NIS2Compliance withMicrosoftSecurityand
NIS2isthenewEuropeancybersecuritydirectivethataimstoestablishabaselineofsecuritymeasurestomitigatethethreatof risingcyberattacksandtoimprovetheoveralllevelofcybersecurityintheEuropeanUnion NIS2buildsupontheexistingNIS directiveandwillcomeintoeffectfrom17thOctober2024
Today organisations and facing rising cyber threats with attacks becoming more frequent and more sophisticated. With multicloud environments, remote and hybrid working and increasing devices, organisations need to adopt a modern zero trust strategy. As a result, good cybersecurity hygiene is vital. Whilst this should be a priority for all organisation regardless, NIS2 enforces this at legislation and brings worse repercussions for both organisations and individuals with high fines and managementbeingheldresponsiblefornon-compliance.
NIS2CompliancewithMicrosoft
NIS2Requirements&Objectives
A3:Asset Management Managesecurityrisk
A1: Governance
A4:Supply Chain A2:Risk Management
Protectingagainstcyber attacks
B1:Service Protection Policies& Processes
B3:Data Security
B5:Resilient Networks& Systems
B2:Identity &Access Control
B3:System Security
B6:Staff Awareness& Training
C1:Security Monitoring Detectingcybersecurity incidents
C2:Proactive Security Event Discovery
Minimisingtheimpactof cybersecurityincidents
D1:Response &Recovery Planning
HowMETCLOUD&ChorusMDR&MXDRservicessupportNIS2compliance NIS2objectivesareessentiallysplitintotwoareas:
•
• Prevention:A)ManagingsecurityriskandB)Protectingagainstcyberattacks
D2:Lessons Learned
Response:C)Detectingcybersecurity incidentsandD)Minimisingtheimpactofcybersecurityincidents
AsanMSSPprovidingMDR&MXDRservices,wedetectandrespondtosecuritythreatstohelpminimisetheimpact ofcybersecurityincidents Bypartneringwithus,wehelporganisationsmeetobjectivesC&D
C:Detectingsecurityincidents
C1:SecurityMonitoring
Duringonboarding,wesetupallthenecessary configurationstepswithinyourtenancytocollate logsfromallofyouressentialfunctions Weprovide extensivemonitoringofalluseranddeviceactivity withinyourorganisation Logsarereviewedinrealtimeandalertsareconsistentlyinvestigatedbyour teamofsecurityexperts.
C2:ProactiveSecurity
EventDiscoveryThroughmultiplethreat intelligencefeedsandbehaviouralanalysis,we analysesuspectedattackvectorsandproactively respondtounknownthreatsbeforetheytakeafoot hold METCLOUD&Chorusregularlyperform threathuntingexercisestoprovidecontinuous serviceimprovement
D:Minimisingtheimpactofsecurityincidents
D1:ResponseandRecoveryPlanning
Weuseresponseplaybooksduringincidentinvestigationto containthreatsandlimitthelateralmovementofanattack WhilstMETCLOUD&Chorushaveanextensiveincident responseplan,weworkwithyourorganisationtofeed directlyintoyourIncidentResponseandDisasterRecovery plans.
D2:LessonsLearned AllCSOCrolesaredefinedbyaRACImatrixsosecurity personnelunderstandtheirresponsibilities Afterevery incident,rootcauseanalysisisundertakenbyleadanalysts toassessanyvulnerabilitiesthattheattackerleveraged, whichthenfeedsintoarobustchangemanagement process Notonlyarethetechnicalelementsassessedinthe rootcauseanalysisbutalsopost-incidenttheentireincident timelineisreviewedina“LessonsLearned”meetingto maintainthehighestpossiblelevelofintegrity
NIS2ComplianceMicrosoft
UsingMicrosofttechnologiestohelpmeetNIS2requirements
AsleaderinMicrosoftsecurity,wehelporganisationsmaximisethevaluefromtheirMicrosoftlicensingandensurebestpractice implementationofavailablesecuritytooling OurMDR&MXDRservicesarebuiltonMicrosoftSentinelandMicrosoftDefender XDRandaspartofserviceonboardingwecanalsosupporttheimplementationofthevarioustoolswithinMicrosoft365,which supportwithmeetingtheprincipleswithinB
ThefollowingtableshowswhatMicrosoftsolutionscanbeusedtohelpmeetNIS2principles.
