Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
Toutes nos fiches > NIS2, in plain text
Published on 03/27/2025

THE FACTS

After the deadline of 17 October 2024, the transposition of the NIS2 directive continues to mobilise the ANSSI. Essential and important entities must already comply with articles 20 and 21, which require structured IT security governance, robust technical measures and an incident management system.

THE CONTEXT

The NIS2 Directive represents a major step forward for European cybersecurity, replacing and strengthening the first version of 2016. It considerably broadens the scope of the organisations concerned and imposes stricter security measures: reinforced governance, robust technical protection and incident management.

The aim is to establish a high, harmonised level of cyber security within the European Union.

THE PILLARSWHAT IMPACT?
Security governanceInformation security governance requires a number of initiatives
cross-functional: defining roles with a safety manager, establishing
of a PSSI, mapping of IS and service providers, risk management with
regular analyses, compliance audits and the integration of the
safety in HR management, in particular through employee training.
Technical protection measuresTechnical protection measures complement the organisational aspect by
maintenance of security conditions, physical access control, management of the
securing the IS architecture and remote access, deploying
anti-malware solutions, hardening of configurations, strict management
and the implementation of business continuity systems.
Handling incidentsSecurity incidents are inevitable, so the organisation needs to have a
comprehensive response system. This is based on three pillars: a system of
SIEM detection supervised by a SOC, a response capability via a CERT
or outsourced, and crisis management procedures that have been tried and tested
periodic exercises.
ANALYSIS
Giuliano Ippoliti, Director of Cybersecurity at Cloud Temple

The NIS 2 Directive affirms Europe's geopolitical ambitions in cybersecurity. By extending its scope and harmonising requirements between Member States, Europe is strengthening its collective resilience in the face of cyber threats. This regulatory framework establishes demanding standards enabling the continent to develop strategic autonomy in an area hitherto dominated by the American and Chinese powers.

WHO MUST COMPLY WITH NIS2?

The NIS2 directive applies to a wide range of organisations, which fall into two categories:
essential entities (energy, transport, health, digital infrastructure) and important entities (food industry, waste management, postal services, manufacturing).

It concerns thousands of entities in more than eighteen sectors, from public administrations to private companies, from SMEs to major groups.


Receive the latest cloud news
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.