Skip to content

Cybersecurity measures

NIS2 cybersecurity measure obligations are implemented in Modulos as a two-layer model:

  • governance and accountability at organization level (OFF-15)
  • execution evidence at AI-system level (MFF-15)

Organization-level governance requirements (OFF-15)

RequirementTopicDirective reference
ORF-286Management body approval and oversightArt. 20(1)
ORF-287Management body cybersecurity trainingArt. 20(2)
ORF-288Proportionate cybersecurity risk-management governanceArt. 21(1)-(3)
ORF-322Risk analysis and information-system security policy governanceArt. 21(2)(a)
ORF-323Incident handling governanceArt. 21(2)(b)
ORF-324Continuity, backup, disaster recovery and crisis governanceArt. 21(2)(c)
ORF-325Supply-chain security governanceArt. 21(2)(d), 21(3)
ORF-326Secure acquisition, development and maintenance governanceArt. 21(2)(e)
ORF-327Cybersecurity measure effectiveness governanceArt. 21(2)(f)
ORF-328Cyber hygiene and cybersecurity training governanceArt. 21(2)(g)
ORF-329Cryptography and encryption policy governanceArt. 21(2)(h)
ORF-330HR security, access-control and asset-management governanceArt. 21(2)(i)
ORF-331MFA, continuous authentication and secured communications governanceArt. 21(2)(j)
ORF-297Corrective action obligation for cybersecurity measure non-complianceArt. 21(4)
ORF-299Certified ICT use obligation governanceArt. 24(1)-(3)

AI-system implementation requirements (MFF-15)

RequirementTopicDirective reference
MRF-255AI system risk analysis and security policiesArt. 21(2)(a)
MRF-256AI system incident handlingArt. 21(2)(b)
MRF-257AI system continuity, backup, disaster recovery and crisis operationsArt. 21(2)(c)
MRF-258AI system supply chain securityArt. 21(2)(d), 21(3)
MRF-259Secure lifecycle and vulnerability handlingArt. 21(2)(e)
MRF-260Cybersecurity measure effectiveness testingArt. 21(2)(f)
MRF-261Operational cyber hygiene and role-based trainingArt. 21(2)(g)
MRF-262Cryptography and encryption controlsArt. 21(2)(h)
MRF-263HR security, access control and asset managementArt. 21(2)(i)
MRF-264MFA, continuous authentication and secured communicationsArt. 21(2)(j)
MRF-270AI system corrective action workflow for cybersecurity non-complianceArt. 21(4)
MRF-273Certified ICT and qualified trust service implementationArt. 24(1)-(2)

Control reuse strategy

NIS2 controls are designed to reuse existing control baselines where possible (notably ISO/IEC 27001 mappings) while preserving NIS2-specific evidence flows for prescriptive timing and governance obligations.

Disclaimer

This page is for general informational purposes and does not constitute legal advice.