Projects Pricing Auditor Kit Demo Guide Docs FAQ About GitHub
Open Source NIS2 Ecosystem

NIS2 Compliance
Made Simple

End-to-end security for your applications. From backend forensic logging to client-side session protection. Open source, production-ready, NIS2 compliant.

user@server:~/project
$ python manage.py check_nis2
[NIS2 SHIELD AUDIT REPORT]
------------------------------------------------
[PASS] Forensic Logging active (JSON/CEF)
[PASS] PII Encryption in logs (Fernet)
[PASS] Session Cookie Secure
[PASS] Rate Limiting enabled
[PASS] Client Telemetry endpoint configured
------------------------------------------------
COMPLIANCE SCORE: 100/100
$ _
Security Audit
Safety CLI Verified
IoT Ready
PiWheels Optimized

Choose Your Stack

NIS2 Shield provides security components for both backend and frontend. Use them together for complete coverage.

Django NIS2 Shield

Backend Middleware

Security-first middleware for Django. Forensic logging, rate limiting, Tor blocking, and multi-SIEM integration.

Python Django 3.2+ SIEM Ready
Explore Django Shield →

Spring NIS2 Shield

Java/Spring Starter

Security-first starter for Spring Boot. Audit logging, rate limiting, and Actuator integration.

Java 21 Spring Boot 3 Bucket4j
Explore Spring Shield →

Express NIS2 Middleware

Node.js Middleware

NIS2 compliance middleware for Express.js. Forensic logging, rate limiting, security headers in one app.use().

TypeScript Express 4/5 Node.js 18+
Explore Express Middleware →

.NET Shield

ASP.NET Core Middleware

Security-first middleware for .NET 8. Forensic logging, HMAC integrity, rate limiting, and Tor blocking.

C# .NET 8 NuGet Enterprise
Explore .NET Shield →

React NIS2 Guard

Client-Side Protection

Client-side security telemetry for React. Session protection, encrypted storage, device fingerprinting.

TypeScript React 18+ AES-GCM
Explore React Guard →

Angular NIS2 Guard

Client-Side Protection

Client-side security telemetry for Angular. Session protection, encrypted storage, device fingerprinting.

TypeScript Angular 14+ AES-GCM
Explore Angular Guard →

Vue NIS2 Guard

Client-Side Protection

Client-side security telemetry for Vue 3. Session protection, encrypted storage, device fingerprinting.

Vue 3 Composition API AES-GCM
Explore Vue Guard →

Infrastructure Kit

Docker Stack

Secure-by-design Docker infrastructure. Hardened containers, log segregation, automated backups.

Docker Fluent Bit PostgreSQL
Explore Infrastructure

Full-Stack Security

Deploy both components for end-to-end NIS2 compliance coverage.

Frontend (React / Angular / Vue)

@nis2shield/{react,angular,vue}-guard

  • ├── SessionWatchdog (idle detection)
  • ├── AuditBoundary (crash reports)
  • ├── useDeviceFingerprint (session validation)
  • └── → POST /api/nis2/telemetry/
Backend (Django / Spring / Express / .NET)

django-nis2-shield | nis2-spring-shield | @nis2shield/express-middleware | Nis2Shield.AspNetCore

  • ├── ForensicLogger (HMAC signed logs)
  • ├── RateLimiter, SessionGuard, TorBlocker
  • ├── Multi-SIEM (Elasticsearch, Splunk, QRadar)
  • └── → Infrastructure Kit (Docker, Helm, Terraform)
The Open Source Advantage

The Network Effect of Security

Why Open Source is safer for Enterprise. We turn the "risk" of public code into your strongest defense.

Centralized Intelligence

We aggregate vulnerability reports from thousands of developers worldwide. When one user finds a bug, every client gets the patch instantly via our Cloud Signing API.

Anti-Tamper Signature

Our Cloud API refuses to sign reports from modified libraries. If a supply-chain attacker (or your own dev) alters the code, compliance stops.

Trusted 3rd Party

Self-certification is a conflict of interest. We act as the independent Digital Auditor that validates your security controls for your clients.

Industrial IoT Ready

Secure the Edge.
Not just the Cloud.

NIS2 Article 21 requires supply chain security across all infrastructure. NIS2 Shield is optimized for ARM architectures, bringing compliance to your shop-floor gateways and edge devices.

  • PiWheels Optimized Pre-compiled wheels for Raspberry Pi. Deploys in seconds, not hours.
  • Air-Gap Capable Local cryptographic logging & verification. No cloud dependency required.
  • OT/IT Convergence Unified compliance audit for both backend servers and industrial controllers.
root@edge-gateway:~# SSH: 192.168.1.50
> pip install django-nis2-shield
Downloading django_nis2_shield-0.3.1-py3-none-any.whl...
Verified PiWheels build (ARMv7) ✅
Successfully installed on Raspberry Pi 4
> python manage.py check_nis2
[NIS2 EDGE COMPLIANCE REPORT]
Local Log Buffer: Active
Offline Crypto: Enabled

Don't just say you're secure.
Prove it.

The Truth is in the Code. The Proof is in the Report. Stop relying on signed PDFs and start trusting your infrastructure code.

Traditional GRC

The Old Way

  • Bureaucratic Developers stop coding to fill manual questionnaires.
  • Compliance Drift "Secure on paper" in January, vulnerable in production by June.
  • High Liability In court, a signed PDF is weak evidence against a data breach.
NIS2 Shield Way

The Truth & The Proof

  • Engineering First Compliance is code. Integrated into CI/CD. Zero friction for devs.
  • Real-Time Verification Our engine audits your infra on every commit. No drift possible.
  • Irrefutable Evidence Cryptographically signed logs and immutable audit trails.

Get Started in Seconds

Python / Django
pip install django-nis2-shield
Java / Spring Boot
<artifactId>nis2-spring-shield</artifactId>
Node.js / Express
npm i nis2-express-middleware
.NET / ASP.NET Core
dotnet add package Nis2Shield.AspNetCore
Frontend / React
npm i @nis2shield/react-guard
Frontend / Angular
npm i @nis2shield/angular-guard
Frontend / Vue
npm i @nis2shield/vue-guard
95% Compliant

Compliance Matrix

How our tools map to NIS2 Directive articles.

View full 42-requirement checklist →
NIS2 Article Requirement NIS2Shield Solution
Art. 21 (a) Risk analysis & system security Automated audit (check_nis2) and config hardening.
Art. 21 (b) Incident management 24h incident reports & structured audit logs.
Art. 21 (c) Business continuity Encrypted Twin (Crypto-Replicator), automated backups, DR testing.
Art. 21 (d) Supply chain security Open source verifiable code (no black box).
Art. 21 (e) Cryptography & HR security PII encryption, log hashing, Session Guard & Secure Storage.
Art. 21 (f) Network security Container hardening, network isolation, Tor blocking.
Art. 21 (g) Security policies & training CLI audit tools, compliance reports, documentation.
Art. 23 Reporting obligations CSIRT-ready incident reports, SIEM integration.
For Enterprise & PA

Auditor Kit

Security documentation ready for hospital procurement and PA audits. CIS benchmarks, NIS2 self-assessment, cryptographic specifications.

42
NIS2 Requirements
95%
Compliance
56
CIS Controls
AES-256
Encryption
View Auditor Kit

Security Updates & Alerts

Stay compliant. Receive immediate notifications about critical CVE patches, regulatory changes (NIS2/DORA updates), and new rule sets.

Subscribe to Alerts