Martin Rylko
  • Services
  • Blog
  • About
  • Contact
  • Get in Touch
Martin Rylko

Senior Cloud Architect & DevOps Engineer. Specializing in Microsoft Azure, IaC, Cloud Security and AI.

Navigation

  • Services
  • Blog
  • About
  • Contact

Collaboration

Looking for an experienced architect for your Azure project? Get in touch.

rylko@cloudmasters.cz

© 2026 Martin Rylko. All rights reserved.

Built in the cloud. Deployed via Azure Static Web Apps.

Home/Blog/NIS2 Azure Compliance: Checklist for Architects
All articlesČíst česky

NIS2 Azure Compliance: Checklist for Architects

9/1/2025 2 min
#Azure#NIS2#Security#Compliance

The NIS2 directive (Network and Information Security Directive 2) is now in effect, and organizations across the EU must demonstrate that they have cybersecurity under control. As a Cloud Architect, I encounter this daily – clients need a clear, practical guide on how to align their Azure infrastructure with NIS2 requirements without having to read hundreds of pages of legislative text.

What Does NIS2 Mean for Your Azure Architecture?

NIS2 expands the scope of obligated entities and tightens requirements for:

  • Risk management – systematic identification and management of risks
  • Incident reporting – reporting incidents within 24 hours
  • Supply chain security – verifying supplier security
  • Business continuity – recovery and continuity of operations plans
  • Encryption & access control – data encryption and access management

Step 1: Azure Policy as the Governance Foundation

The first step is deploying strict Azure Policy definitions that enforce compliance across the entire organization:

resource nis2PolicyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = {
  name: 'nis2-baseline'
  properties: {
    displayName: 'NIS2 Baseline Security Controls'
    policyDefinitionId: '/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8'
    enforcementMode: 'Default'
    parameters: {
      // Enforce storage account encryption
      storageAccountsEncryption: { value: 'Audit' }
      // Enforce HTTPS on web apps
      webAppsHttps: { value: 'Deny' }
    }
  }
}

Step 2: Defender for Cloud – CSPM at Maximum

Microsoft Defender for Cloud is an absolute must-have. I recommend activating:

  1. Defender CSPM (Cloud Security Posture Management) – detects misconfigurations
  2. Defender for Servers – protects VM workloads
  3. Defender for Key Vault – monitors access to secrets
  4. Defender for DNS – detects suspicious DNS activity

Your Secure Score should be at least 80% to meet the NIS2 baseline.

Step 3: Centralized Logging and SIEM

NIS2 requires the ability to detect and report security incidents. In Azure, we solve this with:

  • Azure Monitor + Log Analytics Workspace – centralized log collection
  • Azure Sentinel (Microsoft Sentinel) – SIEM/SOAR platform
  • Diagnostic Settings – enabled on all critical resources
# Enable diagnostics for Key Vault
az monitor diagnostic-settings create \
  --resource "/subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.KeyVault/vaults/{vault}" \
  --name "nis2-logging" \
  --workspace "/subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.OperationalInsights/workspaces/{law}" \
  --logs '[{"categoryGroup": "allLogs", "enabled": true}]' \
  --metrics '[{"category": "AllMetrics", "enabled": true}]'

Step 4: Identity & Access Management

Zero Trust architecture is critical for NIS2:

  • Entra ID Conditional Access – MFA for all administrators
  • PIM (Privileged Identity Management) – just-in-time access
  • Access Reviews – quarterly permission audits
  • Break-glass accounts – emergency accounts with monitoring alerts

Conclusion

NIS2 compliance in Azure is not just about ticking checkboxes. It's about building a truly secure, monitored, and resilient infrastructure. Start with Azure Policy and Defender for Cloud – these two tools will cover the majority of the directive's technical requirements. For hands-on CSPM implementation, see our Defender for Cloud setup guide.

Need help implementing NIS2 in your Azure environment? See our Cloud Security and NIS2 consulting services or reach out for a free assessment.

Tags:#Azure#NIS2#Security#Compliance
LinkedInX / Twitter

About the author

Martin Rylko

Martin Rylko

Senior Cloud Architect & DevOps Engineer

14+ years in IT – from on-premises datacenters and Hyper-V clustering to cloud infrastructure on Microsoft Azure. I specialize in Landing Zones, IaC automation, Kubernetes and security compliance.

Email LinkedInFull profile

Frequently Asked Questions

How do I know if NIS2 applies to my organization?▾
NIS2 applies to "essential" entities (energy, transport, banking, health, digital infrastructure) and "important" entities (postal services, manufacturing, food, digital providers) with 50+ employees or EUR 10M+ annual turnover within the EU. If you are a managed service provider or cloud provider, NIS2 likely applies regardless of size. Check Article 2 and Annexes I/II of the directive for the full scope.
Which Azure compliance certifications help demonstrate NIS2 compliance?▾
Azure holds ISO 27001, ISO 27017, ISO 27018, SOC 2 Type II, and C5 (German cloud security) certifications. These provide evidence for NIS2 Article 21 requirements around risk management and security measures. However, Azure certifications cover the platform -- you still need to demonstrate your own configuration, access controls, and incident response processes meet NIS2 obligations.
What audit trail requirements does NIS2 mandate for cloud infrastructure?▾
NIS2 Article 21 requires organizations to maintain logs of security-relevant events, detect incidents within reasonable timeframes, and report significant incidents to national authorities within 24 hours (initial notification) and 72 hours (full report). In Azure, this means enabling Azure Activity Log export to Log Analytics, configuring Diagnostic Settings on all critical resources, and retaining logs for at least 12 months.
Can I use Azure built-in tools for NIS2 compliance or do I need third-party solutions?▾
Azure native tools cover most NIS2 requirements: Defender for Cloud CSPM for continuous posture monitoring, Microsoft Sentinel for incident detection and response, Azure Policy for governance enforcement, and Entra ID Conditional Access for identity security. Third-party tools add value for specific areas like vulnerability scanning (Qualys, Tenable) or compliance reporting automation, but are not strictly required.

You might also like

Microsoft Defender for Cloud: CSPM Setup Guide

Configure Microsoft Defender for Cloud CSPM for Azure Landing Zones. Secure Score optimization, attack path analysis, regulatory compliance dashboards, and real cost breakdown.

Read

Zero Trust Azure: Conditional Access Policy Design

Design Zero Trust identity architecture with Entra ID Conditional Access policies. MFA enforcement, device compliance, session controls, and named locations for Azure environments.

Read

Azure Landing Zone Governance: Policy at Scale

Implement Azure Policy governance for Landing Zones at scale. Custom policy definitions, initiative assignments, compliance dashboards, and cost management guardrails.

Read