95% Compliant

NIS2 Self-Assessment Checklist

Compliance verification for NIS2 Directive Article 21 & 23 requirements.

Full Compliance Guide

Compliance Summary

42
Total Requirements
40
Compliant
2
Partial
0
Gaps

Article 21(a) - Risk Analysis

"Policies on risk analysis and information system security"

# Requirement Implementation Status
21a.1 Risk analysis performed Threat model in SECURITY.md
21a.2 Security policies defined CIS_COMPLIANCE.md
21a.3 Attack surface minimized Read-only containers
21a.4 Configuration hardening Non-root, no-new-privileges
21a.5 Vulnerability management CI pipeline with linting

Article 21(b) - Incident Handling

"Incident handling"

# Requirement Implementation Status
21b.1 Incident detection SIEM-ready logging (Fluent Bit)
21b.2 Structured audit logs JSON/CEF format with HMAC
21b.3 Log integrity HMAC signing
21b.4 Incident response plan Vulnerability disclosure
21b.5 24h notification SIEM integration, webhooks

Article 21(d) - Supply Chain Security

"Supply chain security"

# Requirement Implementation Status
21d.1 Verified base images Official images
21d.2 Dependency pinning requirements.txt
21d.3 Open source transparency MIT license, public repo
21d.4 SBOM generation Recommended in CI ⚠️
21d.5 Vulnerability scanning Hadolint in CI

Article 21(e) - Vulnerability Handling

"Security in network and systems acquisition, development and maintenance"

# Requirement Implementation Status
21e.1 Secure development Code review, CI/CD
21e.2 Vulnerability disclosure security@nis2shield.com
21e.3 Response timelines SLAs by severity
21e.4 Patch management Monthly recommended ⚠️

Article 21(g) - Access Control

"Human resources security, access control policies"

# Requirement Implementation Status
21g.1 Access control RBAC, DB separation
21g.2 Least privilege Minimal capabilities
21g.3 Secrets management Vault ready
21g.4 Audit logging All access logged

Article 21(h) - Multi-Factor Authentication

"Use of multi-factor authentication"

# Requirement Implementation Status
21h.1 MFA support MFAEnforcer middleware
21h.2 Session security SessionGuard, fingerprint
21h.3 Device validation Device fingerprint

Article 23 - Reporting Obligations

"Reporting obligations"

# Requirement Implementation Status
23.1 Early warning (24h) Timestamped logs
23.2 Structured reports JSON/CEF format
23.3 CSIRT integration SIEM forwarding
23.4 Evidence preservation Immutable, HMAC signed