Search
Close this search box.

Mapping SpyCloud to NIS2 Directive Requirements

Blog featured image - NIS2

The NIS2 Directive, a significant update to the European Union’s cybersecurity legislation, ups cybersecurity requirements for entities within the EU. Building on the original Network and Information Systems (NIS) Directive, NIS2 broadens the scope of sectors considered critical to include the energy, transport, banking, and health sectors, among others.

The new directive mandates stricter security requirements, incident reporting obligations, and introduces heavier penalties for non-compliance. If you’re an organization impacted by NIS2, you know that compliance involves a multi-layered, strategic approach. With SpyCloud, it’s possible to cover a range of NIS2 requirements and see value on day one.

SpyCloud’s solution for identity protection

Our mission is to actively protect organizations from targeted identity-centric attacks that rely on cybercrime data being traded on the darknet about the company, its employees, suppliers, and customers. We do it by continuously providing our customers with access to relevant and actionable cybercrime data through products and integrations that enable automated protection from account takeover, data breaches, business email compromise, session hijacking, and ransomware. Our solutions also provide capabilities to detect and respond to infostealer malware infections that have bypassed the organization’s security controls. 

Mapping SpyCloud to NIS2 requirements

SpyCloud’s identity protection solutions, powered by Cybercrime Analytics, are a path forward to meeting the requirements of Paragraph 2, Article 21 of the NIS2 Directive – specifically requirements b, d, e, f, i, and j.

For each of the remaining requirements – a, c, g, h – SpyCloud’s alerts support the creation of appropriate policies and/or training.

Article 21 Section NIS2 Required Risk Management Measures SpyCloud provides critical support to entities by:
2(a) policies on risk analysis and information system security
  • Supporting the creation of appropriate policies and/or training
2(b) incident handling
2(c) business continuity, such as backup management & disaster recovery, and crisis management
  • Supporting the creation of appropriate policies and/or training
2(d) supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers
  • Providing visibility into business applications accessed by third-party vendors and contractors with dark web-exposed credentials or cookies
  • Detecting application credentials from suppliers using malware-infected personal or undermanaged devices
  • Monitoring third-party domains of your supply chain vendors to identify threat exposure from individuals with privileged access
2(e) security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure
  • Identifying the identity-centric vulnerabilities to allow for detection, disclosure, and automated remediation
  • Detecting application credentials from suppliers using malware-infected personal or undermanaged devices
2(f) policies and procedures to assess the effectiveness of cybersecurity risk-management measures
  • Continuous monitoring of employee exposure risks related to their identity security posture
  • Offering a view into active malware infections that have circumvented implemented security controls, so policies and implementations may be reconsidered
2(g) basic cyber hygiene practices and cybersecurity training
  • Supporting the creation of appropriate policies and/or training
2(h) policies and procedures regarding the use of cryptography and, where appropriate, encryption
  • Supporting the creation of appropriate policies and/or training
2(i) human resources security, access control policies, and asset management
  • Offering a device-agnostic approach with continuous monitoring of employee identities to detect exposed authentication data for critical business applications
  • Delivering evidence of infostealer malware-infected devices, including non-compliant devices used for work purposes
the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate
  • Monitoring of the entity’s identities and authentication continuously and alerting when they are exposed to cybercriminals to properly protect the integrity of MFA and Identity Access Control implementations
  • Securing MFA-protected web sessions from unauthorized access via session hijacking, detecting compromised cookies/tokens for invalidation/reauthentication

Explore SpyCloud’s solutions to support your business’ NIS2 Directive compliance.

Recent Posts

Check Your Company's Exposure

See your real-time exposure details powered by SpyCloud.

[2024 REPORT] The biggest identity threats to have on your radar. Read Now

X
Search
Close this search box.