As announced in our blog post «Keeping Up with Data Protection Regulations Thanks to IAM Solutions», where we showed how identity and access management (IAM) can help with FADP, GDPR, and DORA compliance, we are now covering two more important laws.
In this second part, we will take a closer look at the Electronic Identification, Authentication and Trust Services Regulation (eIDAS) and the Network and Information Security Directive (NIS2).
Interested in knowing how IAM supports eIDAS and NIS2 compliance? And how you can further enhance compliance and thus cybersecurity with non-technical measures, including hands-on tips? Dive right in!
eIDAS aims to create more confidence in electronic interactions across borders and digital services by establishing a framework for digital identity and authentication. This regulation specifically targets electronic identification (e-ID) and trust service providers. Benefits of eIDAS include higher security, convenience, and the ability to conduct activities like submitting tax declarations, enrolling in foreign universities, and setting up businesses across borders.
The key aspects of the eIDAS are as follows:
By providing the necessary tools and controls to manage electronic identities, ensure secure transactions, and facilitate the use of trusted services, IAM systems can help support eIDAS compliance in various ways:
How IAM helps with eIDAS
|
||
Topic | FADP / GDPR requirement | IAM benefit |
Electronic identification and mutual recognition
|
Meeting specific criteria for secure and acknowledged use across the EU
|
Integrates with national e-ID schemes and ensures high security through MFA and secure cross-border transactions
|
Interoperability of e-ID schemes
|
Ensuring interoperability of national e-ID schemes with a technology-neutral framework
|
Supports interoperability by integrating various e-ID protocols and adhering to technology-neutral frameworks
|
Trust services
|
Providing standardized trust services such as electronic signatures and seals to ensure secure transactions
|
Manages and verifies qualified electronic signatures, seals, etc., ensuring document integrity
|
Auditability and reporting
|
Proving compliance with data protection requirements
|
Allows organizations to track and verify who accessed personal data when thanks to detailed logs
|
NIS2, the modernized Network and Information Security Directive, aims to expand cybersecurity standards and fines to ultimately harmonize and improve the level of security in EU member states. Affected by NIS2 are all organizations that play a «critical role» in sustaining the European economy.
NIS2 expands beyond traditional critical infrastructure, establishing compliance across 18 sectors in the EU economy. Eleven are designated as «essential entities» with higher regulatory requirements than the seven «important entities», including oversight, penalties, and security measures. Compliance depends on company size, with different regulations applying to medium companies (50+ employees or EUR 10 mio.+ revenue) and large companies (250+ employees or EUR 50 mio.+ revenue). National laws can also add smaller companies to NIS2 if they hold significant public interest.
This directive is also relevant for Swiss companies because of its explicit inclusion of supply chains and partner companies. That means that relevant Swiss companies involved in the European economy also need to observe NIS2.
The main focus of NIS2 is to raise the level of cybersecurity within the EU. Organizations are now required to create an adequate security policy that describes their approach to securing their network and IT systems. This policy must be aligned with the goals of the company, define roles and responsibilities, and be regularly looked at to ensure that it stays up to date with current developments in the area of IT.
It is also necessary to implement a risk management framework that allows companies to carry out risk assessments and communicate security risks adequately to stakeholders. The organization’s risk management process must follow a cross-risk approach, be based on relevant criteria and be in line with common industry standards.
NIS2 requires organizations and member states to be adequately prepared to handle any cybersecurity incidents. For example, with a Computer Security Incident Response Team (CSIRT) and a competent national authority for network and information systems. All security incidents must be reported, logged, and communicated.
In addition to raising the level of cybersecurity within the EU, NIS2 aims to ensure business continuity and disaster recovery within its organization. Therefore, the directive specifically targets organizations playing a «critical role»” in the European economy.
An IAM system can be an integral part of a risk management framework: many of its features, such as access management, directly help in protecting organizations from security risks.
How IAM helps with NIS2 compliance | ||
Topic | NIS2 requirement | IAM benefit |
Security policy
|
Describing approach to securing network and IT systems, aligned with corporate goals and including responsibilities
|
Enforces security policy by strictly managing access to network and IT systems
|
Risk management framework
|
Conducting risk assessments and communicating security risks to stakeholders
|
Protects network and IT systems by means of access control, MFA, and PAM
|
Cybersecurity incident response
|
Handling cybersecurity incidents, which must be reported, logged, and communicated
|
Provides real-time monitoring, audit logs, and incident tracking, allowing to detect, report, and respond to incidents quickly
|
Business continuity
|
Being able to keep operations running and restore systems in case of a security incident
|
Automates and orchestrates backup and recovery tasks, e.g., enabling access revocation
|
Keyways how IAM supports compliance with NIS2 include:
The regulations described above and in our previous blog are just some of the security requirements a company must meet. Depending on the core offering of a company, different, more specific regulations may apply.
As we have just seen, complying with cybersecurity laws can be a complex task due to constant changes. The key to success here is a structured approach to ensure security, accuracy, and alignment with legal standards. Organizations can achieve this by implementing a number of proven strategies:
All good, then? Almost.
Companies can consider compliance as a «box-checking» exercise that satisfies auditors and provides a defense after an incident. However, the real value lies in using compliance as a pathway to robust security measures. Organizations that move beyond minimal standards and focus on strengthening their defenses are more resilient to cyberthreats.
An IAM system plays a crucial role in this effort by enhancing security beyond basic compliance. It is essential to building true security, reducing risks, supporting resilience, and meeting regulatory obligations – whether under FADP, GDPR, DORA, eIDAS, or NIS2.