SecNumCloud: an essential pillar for governing a sovereign, resilient and trusted cloud

SecNumCloud: an essential pillar for governing a sovereign, resilient and trusted cloud

Digital transformation accelerates the dependence of public and private organizations on cloud services.

This dynamic creates a paradox: the cloud has become essential for performance, but also one of the main risk vectors. Faced with this reality, trust can no longer be implicit; it must be demonstrable, audited and sovereign.

It is in this perspective that ANSSI has designed SecNumCloud, the most advanced security and sovereignty framework in Europe.

Today, it constitutes a reference standard for executives wishing to secure their critical activities, control their risks and align their digital strategy with regulatory requirements (GDPR, NIS2, DORA).

1. SecNumCloud: a strategic framework for demanding organizations

SecNumCloud sets a set of technical, organizational and legal requirements allowing a cloud provider to obtain the ANSSI Security Visa.
This visa materializes a high and lasting level of guarantee, because it is based on:

  • independent control by approved audit centers,

  • a continuous review of security practices,

  • a regular follow-up by the ANSSI.

The repository covers all cloud models — IaaS, PaaS, CaaS and SaaS—and therefore addresses all critical data hosting and processing needs

    2. The key guarantees: security, control and sovereignty

    Enhanced operational security

    SecNumCloud imposes an advanced level of IT hygiene, based on the ANSSI guides, and guarantees:

    • a strict partitioning of environments,

    • a robust encryption of data at rest and in transit,

    • a secure and traceable administration,

    • a structured management of vulnerabilities and incidents,

    • a continuous and correlated supervision of security events.

    These requirements significantly reduce the attack surface and ensure business continuity in sensitive contexts.

    Risk control and transparency

    The framework imposes a comprehensive risk management approach including:

    • the classic technical risks,

    • the risks related to infrastructure sharing,

    • the risks of exposure to non-European jurisdictions.

    A specific document must also be prepared on the residual risks related to non-European laws — central point of version 3.2 of the framework.

    Sovereignty and protection against interference

    The SecNumCloud qualification is distinguished by a set of legal requirements unique in Europe:

    • mandatory location of data, administration and safeguards within the European Union;

    • impossibility for non-European shareholders or suppliers to exercise direct or indirect control over the service;

    • strict supervision of support operations carried out outside the EU, under dedicated supervision;

    • exclusive application of European law to the service.

    These provisions constitute an essential bulwark against extraterritorial laws (Cloud Act, FISA 702).

    3. Why SecNumCloud is becoming a must for executives

    Pilot a digital one of trust

    For a COMEX, the SecNumCloud qualification allows:

    • to control legal, operational and reputational risks,

    • to increase organizational resilience,

    • to ensure business continuity in critical situations,

    • to strengthen integrated compliance (GDPR, NIS2, DORA, sectoral regulation).

    Align digital strategy and sovereignty

    The state’s “cloud at the center” doctrine makes SecNumCloud essential for administrations.

    But the private sector is following the same path, notably in:

    • Health,

    • Energy,

    • Finance,

    • local and regional authorities,

    • companies managing complex supply chains.

    Ensure the trust of partners and customers

    The ANSSI qualification becomes an element of differentiation in the market and strengthens the legitimacy of organizations in their commercial and institutional relations.

    4. The qualification process: a proof of maturity

    Obtaining the qualification is done in four steps:

    1. filing of the file with ANSSI;
    2. definition of the evaluation strategy;
    3. carrying out technical and organizational audits by an approved center;
    4. qualification decision and annual monitoring.

    The qualification is issued for a maximum duration of three years.

    Beyond certification, it is a continuous process of governance, transparency and improvement.

    5. Incident management and notification

    In an interconnected digital economy, security and sovereignty become prerequisites for performance.
    SecNumCloud provides a clear framework for:

    • structure a solid digital governance,

    • create an environment of trust with the stakeholders,

    • promote innovation without undermining safety,

    • reduce critical dependencies to major non-European actors.

    It is fully in line with the mission of governing digital technology to create value and inspire trust, which is at the heart of the Govern IT approach.

    The bottom line

    SecNumCloud is not a technical device; it is a policy of trust.

    For leaders, it is a governance tool allowing to arbitrate, invest and transform by relying on a sovereign, resilient and compliant framework.

    Subscribing to an aligned cloud strategy SecNumCloud means strengthening:

    • Cybersecurity,

    • sovereignty,

    • sustainable performance,

    • digital trust.

    It is a strategic choice for organizations that want to master their digital future.

    DORA Directive: a strategic turning point for the operational resilience of the European financial sector

    DORA Directive: a strategic turning point for the operational resilience of the European financial sector

    The DORA regulation (Digital Operational Resilience Act), applicable since January 2025, establishes a unified European framework aimed at ensuring the digital operational resilience of all financial entities.

    Unlike a directive, DORA is a directly binding regulation for the 27 member states.

    Its purpose: to ensure that all players in the financial sector have robust prevention, detection, management and recovery capabilities against computer incidents, cyber attacks and major disruptions, including through their technology providers.

