquelles figurent l\u2019utilisation\
\ d\u2019un coffre-fort num\xE9rique et le recours \xE0 des m\xE9canismes\
\ de chiffrement.\nBien entendu, le choix d\u2019un mot de passe pour ce coffre-fort\
\ num\xE9rique doit respecter les r\xE8gles \xE9nonc\xE9es pr\xE9c\xE9demment\
\ et \xEAtre m\xE9moris\xE9 par l\u2019utilisateur, qui n\u2019a plus que\
\ celui-ci \xE0 retenir."
implementation_groups:
- S
translations:
en:
name: Protect passwords stored on systems
description: 'The complexity, the diversity and even the infrequent use
of some passwords may encourage their storage on a physical (memo or post-it)
or digital (password files, sending an email to yourself, recourse to
"Remember password" buttons) medium in the event a password is lost or
forgotten.
Yet passwords are a preferred target for hackers wanting to access the
system, whether it is following a theft or the possible sharing of a storage
medium. This is why they must be protected by secure solutions, the best
of which are using a digital safe and using encryption mechanisms.
Of course, the password chosen for this digital safe must respect the
rules set out previously and be memorised by the user, who only has to
remember this password.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:12
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: '12'
name: "Changer les \xE9l\xE9ments d\u2019authentification par d\xE9faut sur\
\ les \xE9quipements et services"
description: "Il est imp\xE9ratif de partir du principe que les configurations\
\ par d\xE9faut des syst\xE8mes d\u2019information sont syst\xE9matiquement\
\ connues des attaquants, quand bien m\xEAme celles-ci ne le sont pas du grand\
\ public. Ces configurations se r\xE9v\xE8lent (trop) souvent triviales (mot\
\ de passe identique \xE0 l\u2019identifiant, mal dimensionn\xE9 ou commun\
\ \xE0 l\u2019ensemble des \xE9quipements et services par exemple) et sont,\
\ la plupart du temps, faciles \xE0 obtenir pour des attaquants capables de\
\ se faire passer pour un utilisateur l\xE9gitime.\nLes \xE9l\xE9ments d\u2019\
authentification par d\xE9faut des composants du syst\xE8me doivent donc \xEA\
tre modifi\xE9s d\xE8s leur installation et, s\u2019agissant de mots de passe,\
\ \xEAtre conformes aux recommandations pr\xE9c\xE9dentes en mati\xE8re de\
\ choix, de dimensionnement et de stockage.\nSi le changement d\u2019un identifiant\
\ par d\xE9faut se r\xE9v\xE8le impossible pour cause, par exemple, de mot\
\ de passe ou certificat \xAB en dur \xBB dans un \xE9quipement, ce probl\xE8\
me critique doit \xEAtre signal\xE9 au distributeur du produit afin que cette\
\ vuln\xE9rabilit\xE9 soit corrig\xE9e au plus vite."
implementation_groups:
- S
translations:
en:
name: Change the default authentication settings on devices and services
description: 'It is essential to consider that the default settings of the
information systems are known by the hackers, even if these are not known
to the general public. These settings are (too) often trivial (password
the same as the username, not long enough or common to all the devices
and services for example) and are often easy to obtain by hackers capable
of pretending to be a legitimate user.
The default authentication settings of the components of the system must
therefore be changed when they are set up and, in terms of passwords,
be in accordance with the previous recommendations in terms of choice,
size and storage.
If changing a default password is impossible due, for example, to a password
or certificate being "hardcoded" onto a device, this critical problem
must be raised with the product supplier so that it can correct this vulnerability
as fast as possible.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:12.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: 12.R
name: "Changer les \xE9l\xE9ments d\u2019authentification par d\xE9faut sur\
\ les \xE9quipements et services (renforc\xE9)"
description: "Afin de limiter les cons\xE9quences d\u2019une compromission,\
\ il est par ailleurs essentiel, apr\xE8s changement des \xE9l\xE9ments d\u2019\
authentification par d\xE9faut, de proc\xE9der \xE0 leur renouvellement r\xE9\
gulier."
implementation_groups:
- R
translations:
en:
name: Change the default authentication settings on devices and services
(strengthened)
description: In order to limit the consequences of a compromise, it is,
moreover, essential, after changing the default authentication settings,
to renew them regularly.
