{"id":66,"date":"2025-08-24T16:04:15","date_gmt":"2025-08-24T14:04:15","guid":{"rendered":"https:\/\/cybersecuritat.eu\/?p=66"},"modified":"2025-08-24T16:08:03","modified_gmt":"2025-08-24T14:08:03","slug":"lanalyse-de-risques","status":"publish","type":"post","link":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/","title":{"rendered":"L&rsquo;Analyse de Risques"},"content":{"rendered":"\n<p>Cet article se situe dans la partie <strong>Gouvernance <\/strong>de la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">M\u00e9thodologies d&rsquo;Analyse<\/h2>\n\n\n\n<p>L&rsquo;analyse de risques repose sur diverses m\u00e9thodologies reconnues, telles qu&rsquo;<strong>EBIOS<\/strong> (ou <strong>EBIOS RM<\/strong> de l&rsquo;ANSSI), l&rsquo;<strong>ISO 27005<\/strong>, entre autres.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Objectifs et D\u00e9marche<\/h2>\n\n\n\n<p>L&rsquo;objectif principal de l&rsquo;analyse de risques est de permettre \u00e0 l&rsquo;\u00e9quipe en charge de la cybers\u00e9curit\u00e9 d&rsquo;interagir \u00e9troitement avec les <strong>\u00e9quipes m\u00e9tiers<\/strong>. Cette collaboration est essentielle pour <strong>identifier la valeur ajout\u00e9e<\/strong> de l&rsquo;entreprise (ou de la collectivit\u00e9), autrement dit, ce qui est critique pour son fonctionnement.<\/p>\n\n\n\n<p>Une fois ces \u00e9l\u00e9ments de valeur identifi\u00e9s, l&rsquo;\u00e9quipe cybers\u00e9curit\u00e9, toujours en \u00e9change avec le m\u00e9tier, d\u00e9finit des <strong>sc\u00e9narios d&rsquo;attaques r\u00e9alistes<\/strong> et \u00e9value leurs <strong>impacts potentiels<\/strong>.<\/p>\n\n\n\n<p>\u00c0 l&rsquo;issue de cette \u00e9valuation, il faut d\u00e9terminer le <strong>traitement appropri\u00e9<\/strong> pour chaque risque. Il existe quatre options principales : l&rsquo;accepter, le r\u00e9duire, le transf\u00e9rer ou le refuser.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les Diff\u00e9rents Traitements du Risque<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Accepter le risque<\/h3>\n\n\n\n<p>Le risque est accept\u00e9 si son niveau est jug\u00e9 <strong>conforme <\/strong>\u00e0 la politique et \u00e0 la tol\u00e9rance de l&rsquo;organisation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Refuser le risque<\/h3>\n\n\n\n<p>Si le risque <strong>n&rsquo;est pas en ad\u00e9quation<\/strong> avec le p\u00e9rim\u00e8tre de l&rsquo;organisation, il peut \u00eatre refus\u00e9. Par exemple, une organisation peut refuser un risque li\u00e9 \u00e0 un serveur web si elle n&rsquo;en poss\u00e8de tout simplement pas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">R\u00e9duire ou Transf\u00e9rer le risque<\/h3>\n\n\n\n<p>Lorsqu&rsquo;un risque est applicable et que son niveau est <strong>inacceptable <\/strong>en l&rsquo;\u00e9tat, l&rsquo;organisation choisit entre le r\u00e9duire ou le transf\u00e9rer.<\/p>\n\n\n\n<p><strong>Transf\u00e9rer <\/strong>: Cela consiste \u00e0 faire supporter le risque (juridiquement ou contractuellement) \u00e0 un <strong>tiers<\/strong>. Par exemple, le risque li\u00e9 \u00e0 la s\u00e9curit\u00e9 d&rsquo;un site web peut \u00eatre transf\u00e9r\u00e9 \u00e0 un prestataire externe \u00e0 qui est d\u00e9l\u00e9gu\u00e9e la cr\u00e9ation et la maintenance du site en condition de s\u00e9curit\u00e9.<br><br><strong>R\u00e9duire <\/strong>: L&rsquo;organisation cherche \u00e0 r\u00e9duire un risque lorsque son niveau est inacceptable et qu&rsquo;elle ne peut (ou ne veut) pas le transf\u00e9rer. Dans ce cas, elle met en \u0153uvre des actions (de <strong>gouvernance <\/strong>ou <strong>techniques<\/strong>) afin de diminuer son <strong>impact <\/strong>ou sa <strong>gravit\u00e9<\/strong>, et ainsi ramener son niveau \u00e0 un seuil tol\u00e9rable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cet article se situe dans la partie Gouvernance de la cybers\u00e9curit\u00e9. M\u00e9thodologies d&rsquo;Analyse L&rsquo;analyse de risques repose sur diverses m\u00e9thodologies reconnues, telles qu&rsquo;EBIOS (ou EBIOS RM de l&rsquo;ANSSI), l&rsquo;ISO 27005, entre autres. Objectifs et D\u00e9marche L&rsquo;objectif principal de l&rsquo;analyse de risques est de permettre \u00e0 l&rsquo;\u00e9quipe en charge de la cybers\u00e9curit\u00e9 d&rsquo;interagir \u00e9troitement avec les [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[67],"tags":[70,72,74],"class_list":["post-66","post","type-post","status-publish","format-standard","hentry","category-governanca-fr","tag-analyse-de-risques","tag-ebios","tag-ebios-rm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>L&#039;Analyse de Risques - Cybersecuritat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;Analyse de Risques - Cybersecuritat\" \/>\n<meta property=\"og:description\" content=\"Cet article se situe dans la partie Gouvernance de la cybers\u00e9curit\u00e9. M\u00e9thodologies d&rsquo;Analyse L&rsquo;analyse de risques repose sur diverses m\u00e9thodologies reconnues, telles qu&rsquo;EBIOS (ou EBIOS RM de l&rsquo;ANSSI), l&rsquo;ISO 27005, entre autres. Objectifs et D\u00e9marche L&rsquo;objectif principal de l&rsquo;analyse de risques est de permettre \u00e0 l&rsquo;\u00e9quipe en charge de la cybers\u00e9curit\u00e9 d&rsquo;interagir \u00e9troitement avec les [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecuritat\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-24T14:04:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-24T14:08:03+00:00\" \/>\n<meta