    The analysis of Regulation 2022/2554 reveals a much more precise, structuring and demanding mechanism than what was hinted at in the initial framework. The article below has therefore been updated to reflect the full regulatory obligations.

    1. Strategic issues and scope of the regulation

    DORA aims to reduce systemic risk related to digital failures and strengthen trust in the European financial ecosystem. This includes:

    • the harmonization of ICT risk management practices;

    • the accountability of leaders;

    • the strict supervision of critical ICT providers;

    • a coordinated European supervision.

    The act covers more than 20 categories of financial entities, as well as all IT providers, including cloud, data center, managed services, application developers, data providers and analytics providers.

    2. Essential definitions introduced by the regulation

    To ensure consistent interpretation, DORA establishes precise definitions, including:

    • Critical or important function: activity whose interruption impacts continuity, stability, or customer rights.

    • Critical ICT Provider: supplier whose failure represents a systemic risk.

    • ICT major incident: significant disruption according to harmonised criteria.

    • Threat-Guided Penetration Test (TLPT): advanced test based on real attacker scenarios.

    These concepts structure all operational obligations.

    3. Digital resilience governance

    Direct responsibility of the leaders

    The management bodies must:

    • approve the ICT risk management policy;

    • validate the continuity plans each year;

    • follow the security investments;

    • have specific training in ICT risks.

    DORA strengthens the link between corporate governance and cybersecurity, placing leaders on the front line.

    Critical functions register

    Entities must maintain a comprehensive register describing:

    • critical processes;

    • their technical dependencies;

    • the providers involved.

    This tool is central to supervision and audits.

    4. Integrated ICT risk management

    The regulation imposes a comprehensive and documented approach including:

    Mapping of resources and dependencies (art. 16)

    Organizations must map:

    • infrastructures, software, critical assets;

    • internal and external interconnections;

    • cloud dependencies and subcontractors.

    Life cycle management of assets (art. 17)

    Detailed documentation must cover:

    • the inventory;

    • maintenance;

    • obsolescence;

    • the controlled decommissioning.

    Configuration policy, patches and vulnerabilities (art. 18-21)

    Entities must demonstrate capabilities:

    • management of configurations,

    • of quick application of patches,

    • automated risk monitoring,

    • for the identification and remediation of vulnerabilities.

    Security of software development (art. 20)

    DORA requires a secure development approach integrating tests, code review, and version management.

    5. Gestion des incidents et notification

    harmonised classification

    Incidents shall be classified according to:

    • their operational impact;
    • the duration;
    • the number of affected clients;
    • the criticality of the affected services.

    Three-step reporting (art. 33)

    The regulation requires:

    1. Initial notification
    2. Interim reports according to the evolution
    3. Final report including causal analysis and corrective measures

    Notifications must be transmitted without undue delay to the national authorities (AMF, ACPR) and, if necessary, to the ECB.

    Informing customers (art. 36)

    In the event of a major incident, customers may need to be informed clearly and quickly.

    6. Operational resilience tests

    Mandatory test plan (art. 42-54)

    Organizations must drive:

    • technical tests;
    • crisis management exercises;
    • incident recovery plans ;
    • restoration tests and switches.

    6.2. TLPT: advanced tests guided by the threat

    Significant entities must organize every three years:

    • a TLPT carried out by independent and certified teams;
    • realistic scenarios simulating the operating methods of hostile actors;
    • a validated and tested remediation action plan.

    7. Management and supervision of ICT providers

    Mandatory register of providers (art. 28)

    Entities must identify:

    • all their ICT providers;
    • the services provided;
    • the associated criticality.

    Mandatory contractual clauses (art. 30)

    Any contract must include:

    • the expected level of service;
    • the security requirements, PRA/PCA;
    • the right of audit;
    • the terms of reversibility and access to newspapers;
    • the incident notification obligations.

    Concentration risk analysis (Art. 41)

    Entities need to assess the risk of over-reliance on a single provider, including cloud.

    European supervision of critical service providers (art. 49-57)

    The European Union establishes:

    • a Lead Overseer (ESMA, EIOPA or EBA depending on the sectors);
    • European audits;
    • on-site visits;
    • injunctions or corrective measures;
    • a device that can go as far as the restriction of a service.

    This supervision is a major step forward.

    8. Sectoral information sharing

    DORA encourages participation:

    • to the exchange communities related to cyber threats;
    • to the sectoral centres (ISAC);
    • to the collective learning programs of resilience.

    This aspect aims to strengthen intra-European cooperation.

    9. Sanctions and corrective measures

    The regulation provides for:

    • administrative penalties;

    • remediation obligations ;

    • injunctions;

    • potential restrictions on activities or services;

    • reinforced supervision when persistent shortcomings are observed.

    National authorities may require corrective plans with enhanced monitoring.

    The bottom line

    • DORA constitutes a fully binding regulation, imposing a high level of digital resilience.

    • Leaders are responsible and accountable for compliance.

    • The framework imposes detailed requirements for mapping, testing, reporting, contracting and third-party supervision.

    • Critical ICT providers will be subject to direct monitoring at the European level.

