Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Detection
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
Sovereign SOC
A sovereign SOC offering operated 24/7, deployable from our marketplace, on SecNumCloud-qualified infrastructure.
Protection
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
The magazine > 18 essential points to anticipate NIS2 compliance 
Published on 03/11/2024 by Giuliano Ippoliti, Director of Cybersecurity at Cloud Temple

As the fateful date of 17 October 2024 approaches, ANSSI is continuing its work to adapt and implement the requirements of the NIS2 Directive in the French context. Without waiting for the details of the new obligations and compliance monitoring processes that will be put in place by the legislator, the essential and important entities in the many sectors covered by the European directive must take the lead.  

Articles 20 and 21 of NIS 2 set out a series of measures with which companies and public authorities will have to comply. They cover the implementation of an information security governance system, the deployment of technical protection measures and the establishment of a system for dealing with security incidents.

Security governance

In terms of governanceIn order to master information security, a number of essential projects need to be put in place, which have a cross-functional impact on the entire organisation. 

  1. Definition of roles and responsibilities, in particular through the appointment of a safety officer, ideally reporting to general management 
  1. Establishment of a body of security policies, processes and procedures, the centrepiece of which is the Information Systems Security Policy (ISSP) 
  1. Mapping of the information system in terms of activities and services, and identification of support assets (servers, networks, applications, etc.) 
  1. Mapping of service providers and suppliers, a prerequisite for monitoring their level of security 
  1. Implementation of safety risk management, through regular risk analyses, with acceptance of residual risks by senior management 
  1. Regular audits to verify the effectiveness of security measures and compliance with applicable regulations 
  1. Taking safety into account in HR management, with particular attention to employee training and awareness, and the proper management of arrivals and departures 

Technical protection measures

These organisational measures are essential, but remain insufficient if they are not complemented by robust technical protection measures. 

  1. Maintaining systems in secure conditions, by implementing security monitoring and vulnerability management processes 
  1. Controlling physical access to premises, with the deployment of modern access control and alarm systems 
  1. Securing the architecture of the information system, with specific attention paid to interconnections with third-party networks, and to partitioning according to the sensitivity of the different zones 
  1. Secure remote access and administration by deploying multi-factor authentication, and bastions management 
  1. Deployment of malicious code protection solutions in different layers: EDR, IDS, IPS, WAF 
  1. Hardening of configurations, with the aim of reducing the attack surface as much as possible, while ensuring that systems and applications are easy to use 
  1. Secure identity and access management, based on the principle of least privilege, which requires strict management of authorisations and regular reviews. 
  1. Implementation of measures for business continuity and recovery, based on reliable backups, ideally offline  

Handling incidents

Because there is no such thing as zero risk, and because attackers are constantly innovating, security incidents are bound to happen. That's why it's vital to have a solid capability for handling security incidents. 

  1. Incident detection, essentially through the deployment of a SIEM, operated by an SOC, possibly outsourced 
  1. Responding to incidents, either by setting up an in-house CERT or by working with a specialist partner 
  1. Cyber crisis management, by defining managerial and operational processes and organising regular exercises 

Naturally, this compliance work is made easier by using trusted service providers, ideally qualified by ANSSI

The magazine
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.