name=\"author\" content=\"stan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"stan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/\"},\"author\":{\"name\":\"stan\",\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"headline\":\"L&rsquo;Analyse de Risques\",\"datePublished\":\"2025-08-24T14:04:15+00:00\",\"dateModified\":\"2025-08-24T14:08:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/\"},\"wordCount\":377,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"keywords\":[\"Analyse de risques\",\"EBIOS\",\"EBIOS RM\"],\"articleSection\":[\"governan\u00e7a\"],\"inLanguage\":\"oc\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/\",\"url\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/\",\"name\":\"L'Analyse de Risques - Cybersecuritat\",\"isPartOf\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#website\"},\"datePublished\":\"2025-08-24T14:04:15+00:00\",\"dateModified\":\"2025-08-24T14:08:03+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#breadcrumb\"},\"inLanguage\":\"oc\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/cybersecuritat.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&rsquo;Analyse de Risques\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/cybersecuritat.eu\/#website\",\"url\":\"http:\/\/cybersecuritat.eu\/\",\"name\":\"Cybersecuritat\",\"description\":\"Lo prum\u00e8r site de cybersecuritat en occitan\",\"publisher\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/cybersecuritat.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"oc\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\",\"name\":\"stan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"oc\",\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png\",\"contentUrl\":\"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png\",\"width\":512,\"height\":323,\"caption\":\"stan\"},\"logo\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/cybersecuritat.eu\"],\"url\":\"http:\/\/cybersecuritat.eu\/index.php\/author\/stan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'Analyse de Risques - Cybersecuritat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/","og_locale":"en_US","og_type":"article","og_title":"L'Analyse de Risques - Cybersecuritat","og_description":"Cet article se situe dans la partie Gouvernance de la cybers\u00e9curit\u00e9. M\u00e9thodologies d&rsquo;Analyse L&rsquo;analyse de risques repose sur diverses m\u00e9thodologies reconnues, telles qu&rsquo;EBIOS (ou EBIOS RM de l&rsquo;ANSSI), l&rsquo;ISO 27005, entre autres. Objectifs et D\u00e9marche L&rsquo;objectif principal de l&rsquo;analyse de risques est de permettre \u00e0 l&rsquo;\u00e9quipe en charge de la cybers\u00e9curit\u00e9 d&rsquo;interagir \u00e9troitement avec les [&hellip;]","og_url":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/","og_site_name":"Cybersecuritat","article_published_time":"2025-08-24T14:04:15+00:00","article_modified_time":"2025-08-24T14:08:03+00:00","author":"stan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"stan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#article","isPartOf":{"@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/"},"author":{"name":"stan","@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"headline":"L&rsquo;Analyse de Risques","datePublished":"2025-08-24T14:04:15+00:00","dateModified":"2025-08-24T14:08:03+00:00","mainEntityOfPage":{"@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/"},"wordCount":377,"commentCount":0,"publisher":{"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"keywords":["Analyse de risques","EBIOS","EBIOS RM"],"articleSection":["governan\u00e7a"],"inLanguage":"oc","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/","url":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/","name":"L'Analyse de Risques - Cybersecuritat","isPartOf":{"@id":"http:\/\/cybersecuritat.eu\/#website"},"datePublished":"2025-08-24T14:04:15+00:00","dateModified":"2025-08-24T14:08:03+00:00","breadcrumb":{"@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#breadcrumb"},"inLanguage":"oc","potentialAction":[{"@type":"ReadAction","target":["http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2025\/08\/24\/lanalyse-de-risques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/cybersecuritat.eu\/"},{"@type":"ListItem","position":2,"name":"L&rsquo;Analyse de Risques"}]},{"@type":"WebSite","@id":"http:\/\/cybersecuritat.eu\/#website","url":"http:\/\/cybersecuritat.eu\/","name":"Cybersecuritat","description":"Lo prum\u00e8r site de cybersecuritat en occitan","publisher":{"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/cybersecuritat.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"oc"},{"@type":["Person","Organization"],"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf","name":"stan","image":{"@type":"ImageObject","inLanguage":"oc","@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/","url":"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png","contentUrl":"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png","width":512,"height":323,"caption":"stan"},"logo":{"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/cybersecuritat.eu"],"url":"http:\/\/cybersecuritat.eu\/index.php\/author\/stan\/"}]}},"_links":{"self":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":3,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/66\/revisions"}],"predecessor-version":[{"id":71,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/66\/revisions\/71"}],"wp:attachment":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/media?parent=66"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/categories?post=66"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/tags?post=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}