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:13
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: '13'
name: "Privil\xE9gier lorsque c\u2019est possible une authentification forte"
description: "Il est vivement recommand\xE9 de mettre en \u0153uvre une authentification\
\ forte n\xE9cessitant l\u2019utilisation de deux facteurs d\u2019authentification\
\ diff\xE9rents parmi les suivants :\n> quelque chose que je sais (mot de\
\ passe, trac\xE9 de d\xE9verrouillage, signature) ;\n> quelque chose que\
\ je poss\xE8de (carte \xE0 puce, jeton USB, carte magn\xE9tique, RFID, un\
\ t\xE9l\xE9phone pour recevoir un code SMS) ;\n> quelque chose que je suis\
\ (une empreinte biom\xE9trique)."
implementation_groups:
- S
translations:
en:
name: Prefer a two-factor authentication when possible
description: 'The implementation of a two-factor authentication is strongly
recommended, requiring the use of two different authentication factors
from among the following:
> something I know (password, unlock pattern, signature);
> something I have (smart card, USB token, magnetic card, RFID, a phone
to receive an SMS);
> something I am (a digital fingerprint).'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:13.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iii
ref_id: 13.R
name: "Privil\xE9gier lorsque c\u2019est possible une authentification forte\
\ (renforc\xE9)"
description: "Les cartes \xE0 puces doivent \xEAtre privil\xE9gi\xE9es ou, \xE0\
\ d\xE9faut, les m\xE9canismes de mots de passe \xE0 usage unique (ou One\
\ Time Password) avec jeton physique. Les op\xE9rations cryptographiques mises\
\ en place dans ces deux facteurs offrent g\xE9n\xE9ralement de bonnes garanties\
\ de s\xE9curit\xE9.\nLes cartes \xE0 puce peuvent \xEAtre plus complexes\
\ \xE0 mettre en place car n\xE9cessitant une infrastructure de gestion des\
\ cl\xE9s adapt\xE9e. Elles pr\xE9sentent cependant l\u2019avantage d\u2019\
\xEAtre r\xE9utilisables \xE0 plusieurs fins : chiffrement, authentification\
\ de messagerie, authentification sur le poste de travail, etc."
implementation_groups:
- R
translations:
en:
name: Prefer a two-factor authentication when possible (strengthened)
description: 'Smart cards must be encouraged or, by default, one-time passwords
with a physical token. Encryption operations implemented with two-factor
authentication generally offer good security results.
Smart cards can be more complex to implement as they require an adapted
key management structure. However, they have the advantage of being re-usable
for various purposes: encryption, message authentication, authentication
on the workstation, etc.'
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iv
assessable: false
depth: 1
ref_id: IV
name: "S\xE9curiser les postes"
translations:
en:
name: Secure the devices
description: null
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:14
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iv
ref_id: '14'
name: "Mettre en place un niveau de s\xE9curit\xE9 minimal sur l\u2019ensemble\
\ du parc informatique"
description: "L\u2019utilisateur plus ou moins au fait des bonnes pratiques\
\ de s\xE9curit\xE9 informatique est, dans de tr\xE8s nombreux cas, la premi\xE8\
re porte d\u2019entr\xE9e des attaquants vers le syst\xE8me. Il est donc fondamental\
\ de mettre en place un niveau de s\xE9curit\xE9 minimal sur l\u2019ensemble\
\ du parc informatique de l\u2019entit\xE9 (postes utilisateurs, serveurs,\
\ imprimantes, t\xE9l\xE9phones, p\xE9riph\xE9riques USB, etc.) en impl\xE9\
mentant les mesures suivantes :\n> limiter les applications install\xE9es\
\ et modules optionnels des navigateurs web aux seuls n\xE9cessaires ;\n>\
\ doter les postes utilisateurs d\u2019un pare-feu local et d\u2019un anti-virus\
\ (ceux-ci sont parfois inclus dans le syst\xE8me d\u2019exploitation) ;\n\
> chiffrer les partitions o\xF9 sont stock\xE9es les donn\xE9es des utilisateurs\
\ ; \n> d\xE9sactiver les ex\xE9cutions automatiques (autorun).\nEn cas de\
\ d\xE9rogation n\xE9cessaire aux r\xE8gles de s\xE9curit\xE9 globales applicables\
\ aux postes, ceux-ci doivent \xEAtre isol\xE9s du syst\xE8me (s\u2019il est\
\ impossible de mettre \xE0 jour certaines applications pour des raisons de\
\ compatibilit\xE9 par exemple)."
