EU NIS2 Directive (2022/2555)

EU mandatory cybersecurity directive for essential and important entities. Effective October 2024. Covers endpoint security, supply chain, incident response, and management accountability.

EU-operating organizations in energy, transport, health, finance, digital infrastructure

10

control domains mapped

10

Nitrokey products applicable

6

other frameworks cross-mapped

Official doc

EU NIS2 Directive (2022/2555)

Art.21(2)(i) Multi-factor or continuous authentication solutions

Phishing-resistant MFA using hardware security keys. Software TOTP and SMS are explicitly excluded from "phishing-resistant" in NIST 800-63B and most modern framework guidance.

Art.21(2)(h) Basic cyber hygiene — cryptography policies

Hardware-bound key generation and storage. Private keys generated and stored inside a certified secure element (EAL 6+) and are non-exportable by design.

Art.21(2)(e) Security in network and information systems acquisition

Hardened mobile OS with per-app sensor controls, verified boot, and no background telemetry. Satisfies mobile device management and bring-your-own-device security requirements.

Art.21(2)(e) Security in acquisition, development, and maintenance

Measured boot chain verified on every power-on. Any firmware modification — supply chain implant, evil-maid attack, or malicious update — fails attestation before the OS loads.

Art.21(2)(e) Network segmentation

VM-level compartmentalization means a compromise of one domain (e.g. browser) cannot reach another (e.g. keys, vault). No other consumer laptop provides this by default.

Art.21(2)(e) Network and information systems security measures

Stateful firewall with IPS at the network perimeter. All inbound/outbound traffic inspected with Suricata rule sets. VPN gateway replaces consumer VPN dependency.

Products that satisfy this control:

Art.21(2)(h) Policies and procedures on use of cryptography

Hardware-encrypted storage and self-hosted file servers replace cloud storage with hardware you control. Encryption keys never leave your environment.

Art.21(2)(d) Supply chain security

Open-source firmware is publicly auditable and reproducibly built. EU jurisdiction hardware is not subject to US National Security Letters. Directly addresses hardware supply chain risk in CMMC and NIS2.

Art.21(2)(i) Physical security measures for network and information systems

Rated safes and vaults protect physical assets, documents, and hardware backups. UL-certified fire and burglary ratings provide auditable physical security controls.

Products that satisfy this control:

Art.21(2)(h) Encryption of data in transit

Verified boot ensures the TLS stack is unmodified before communication. VPN gateway encrypts all remote access traffic. Hardware-backed keys prevent interception even if endpoints are observed.