<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ConformScan</title>
    <description>The latest articles on DEV Community by ConformScan (@conformscan).</description>
    <link>https://dev.to/conformscan</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3833679%2F75055bd7-cca3-43ea-9ae5-f1615632431a.png</url>
      <title>DEV Community: ConformScan</title>
      <link>https://dev.to/conformscan</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/conformscan"/>
    <language>en</language>
    <item>
      <title>Top 10 NIS2 and DORA Compliance Tools in 2026: A Complete Guide</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Mon, 23 Mar 2026 08:02:40 +0000</pubDate>
      <link>https://dev.to/conformscan/top-10-nis2-and-dora-compliance-tools-in-2026-a-complete-guide-564h</link>
      <guid>https://dev.to/conformscan/top-10-nis2-and-dora-compliance-tools-in-2026-a-complete-guide-564h</guid>
      <description>&lt;h1&gt;
  
  
  Top 10 NIS2 and DORA Compliance Tools in 2026: A Complete Guide
&lt;/h1&gt;

&lt;p&gt;The European cybersecurity landscape is undergoing a massive transformation. With the &lt;strong&gt;NIS2 Directive&lt;/strong&gt; now in full effect and &lt;strong&gt;DORA (Digital Operational Resilience Act)&lt;/strong&gt; reshaping the financial sector, organizations are scrambling to find the right tools to achieve compliance.&lt;/p&gt;

&lt;p&gt;Having worked with numerous organizations navigating these regulations, I've compiled this comprehensive guide to the best compliance tools available in 2026.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why NIS2 and DORA Matter
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;NIS2&lt;/strong&gt; expands the scope of the original NIS Directive, covering more sectors and imposing stricter requirements on essential and important entities. Key requirements include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Risk management measures&lt;/li&gt;
&lt;li&gt;Incident reporting within 24-72 hours&lt;/li&gt;
&lt;li&gt;Supply chain security&lt;/li&gt;
&lt;li&gt;Security governance at management level&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;DORA&lt;/strong&gt; specifically targets the financial sector with requirements for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ICT risk management&lt;/li&gt;
&lt;li&gt;Incident reporting&lt;/li&gt;
&lt;li&gt;Digital operational resilience testing&lt;/li&gt;
&lt;li&gt;Third-party risk management&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Non-compliance penalties can reach up to &lt;strong&gt;€10 million or 2% of global turnover&lt;/strong&gt; for NIS2, making the right tooling essential.&lt;/p&gt;

&lt;h2&gt;
  
  
  What to Look for in a Compliance Tool
&lt;/h2&gt;

