Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
NIS2

Physical Compliance with NIS2 Directive Requirements

NIS2 requires essential and important entities to implement appropriate technical measures for network security, access control, and incident handling. Firevault Control provides physical enforcement that demonstrably exceeds directive requirements.

Back to Control
Control

NIS2

NIS2 requires appropriate and proportionate measures. For essential services that underpin national infrastructure, appropriate means physical, not just logical.

Art. 21

Full Article 21 requirements coverage

100%

Physical network segmentation enforcement

24hr

Incident notification capability support

Full

Automated compliance evidence generation

The Compliance Challenge

NIS2 demands demonstrable security measures.

Proportionate Measures

NIS2 requires measures proportionate to the risk. For essential services, this means demonstrating that security measures go beyond standard software controls.

Network Segmentation

Article 21 requires network segmentation, but many organisations rely on VLAN-based separation that can be bypassed through misconfiguration.

Management Accountability

NIS2 introduces personal liability for management bodies. Demonstrating appropriate measures requires evidence that goes beyond compliance checklists.

The Scenario

Scenario: NIS2 Audit with Physical Evidence

An essential entity faces its first NIS2 compliance audit. The assessor examines network segmentation controls and finds that existing firewall-based segmentation, while configured correctly today, has experienced three misconfiguration incidents in the past year that temporarily created paths between zones. Each incident violated NIS2 requirements for the duration it existed. The organisation cannot demonstrate continuous compliance. With Firevault Control, the organisation presents physical zone boundary evidence showing continuous, unbroken zone separation. Conduit activations are logged with multi-party authorisation records. The assessor can verify that physical boundaries were maintained at all times, providing evidence of continuous compliance.

"Our auditor asked us to prove that our network segmentation had been continuously effective for the past twelve months. With firewall logs, we could show configuration at a point in time. We could not prove there had been no gaps between audits."

Framework Mapping

Exceed NIS2 requirements with physical measures.

Essential and important entities achieve NIS2 compliance through physical measures that demonstrably exceed directive requirements. Network segmentation is physical, not logical. Access control is multi-party and time-limited. Business continuity is guaranteed through air-gapped archives. Compliance evidence is generated continuously.

  • Physical network segmentation exceeding Article 21 requirements
  • Multi-party access control satisfying Article 21(2)(d)
  • Continuous compliance evidence between assessments
  • Management accountability documentation for Article 20
  • Rapid incident containment for notification timelines
  • Air-gapped recovery exceeding business continuity requirements
Fracture

Fracture — Article 21(2)(c) Network Security

Module 1 of 4

Provides physical network segmentation that directly satisfies NIS2 Article 21(2)(c) requirements for network security. Physical boundaries demonstrate a higher standard of protection than the directive requires.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

EU Data Sovereignty

Data residency within UK and EU jurisdictions supports NIS2 requirements for appropriate data handling and sovereignty.

Management Accountability

Documented multi-party authorisation and governance processes demonstrate management oversight required by Article 20.

Continuous Evidence

Automated compliance logging generates continuous NIS2 evidence, eliminating gaps between point-in-time assessments.

Incident Response

Physical zone isolation capabilities support the rapid incident containment required by NIS2 notification timelines.

Audit-Ready Records

Tamper-proof logs provide complete audit trails for every network boundary state, access authorisation, and incident response action.

Recovery Assurance

Air-gapped recovery archives demonstrate business continuity capability that exceeds NIS2 disaster recovery requirements.

Demo to Live

Adoption Guide

Step 1

NIS2 Gap Assessment

Map your current security measures against NIS2 Article 21 requirements to identify where physical enforcement strengthens your compliance position.

Step 2

Compliance Architecture Design

Design physical zone boundaries and access controls that satisfy and exceed NIS2 requirements for your entity classification.

Step 3

Evidence Validation

Deploy Control in a representative environment to validate compliance evidence generation and prepare for your first NIS2 assessment.

Step 4

Full Compliance Deployment

Organisation-wide deployment with continuous compliance evidence, multi-party governance, and air-gapped recovery assurance.

Step 1

NIS2 Gap Assessment

Map your current security measures against NIS2 Article 21 requirements to identify where physical enforcement strengthens your compliance position.

Step 2

Compliance Architecture Design

Design physical zone boundaries and access controls that satisfy and exceed NIS2 requirements for your entity classification.

Step 3

Evidence Validation

Deploy Control in a representative environment to validate compliance evidence generation and prepare for your first NIS2 assessment.

Step 4

Full Compliance Deployment

Organisation-wide deployment with continuous compliance evidence, multi-party governance, and air-gapped recovery assurance.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy