{"id":1377,"date":"2024-04-30T19:20:51","date_gmt":"2024-04-30T17:20:51","guid":{"rendered":"https:\/\/memority.p2.pp-izhak.fr\/2024\/04\/30\/nis2-et-dora\/"},"modified":"2024-07-07T23:31:44","modified_gmt":"2024-07-07T21:31:44","slug":"nis2-and-dora","status":"publish","type":"post","link":"https:\/\/memority.p2.pp-izhak.fr\/en\/nis2-and-dora\/","title":{"rendered":"NIS2 and DORA"},"content":{"rendered":"<p class=\"has-text-align-left\">As cyberattacks become increasingly frequent and sophisticated, the NIS2 and DORA regulations represent key steps toward better securing digital infrastructures and the financial sector across Europe. At the heart of this compliance effort, effective digital identity management emerges as a major strategic challenge, serving to strengthen the security of organizations.<\/p>\n<h3 class=\"wp-block-heading\"><strong>NIS2 and DORA: framework and objectives<\/strong><\/h3>\n<p>\u2022\u00a0<strong>NIS2 \u2013 Directive on the Security of Network and Information Systems<\/strong><br \/>\nAdopted to strengthen the level of cybersecurity within the European Union, NIS2 extends security requirements and incident reporting obligations to a larger number of sectors. It also helps harmonize security measures within the EU, thus enhancing resilience against cyberattacks.<\/p>\n<p>\u2022\u00a0<strong>DORA \u2013 Digital Operational Resilience Act<\/strong><br \/>\nThe DORA regulation specifically targets the financial sector. It aims to ensure the digital operational resilience of a sector particularly vulnerable to sensitive digital practices. With new risks and cloud service providers, DORA also seeks to raise the level of security across Europe.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Digital Identity Management: essential for your compliance?<\/strong><\/h3>\n<p>The implementation of NIS2 and DORA, scheduled respectively for October 2024 and January 2025, is now imminent. To meet expected requirements, a controlled, agile, and well-scaled digital access and identity management is a necessary prerequisite to be established within organizations.<\/p>\n<p>\u2022\u00a0<strong>Protection against cyberattacks<\/strong><br \/>\nEffective identity management precisely defines roles, rights, and access. Thus, only authorized users or systems can access a network, an application, etc. This granularity inherently limits unauthorized access, and thus the possibilities of attack. Similarly, in the event of an intrusion, it helps contain the threat quickly and provide an effective and controlled incident response.<\/p>\n<p>\u2022\u00a0<strong>Optimization of detection<\/strong><br \/>\nReal-time analysis of logs and operations ensures an optimal level of control and immediate alerts in case of unusual or suspicious behaviors. The security of operations and interactions is thus reinforced, in accordance with the regulations.<\/p>\n<p>\u2022\u00a0<strong>Demonstration of compliance<\/strong><br \/>\nRegular audits are an essential component of NIS2 and DORA, as is the requirement for rigorous access control to protect sensitive data. In the coming months, organizations will need to demonstrate their compliance. Advanced analyses and reports provided by Identity Factory platforms will justify the processes and various policies (security, log provision, access controls, etc.) implemented.<\/p>\n<h3 class=\"wp-block-heading\"><strong>How to start?<\/strong><\/h3>\n<p>If we\u2019ve convinced you that effective and robust identity management can be at the heart of your compliance strategy for NIS2 and DORA, here are now three practical tips to get started!<\/p>\n<p>\u2022\u00a0<strong>Mapping your access and data<\/strong><br \/>\nNIS2 and DORA require strict access control to protect critical infrastructures. Establishing \u2013 or validating if it already exists \u2013 a precise mapping of access and identities, based on their importance and sensitivity, will allow you to:<br \/>\n-&gt; build (or confirm) your identity management and access level policy (especially regarding sensitive data)<br \/>\n-&gt; deploy a strategy consistent with your challenges and meeting new European requirements, thanks to an IDaaS solution \u2013 particularly an Identity Factory<\/p>\n<p>\u2022\u00a0<strong>Deploy an Identity Factory approach<\/strong><br \/>\nUsing an Identity Factory solution is a strategic imperative in your compliance effort.