NIS2Principles
Governance
RiskManagement
AssetManagement
SupplyChain
ServiceProtection
Identity&Access
DataSecurity
SystemSecurity
ResilientNetworks
StaffAwareness
SecurityMonitoring
ProactiveSecurity
Response&Recovery
LessonsLearned
DefenderCSPM,Entra
DefenderXDRandPurviewComplianceManagerandInsiderRiskManagement
DefenderCSPM,DefenderforEndpoint
DefenderXDR,EntraandDevOps
DefenderforAPI
Entra
Microsoft365Purview(InformationProtection,DataLossPrevention,InsiderRiskManagement)
DefenderforEndpoint,DefenderforIoTandIntune
AzureNetworkSecurity
O365PhishingSimulation,LearningPaths,PolicyTipsinPurview MicrosoftSentinel
DefenderXDR
ManagedDetection&Response(MDR)or ManagedExtendedDetection&Response (MXDR) DefenderXDR,AzureBackupandRecovery
N/A
WhilstthesesolutionswillhelpyourjourneytoNIS2compliance,itisimportanttonotethattechnologyalonedoesnotmeet theserequirements HavingthecorrectpoliciesandproceduresareacorepartofNIS2complianceandorganisationsneedto coverpeople,processesandtechnologies
Aspartoftheonboardingprocess,wewillcovervariousaspectsofObjectiveB;however,ifwedonotsatisfythe objectiveinitsentirety,wewillbeabletoadviseonhowyoucanachieveit Theelementsoftheonboarding configurationwillcoveraspectssuchas:
IdentityverificationsuchasMulti-FactorAuthentication(MFA)willbeenforced
UserriskandSign-Inriskdependingonthelicense
Dedicatedmanageddevicesandconditionalaccesswillalsoprovideassurancesagainstdevicecompliance
Constantmonitoringofelevatedprivileges
DataSecurity
Wearesecurebydesignandprovidesecureconfigurationsettings
VulnerabilityManagement
NIS2ComplianceMicrosoft
NIS2FAQs
HowdoIbecomeNIS2compliant?Thefirststepistocarryoutaselfassessmentonyourorganisationtounderstandwhereyourweaknesses exist Followingthis,carryoutariskassessmentofthesefindingsand mitigatetheserisksaccordingly Thiswillbeasecurityimprovementjourney inwhichtheorganisationwillliaisewiththeircomplianceauthorityatregular intervals Ifyouneedanyhelpwiththisthenpleasereachouttous IsNIS2applicableintheUK?
NIS2willnotapplytotheUKdirectly,howevertheUKisplanningits ownNISchanges,whichareexpectedin2024
WhereshouldIstartwithmyNIS2journey?
ReachouttoNCSC(NationalCyberSecurityCentre)oryour CertifyingAuthoritytodownloadaselfassessmentform
NIS2comesintoeffect17October 2024.Ifyouwouldliketochatabout howtogetready,pleasereachoutto us
METCLOUDstandsattheforefrontofinnovation,harnessingcutting-edgetechnologies,includingsophisticatedcyberdefense,surveillance, ArtificialIntelligence(AI),andMachineLearning(ML) Thisformidablearsenalempowersorganisationstofortifytheirdigitaldefences,ensuringa secure,resilient,andefficientoperation OurMicrosoftMDR&MXDRServices
AdvancedManagedthreat detectionandcontainmentservice forendpointprotectionwith MicrosoftDefenderforEndpoints
Extendedthreatdetectionand containmentacrossidentity, network,email,infrastructure,data andapplicationsusingMicrosoft securitytooling
Extendedthreatdetection& containmentacrossidentity,network, email,infrastructure,dataand applicationsusingMicrosoftsecurityand thirdpartytooling
Ifyouhaveanyquestionsorwishtofindoutmoreabout ourservices,pleasecontactus.