implementation_groups:
- S
translations:
en:
name: Implement a minimum level of security across the whole IT stock
description: "Depending on his level of IT security practices, the user,\
\ a great deal of the time, is the first port of call for hackers trying\
\ to enter the system. It is therefore fundamental to implement a minimum\
\ level of security across the entire IT stock of the organization (user\
\ devices, servers, printers, phones, USB peripherals, etc.) by implementing\
\ the following measures:\n> limit the applications installed and optional\
\ modules in web browsers to just what is required;\n> equip users\u2019\
\ devices with an anti-virus and activate a local firewall (these are\
\ often included in the operating system);\n> encrypt the partitions where\
\ user data is stored;\n> deactivate automatic executions (autorun).\n\
In the event of a necessary exception from the general security rules\
\ applicable to devices, these devices must be isolated from the system\
\ (if it is impossible to update certain applications for interoperability\
\ reasons for example)."
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:14.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iv
ref_id: 14.R
name: "Mettre en place un niveau de s\xE9curit\xE9 minimal sur l\u2019ensemble\
\ du parc informatique (renforc\xE9)"
description: "Les donn\xE9es vitales au bon fonctionnement de l\u2019entit\xE9\
\ que d\xE9tiennent les postes utilisateurs et les serveurs doivent faire\
\ l\u2019objet de sauvegardes r\xE9guli\xE8res et stock\xE9es sur des \xE9\
quipements d\xE9connect\xE9s, et leur restauration doit \xEAtre v\xE9rifi\xE9\
e de mani\xE8re p\xE9riodique. En effet, de plus en plus de petites structures\
\ font l\u2019objet d\u2019attaques rendant ces donn\xE9es indisponibles (par\
\ exemple pour exiger en contrepartie de leur restitution le versement d\u2019\
une somme cons\xE9quente (ran\xE7ongiciel))."
implementation_groups:
- R
translations:
en:
name: Implement a minimum level of security across the whole IT stock (strengthened)
description: "Data vital to the proper business of the organization that\
\ is held on users\u2019 devices and servers must be subject to regular\
\ backups and stored on disconnected devices, and its restoration must\
\ be tested periodically. An increasing number of small organisations\
\ are subject to attacks which make their data unavailable (for example\
\ demanding, in exchange for returning the data, the payment of a significant\
\ amount of money (ransomware))."
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:15
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iv
ref_id: '15'
name: "Se prot\xE9ger des menaces relatives \xE0 l\u2019utilisation de supports\
\ amovibles"
description: "Les supports amovibles peuvent \xEAtre utilis\xE9s afin de propager\
\ des virus, voler des informations sensibles et strat\xE9giques ou encore\
\ compromettre le r\xE9seau de l\u2019entit\xE9. De tels agissements peuvent\
\ avoir des cons\xE9quences d\xE9sastreuses pour l\u2019activit\xE9 de la\
\ structure cibl\xE9e.\nS\u2019il n\u2019est pas question d\u2019interdire\
\ totalement l\u2019usage de supports amovibles au sein de l\u2019entit\xE9\
, il est n\xE9anmoins n\xE9cessaire de traiter ces risques en identifiant\
\ des mesures ad\xE9quates et en sensibilisant les utilisateurs aux risques\
\ que ces supports peuvent v\xE9hiculer.\nIl convient notamment de proscrire\
\ le branchement de cl\xE9s USB inconnues (ramass\xE9es dans un lieu public\
\ par exemple) et de limiter au maximum celui de cl\xE9s non ma\xEEtris\xE9\
es (dont on connait la provenance mais pas l\u2019int\xE9grit\xE9) sur le\
\ syst\xE8me d\u2019information \xE0 moins, dans ce dernier cas, de faire\
\ inspecter leur contenu par l\u2019antivirus du poste de travail."
