This new edition has been updated as regards both new and growing technologies and practices, which must be addressed in terms of security (mobile working, separation of uses, etc.) and also the introduction of tools (indicators of a standard or strengthened level) to enlighten the reader in the appreciation of the specified measures. Although the purpose of this guide is not information security as such, applying the proposed measures maximises the security of the information system, the information cradle of your organization.
To this end, IS security stakes must come to occupy a similar level as the economic, strategic and even image concerns of decision makers. By contextualising the need, giving a reminder of the intended aim and responding to it by applying the corresponding concrete measure, this document is a roadmap which is in the interest of all organizations aware of the value of their data.