<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url> <loc>https://kb.zkip.eu/</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-quels-sont-les-elements-de-tracabilite-conserves-et-comment-sont-ils-analyses</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-les-postes-de-travail-sont-ils-chiffres-selon-quel-protocole</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-dans-le-cas-d-un-pc-ou-d-un-acces-eg-vpn-fourni-par-le-client-le-procecessus-est-gere-par-le-client</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-avez-vous-une-politique-des-mots-de-passe-fait-elle-une-distinction-en-fonction-de-la-sensibilite-des-droits-d-acces</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-sont-geres-les-patches-y-compris-pour-tous-les-elements-dans-les-enclaves-site-sur</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-vous-assurez-vous-du-respect-des-regles-de-securite-le-client</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/etat-de-l-art</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-24-planification-et-preparation-de-la-gestion-des-incidents-de-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/178780</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-sont-gerees-les-applications-installees-sur-les-postes-de-travail-identifiation-limitation-licences</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-11-services-supports</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-4-acces-aux-codes-source</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-26-reponse-aux-incidents-de-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-est-gere-l-acces-des-visiteurs</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-2-droits-d-acces-privilegies</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-2-fonctions-et-responsabilites-liees-a-la-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-20-securite-des-reseaux</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-est-gere-le-teletravail-qui-frequence-lieu-dispositif-de-securite-dedie</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-32-droits-de-propriete-intellectuelle</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-6-dimensionnement</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-19-installation-de-logiciels-sur-des-systemes-operationnels</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-un-site-de-repli-est-il-envisage-est-il-decrit</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-13-marquage-des-informations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-6-contacts-avec-des-groupes-d-interet-specifiques</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/718580</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-19-securite-de-l-information-dans-les-relations-avec-les-fournisseurs</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-est-gere-le-materiel-inventaire-maintenance-support</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/639398</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-31-separation-des-environnements-de-developpement-de-test-et-operationnels</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-4-processus-disciplinaire</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-23-filtrage-web</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-sont-geres-les-droits-d-acces-arrivee-depart-d-un-collaborateur-demande-retrait-d-un-droit-d-acces</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/AvlIUtLJMn0ZppYp</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-22-cloisonnement-des-reseaux</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-1-politiques-de-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-7-renseignements-sur-les-menaces</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-les-politiques-processus-sont-mis-a-jour-deployes-et-leur-application-controlee</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-16-gestion-des-identites</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-qui-accede-a-la-salle-technique-quelles-sont-les-modalites-pour-acceder-a-la-salle-technique</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-quel-est-le-dispositif-de-resilience</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-y-a-t-il-des-certifications-securite-iso27xxx-passi-iso900x</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/693287</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/password-policy-notes</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-8-gestion-des-vulnerabilites-techniques</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-3-securisation-des-bureaux-des-salles-et-des-installations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-10-supports-de-stockage</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-1-terminaux-finaux-des-utilisateurs</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/204157</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-y-a-t-il-une-ged</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/263505</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-1-selection-des-candidats</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/136335</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-description-des-processus-d-arrivee-depart-d-un-collaborateur-et-attribution-du-materiel</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-1-perimetres-de-securite-physique</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-30-developpement-externalise</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-23-securite-de-l-information-dans-l-utilisation-de-services-en-nuage</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/550433</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-15-journalisation</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-9-inventaire-des-informations-et-autres-actifs-associes</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-est-gere-le-materiel-hors-service</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/795664</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-13-sauvegarde-des-informations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-6-accords-de-confidentialite-ou-de-non-divulgation</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-14-redondance-des-moyens-de-traitement-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/770556</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-le-client-peut-il-acceder-aux-elements-d-audits-procedures-dossiers-d-audits</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-sont-geres-les-badges-d-acces-attribution-perte-oubli</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/364403</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-7-protection-contre-les-programmes-malveillants-malware</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-17-synchronisation-des-horloges</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-les-collaborateurs-sont-ils-administrateurs-de-leur-poste</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-3-sensibilisation-enseignement-et-formation-en-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-17-informations-d-authentification</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-11-restitution-des-actifs</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-2-les-entrees-physiques</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-37-procedures-d-exploitation-documentees</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-avez-vous-un-dispositif-de-crise-securite-faites-vous-des-exercices-si-oui-a-quelle-frequence</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-12-classification-des-informations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-28-codage-securise</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-34-protection-des-systemes-d-information-pendant-les-tests-d-audit</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/204096</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-32-gestion-des-changements</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-5-responsabilites-apres-la-fin-ou-le-changement-d-un-emploi</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-22-surveillance-revision-et-gestion-des-changements-des-services-fournisseurs</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