&lt;p&gt;Before diving into our top picks, here are the key criteria we evaluated:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Multi-framework support&lt;/strong&gt; (NIS2, DORA, ISO 27001, GDPR, etc.)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated evidence collection&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-time monitoring and alerts&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cloud provider support&lt;/strong&gt; (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Audit-ready reporting&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Third-party risk management&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration capabilities&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Top 10 NIS2 and DORA Compliance Tools
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. ConformScan
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Automated multi-cloud compliance scanning&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ConformScan stands out for its comprehensive approach to cloud compliance. It automatically scans AWS, Azure, and GCP environments against NIS2, DORA, GDPR, ISO 27001, and CIS benchmarks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuous compliance monitoring&lt;/li&gt;
&lt;li&gt;Real-time alerts for misconfigurations&lt;/li&gt;
&lt;li&gt;Multi-framework mapping&lt;/li&gt;
&lt;li&gt;Audit-ready reports&lt;/li&gt;
&lt;li&gt;Remediation guidance&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;Visit ConformScan →&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Sysdig
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Cloud-native security and compliance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sysdig offers out-of-the-box policies for NIS2 and DORA compliance, making it one of the first CNAPP solutions to provide this level of support.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Runtime security&lt;/li&gt;
&lt;li&gt;Container compliance&lt;/li&gt;
&lt;li&gt;Cloud security posture management&lt;/li&gt;
&lt;li&gt;Deep forensics capabilities&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Wiz
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Enterprise-wide compliance visibility&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Wiz provides a comprehensive CNAPP platform with strong compliance capabilities across multiple frameworks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Agentless deployment&lt;/li&gt;
&lt;li&gt;Attack path analysis&lt;/li&gt;
&lt;li&gt;Multi-cloud support&lt;/li&gt;
&lt;li&gt;Automated compliance mapping&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Drata
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: SOC 2 and ISO 27001 with DORA support&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Drata excels at automating evidence collection and maintaining continuous compliance, with growing support for EU regulations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automated evidence gathering&lt;/li&gt;
&lt;li&gt;Pre-built policy templates&lt;/li&gt;
&lt;li&gt;Auditor portal&lt;/li&gt;
&lt;li&gt;Continuous monitoring&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Vanta
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: SMBs and startups&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Vanta makes compliance accessible for smaller organizations with an intuitive interface and strong automation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Easy onboarding&lt;/li&gt;
&lt;li&gt;Multiple framework support&lt;/li&gt;
&lt;li&gt;Integrations with popular tools&lt;/li&gt;
&lt;li&gt;Weekly compliance reports&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  6. Prisma Cloud (Palo Alto Networks)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Enterprise security teams&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Prisma Cloud offers complete lifecycle protection with extensive compliance capabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;20+ regulatory frameworks&lt;/li&gt;
&lt;li&gt;Rich policy engine&lt;/li&gt;
&lt;li&gt;Kubernetes support&lt;/li&gt;
&lt;li&gt;API-driven automation&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  7. AccuKnox
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Zero Trust compliance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Built on open-source KubeArmor, AccuKnox brings zero-trust compliance to multi-cloud environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Runtime enforcement&lt;/li&gt;
&lt;li&gt;DevSecOps integration&lt;/li&gt;
&lt;li&gt;Policy-driven compliance&lt;/li&gt;
&lt;li&gt;Open-source foundation&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  8. Scrut Automation
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Startups needing quick compliance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Scrut offers streamlined compliance monitoring with an intuitive dashboard.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Quick implementation&lt;/li&gt;
&lt;li&gt;Multiple framework support&lt;/li&gt;
&lt;li&gt;Evidence automation&lt;/li&gt;
&lt;li&gt;Audit preparation&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  9. Lacework
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Behavioral compliance analysis&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Lacework uses machine learning to detect anomalies and compliance violations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Agentless deployment&lt;/li&gt;
&lt;li&gt;Anomaly detection&lt;/li&gt;
&lt;li&gt;Compliance drift visualization&lt;/li&gt;
&lt;li&gt;Multi-cloud support&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  10. MetricStream
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Best for: Enterprise GRC programs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;MetricStream provides comprehensive GRC capabilities for large organizations managing multiple regulations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Unified controls program&lt;/li&gt;
&lt;li&gt;Cross-regulation mapping&lt;/li&gt;
&lt;li&gt;Advanced reporting&lt;/li&gt;
&lt;li&gt;Third-party risk management&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Comparison Table
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;NIS2&lt;/th&gt;
&lt;th&gt;DORA&lt;/th&gt;
&lt;th&gt;Multi-Cloud&lt;/th&gt;
&lt;th&gt;Automation Level&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;ConformScan&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sysdig&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wiz&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Drata&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vanta&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;Partial&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;Medium-High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prisma Cloud&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AccuKnox&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Scrut&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;Partial&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;Medium-High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lacework&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MetricStream&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  How to Choose the Right Tool
&lt;/h2&gt;

&lt;p&gt;When selecting a NIS2/DORA compliance tool, consider:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Your cloud environment&lt;/strong&gt;: Ensure the tool supports your cloud providers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Framework coverage&lt;/strong&gt;: Check if it covers all your required frameworks&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Team size&lt;/strong&gt;: Some tools are better suited for SMBs, others for enterprises&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Budget&lt;/strong&gt;: Pricing varies significantly&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Integration needs&lt;/strong&gt;: Check compatibility with your existing stack&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;NIS2 and DORA compliance doesn't have to be overwhelming. With the right tools, organizations can automate much of the heavy lifting, maintain continuous compliance, and focus on their core business.&lt;/p&gt;

&lt;p&gt;For organizations looking for a comprehensive, automated approach to multi-cloud compliance, &lt;strong&gt;ConformScan&lt;/strong&gt; offers an excellent balance of features, ease of use, and value.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Have questions about NIS2 or DORA compliance? Drop a comment below or check out &lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;ConformScan&lt;/a&gt; for a free compliance assessment.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>compliance</category>
      <category>security</category>
      <category>cloud</category>
      <category>devops</category>
    </item>
    <item>
      <title>5 Best Wiz Alternatives for Cloud Compliance in 2026</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Sat, 21 Mar 2026 02:19:13 +0000</pubDate>
      <link>https://dev.to/conformscan/5-best-wiz-alternatives-for-cloud-compliance-in-2026-25ic</link>
      <guid>https://dev.to/conformscan/5-best-wiz-alternatives-for-cloud-compliance-in-2026-25ic</guid>
      <description>&lt;h1&gt;
  
