Cyber threat modelling for secure cloud application design

3. Looking

Challenge

As part of its digital transformation, our customer recognised that cybersecurity was essential for existing and future applications. To achieve this, these new projects had to be assessed for appropriate security from design to commissioning.

We therefore worked on the following assignments:

  • Analysis of the architecture and design with the corresponding security frameworks, including examination of technical and organisational information security, for upstream detection of weak points and elimination by targeted measures;
  • Agile implementation of internal processes using the Scrum methodology and based on ISO/IEC 27001 for information security.

Methods

  • Scrum
  • ISO/IEC 27001

The keys to success

1
Our expertise in cybersecurity, in particular in the design of complex secure IT architectures;
2
A thorough knowledge of ISO/IEC 27001;
3
Our ability to move issues forward in a matrix management system.