Skip to content

Cybersecurity

We are the experts in our product’s security

 

cyberelements has in-depth expertise in its products and is well positioned to provide security recommendations adapted to each specific context.

The aim of our security audits is to ensure that cyberelements is used in accordance with best security practices, to prevent cyber-incidents. They compare a list of checkpoints drawn up by our product and security experts with our clients’ existing environments. In the event of security gaps, reservations or non-compliance may be expressed, with recommendations and an action plan.

Our audit reports are built on principles of objectivity, accuracy, and respect for individuals. We ensure anonymity and focus on activities, not individuals, while maintaining a constructive approach. Controls that are carried out according to industry standards are presented in a clear and understandable way for non-experts during the debriefing.

Deliverables

Two deliverables are provided: an audit report and an audit presentation.

The audit report includes all the security control points analyzed by the consultant. For each control point, the following information is specified:

  • Description of the control point
  • Customer documents used to assess the control point
  • Description of the encountered state
  • Findings (compliant, compliant with reservations, non-compliant, undetermined)
  • Recommendations
  • Benefits and implementation of recommendations, based on various criteria such as user experience, service availability, security and resources, while considering the challenges of implementation, including burden and complexity.

Control point categories

  • Architecture
  • Capacity
  • Product Lifecycle (PLC)
  • Documentation
  • Training
  • Change Management
  • Incident Management
  • Performance
  • Backup
  • Security
  • Product
  • Supervision

The recommendations provided by cyberelements concerning other products (e.g. Windows environments, SQL, etc.) are given solely as a guide.

The report also includes a summary of key figures for control points, positive points, areas for improvement, points to be dealt with as a priority and an action plan

The Powerpoint document is presented at a meeting with the customer and includes the summary: key figures for control points, positive points, areas for improvement, points to be dealt with as a priority, and an action plan. Other control points that appear to be key points may be presented as well.

Activity

Description

Charge (p.*j.)

Analysis of control points

By product

1

Creating deliverables

  • Document describing all control points specific to a product.
  • Presentation of an audit report summarizing the audit findings.

0.5

Submission

Overview of essential information of a security audit

0.5