diff --git a/index.html b/index.html index 3dd1ae0c..22eed1e9 100644 --- a/index.html +++ b/index.html @@ -172,5 +172,5 @@

Limitations

diff --git a/reports.fr/index.html b/reports.fr/index.html index 2c4893c8..004cd142 100644 --- a/reports.fr/index.html +++ b/reports.fr/index.html @@ -166,13 +166,13 @@

Mises à jour

Cette liste permet d'auditer les changements réalisés sur la cartographie.

Une cartographie qui ne change jamais n’est pas à jour. Ce rapport permet d’identifier les changements (créations, suppressions et modifications) par types d'objets réalisés sur la cartographie sur une année.

Conformité

-

Le calcul des niveaux de conformité pour chaque objet de la cartographie est basé sur les éléments suivants :

+

Le calcul des niveaux de conformité pour chaque objet de la cartographie est basé sur la présence des éléments suivants :

- + @@ -391,6 +391,76 @@

Conformité

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Objet NiveauElementsElements requis
Sites1Description
Buildings1Description
Baies1Description
Serveurs physique1Description, configuration, site, building, responsable
Poste de travail1Description, site, building
Téléphones1Description, site, building
Stockage1Description, site, building
Périphériques1Description, site, building, responsable
Commutateurs physique1Description, type, site, building
Routeurs physique1Description, type, site, building
Terminaux WiFi1Description, type, site, building
Dispositifs de sécurité physique1Description, type, site, building
LANs1Description
VLans1Description
diff --git a/reports/index.html b/reports/index.html index a993ac1d..51080118 100644 --- a/reports/index.html +++ b/reports/index.html @@ -88,6 +88,8 @@ +
  • Compliance +
  • @@ -132,29 +134,29 @@

    Reports

    Mapping report

    -

    The cartography report contains all the objects making up the cartography and the links between them.

    +

    The cartography report contains all the objects making up the cartography and the links between them.

    This is a Word document containing information on all the objects in the selected views at the desired level of granularity.

    Lists

    Mercator allows you to extract a range of information in the form of lists:

    Supported entities and applications

    -

    Generates a list of information system entities and their supported applications.

    +

    Generates a list of information system entities and their supported applications.

    This list can be used to draw up an inventory of the entities responsible for the various information system applications, along with their managers and contact points.

    Applications by application group

    -

    List of applications by application group

    +

    List of applications by application group

    This list provides an overview of all the applications in the information system, classified by application group. This list can be used to monitor vulnerabilities in information system applications.

    Logical servers

    List of logical servers by applications and managers.

    This list can be used to identify logical server managers and the applications they serve.

    Security needs analysis

    -

    List of security requirements between macro-processes, processes, applications, databases and information.

    +

    List of security requirements between macro-processes, processes, applications, databases and information.

    This list is used to analyze the consistency of the information classification plan in terms of confidentiality, integrity, availability and traceability between processes, applications, databases and the information they contain.

    Logical server configuration

    Logical server configuration list.

    This list is used to analyze the configuration of logical servers.

    This list can be used to analyze the capacity required to run the information system, and to make year-on-year projections.

    Physical infrastructure inventory

    -

    List of equipment by site/location

    +

    List of equipment by site/location

    This list is used to review the physical inventory of information system equipment.

    Every year, we recommend you print out this list and check that the equipment in the inventory corresponds to what is actually present in the corresponding premises, sites and bays.

    Audit

    @@ -163,6 +165,304 @@

    Maturity levels

    Updates

    This list is used to audit changes made to the mapping.

    A map that never changes is not up-to-date. This report identifies the changes (creations, deletions and modifications) made to the cartography by object type over the course of a year.

    +

    Compliance

    +

    The calculation of conformity levels for each mapping object is based on the presence of the following elements:

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ObjectLevelRequired elements
    Ecosystem
    Entities1Description, security level, point of contact, at least one process
    Relationships1Description, type
    Relationships2Importance
    Business
    Macro-processes2Description, security levels
    Macro-processes3Responsible
    Process1Description, input-output, responsible
    Process2Macro-processes, security requirements
    Activities2Description
    Operations1Description
    Operations2Actors
    Operations3Tasks
    Tasks3Description, task
    Actor2Contact, nature, type
    Information1Description, owner, administrator, storage
    Information2Security Requirements, Sensitivity
    Information system
    Application block2Description, responsible, applications
    Applications1Description, technology, type, users, process
    Applications2Responsible, security levels
    Application Services2Description, applications
    Application Modules2Description
    Database1Description, type, responsible entity, responsible person
    Database2Security requirements
    Flows1Description, source, destination
    Administration
    Zones1Description
    Directories1Description, solution, administration area
    Forest1Description, administration area
    Domains1Description, domain controller, number of users, number of machines, inter-domain relationship
    Logical
    Networks1Description, manager, security manager, security requirements
    Subnets1Description, address, default gateway, IP allocation type, DMZ, WiFi, VLAN
    Gateways1Description, authentication, IP range
    Connected external devices2Type, contacts
    Switches1Description
    Routers1Description
    Security devices1Description
    Clusters1Description, type
    Logical servers1Description, OS, environment, IP address, applications, physical servers or clusters
    Certificates2Description, Type, validity start date, validity end date, applications or logical server
    Physical infrastructure
    Sites1Description
    Buildings1Description
    Bays1Description
    Physical servers1Description, configuration, site, building, responsible
    Workstations1Description, site, building
    Telephones1Description, site, building
    Storage1Description, site, building
    Peripherals1Description, site, building, responsible
    Physical switches1Description, type, site, building
    Physical routers1Description, type, site, building
    WiFi terminals1Description, type, site, building
    Physical security devices1Description, type, site, building
    LANs1Description
    VLans1Description