<br \/>\nIt allows you to:<br \/>\n-&gt; protect by granting access based on the principle of least privilege<br \/>\n-&gt; recertify authorizations<br \/>\n-&gt; adapt access control based on risk<br \/>\n-&gt; use strong authentication technologies (MFA)<br \/>\n-&gt; view accesses and identities as a wholehave real-time tracking and reporting of your activity<br \/>\nThe Identity Factory ensures that only authorized individuals can access critical resources, a central element of NIS2 compliance.<\/p>\n<p>\u2022\u00a0<strong>Train your employees and partners regularly<\/strong><br \/>\nRegularly educating and training your teams on identity security and access management is crucial. These trainings should disseminate and anchor the best security practices, internal policies, and specific regulatory requirements of NIS2 and DORA. By strengthening the security culture within your organization, you improve both your compliance and your employees\u2019 ability to respond effectively to security incidents.<\/p>\n<h3 class=\"wp-block-heading\"><strong>In conclusion:<\/strong><br \/>\n<strong>Memority, the Identity Factory solution for successful compliance<\/strong><\/h3>\n<p>The Identity Factory Memority offers a unique platform with three complementary services to meet the challenges set up by NIS2 and DORA:<br \/>\n\u2022\u00a0<strong>My-Identity<\/strong>\u00a0to manage the lifecycle of all digital identities (employees, partners, clients, businesses, individuals, citizens, and IoT) while propagating access rights across the information system and verifying compliance at any time<br \/>\n\u2022\u00a0<strong>My-Access<\/strong>\u00a0to manage access to SI applications by offering a seamless and secure experience based on the access context<br \/>\n\u2022\u00a0<strong>My-Keys<\/strong>\u00a0to manage users\u2019 second authentication factors, thus securing your organization<\/p>\n<p>NB: As a supplier and hoster of sensitive data, Memority is also subject to NIS2, as many other companies will be.<\/p>\n<p class=\"has-link-color wp-elements-075215aaa8a82f341d892155255aee0d\">-&gt; To find out more about the benefits of the Memority platform:\u00a0<a href=\"https:\/\/www.memority.com\/\">click here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As cyberattacks become increasingly frequent and sophisticated, the NIS2 and DORA regulations represent key steps toward better securing digital infrastructures and the financial sector across Europe. At the heart of this compliance effort, effective digital identity management emerges as a major strategic challenge, serving to strengthen the security of organizations. NIS2 and DORA: framework and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":852,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[30,31,32,33],"class_list":["post-1377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee","tag-cybersecurity-en","tag-iam-en","tag-idaas-en","tag-identityfactory-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIS2 and DORA - Memority<\/title>\n<meta name=\"description\" content=\"La gestion des identit\u00e9s num\u00e9riques s\u2019impose comme un enjeu strat\u00e9gique majeur \u00e0 la mise en conformit\u00e9 \u00e0 NIS2 et DORA\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 and DORA - Memority\" \/>\n<meta property=\"og:description\" content=\"La gestion des identit\u00e9s num\u00e9riques s\u2019impose comme un enjeu strat\u00e9gique majeur \u00e0 la mise en conformit\u00e9 \u00e0 NIS2 et DORA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/\" \/>\n<meta property=\"og:site_name\" content=\"Memority\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-30T17:20:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-07T21:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"864\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IZHAKxMMRT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IZHAKxMMRT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/\",\"name\":\"NIS2 and DORA - Memority\",\"isPartOf\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg\",\"datePublished\":\"2024-04-30T17:20:51+00:00\",\"dateModified\":\"2024-07-07T21:31:44+00:00\",\"author\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/9f97cf16b7adee7fa0bc6601a89e6f7f\"},\"description\":\"La gestion des identit\u00e9s num\u00e9riques s\u2019impose comme un enjeu strat\u00e9gique majeur \u00e0 la mise en conformit\u00e9 \u00e0 NIS2 et