Related Posts
小型企业选择门禁控制系统的 7 大标准
中小企业访问系统评估详解, 从成本和安全性,到支持和扩展性。
By now, you’ve probably heard about the Network and Information Security 2 (NIS2) Directive, the European Union (EU) legislation that aims to strengthen cybersecurity and protect critical infrastructure.
By October 17, 2024, NIS2 requirements will have to be transposed into the national laws of EU member states — and companies within those states will have to comply with its requirements or face steep fines. Though states don’t need to define which entities fall under the directive until April 17, 2025, most affected organizations are already aware of their status and should start crafting compliance strategies before then.
How can you ensure that your organization is prepared for NIS2 compliance? In this article, we’ll review the new directive’s requirements, focusing on the terms it sets for one of the most effective tools for preventing network intrusions: multi-factor authentication (MFA).
The NIS2 Directive was designed to build upon and modernize the legal framework first articulated in the original NIS Directive — European Union legislation that aims to improve network security and increase the resilience of critical infrastructure and essential services.
Changes to NIS include:
Introduced in 2020, NIS2 went into effect on January 16, 2023, though it gave member states until October 2024 to incorporate the requirements into their respective national laws.
NIS2 requires entities to implement certain baseline security measures, from cryptography to cybersecurity training. It also highlights the importance of robust identity and access management. Proceeding from an “all-hazards approach” that seeks to address a wide range of threats rather than individual ones, it specifies that organizations should:
“Use multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.”
MFA mitigates risk by providing an additional layer of security if a password has been breached (which happens with unnerving regularity). To determine where it’s needed, NIS2 asks organizations to assess their specific exposure to risk. Where would a breach be likely to result in a critical threat? And which type of MFA is most likely to prevent that type of breach?
According to Verizon research, MFA “goes a long way toward mitigating [credential] attacks.” However, there are a lot of different MFA solutions on the market. They range from straightforward but less secure methods like SMS authentication to highly secure passwordless methods like PKI and FIDO technology using passkeys. The kind of MFA that best fits depends on each organization’s infrastructure, needs, user preferences and budget. There are also certain constraints that companies need to address when implementing MFA, e.g. employees are not happy to use their personal mobile phones for work. The goal: to select safeguard data without standing in the way of mission-critical tasks.
Indeed, NIS2 access control and authentication requirements give organizations a much-needed opportunity to evaluate their end-to-end security journeys. A lot goes into this journey, from the systems that enable administrators to manage access to physical and digital resources to the form factors that employees use to authenticate. Adding MFA represents a chance to strengthen security without changing the way users work.
NIS2 sets strict standards for ensuring supply chain security. That’s because smaller companies are increasingly common attack targets due to their limited security resources — and because those attacks often have cascading effects on larger enterprises. In fact, according to Verizon, 15% of network breaches were caused by vulnerabilities in partner infrastructure.
IBM, meanwhile, found that third-party and supply chain breaches increased the average cost of an attack by as much as $260,000 per incident.
To avoid supply chain related liabilities and penalties, companies must keep a constant and efficient overview of their suppliers. When it comes to authentication and identification, that means strengthening the Operational Technology (OT) environments that typically control manufacturing processes.
Here, too, MFA is a powerful solution — one recommended as best practice by the International Society of Automation (ISA) Global Cybersecurity Alliance. Extending MFA and access policies to OT resources enables organizations to secure and monitor systems that could not be protected before.
Even though organizations agree on the importance of NIS2 compliance, our research shows that at least a third of them still have little to no implementation. HID has decades of experience designing MFA solutions for the highly-regulated industries that are covered by NIS2, from healthcare to government. That experience enables us to design end-to-end security solutions that enable you to comply with the new regulations and support your business goals.
Our MFA solutions encompass:
HID’s authentication and identity experts support each project to ensure that it powers productivity with efficiency and ease. Thanks to our award-winning physical access control technologies, we can also help you integrate MFA into broader security systems — and offer converged credentials that enable employees to unlock doors, data and business applications through a single ID badge.
The landscape of cyberthreats is enormous and complex, but compromised credentials are still the most common launch point for cyberattacks. That’s what makes MFA so important — not just for complying with NIS2 but to avoid the staggering expense and reputational damage that come with a successful network breach.
Don’t let MFA stand in your way. Request your sample today >>