Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Calcul offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
Openshift PaaS
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
IA
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the IA offer
IA
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
The magazine > ANSSI's PAMS guidelines: critical outsourcing security

PAMS (Prestataires d'Administration et de Maintenance Sécurisées - Secure Administration and Maintenance Service Providers) is a standard developed by ANSSI (Agence Nationale de la Sécurité des Systèmes d'Information - French National Agency for Information Systems Security) to govern the activities of companies offering outsourcing services. This standard applies specifically to the outsourced administration and maintenance of critical information systems. It establishes a set of rigorous requirements designed to guarantee the security of these services, particularly for sensitive customers such as Operators of Vital Importance (OIV).

Why was the PAMS repository created?

The PAMS repository was created in response to a growing need to secure outsourcing services. In an environment where the outsourcing of IT administration and maintenance has become commonplace, the associated risks (cyber attacks, data leaks, system compromises) have increased considerably.

PAMS enables sponsoring organisations (companies, public authorities, OIVs) to comply with the regulatory requirements arising from several standards frameworks:

  • The European NIS (Network and Information Security) Directive
  • The French Defence Code
  • State Information Systems Security Policy (PSSIE)

Using a PAMS-qualified service provider is therefore not only a guarantee of regulatory compliance, but also an assurance that best practice in IT security will be applied, even for organisations that are not strictly subject to these legal obligations.

The different stages in the qualification process

D0: Preparatory phase

This initial stage marks the service provider's commitment to the qualification process. It includes familiarisation with the standards and formal acceptance of the requirements contained therein.

Day 1: Initial assessment

An independent certification body (such as the Laboratoire National de Métrologie et d'Essais - LNE) carries out an in-depth assessment to check that the service provider complies with the requirements of the PAMS standard.

Day 1: Initial assessment

An independent certification body (such as the Laboratoire National de Métrologie et d'Essais - LNE) carries out an in-depth assessment to check that the service provider complies with the requirements of the PAMS standard.

D2: Validation by ANSSI

ANSSI examines and accepts the evaluation work carried out by the certifying body. This stage constitutes a technical validation of the evaluation file.

J3: Qualification decision

On the basis of the validated assessment report, ANSSI takes the final decision on whether or not to grant PAMS qualification. If the decision is favourable, the qualification certificate is issued for a period of three years and published on the official ANSSI website.

Follow-up assessments are then carried out annually to ensure that the required level of safety is maintained throughout the period of validity of the qualification.

The requirements and scope of the standards

The PAMS standard imposes strict requirements in three main areas:

Organisational requirements

  • Implementation of formalised processes for administration and maintenance
  • Clear definition of roles and responsibilities
  • Rigorous management of security incidents

Technical requirements

  • Strict separation between the service provider's information system (tools, workstations, administration networks) and the customer's managed resources
  • Implementation of mechanisms to track administrative actions
  • Protection of administration and maintenance workflows
  • Securing privileged access

Human requirements

  • Training staff and raising their awareness of safety issues
  • Background checks on administrators with access to critical systems
  • Application of the principle of least privilege

The scope covered by PAMS includes all the physical or virtual devices in the information system under management: servers, workstations, network equipment, applications, databases, etc.

The benefits of PAMS qualification

Enhanced safety

PAMS qualification significantly reduces the risks associated with outsourcing the administration and maintenance of information systems. It provides effective protection against increasingly sophisticated cyber threats.

Regulatory compliance

For customers subject to strict legal obligations, using a PAMS-qualified service provider makes it easier to comply with the regulatory requirements applicable to their sector of activity.

Confidence and market differentiation

For outsourcing providers, PAMS qualification represents a guarantee of reliability and competence, facilitating access to sensitive markets (OIV, public sector, critical industries). It represents a significant competitive advantage.

Continuous improvement

The annual assessment process ensures that safety levels are maintained over time and encourages continuous improvement in safety practices.

Prospects and challenges

The PAMS standard is now the benchmark for secure outsourcing in France. The standard helps to structure the relationship between service providers and customers around high, verifiable requirements, thereby contributing to the overall resilience of critical information systems.

Future challenges will include adapting the standard to technological developments (cloud computing, artificial intelligence, automation), as well as linking it with other international standards to facilitate interoperability and mutual recognition of security qualifications worldwide.

The magazine
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.