Contact sales

Contact us to start
your fiber journey.

Behind every remarkable transformation journey is a great team. Get expert guidance and your questions answered with one of our experts.

Project

Regulatory Compliance.

 

arrow-down-white

Regulatory compliance

Over the last decade, states and transnational organizations such as the EU have started regulating cybersecurity in response to an increasing threat level, the failure of voluntary compliance and a systemic interdependence within the digital ecosystem.

The NIS2 Directive represents a significant evolution in EU cybersecurity legislation, expanding upon its predecessor, NIS1, to strengthen digital resilience across more sectors and organizations.

Meanwhile, the UK has introduced the Telecommunications Security Act, or TSA, with many of the same goals but a different approach.

These comprehensive frameworks introduce strict cybersecurity requirements, broad reporting obligations, and enhanced supervision measures for essential and important entities throughout the European Union and the UK.

Organizations must adapt their security measures, risk management processes, and incident reporting procedures to ensure compliance with these new regulations.

nis2-project

Netadmin and NIS2/TSA

The Netadmin Regulatory Compliance Project is a key component of our broader Security Journey roadmap. While NIS2 and TSA is one aspect of our security strategy, we recognize that cybersecurity is increasingly critical, and Netadmin must stay ahead of emerging threats.

When using Netadmin, our customers must comply with NIS2/TSA regulations, particularly regarding logging and traceability, encryption, and authentication and authorization. We are actively working on the following topics:

  • Logging & Traceability: Ensure extensive logging and real-time analysis support to detect malicious behavior, breaches and other security issues.

  • Encryption: Ensuring encryption in transit and encryption at rest. What is the most efficient and appropriate encryption mechanism to recommend? For example, should at rest encryption be implemented at the database, container or OS level?

  • Authentication/Authorization: Ensure Multi-Factor Authentication (MFA) and strong password security mechanisms in all interfaces and systems, with appropriate ACL (Access Control List) and auditing support throughout the solution.

Summary

The Regulatory Compliance Project at Netadmin enhances our cybersecurity measures to meet the EU's updated NIS2 Directive's stricter digital resilience and security requirements, as well as the similar requirements of the TSA. We focus on three key areas: comprehensive logging and traceability systems, encryption mechanisms, authentication, and authorization measures — all designed to help our customers meet their regulatory obligations.

contact-mattias-b

Contact me!

Want to learn more? Contact me:
Mattias Bergsten
, Product Evangelist

mattias.bergsten@netadminsystems.com