    • DORA harmonizes digital crisis management throughout the financial sector, enhancing performance, transparency and trust.

    SRI 2 : a new digital resilience requirement for organizations

    SRI 2 : a new digital resilience requirement for organizations

    The European SRI2 directive has not yet been fully integrated into French law. The bill on critical infrastructure resilience and strengthening cybersecurity has been passed by the Senate, but its final validation remains pending.

    This transition marks a major evolution of the digital security framework in Europe: SRI2 significantly expands organizations’ obligations and places cybersecurity at the heart of governance.

    As value chains become more interdependent and cyber threats become more sophisticated, SRI2 is undergoing a paradigm shift: digital security is no longer a technical issue reserved for IT teams.

    It becomes a strategic responsibility, directly engaging the governing bodies.

    1. An expanded scope: more organizations concerned

    SRI2 replaces the 2016 SRI Directive and broadens the scope of sectors subject to enhanced obligations. Two categories now structure the device:

    • Essential entities: energy, health, water, transport, digital infrastructure, financial sector, public administration, space.
    • Important entities: digital services, waste management, agri-food, manufacture of critical products, research, chemistry, logistics, industrial equipment.

    Any organisation with more than 50 employees or €10 million in turnover, and operating in one of these sectors, is likely to be concerned.

    This extension leads to a direct consequence: a large number of strategic midcaps and SMEs now fall within the regulatory scope.

    2. Strengthened governance: a direct responsibility of the EXCOM

    One of the major contributions of SRI2 lies in the explicit commitment of the governing bodies.

    Governance bodies shall:

    • validate cybersecurity policies;
    • follow the levels of risks;
    • ensure the implementation of security measures;
    • follow regular training on cybersecurity issues.

    The directive also introduces personal liability on the part of managers in the event of serious breaches.

    The COMEX is witnessing a significant change: cybersecurity is now a field that needs to be piloted, documented, and audited with the same level of requirements as finance or operational risks.

    3. Ten structuring obligations that companies must apply

    SRI2 imposes a common core of measures aimed at strengthening digital resilience. Among the key obligations:

    • Governance and risk management: identification and treatment of risks, formalization of a security strategy.
    • Security policies and incident management: detection, response and coordination with the competent authorities.
    • Business continuity and crisis management: update of PCA, PRA and regular exercises.
    • Securing the supply chain: evaluation of critical providers, reinforced contractual clauses.
    • IT hygiene and hardening: patch management, MFA, segmentation, controlled backups.
    • Network and information systems security: technical controls adapted to the level of risk.
    • Vulnerability management: detection, analysis and correction process.
    • Identity and access management: strong authentication, principles of least privilege.
    • Supervision and detection: SOC, SIEM or equivalent devices adapted to the size of the entity.
    • Regular testing: technical audits, penetration tests and crisis exercises.

    The objective is clear: to raise the overall level of maturity and structure a coherent approach from prevention to resilience.

    4. A new incident notification regime: 24h, 72h, 1 month

    To improve coordination and transparency, NIS2 imposes a precise schedule:

    • 24 hours: preliminary notification («early warning»)
    • 72 hours: detailed report on the incident
    • 1 month: final report describing the impact and corrective measures

    This requirement strengthens the collective capacity to detect, understand and respond to major incidents.

    5. Increased supervision and a meaningful sanctions regime

    National authorities will have strengthened levers:

    • mandatory audits,
    • inspections sur site,
    • requests for evidence of conformity,
    • follow-up of corrective measures.

    The planned sanctions can reach:

    • 10 million euros, or

    • 2% of global turnover, whichever is greater.

    These levels reflect a strong desire to strengthen cybersecurity discipline at the European level.

    6. Impacts for organizations: a transversal project

    NIS2 compliance affects several dimensions simultaneously:

    Governance

    • Formalization of the cyber strategy, structuring of responsibilities, implementation of indicators.

    Organisation

    • Strengthening of security teams, regular training, coordination with the professions and external partners.

    Technologies

    • Increase of supervision, hardening, segmentation, immutable backups, automation.

    Compliance and documentation

    • Updates to internal policies, registers, supplier contracts, procedures and evidence of compliance.

    SRI2 thus becomes a transformation lever, forcing organizations to move from a reaction logic to an integrated approach to digital risk managemen

    7. A strategic opportunity: trust, performance and sovereignty

    Beyond the obligations, SRI2 constitutes a vector of value creation:

    • reduction of operational risks,
    • strengthening of relationships with clients and partners,
    • improvement of insurance conditions,
    • alignment with other regulatory frameworks (GDPR, DORA, CER, SecNumCloud).

    Proactive organizations can turn this constraint into a competitive advantage by installing managed, controlled and trustworthy security.

    The bottom line

    SRI2 greatly expands the scope of the entities concerned.

    Leaders are directly responsible for cyber governance.

    Ten structuring bonds underpin the resilience model.

    Incidents must be notified according to a strict schedule.

    The sanctions are among the highest in European frameworks.

    SRI2 is an opportunity to strengthen resilience, compliance and sustainable performance.