Source: https://www.globalsecuritymag.fr/IMG/pdf/2017_Guide_Audit_informatique_vdef.pdf