implementation_groups:
- S
translations:
en:
name: Protect against threats relating to the use of removable media
description: "Removable media can be used to spread viruses, steal sensitive\
\ and strategic information or even compromise the organization\u2019\
s network. Such attacks can have disastrous consequences for the activity\
\ of the organisation targeted.\nAlthough it is not a matter of completely\
\ prohibiting the use of removable media within the organization, it is\
\ nevertheless necessary to deal with these risks by identifying adequate\
\ measures and by raising users\u2019 awareness to the risks that these\
\ media can carry.\nIt is advisable to prohibit the connection of unknown\
\ USB sticks (collected in a public area for example) and to reduce, as\
\ much as possible, the use of uncontrolled sticks (the origin of which\
\ is known but not the integrity) on the information system, or at least\
\ have their content examined by the workstation\u2019s anti-virus."
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:15.r
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iv
ref_id: 15.R
name: "Se prot\xE9ger des menaces relatives \xE0 l\u2019utilisation de supports\
\ amovibles (renforc\xE9)"
description: "Sur les postes utilisateur, il est recommand\xE9 d\u2019utiliser\
\ des solutions permettant d\u2019interdire l\u2019ex\xE9cution de programmes\
\ sur les p\xE9riph\xE9riques amovibles (par exemple Applocker sous Windows\
\ ou des options de montage noexec sous Unix). \nLors de la fin de vie des\
\ supports amovibles, il sera n\xE9cessaire d\u2019impl\xE9menter et de respecter\
\ une proc\xE9dure de mise au rebut stricte pouvant aller jusqu\u2019\xE0\
\ leur destruction s\xE9curis\xE9e afin de limiter la fuite d\u2019informations\
\ sensibles."
implementation_groups:
- R
translations:
en:
name: Protect against threats relating to the use of removable media (strengthened)
description: "On user devices, using solutions able to block the execution\
\ of programs on removable media (for example Applocker on Windows or\
\ noexec assembly options on Unix) is recommended.\nAt the end of the\
\ removable media\u2019s life span, it will be necessary to implement\
\ and respect a strict disposal procedure which may extend to their secure\
\ destruction, in order to limit the leaking of sensitive information."
- urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:16
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:anssi-guide-hygiene:iv
ref_id: '16'
name: "Utiliser un outil de gestion centralis\xE9e afin d\u2019homog\xE9n\xE9\
iser les politiques de s\xE9curit\xE9"
description: "La s\xE9curit\xE9 du syst\xE8me d\u2019information repose sur\
\ la s\xE9curit\xE9 du maillon le plus faible. Il est donc n\xE9cessaire d\u2019\
homog\xE9n\xE9iser la gestion des politiques de s\xE9curit\xE9 s\u2019appliquant\
\ \xE0 l\u2019ensemble du parc informatique de l\u2019entit\xE9.\nL\u2019\
application de ces politiques (gestion des mots de passe, restrictions de\
\ connexions sur certains postes sensibles, configuration des navigateurs\
\ Web, etc.) doit \xEAtre simple et rapide pour les administrateurs, en vue\
\ notamment de faciliter la mise en \u0153uvre de contre-mesures en cas de\
\ crise informatique.\nPour cela, l\u2019entit\xE9 pourra se doter d\u2019\
un outil de gestion centralis\xE9e (par exemple Active Directory en environnement\
\ Microsoft) auquel il s\u2019agit d\u2019inclure le plus grand nombre d\u2019\
\xE9quipements informatiques possible. Les postes de travail et les serveurs\
\ sont concern\xE9s par cette mesure qui n\xE9cessite \xE9ventuellement en\
\ amont un travail d\u2019harmonisation des choix de mat\xE9riels et de syst\xE8\
mes d\u2019exploitation.\nAinsi, des politiques de durcissement du syst\xE8\
me d\u2019exploitation ou d\u2019applications pourront facilement s\u2019\
appliquer depuis un point central tout en favorisant la r\xE9activit\xE9 attendue\
\ en cas de besoin de reconfiguration."
implementation_groups:
- S
translations:
en:
name: Use a centralised management tool to standardise security policies