A structured approach covering the full lifecycle of your controlled export operations, from initial classification to ongoing strategic support.
A comprehensive approach to secure, optimise and streamline your customs operations, from fundamental compliance to the full outsourcing of your customs function.
An integrated approach to optimise your cross-border flows, reduce your overall tax burden and secure your positions with tax and customs authorities.
An integrated approach combining innovation protection, contractual security and international regulatory compliance — in direct complementarity with Export Control.
Sanctions and embargo regimes (EU, UN, OFAC, UK, etc.) require heightened vigilance over your partners, financial flows and deal structures.
ELA helps you secure your operations against primary and secondary sanctions, avoid situations of blocking over-compliance, and engage effectively with authorities and your banks.
In practice, we combine operational screening, extraterritorial nexus analysis and crisis management (licences, asset unfreezing) to enable you to make informed decisions.
Checking your clients, suppliers, banks and intermediaries against sanctions lists (EU, UN, OFAC, UK…), including beneficial owners and controlling shareholders, to detect structures that appear clean but are controlled by sanctioned persons.
Qualification of contact points with high-risk jurisdictions (USD, US servers or banks, US persons, SWIFT flows, correspondent banks…), to determine whether your operations fall under OFAC or other authorities.
Preparation of licence applications and special authorisations with the French Treasury Directorate or competent authorities, where an operation remains possible despite a partial embargo or a sudden change in the sanctions regime.
II 901 defines the organisational and technical requirements applicable to sensitive or Restricted Distribution (DR) information systems, imposing a risk-based approach, formal accreditation and enhanced security measures.
ELA supports you from initial analysis through to accreditation and operational implementation of security measures, taking into account other applicable frameworks (PPST, NIS2, PSSIE, ANSSI standards).
In practice, we structure ISS governance, technical architecture and security procedures to obtain and maintain a robust II 901 accreditation, while remaining compatible with your project constraints and industrial timelines.
Our teams combine regulatory expertise, cybersecurity and operational knowledge of the defence, space, NewSpace and critical industries sectors to build II 901 frameworks that are actionable by your teams and credible with ANSSI, DGA or SGDSN.
Our experience covers the implementation of compliant operational environments for processing controlled data (ML/AMA, Dual-Use, DR-SF…), based on validated solutions including Sovereign Cloud platforms that meet regulatory requirements.
Sensitivity analysis of information (incl. Restricted Distribution), inventory of exposed activities, mapping of tangible/intangible flows and interconnections to precisely identify the II 901 scope and systems requiring accreditation.
Assessment of ISS maturity level, identification of gaps against the II 901 baseline and ANSSI guides, and prioritisation of compliance actions based on your business, contractual and export stakes.
Design of ISS governance (roles, responsibilities, ISMS policy), definition of organisational and technical measures (segmentation, approved encryption, logging, access control) and adaptation of your existing procedures to build a complete accreditation file.
Alignment with DGA, SGDSN and ANSSI guidelines (II 901, NIS2, DR frameworks, PPST requirements), to pool compliance efforts and prepare for client, authority or prime contractor audits.
Taking on the outsourced OCSS or CISO role for sensitive systems, cyber risk management, action plan monitoring, preparation and chairing of accreditation committees and relations with competent authorities.
Operational management of security incidents, coordination of technical responses, security maintenance and periodic reassessment of II 901 accreditation in a continuous improvement approach.