  
  5 Best Wiz Alternatives for Cloud Compliance in 2026
&lt;/h1&gt;

&lt;p&gt;Wiz has become a major player in cloud security, but many organizations are looking for alternatives that offer stronger compliance automation capabilities. Whether you need better NIS2 support, more affordable pricing, or deeper compliance workflows, here are the top 5 Wiz alternatives worth considering.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. ConformScan
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Compliance-first cloud security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;ConformScan&lt;/a&gt; takes a compliance-first approach that sets it apart from Wiz. While Wiz excels at security, ConformScan is built specifically for organizations that need to demonstrate compliance against NIS2, GDPR, DORA, ISO 27001, and CIS benchmarks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why consider it over Wiz:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pre-built compliance frameworks ready to deploy&lt;/li&gt;
&lt;li&gt;Automatic mapping of cloud configs to regulatory requirements&lt;/li&gt;
&lt;li&gt;Audit-ready reports with evidence trails&lt;/li&gt;
&lt;li&gt;Multi-cloud support (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;More affordable for compliance-focused use cases&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best suited for:&lt;/strong&gt; European organizations facing NIS2 deadlines, companies needing multi-framework compliance.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Orca Security
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Agentless cloud security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Orca Security pioneered the agentless approach to cloud security. Like Wiz, it provides comprehensive visibility without deployment complexity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why consider it over Wiz:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Strong agentless technology&lt;/li&gt;
&lt;li&gt;Good coverage across cloud platforms&lt;/li&gt;
&lt;li&gt;Competitive pricing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Considerations:&lt;/strong&gt; Compliance features less mature than security offerings.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Palo Alto Prisma Cloud
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Enterprise security teams&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Prisma Cloud offers the full spectrum of cloud security, from CSPM to runtime protection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why consider it over Wiz:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;More mature enterprise features&lt;/li&gt;
&lt;li&gt;Strong integration with existing Palo Alto tools&lt;/li&gt;
&lt;li&gt;Comprehensive compliance modules&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Considerations:&lt;/strong&gt; Higher price point, steeper learning curve.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Lacework
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Behavioral anomaly detection&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Lacework uses machine learning to detect anomalies in cloud environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why consider it over Wiz:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Strong behavioral analysis&lt;/li&gt;
&lt;li&gt;Good for detecting unknown threats&lt;/li&gt;
&lt;li&gt;Polygraph technology&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Considerations:&lt;/strong&gt; Compliance workflows require more manual configuration.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Checkov by Bridgecrew
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Infrastructure as Code security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Checkov focuses on scanning IaC templates before deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why consider it over Wiz:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open-source foundation&lt;/li&gt;
&lt;li&gt;Excellent for shift-left security&lt;/li&gt;
&lt;li&gt;Strong IaC coverage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Considerations:&lt;/strong&gt; Runtime security requires additional tools.&lt;/p&gt;




&lt;h2&gt;
  
  
  Quick Comparison
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Compliance Focus&lt;/th&gt;
&lt;th&gt;Multi-Cloud&lt;/th&gt;
&lt;th&gt;Pricing&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;ConformScan&lt;/td&gt;
&lt;td&gt;Excellent&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Affordable&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Orca Security&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Moderate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prisma Cloud&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Enterprise&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lacework&lt;/td&gt;
&lt;td&gt;Moderate&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Moderate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Checkov&lt;/td&gt;
&lt;td&gt;Moderate&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Open source + paid&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;If your primary need is &lt;strong&gt;compliance automation&lt;/strong&gt;, &lt;strong&gt;ConformScan&lt;/strong&gt; offers the most comprehensive solution among Wiz alternatives. For pure security use cases, Orca and Prisma Cloud remain strong contenders.&lt;/p&gt;

&lt;p&gt;The best choice depends on whether you prioritize security depth (Wiz, Orca) or compliance breadth (ConformScan).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;What has your experience been with cloud compliance tools? Share in the comments!&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cloudsecurity</category>
      <category>compliance</category>
      <category>devops</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Top 5 Best NIS2 Compliance Tools in 2026</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Sat, 21 Mar 2026 02:16:15 +0000</pubDate>
      <link>https://dev.to/conformscan/top-5-best-nis2-compliance-tools-in-2026-84h</link>
      <guid>https://dev.to/conformscan/top-5-best-nis2-compliance-tools-in-2026-84h</guid>
      <description>&lt;h1&gt;
  
  
  Top 5 Best NIS2 Compliance Tools in 2026
&lt;/h1&gt;

&lt;p&gt;The NIS2 Directive has fundamentally transformed the cybersecurity compliance landscape across Europe. With stricter requirements, broader scope, and significant penalties for non-compliance, organizations are scrambling to find the right tools.&lt;/p&gt;

