Article 21 Controls → Enginsight Mapping

Complete mapping of NIS2 Article 21 security requirements to Enginsight platform modules and the audit-ready evidence each produces.

Filter by sector:
NIS2 RequirementWhat It MeansEnginsight Module(s)Evidence Output
Risk analysis and information system security policiesContinuous risk assessment and policy documentation
ObserverWatchdog
Risk Score Dashboard, Policy Audit Trail
Incident handlingDetection, response, and recovery procedures
Verity SIEMActive Shield
Incident Timeline, Forensic Trace Pack
Business continuity and crisis managementBackup management and disaster recovery
WatchdogObserver
System Status Reports, Availability Logs
Supply chain securityThird-party risk and access controls
Network ShieldPulsar Agent
Supplier Access Logs, Segmentation Evidence
Security in network and information systems acquisitionSecure development and maintenance
HacktorObserver
Vulnerability Scan Reports, Remediation Trail
Vulnerability handling and disclosureCVE detection and patching workflows
ObserverHacktor
CVE Register, Patch Status Reports
Policies and procedures for cryptographyEncryption standards and key management
ObserverPulsar Agent
Encryption Compliance Reports
Human resources securityAccess control and personnel security
Pulsar AgentVerity SIEM
User Access Logs, Privilege Reports
Access control policiesLeast privilege and role-based access
Network ShieldVerity SIEM
Access Control Matrices, Audit Logs
Multi-factor authenticationSecure authentication mechanisms
Pulsar AgentObserver
MFA Compliance Reports
Secure communicationsEncrypted voice, video, and text
Network ShieldObserver
Communication Security Audit
Secure emergency communicationsResilient backup communication systems
WatchdogVerity SIEM
Emergency System Status Logs

See How Your Organisation Maps

Take our scorecard to identify which Article 21 controls you're missing and get personalised module recommendations.