DuoKey logotype

Compliance

NIS2

Network and information security for essential and important entities, encryption and keys you govern, not just a checkbox.

Talk to us

Requirements

What the regulation expects

NIS2 pushes sectors toward documented cybersecurity risk management, supply-chain oversight, and incident reporting. Encryption is a standard technical measure—but if keys live only inside your operator’s estate, your “measure” is partly theirs. Customer-controlled keys let you enforce *your* policies on who can use keys, from where, and with what logging—so security measures are attributable to the entity on the hook under NIS2.
What the regulation expects

Customer-controlled keys under NIS2

Documented measures matter—custody of keys is part of defensible security, not vendor boilerplate.

Risk management and proportionate measures

You must implement appropriate technical and organisational measures. For sensitive data in SaaS and public cloud, external key management is often proportionate because it reduces operator overreach and jurisdiction risk.

Business continuity and crisis management

Resilience includes maintaining access to critical data *without* depending on a single vendor’s good faith during a crisis. Key custody you control supports orderly recovery and key rotation scenarios.

Supply chain and ICT provider oversight

You remain responsible for critical services even when ICT is outsourced. Cryptographic separation limits how much trust you must place in any one provider.

Solutions

Relevant DuoKey products

OpenBAO + DuoKey SD-HSM

Standardise how applications and cloud services consume keys under governance you define.

Learn more
AWS XKS & hybrid KMS patterns

Bind AWS encryption to keys materialised outside the cloud’s core trust boundary.

Learn more
Microsoft 365 advanced encryption

Customer Key and DKE for tenants that need keys off Microsoft’s administrative plane.

Learn more
Salesforce Cache-Only / BYOK-style patterns

Keep key fragments or operational modes where the app vendor never holds usable keys alone.

Learn more

Key themes

Where customer-controlled keys fit

DuoKey enables essential and important entities to demonstrate proportionate technical measures by placing encryption key governance under your organisation's control — not the cloud operator's.

Article 21-style measures (technical & organisational)

Pair encryption at rest and in transit with key governance you can document, test, and audit.

Incident handling readiness

Key disablement, rotation, and break-glass procedures you control support response playbooks.