Everything you need to evaluate NIS2 Shield for your organization. Compliance documentation, security benchmarks, and technical specifications.
40 out of 42 NIS2 Article 21 & 23 requirements addressed. 2 partial items require organizational procedures.
42 requirements checklist
Complete mapping of NIS2 Article 21 & 23 requirements to implementation, with evidence locations and certification signature block.
Docker & Kubernetes
Self-assessment against CIS Docker v1.6 and CIS Kubernetes v1.8 benchmarks with pass/fail status for each control.
Encryption details
Technical documentation of AES-256-GCM, RSA-OAEP algorithms, key management lifecycle, and disaster recovery procedures.
Threat model & hardening
Threat model, trust boundaries, container hardening, network security, and vulnerability disclosure process.
| Option | Best For | Time to Deploy |
|---|---|---|
| Docker Compose | PoC, Small deployments | ~5 minutes |
| Helm (Kubernetes) | Enterprise, On-premise | ~15 minutes |
| Terraform (Cloud) | AWS, GCP, Azure | ~30 minutes |
For procurement questions or custom deployment support, contact us.