Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
The magazine > Transposition of NIS2: what does the bill on the resilience of critical infrastructures and the strengthening of cybersecurity contain?
Published on 04/17/2024 by Laure Martin-Tervonen, Brand and Public Affairs Director at Cloud Temple

The draft law transposing NIS2 has been submitted to the Senate for its first reading. Called "Resilience", the bill aims to build a comprehensive framework by also transposing two other European directives: the Directive on the Resilience of Critical Entities (REC) and the Directive on Digital Operational Resilience (DORA). Focus on the provisions of the text relating to NIS 2.

Three directives transposed into a single piece of legislation. This is the ambition of the bill presented on 15 October 2024, which aims to put in place a comprehensive and coherent policy on the resilience of vitally important activities, critical infrastructure protection, cybersecurity and the digital operational resilience of the financial sector. 

Simplification, harmonisation and proportionality

ANSSI is taking the opportunity presented by this bill to simplify IS security rules, by limiting the stacking of regulatory requirements. It is taking care to ensure that future rules remain proportionate, in terms of the requirements imposed and the penalties.

Extending the scope of entities to resist the cyber threat

In response to the rapid evolution and intensification of the cyber threat, the European NIS 2 directive, which succeeds NIS 1, aims to significantly raise cybersecurity standards across the European Union. It covers a wider range of entities and sectors. In France, 10,000 public and private entities are targeted and at least 18 sectors are affected. The directive includes sectors linked to electrical and digital infrastructures, health and transport, but it also includes sectors that were previously outside the scope, such as education, agri-food, public administration and digital service providers. At the same time, the text broadens the scope of the information systems to be secured, applying to all the IS of the targeted entities, and not just their essential IS.

Essential and important: two levels of regulated entities

The principle of proportionality involves the creation of two categories of entities, classified according to their degree of criticality, their size and - for companies - their turnover. The text distinguishes between "essential entities" and "important entities". The former, which are already familiar with security constraints because of their criticality, are subject to stricter standards, while the latter are subject to basic requirements aimed at improving their digital hygiene without incurring disproportionate costs. ANSSI has set up a portal to enable entities to find out whether they are regulated and, if so, to which category they belong. The portal helps the entities concerned to implement their 3 major obligations: providing information to ANSSI, implementing appropriate risk management measures and reporting any cybersecurity incidents. 

Four safety objectives

The entities concerned must implement measures to guarantee a level of security that is appropriate and proportionate to the existing risk. The set of requirements currently being developed is based on security objectives organised around four key areas:

  • Set up ad hoc governance to ensure that cyber risk is taken into account at the highest level of the organisation
  • Implement IS protection measures
  • Defence capabilities to speed up response to incidents and limit their impact
  • Develop resilience capabilities to facilitate business continuity and recovery

Highly dissuasive penalties

A system of penalties is also provided for, aligned with high standards similar to those of the RGPD, with fines of up to 2 % of worldwide turnover for essential entities and 1.4 % for important entities. These measures are intended to deter breaches and encourage investment in cybersecurity, thereby reflecting the ever-increasing real cost of cyber attacks. However, public administrations and local authorities will be exempt from penalties.

A gradual, collaborative approach to implementation

Numerous preliminary consultations were held to define the requirements, with professional federations, local authorities and ministries. The timetable for the entry into force of the new obligations will be staggered to give the targeted players time to comply. Lastly, ANSSI will provide regulated entities with a range of services to help them achieve the required level of protection in a gradual approach.

The special case of local authorities

Taking into account the vulnerability of local and regional authorities, which account for 17% of all cyber incidents handled by ANSSI, the bill includes them in the scope of NIS2. The aim is to put in place a proportionate approach, tailored to the maturity and resources of local authorities. 
In all, 661 local authorities or groupings should be concerned as essential entities: 22 regions, 97 départements, 263 metropolises and 279 communes with more than 30,000 inhabitants. The 992 communities of communes will also be affected as major entities. 
Their need for support and guidance has been taken into account: the cybersecurity pathways set up as part of France Relance will be accelerated. A transition budget will also be envisaged, to finance the estimated average cost of €400,000 required to bring a local authority into cyber compliance.

Bill agenda

During his opening speech at the Assises de la Sécurité conference in Monaco, Mr Strubel, Director General of the ANSSI, declared: "On 17 October, nothing will happen", referring to the deadline given to Member States to transpose the NIS2 directive.
Against this backdrop, the bill on the resilience of critical infrastructures and the strengthening of cybersecurity was submitted to the Senate on 15 October 2024 by three ministers: Antoine Armand (Economy, Finance and Industry), Patrick Hetzel (Higher Education and Research) and Clara Chappaz (Secretary of State for Artificial Intelligence and the Digital Economy).
As a result of the accelerated procedure initiated by the government, the examination of this text by Parliament will be limited to a single reading by each chamber, thus increasing the pressure on deadlines.

Article updated on 17 December 2024

The magazine
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.