{"id":2878,"date":"2024-03-04T12:39:49","date_gmt":"2024-03-04T12:39:49","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2878"},"modified":"2026-04-08T14:59:13","modified_gmt":"2026-04-08T13:59:13","slug":"nis2-zero-trust","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/","title":{"rendered":"Zero Trust and NIS2: Is it the Answer?"},"content":{"rendered":"\n<p><strong>NIS2 shifts cybersecurity conversations from a pure technical focus towards cybersecurity being a critical business requirement. By outlining a variety of requirements for Basic Cyber Hygiene, the directive highlights some factors that make adopting <a href=\"https:\/\/cwsisecurity.com\/principles-of-zero-trust-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust<\/a> Architecture more compelling. Let\u2019s have a closer look at how a Zero Trust <a href=\"https:\/\/cwsisecurity.com\/future-it_architecture\/\" target=\"_blank\" rel=\"noreferrer noopener\">Architecture<\/a> can help you deliver on your <a href=\"https:\/\/cwsisecurity.com\/5-key-requirements-for-nis2-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2 compliance<\/a> posture.<\/strong><\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The surge in digital transformation, over the last number of years, has led to organisations managing ever escalating amounts of data. Additionally, external collaborators, such as partners, vendors, and customers, typically require access to some of this information from outside of the corporate network. <\/p>\n\n\n\n<p>This is a shift that has created a complex data landscape, especially when you consider the proliferation of hybrid working, increased adoption of cloud computing, growing complexity of cyberthreats, and now changing regulatory requirements of how corporate data needs to be governed and protected.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Website-landscape-images-7.png\" alt=\"paper boats on blue background\" class=\"wp-image-2554\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Facing this new, dramatically different reality, the <a href=\"https:\/\/cwsisecurity.com\/nis2-implications-for-europe-and-beyond\/\" target=\"_blank\" rel=\"noreferrer noopener\">European Union\u2019s NIS2 requirements<\/a> forces organisations to reflect on the shortcomings of traditional perimeter-based security models. Zero Trust Architecture has undoubtedly emerged as the default security architecture. <a href=\"https:\/\/cwsisecurity.com\/talking-nis2-with-microsoft\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a>, for example, aims at establishing a higher level of cybersecurity and resilience within European organisations. <\/p>\n\n\n\n<p>By placing a greater emphasis on preventing cyber incidents, the directive highlights the deficiencies of security models based on implicit trust. With Zero Trust being the only cybersecurity strategy that has prevention at its core, it will play a key role in one\u2019s efforts to meet <a href=\"https:\/\/cwsisecurity.com\/nis2-and-microsoft\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a> compliance.<\/p>\n\n\n\n<p>In this blog we focus&nbsp;on the pillars of Zero Trust security, outline how a Zero Trust architecture can enforce NIS2 compliance and share a guide to assess how NIS2 ready your organisation is.<\/p>\n\n\n\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-zero-trust-as-a-nis2-requirement\">Zero Trust as a NIS2 Requirement<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Today, organisations require a security model that adapts to the complexity of the modern environment they are operating in. Zero Trust security is designed to adapt to the complexities of the modern workplace by embracing the mobile workforce, safeguarding people, devices, applications, and data, irrespective of their location.<\/p>\n\n\n\n<p>Instead of believing that everything behind the corporate firewall is safe, Zero Trust models assume breach and verify each user and device trying to gain access to corporate resources, regardless of where the request comes from. Zero Trust Security Practices also rely on continuous monitoring of devices and users. Trustworthiness is continuously re-evaluated, and access may be limited or revoked in case of suspicious activity.<\/p>\n\n\n\n<p>In today\u2019s volatile field of cyber conflicts, \u2018trust but verify\u2019 is the only way to comprehensively deliver on cybersecurity requirements. It is therefore a vital foundation for securing corporate resources and ensuring compliance.<\/p>\n\n\n\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">A Guide to NIS2 Compliance<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>With the compliance deadline approaches, organisations that fall within the scope of NIS2\u2019s expanded parameters can no longer delay taking the necessary action. Research from the Leading Security Research Firm, <a href=\"https:\/\/connect.arubanetworks.com\/ponemon-closing-it-security-gap-report\" target=\"_blank\" rel=\"noreferrer noopener\">Ponemon Institute<\/a>, shows that organisations are still struggling to adopt Zero Trust. <\/p>\n\n\n\n<p>Nearly half of the surveyed organisations indicates that they haven\u2019t implemented Zero Trust Security yet. Mainly due to the lack of skills and expertise. This is something that confirms our experiences in working with our customers.<\/p>\n\n\n\n<p>Leveraging our expertise in assisting our customers secure their organisations, we have developed a guide to evaluate your NIS2 readiness and support you in developing a plan to successfully adopt Zero Trust.<\/p>\n\n\n\n<p>Our Zero Trust compliance guide defines an approach to implement an end-to-end methodology across identities, endpoints\/devices, data, apps, infrastructure, and network:<\/p>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-secure-identity\">1 <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Secure Identity<\/mark><\/strong> <\/h3>\n\n\n\n<p>Follow the least privilege access principles. When an identity attempts to access a corporate resource, verify that identify with strong authentication and ensure access is compliant and typical to that it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2 <mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\"><strong>Secure Endpoints<\/strong><\/mark><\/h3>\n\n\n\n<p>Once an identity has been granted access to a corporate resource, data can flow to a variety of endpoints. As this diversity creates a massive attack surface area, monitoring and enforcing device health and compliance are key for secure access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3 <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Secure Applications<\/mark><\/strong><\/h3>\n\n\n\n<p>Applications and APIs provide the interface by which data is consumed. Apply controls and technologies to discover shadow IT to ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behaviour, control user actions, and validate secure configuration options.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4 <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Secure Data<\/mark><\/strong><\/h3>\n\n\n\n<p>Data should remain safe, even when it leaves the devices, apps, infrastructure and network the organisation controls. Classify, label, and encrypt your corporate resources and restrict access based on those attributes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5 <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Secure Networks<\/mark><\/strong><\/h3>\n\n\n\n<p>All data is ultimately accessed over network infrastructure. Networking controls can provide critical controls to enhance visibility and help prevent attackers from moving across the network. Segment networks and deploy real-time threat protection, end-to-end encryption, monitoring, and analytics.