Compliance Framework

NIS2 Directive — EU cybersecurity requirements, in the code.

The EU NIS2 Directive expanded mandatory cybersecurity requirements to a much broader range of organizations operating in the EU. Article 21 requires "appropriate and proportionate technical measures" — including secure software development practices. MergeGuide enforces these requirements at the code layer.

Who NIS2 affects

NIS2 (Directive 2022/2555) expanded the scope of the original NIS Directive to cover essential and important entities across 18 sectors — including digital infrastructure, ICT service management, and digital service providers. Organizations operating in or supplying to EU-regulated sectors must demonstrate compliance with Article 21 cybersecurity measures.

Unlike its predecessor, NIS2 imposes personal liability on management for cybersecurity failures and requires systematic risk management including supply chain security. Software suppliers to NIS2-covered entities face increasing audit and contractual requirements.

MergeGuide includes policies that guide implementation of NIS2 Article 21 technical requirements — detecting code-level security vulnerabilities that would constitute failures of the "appropriate technical measures" requirement.

Article 21 technical measure coverage

MergeGuide templates cover key NIS2 Article 21 technical measures at the code level:

  • Art. 21(2)(a) — Policies on risk analysis: code-level risk detection patterns
  • Art. 21(2)(b) — Incident handling: audit logging for security-relevant code events
  • Art. 21(2)(e) — Supply chain security: dependency vulnerability detection
  • Art. 21(2)(f) — Security in network and information systems acquisition: secure SDLC enforcement
  • Art. 21(2)(g) — Policies on cybersecurity risk management: OWASP and NIST-mapped detection
  • Art. 21(2)(h) — Basic cyber hygiene and training: code hygiene enforcement at commit time

NIS2-relevant detection patterns

NIS2 Requirement What MergeGuide Detects Severity
Art. 21(2)(f) — Secure acquisitionSQL injection and command injection patterns in application codeCritical
Art. 21(2)(f) — Secure acquisitionHardcoded credentials and secrets in source codeCritical
Art. 21(2)(g) — Risk managementInsecure cryptography — deprecated algorithms and weak key handlingHigh
Art. 21(2)(g) — Risk managementData transmitted without encryption or using deprecated TLSHigh
Art. 21(2)(b) — Incident handlingMissing audit logging on security-relevant application eventsHigh
Art. 21(2)(h) — Cyber hygieneDebug mode enabled, missing security headers, insecure defaultsMedium
Art. 21(2)(e) — Supply chainKnown-vulnerable dependency patterns detectable in application codeHigh
🇪🇺

NIS2 + GDPR alignment

NIS2 and GDPR share substantial overlap in technical security requirements — both require appropriate technical measures for data protection and security. MergeGuide's PolicyMerge resolves overlapping controls, letting teams satisfy both frameworks with a single assessment.

📋

Evidence for regulators

NIS2 requires organizations to demonstrate that cybersecurity measures are in place and operational. MergeGuide generates signed evidence artifacts at every code evaluation — providing the documentation required to demonstrate continuous operation of Article 21 measures.

🔗

Supply chain compliance

NIS2 Article 21(2)(e) specifically addresses supply chain security. Software vendors supplying to NIS2-covered entities can demonstrate security posture via MergeGuide evidence artifacts — satisfying customer audit requirements and vendor security questionnaires.

Operating in EU-regulated sectors?

See how MergeGuide enforces NIS2 Article 21 technical measures and generates compliance evidence in a live demo.

Book a demo Talk to sales