Kiteworks and NIS 2 Directive Reduce Cyber Risk
Kiteworks helps businesses demonstrate NIS 2 compliance through a single platform that simplifies the protection and management of sensitive content communications, while enabling organizations to enforce security and compliance policies using a content-defined zero trust approach.
Kiteworks and NIS 2 Directive
Reduce Cyber Risk
Essential Service and Online Marketplace
Organisations: Achieve NIS 2 Compliance
and Secure Your Content
The European Union (EU) has proposed the NIS 2 Directive, an EU-wide regulatory framework for managing Information and
Communications Technology (ICT) risks and cyber threats in the essential services and online marketplace sectors. Kiteworks
reduces complexity through a single platform to protect and manage content communications while providing transparent
visibility to help businesses demonstrate NIS 2 compliance.
The proposed regulation would require financial entities to ensure the security of their ICT systems and networks and to report
major incidents to relevant authorities. It would also establish a coordinated EU-wide approach to cybersecurity and incident
response, with national competent authorities responsible for oversight and enforcement. NIS 2 will apply to EU organizations
with more than 50 employees and an annual turnover in excess of $10M and any organization that was previously included in
the NIS Directive. Kiteworks and a Kiteworks-enabled Private Content Network, deployed on-premises, in the cloud, or hybrid,
directly support your ability to be compliant in your sensitive file and email data that you communicate internally and externally.
Enforce Compliance With Information System Security Policies
Kiteworks allows customers to standardize security policies across email, ﬁle sharing, mobile, MFT, SFTP, and more with the ability
to apply granular policy controls to protect data privacy. Admins can deﬁne role-based permissions for external users, thereby
enforcing NIS 2 compliance consistently across communication channels.
Handle Incidents With Efficiency
Anomaly detection allows for immediate insight into unauthorized access. AI technology detects suspicious events, such as
possible exﬁltration, and sends an alert via email and audit logs. Through the platform’s immutable audit logs, organizations can
trust that attacks are detected sooner and maintain the correct chain of evidence to perform forensics. This enables efﬁcient
mandatory reporting of any data violations to the Computer Security Incident Response Team (CSIRT) or, if needed, to the
European Union Agency for Cybersecurity (ENISA) in a timely manner per the Directive.
Support Business Continuity With Kiteworks’ Built-in Disaster Recovery
Maintain accurate records of all activities and technical data with user-friendly tracking displays, allowing audit logs to serve the
dual purpose of ensuring that an organization can investigate data breaches and provide evidence of compliance during audits.
In the event of a breach, this grants an organization the ability to see exactly what was exﬁltrated so that they can get to work
immediately on disaster recovery and continue their day to business while maintaining compliance.
Kiteworks and NIS 2 Directive Reduce Cyber Risk COMPLIANCE BRIEF
Copyright © 2023 Kiteworks. Kiteworks’ mission is to empower organizations to effectively manage risk in every send, share, receive, and
save of sensitive content. The Kiteworks platform provides customers with a Private Content Network that delivers content governance,
compliance, and protection. The platform uniﬁes, tracks, controls, and secures sensitive content moving within, into, and out of their
organization, signiﬁcantly improving risk management and ensuring regulatory compliance on all sensitive content communications.
Manage Vulnerabilities in Development and Maintenance
Kiteworks enforces a strict secure software development life cycle including extensive security code reviews, regular penetration
testing, and a bounty program to keep your data protected. An embedded network ﬁrewall and WAF, zero-trust access, and
minimized attack surface all work to signiﬁcantly reduce security risk. Kiteworks also manages one-click updates for customers
that have been tested for compatibility of the patch with other system components, allowing timely patches to the operating
system, databases, and open-source libraries.
Define and Enforce Basic Cyber Hygiene Practices
ISO has validated Kiteworks to effectively protect your sensitive content from cyber risk (ISO 27001), including when deployed as a
cloud service (ISO 27017), and to shield your organization from damaging leaks of personally identiﬁable information (PII) as validated
by ISO 27018. In addition, Kiteworks has a library of compliance certiﬁcations, including being SOC 2 compliant and SOC 2 certiﬁed.
These certiﬁcations, along with the single-tenant architecture and multilayered hardening, continue to validate Kiteworks’ ability to
mitigate content risk with the content management system and keep your basic cyber hygiene practices within NIS 2 compliance.
Protect Content With Encryption
Ensure volume and ﬁle level encryption of all content at rest (with AES-256 encryption) and TLS encryption in transit to protect
content from unauthorized access, data corruption, and malware. Flexible encryption allows customers to use Kiteworks’ end-to-end
encryption and bridge to partners with different standards such as OpenPGP, S/MIME, and TLS. Kiteworks’ secure email provides
encryption and uniform security controls with an email protection gateway, ensuring only authenticated users can read messages.
Establish Access Control Policies and Asset Management
Kiteworks admins set up granular controls to protect sensitive content and enforce compliance policies, enabling business owners
to easily manage content, folders, invitations, and access controls to ensure NIS 2 compliance of all content. Access control can be
further managed within compliance with geofencing, app enablement, ﬁle type ﬁltering, and email forwarding control.
Verify Users With Multi-factor Authentication
Apply granular MFA and SSO policies by role and location utilizing RADIUS, SAML 2.0, Kerberos, authenticator apps, PIV/CAC, SMS,