Long term confidence and support

We guarantee that your trust in us will be respected through our extensive quality and security controls.

Our quality standards conform to the following:

  • ISO 9001
  • BSI Management Systems
  • UKAS accreditation body

Our facility is a fully accredited site to manage security of the support activities together with any appropriate documentation; all kept under strict baseline control.

We have developed a team of CLAS supported engineers that deliver accreditation to both our own system designs and those of our customers.

Achieved through sound security engineering practices including:

  • Rigorous Security Risk Assessments
  • Thorough application of HMG IA Standards and processes
  • Presentation of sounds Risk Mitigation argument through use of the Security Policy Framework

Security Assurance Coordinator Services

TP Group offers a security engineering Customer Friend relationship through client-side management of the Accreditation Process (including the management of all Security Working Groups.)  We provide Security Assurance Coordinator capabilities at your site that will include:

  • Mapping of security engineering activities to the requirements of the programme/project plan
  • Production of Risk Balance material for Risk Balance Cases
  • Management of the Tier 1 delivery of the Security Architecture

Security Architecture Reviews of 3rd Party Systems

We offer a customer relationship designed to offset programme delivery risk through a thorough review of 3rd party security architectures against the agreed Risk Profile.

  • Confirmation of the completeness and applicability of the agreed Risk Profile
  • Review of the selected security components for applicability, efficacy and residual strength

Forensic Reviews of 3rd party Security Architectures

Our Security Engineering support services to 3rd party customers through forensic reviews of failing 3rd party security architectures.

  • Confirmation of the completeness of the Security Architecture
  • Confirmation that the security operation of the architecture is holistic and efficient
  • Identification of potential weaknesses in the Security Architecture
  • Identification of appropriate weaknesses mitigation paths