-29-tests-de-securite-dans-le-developpement-et-l-acceptation</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-2-termes-et-conditions-du-contrat-de-travail</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/104515</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/sap-basis-definition</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-27-principes-d-ingenierie-et-d-architecture-des-systeme-securises</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-15-controle-d-acces</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-31-exigences-legales-statutaires-reglementaires-et-contractuelles</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-des-tiers-interviennent-ils-sur-le-dispositif-de-securite-si-oui-sur-quels-elements-comment-sont-ils-pilotes-comment-sont-ils-controles</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-est-communique-le-mot-de-passe-a-l-utilisateur-sa-modification-a-la-premiere-connexion-est-elle-forcee</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/476327</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-29-securite-de-l-information-pendant-une-perturbation</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/503702</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-faites-vous-une-analyse-de-risque-vis-a-vis-de-la-securite-de-l-information-en-interne-et-sur-le-perimetre-de-prestation-si-oui-comment-les-risques-identifies-sont-ils-geres</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-le-prestataire-propose-t-il-la-redaction-d-un-pas</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/872127</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-des-audits-sont-ils-realises-en-interne-ou-en-externe-de-quelle-nature</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-quel-antivirus-est-utilise-quelle-est-la-frequence-des-scans-et-des-mises-a-jour</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/528200</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/905172</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-21-securite-des-services-reseau</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-avez-vous-une-charte-utilisateur</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-8-declaration-des-evenements-de-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-9-gestion-des-configurations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-le-byod-est-il-autorise-si-oui-comment-le-gerez-vous</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-18-utilisation-de-programmes-utilitaires-a-privileges</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-10-utilisation-correcte-des-informations-et-autres-actifs-associes</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-sont-gerees-les-vulnerabilites-identification-choix-des-patchs-strategie-de-deploiement-frequence</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/116931</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-20-la-securite-de-l-information-dans-les-accords-conclus-avec-les-fournisseurs</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-21-gestion-de-la-securite-de-l-information-dans-la-chaine-d-approvisionnement-tic</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-8-emplacement-et-protection-du-materiel</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-36-conformite-aux-politiques-regles-et-normes-de-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-en-cas-d-incident-securite-quel-est-le-dispositif-de-remontee-d-alerte-en-interne-et-vers-le-client</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-27-tirer-des-enseignements-des-incidents-de-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-7-bureau-vide-et-ecran-vide</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-24-utilisation-de-la-cryptographie</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-4-responsabilites-de-la-direction</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-12-prevention-de-la-fuite-de-donnees</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-33-informations-de-test</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-13-maintenance-du-materiel</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-8-securite-de-l-information-dans-la-gestion-de-projet</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-14-elimination-ou-recyclage-securise-e-du-materiel</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-6-7-travail-a-distance</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-quel-dispositif-de-formation-des-developpeurs-securite-du-code-informatique-delivre-est-en-place</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-l-ensemble-des-personnels-intervenants-sur-l-applicatif-le-client-ont-ils-signe-individuellement-un-accord-de-confidentialite</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-6-travail-dans-les-zones-securisees</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-4-surveillance-de-la-securite-physique</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-25-cycle-de-vie-de-developpement-securise</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/769145</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-12-securite-du-cablage</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-est-livre-le-delivery-integration-dans-l-environnement-de-prod-sas-de-livraison</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-14-transfert-des-informations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-3-restrictions-d-acces-aux-informations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/117269</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/468098</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/203231</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-5-authentification-securisee</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-se-fait-le-lien-entre-la-securite-du-prestataire-et-celle-du-client</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-11-masquage-des-donnees</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-28-collecte-des-preuves</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-34-protection-de-la-vie-privee-et-des-dcp</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-sont-traitees-les-alertes-de-securite-interne-et-sur-le-perimetre-de-prestation</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-26-exigences-de-securite-des-applications</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-9-securite-des-actifs-hors-des-locaux</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/646117</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-est-geree-l-obsolescence-du-materiel</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-10-suppression-des-informations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-30-preparation-des-tic-pour-la-continuite-d-activite</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-quel-dispositif-de-sensibilisation-des-collaborateurs-est-en-place-en-interne-et-sur-les-prestations</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-18-droits-d-acces</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-35-revision-independante-de-la-securite-de-l-information</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-25-evaluation-des-evenements-de-securite-de-l-information-et-prise-de-decision</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-33-protection-des-enregistrements</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-comment-sont-geres-les-mots-de-passe-format-attribution-renouvellement-automatisation</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-5-5-contacts-avec-les-autorites</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-7-5-protection-contre-les-menaces-physiques-et-environnementales</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-y-a-t-il-un-referentiel-securite-sous-quelle-forme-se-presente-t-il</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/client-y-a-t-il-une-pssi-integre-t-elle-le-perimetre-de-prestation</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/871347</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
<url> <loc>https://kb.zkip.eu/kb/iso_27002-8-16-activites-de-surveillance</loc> <changefreq>weekly</changefreq> <priority>1.0</priority> </url>
</urlset>