DORA\",\"breadcrumb\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#primaryimage\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg\",\"contentUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg\",\"width\":1536,\"height\":864},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 and DORA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/\",\"name\":\"Memority\",\"description\":\"L&#039;IDaaS europ\u00e9enau service des enjeux business\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/9f97cf16b7adee7fa0bc6601a89e6f7f\",\"name\":\"IZHAKxMMRT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/59a295f44648e448d26bd445107301c715706a4e82d6f1f01736768c71d7f3e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/59a295f44648e448d26bd445107301c715706a4e82d6f1f01736768c71d7f3e7?s=96&d=mm&r=g\",\"caption\":\"IZHAKxMMRT\"},\"description\":\"Deputy CEO Chief of Strategy, Technology, Innovation Co-founder\",\"sameAs\":[\"https:\/\/memority.p2.pp-izhak.fr\"],\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhakxmmrt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 and DORA - Memority","description":"La gestion des identit\u00e9s num\u00e9riques s\u2019impose comme un enjeu strat\u00e9gique majeur \u00e0 la mise en conformit\u00e9 \u00e0 NIS2 et DORA","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"NIS2 and DORA - Memority","og_description":"La gestion des identit\u00e9s num\u00e9riques s\u2019impose comme un enjeu strat\u00e9gique majeur \u00e0 la mise en conformit\u00e9 \u00e0 NIS2 et DORA","og_url":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/","og_site_name":"Memority","article_published_time":"2024-04-30T17:20:51+00:00","article_modified_time":"2024-07-07T21:31:44+00:00","og_image":[{"width":1536,"height":864,"url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg","type":"image\/jpeg"}],"author":"IZHAKxMMRT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"IZHAKxMMRT","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/","url":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/","name":"NIS2 and DORA - Memority","isPartOf":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#primaryimage"},"image":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#primaryimage"},"thumbnailUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg","datePublished":"2024-04-30T17:20:51+00:00","dateModified":"2024-07-07T21:31:44+00:00","author":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/9f97cf16b7adee7fa0bc6601a89e6f7f"},"description":"La gestion des identit\u00e9s num\u00e9riques s\u2019impose comme un enjeu strat\u00e9gique majeur \u00e0 la mise en conformit\u00e9 \u00e0 NIS2 et DORA","breadcrumb":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#primaryimage","url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg","contentUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Nis2-DORA-1536x864-1.jpg","width":1536,"height":864},{"@type":"BreadcrumbList","@id":"https:\/\/memority.p2.pp-izhak.fr\/nis2-et-dora\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/memority.p2.pp-izhak.fr\/en\/"},{"@type":"ListItem","position":2,"name":"NIS2 and DORA"}]},{"@type":"WebSite","@id":"https:\/\/memority.p2.pp-izhak.fr\/#website","url":"https:\/\/memority.p2.pp-izhak.fr\/","name":"Memority","description":"L&#039;IDaaS europ\u00e9enau service des enjeux business","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/9f97cf16b7adee7fa0bc6601a89e6f7f","name":"IZHAKxMMRT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/59a295f44648e448d26bd445107301c715706a4e82d6f1f01736768c71d7f3e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/59a295f44648e448d26bd445107301c715706a4e82d6f1f01736768c71d7f3e7?s=96&d=mm&r=g","caption":"IZHAKxMMRT"},"description":"Deputy CEO Chief of Strategy, Technology, Innovation Co-founder","sameAs":["https:\/\/memority.p2.pp-izhak.fr"],"url":"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhakxmmrt\/"}]}},"_links":{"self":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/comments?post=1377"}],"version-history":[{"count":2,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1377\/revisions"}],"predecessor-version":[{"id":1379,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1377\/revisions\/1379"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media\/852"}],"wp:attachment":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media?parent=1377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/categories?post=1377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/tags?post=1377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}