Digital sovereignty
Your Strategic Autonomy
Our teams of digital sovereignty experts support you in gaining complete control over your critical infrastructure and sensitive data.
With our PASSI and PASSI LPM (Information Systems Security Audit Provider – Military Programming Law) and PACS (Information Systems Security Support and Consulting Provider) – witness audit phase – issued by ANSSI, we support you in every phase of your digital sovereignty process.
Our approach strengthens your resilience to geopolitical risks while highlighting your commitment to protecting national and European data.
Our preferred technology partners:
Our qualifications:
Information system security audit provider - PASSI LPM
- Architecture audit
- Configuration audit
- Source code audit
- Penetration testing
- Organizational and physical audit
Information system security support and consulting providers - PACS (witness audit phase)
- Consulting services for information system security certification
- Consulting services for information system security risk management
- Consulting services for information system architecture security
- Consulting services for cyber crisis management preparedness

Audit and Consulting
Sovereign diagnostics - PASSI & PACS
- In-depth audits (PASSI-qualified)
- Assessment of compliance with French and European regulatory requirements
- Mapping of critical processes and data requiring sovereign protection
- Intrusion tests specific to strategic threats targeting sovereign infrastructures
Strategic consulting - PACS
- Development of strategies for transition to technological autonomy
- Risk analysis using the EBIOS RM method
- Support for compliance with sovereignty regulations
- Development of governance plans and digital sovereignty policies
- Monitoring and anticipation of changes in French and European standards
Support for certification - PACS
- Complete preparation of RGS/LPM/IGI1300 certification files
- Establishment and coordination of the Approval Commission
- Development of Security Assurance Plans in accordance with ANSSI requirements
- Risk analysis specific to sensitive and classified environments

Design and Implementation
Sovereign architecture
- Design of infrastructures meeting DR and/or classified requirements (PACS)
- Creation of secure administration zones
- Verification through intrusion testing, architecture and configuration auditing (PASSI) of defenses against strategic and systemic threats
Classified systems
- Deployment of DR and/or classified IS compliant with IGI1300, II901, II920, etc. standards.
- Implementation of solutions qualified by ANSSI
- Development of compliance verification procedures/scripts
Critical sovereign and embedded industrial systems
- Specialized auditing and consulting for critical and embedded industrial systems (SCADA, ICS, OT) - IEC62443, ISO21434
- Design of secure architectures for national industrial infrastructures
- Protection of industrial controllers and protocols against advanced threats
- Compliance with sector-specific standards (energy, defense, transportation)

Continuous Improvement and Resilience
Maintaining security conditions
- Developing MCO/MCS strategies adapted to sovereignty constraints
- Managing patches in accordance with ANSSI recommendations
- Periodic security reviews by our PASSI-certified auditors
- Support for the renewal of certifications
- Support for strategic technological transitions
Preparation for crisis management - PACS
- Design of sovereign and autonomous crisis response systems
- Development of crisis management starter kits (reflex sheets, guides, etc.)
- Development of continuity plans
- Organization of simulation exercises incorporating embargo scenarios
- Training on the challenges and specificities of sovereign crisis communication

Our PASSI-PACS synergistic approach
Our dual high-level PASSI and PACS certification enables us to offer unique and consistent support throughout your sovereignty process:
- Our PASSI audits precisely identify your non-compliance issues and/or vulnerabilities
- Our PACS consultants use these results to develop relevant recommendations
- The EBIOS RM method is applied consistently between the audit and consulting phases (risk-based approach)
- Penetration tests to validate architectures are conducted with in-depth knowledge of the issues identified during the consulting phases
- Control audits validate the effectiveness of the measures deployed on the recommendation of our consultants
This synergy ensures continuity in your approach, avoiding methodological disruptions and ensuring that each step builds on the previous ones to strengthen your digital autonomy in the face of geopolitical challenges.