<\/p>\n\n\n\n<p>With each of these areas generating their own relevant alerts, there is a need for an integrated capability to better detect and respond to threats. Once consolidated, the burden of proof for NIS2 compliance will be there for the taking.<\/p>\n\n\n\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Whitepaper: Are You Ready for NIS2?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">Kick Start Your Journey Towards NIS2 Compliance<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><br>To take your first step towards NIS2 compliance, we have composed a whitepaper to help you gain a greater understanding of the NIS2 regulations. Dive into why the upcoming directive is relevant to your organisation and what are the first steps you should be taking.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/02\/Website-landscape-images-1.png\" alt=\"lady working on laptop in an office\" class=\"wp-image-2785\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 gap-1 mb-3\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"btn btn-outline-primary wp-element-button\" href=\"https:\/\/cwsiinsights.cwsi.ie\/are_you_ready_for_nis2\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">Download HERE<\/mark><\/strong><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">How Can CWSI Help You on Your NIS2 Journey?<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">When it comes to NIS2 and Zero Trust you need an experienced partner.<\/mark><\/strong><\/p>\n\n\n\n<p>For more than a decade, CWSI has played a pivotal role in enabling our customers to thrive within the continually evolving threat landscape. Our team of security experts have extensive experience and apply strict security policies and processes from our deep knowledge and understanding of the forthcoming NIS2 Directive.<\/p>\n\n\n\n<p>CWSI can assist you in assessing if your organisation falls under the purview of the NIS2 Directive. For each key requirement of the directive, CWSI can help discover and document your current state of preparedness and provide you with an individual roadmap to achieving NIS2 compliance.<\/p>\n\n\n\n<p>With expertise in three Microsoft Security Specialisations: <a href=\"https:\/\/cwsisecurity.com\/identity-and-access-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity and Access Management<\/a>, Information Protection and&nbsp;<a href=\"https:\/\/cwsisecurity.com\/governance-risk-compliance-advisory-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Governance<\/a>&nbsp;and <a href=\"https:\/\/cwsisecurity.com\/threat-protection-engagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Protection<\/a>, CWSI serves as an expert in these crucial NIS2 areas \u2013 Identity, Data Governance, Security Threat Protection and Response, Education and Awareness and Security Policy.<\/p>\n\n\n\n<p>It\u2019s our people and their expertise that ensure that your business can close the gap between its current security state and compliance.<\/p>\n\n\n\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Contact Us<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Get in contact today to begin your journey to NIS2 compliance:<\/p>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-03-01\/96v5x\" width=\"100%\" height=\"600\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>NIS2 shifts cybersecurity conversations from a pure technical focus towards cybersecurity being a critical business requirement. By outlining a variety of requirements for Basic Cyber Hygiene, the directive highlights some factors that make adopting Zero Trust Architecture more compelling. Let\u2019s have a closer look at how a Zero Trust Architecture can help you deliver on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":502,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4,1],"tags":[],"class_list":["post-2878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","category-uncategorised"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Trust and NIS2: Is it the Answer? | CWSI<\/title>\n<meta name=\"description\" content=\"Discover how adopting a Zero Trust Architecture can help you deliver NIS2 compliance in this guide from CWSI Security. We discuss security identity and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust and NIS2: Is it the Answer?\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-04T12:39:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T13:59:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/\"},\"headline\":\"Zero Trust and NIS2: Is it the Answer?\",\"datePublished\":\"2024-03-04T12:39:49+00:00\",\"dateModified\":\"2026-04-08T13:59:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/\"},\"wordCount\":1072,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\",\"Uncategorised\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/\",\"name\":\"Zero Trust and NIS2: Is it the Answer? | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-03-04T12:39:49+00:00\",\"dateModified\":\"2026-04-08T13:59:13+00:00\",\"description\":\"Discover how adopting a Zero Trust Architecture can help you deliver NIS2 compliance in this guide from CWSI Security. We discuss security identity and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust and NIS2: Is it the Answer?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust and NIS2: Is it the Answer? | CWSI","description":"Discover how adopting a Zero Trust Architecture can help you deliver NIS2 compliance in this guide from CWSI Security. We discuss security identity and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/","og_locale":"nl_NL","og_type":"article","og_title":"Zero Trust and NIS2: Is it the Answer?","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/","og_site_name":"CWSI","article_published_time":"2024-03-04T12:39:49+00:00","article_modified_time":"2026-04-08T13:59:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"6 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/"},"headline":"Zero Trust and NIS2: Is it the Answer?","datePublished":"2024-03-04T12:39:49+00:00","dateModified":"2026-04-08T13:59:13+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/"},"wordCount":1072,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice","Uncategorised"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/","url":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/","name":"Zero Trust and NIS2: Is it the Answer? | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-03-04T12:39:49+00:00","dateModified":"2026-04-08T13:59:13+00:00","description":"Discover how adopting a Zero Trust Architecture can help you deliver NIS2 compliance in this guide from CWSI Security. We discuss security identity and more.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Zero Trust and NIS2: Is it the Answer?"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=2878"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2878\/revisions"}],"predecessor-version":[{"id":8363,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2878\/revisions\/8363"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=2878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=2878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=2878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}