Interministerial Instruction 901 & Cybersecurity
II901 sets the bar for securing sensitive and Restricted Information systems, combining a risk-based approach, formal accreditation, and reinforced security controls to protect your most critical assets.
If your systems handle controlled data, II901 is a key requirement.
ELA guides you from initial scoping through to accreditation and day-to-day operations, aligning II901 with your other regulatory obligations (PPST, NIS2, PSSIE, ANSSI guidance) and your business priorities.
In concrete terms, we design and structure your information security governance, technical architecture, and operational procedures so you can obtain – and maintain – a strong II901 accreditation without slowing down your projects or industrial timelines.
Our teams blend regulatory expertise, cybersecurity capabilities, and on-the-ground experience in defense, space, NewSpace, and critical industries to build II901 frameworks that your teams can actually apply – and that stand up to scrutiny from ANSSI, DGA, and SGDSN.
II901 Readiness Assessment
Sensitivity analysis of your information (including Restricted Distribution), mapping of exposed activities, data flows, and interconnections to clearly define the II901 perimeter and the systems that must be accredited.
Gap analysis against the II901 baseline and ANSSI best practices, with a pragmatic remediation roadmap prioritized by business impact, contractual commitments, and export-control constraints.
II901 Framework & Accreditation
Design of your information security governance (roles, responsibilities, policies), definition of organizational and technical safeguards (segmentation, approved encryption, logging, access control), and adaptation of existing procedures into a complete, audit-ready accreditation package.
Alignment with DGA, SGDSN, and ANSSI frameworks (II901, NIS2, Restricted Distribution regimes, PPST requirements) to industrialize compliance efforts and streamline audits by authorities, strategic customers, and major primes.
Outsourced OCSSI / CISO Services
Acting as your outsourced OCSSI or CISO for sensitive systems, steering cyber risk management, tracking remediation plans, and leading accreditation boards as well as interactions with competent authorities.
Day-to-day management of security incidents, coordination of technical response, maintenance of the required security posture, and regular II901 re-assessments to embed continuous improvement into your operations.