Advice & risk analysis
ITrust brings its expertise in the accompaniment and assistance to the project management of a secure information system architecture, by addressing various points:
- Study of the existing situation including functional and operational aspects
- Technological and architectural study
Relying on a dedicated professional can ensure that you are in control of your architecture and your information system. ITrust assists and accompanies you in :
- the drafting of specifications for the expression of security needs (recommendations and specifications)
- assistance in defining and improving physical security (access) in correlation with the population and the different types of security zones defined
- training of collaborators, administrators, users and stakeholders
- implementation of mock-ups (proof of concept)
- revision of legal references (IT charter, data confidentiality, regulatory compliance)
- the implementation of a standard for naming and managing information system equipment (servers, switches, routers, etc.) in their life cycles (input/output of equipment) and in their use
- setting up procedures for managing Service Level Agreements (identification, quantification, qualification of projects, monitoring and control)
Advice & project management assistance
The objective of ITrust’s project management assistance mission is to accompany you on :
- the identification of information assets through a risk analysis process
- the definition and implementation of relevant priorities in your security plan
- the implementation of the IS security policy (structure, developments, dissemination)
- communicating and promoting security policy internally
Studies & risk analysis
ITrust assists you by putting its know-how at your disposal through :
- the use of multiple analysis methods (MEHARI, EBIOS…)
- the global analysis of an information system (structural, functional, organizational and operational)
- specific analysis in the context of a project or a segment of an information system (e.g. securing an extranet)
- the study of the behavioural habits of the users of the information system
- the study of risks applicable to the information system and business applications
Definitions & planning your security
ITrust puts at your disposal its know-how on :
- the organization and editing of security precepts within the entity
- the implementation of operational procedure documents: security dashboard (TBSGSSI), definition of qualitative and quantitative criteria, reporting, management of the life cycle of security policies
- security policy charters: assistance with the implementation of charters, drafting and updating of documents, control of confidentiality and deliverables
- assistance in the implementation of security within the company: identification of the responsibilities of the different populations within the company, training and awareness raising on the different aspects of security, support in the compliance and deployment of security policies.