{"id":23972,"date":"2024-02-28T10:54:55","date_gmt":"2024-02-28T18:54:55","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17702\/"},"modified":"2024-02-28T10:54:55","modified_gmt":"2024-02-28T18:54:55","slug":"news-17702","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17702\/","title":{"rendered":"Navigating NIS2 requirements with Microsoft Security solutions"},"content":{"rendered":"<p><strong>Credit to Author: Herain Oberoi| Date: Tue, 20 Feb 2024 17:00:00 +0000<\/strong><\/p>\n<p>The Network and Information Security Directive 2 (NIS2) is a continuation and expansion of the previous European Union (EU) cybersecurity directive introduced back in 2016. With NIS2, the EU expands the original baseline of cybersecurity risk management measures and reporting obligations to include more sectors and critical organizations. The purpose of establishing a baseline of security measures for digital service providers and operators of essential services is to mitigate the risk of cyberthreats and improve the overall level of cybersecurity in the EU. It also introduces more accountability\u2014through strengthened reporting obligations and increased sanctions or penalties. Organizations have until October 17, 2024, to improve their security posture before they\u2019ll be legally obligated to live up to the requirements of NIS2. The broadened directive stands as a critical milestone for tech enthusiasts and professionals alike. Our team at Microsoft is excited to lead the charge in decoding and navigating this new regulation\u2014especially its impact on compliance and how cloud technology can help organizations adapt. In this blog, we\u2019ll share the key features of NIS2 for security professionals, how your organization can prepare, and how Microsoft Security solutions can help. And for business leaders, check out our <a href=\"https:\/\/info.microsoft.com\/WE-PGSD-CNTNT-FY24-09Sep-25-Preparing-for-NIS2-3-Guiding-Principles-for-Leaders-SRGCM10905_LP01-Registration---Form-in-Body.html\">downloadable guide for high-level insights<\/a> into the people, plans, and partners that can help shape effective NIS2 compliance strategies.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"nis2-key-features\">NIS2 key features&nbsp;<\/h2>\n<p>As we take a closer look at the key features of NIS2, we see the new directive includes risk assessments, multifactor authentication, security procedures for employees with access to sensitive data, and more. NIS2 also includes requirements around supply chain security, incident management, and business recovery plans. In total, the comprehensive framework ups the bar from previous requirements to bring:&nbsp;<\/p>\n<ul>\n<li>Stronger requirements and more affected sectors.<\/li>\n<li>A focus on securing business continuity\u2014including supply chain security.<\/li>\n<li>Improved and streamlined reporting obligations.<\/li>\n<li>More serious repercussions\u2014including fines and legal liability for management.<\/li>\n<li>Localized enforcement in all EU Member States.&nbsp;<\/li>\n<\/ul>\n<p>Preparing for NIS2 may take considerable effort for organizations still working through digital transformation. But it doesn\u2019t have to be overwhelming.&nbsp;<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters material-color-brand-dark\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-1024x577.jpg\" class=\"card-img img-object-cover\" alt=\"logo, company name\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-1024x577.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-768x433.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-1536x865.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-2048x1154.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-615x346.jpg 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-336x189.jpg 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-189x106.jpg 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Security_Blog_Abstract-01-630x354.jpg 630w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>NIS2 guiding principles guide<\/h2>\n<div class=\"mb-3\">\n<p>Get started on your transformation with three guiding principles for preparing for NIS2.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/info.microsoft.com\/WE-PGSD-CNTNT-FY24-09Sep-25-Preparing-for-NIS2-3-Guiding-Principles-for-Leaders-SRGCM10905_LP01-Registration---Form-in-Body.html\" class=\"btn btn-link text-decoration-none p-0\" > \t\t\t\t\t\t\t\t<span>Download the guide today<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"proactive-defense-the-future-of-cloud-security\">Proactive defense: The future of cloud security<\/h2>\n<p>At Microsoft, our approach to NIS2 readiness is a blend of technical insight, innovative strategies, and deep legal understanding. We&#8217;re dedicated to nurturing a security-first mindset\u2014one that&#8217;s ingrained in every aspect of our operations and resonates with the tech community&#8217;s ethos. Our strategy for NIS2 compliance addresses the full range of risks associated with cloud technology. And we&#8217;re committed to ensuring that Microsoft\u2019s cloud services set the benchmark for regulatory compliance and cybersecurity excellence in the tech world. Now more than ever, cloud technology is integral to business operations. With NIS2, organizations are facing a fresh set of security protocols, risk management strategies, and incident response tactics. Microsoft cloud security management tools are designed to tackle these challenges head-on, helping to ensure a secure digital environment for our community.&nbsp;&nbsp;<\/p>\n<p>NIS2 compliance aligns to the same <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust<\/a> principles addressed by Microsoft Security solutions, which can help provide a solid wall of protection against cyberthreats across any organization\u2019s entire attack surface. If your security posture is aligned with Zero Trust, you\u2019re well positioned to assess and help assure your organization\u2019s compliance with NIS2.&nbsp;<\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/image.webp\" alt=\"Diagram conveying the multiple cyber threats across an organizations entire attack surface. \" class=\"wp-image-133347 webp-format\" style=\"width:900px\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/image.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 1. Risks associated with securing an organizations external attack surface.&nbsp;<\/em><\/figcaption><\/figure>\n<p>For effective cybersecurity, it takes a fully integrated approach to protection and streamlined threat investigation and response. Microsoft Security solutions provide just that, with:&nbsp;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Sentinel<\/strong><\/a> \u2013 Gain visibility and manage threats across your entire digital estate with a modern security information and event management (SIEM).&nbsp;<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/extended-detection-response-xdr\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft XDR<\/strong><\/a> \u2013 Stop attacks and coordinate response across assets with extended detection and response (XDR) built into Microsoft 365 and Azure.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Defender Threat Intelligence<\/strong><\/a> \u2013 Expose and eliminate modern threats using dynamic cyberthreat intelligence.&nbsp;<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"next-steps-for-navigating-new-regulatory-terrain\">Next steps for navigating new regulatory terrain&nbsp;<\/h2>\n<p>The introduction of NIS2 is reshaping the cybersecurity landscape. We&#8217;re at the forefront of this transformation, equipping tech professionals\u2014especially Chief Information Security Officers and their teams\u2014with the knowledge and tools to excel in this new regulatory environment. To take the next step for NIS2 in your organization, download our <a href=\"https:\/\/info.microsoft.com\/WE-PGSD-CNTNT-FY24-09Sep-25-Preparing-for-NIS2-3-Guiding-Principles-for-Leaders-SRGCM10905_LP01-Registration---Form-in-Body.html\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2 guiding principles guide<\/a> or reach out to your Microsoft account team to learn more.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>To learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>\u202fBookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/02\/20\/navigating-nis2-requirements-with-microsoft-security-solutions\/\">Navigating NIS2 requirements with Microsoft Security solutions<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/02\/20\/navigating-nis2-requirements-with-microsoft-security-solutions\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Herain Oberoi| Date: Tue, 20 Feb 2024 17:00:00 +0000<\/strong><\/p>\n<p> \u200b\u200bNIS2 is the most comprehensive European cybersecurity directive yet, covering 18 sectors and 160,000+ companies. The Zero Trust principles addressed by Microsoft Security solutions can help you protect your organization and meet NIS2 requirements.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/02\/20\/navigating-nis2-requirements-with-microsoft-security-solutions\/\">Navigating NIS2 requirements with Microsoft Security solutions<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-23972","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23972"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23972\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}