Law No. 05-20 on cybersecurity stipulates in its Article 19 that any sensitive information system (SIS) of critical infrastructure (CI) must have its security approved before being put into operation.
This approval is intended to inform the CI managers of the risks associated with the operation of their sensitive information systems. It is a process that leads to a decision made by the CI manager. This decision constitutes a formal act by which he/she:
This guide details the steps to follow to approve a sensitive information system of critical infrastructure and establishes the form and content of the approval decision.
To report any criminal digital content, including threats to the security of individuals and groups, praise or incitement of terrorism, and violations of the rights and freedoms of children, please use the following platform : www.e-blagh.ma
DGSSI2024 All rights reserved