&lt;p&gt;After extensive research, I identified the top 5 NIS2 compliance tools that stand out in 2026.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. ConformScan
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Multi-cloud organizations seeking comprehensive NIS2 automation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ConformScan has emerged as a leading solution for NIS2 compliance across AWS, Azure, and GCP environments. It automatically maps infrastructure configurations to specific NIS2 articles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key strengths:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time compliance scanning across all major cloud providers&lt;/li&gt;
&lt;li&gt;Automated evidence collection for audits&lt;/li&gt;
&lt;li&gt;Pre-built NIS2 policy templates&lt;/li&gt;
&lt;li&gt;Integration with existing DevOps pipelines&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. Drata
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Companies seeking SOC 2 alongside NIS2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Drata has built a strong reputation in compliance automation, expanding to support NIS2 and other European frameworks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key strengths:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Strong automation for evidence collection&lt;/li&gt;
&lt;li&gt;Excellent integration with HR and IT systems&lt;/li&gt;
&lt;li&gt;Clean, intuitive interface&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3. Vanta
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Startups and growing companies&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Vanta offers a user-friendly approach to compliance automation with promising NIS2 support.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key strengths:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Easy onboarding and setup&lt;/li&gt;
&lt;li&gt;Strong integration ecosystem&lt;/li&gt;
&lt;li&gt;Scalable pricing model&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  4. Wiz
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Cloud-native security with compliance features&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Wiz combines cloud security with compliance capabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key strengths:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Excellent cloud security foundations&lt;/li&gt;
&lt;li&gt;Good visualization of compliance posture&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  5. Qualys
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Best for: Enterprise organizations&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Qualys brings decades of security experience to compliance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key strengths:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Comprehensive security platform&lt;/li&gt;
&lt;li&gt;Mature technology stack&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;For multi-cloud environments requiring comprehensive NIS2 automation, &lt;strong&gt;ConformScan&lt;/strong&gt; offers an excellent balance of features and usability. The key is to start early—NIS2 compliance requires continuous monitoring.&lt;/p&gt;

</description>
      <category>nis2</category>
      <category>compliance</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>NIS2 : Les amendements de janvier 2026 et ce qu'ils changent pour votre conformité</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Sat, 21 Mar 2026 00:36:41 +0000</pubDate>
      <link>https://dev.to/conformscan/nis2-les-amendements-de-janvier-2026-et-ce-quils-changent-pour-votre-conformite-3f6l</link>
      <guid>https://dev.to/conformscan/nis2-les-amendements-de-janvier-2026-et-ce-quils-changent-pour-votre-conformite-3f6l</guid>
      <description>&lt;h1&gt;
  
  
  NIS2 : Les amendements de janvier 2026 et ce qu'ils changent pour votre conformité
&lt;/h1&gt;

&lt;p&gt;Le 20 janvier 2026, la Commission européenne a proposé des amendements ciblés à la directive NIS2. Ces modifications visent à clarifier les obligations légales et simplifier la conformité pour les entreprises opérant dans l'UE.&lt;/p&gt;

&lt;h2&gt;
  
  
  Les points clés des amendements
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Clarification du périmètre
&lt;/h3&gt;

&lt;p&gt;Les amendements apportent des précisions sur quelles entités sont concernées par NIS2. Fini le flou sur les entreprises « essentielles » vs « importantes » — les critères sont maintenant plus nets.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Simplification des exigences de gestion des risques
&lt;/h3&gt;

&lt;p&gt;Les nouvelles règles harmonisent les exigences de gestion des risques cybersécurité. L'objectif : réduire la charge administrative tout en maintenant un niveau de sécurité élevé.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Amélioration de la coopération transfrontalière
&lt;/h3&gt;

&lt;p&gt;Les amendements facilitent la coopération entre les autorités nationales de cybersécurité. Essentiel dans un monde où les cyberattaques ignorent les frontières.&lt;/p&gt;

&lt;h2&gt;
  
  
  Où en est la transposition ?
&lt;/h2&gt;

&lt;p&gt;Seuls 4 pays ont respecté la date limite de transposition du 17 octobre 2024 :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Belgique&lt;/li&gt;
&lt;li&gt;Croatie&lt;/li&gt;
&lt;li&gt;Lituanie&lt;/li&gt;
&lt;li&gt;Roumanie&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Les autres États membres sont en retard, créant un paysage réglementaire fragmenté.&lt;/p&gt;

&lt;h2&gt;
  
  
  Ce que vous devez faire maintenant
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Audit de votre périmètre
&lt;/h3&gt;

&lt;p&gt;Identifiez si votre organisation relève de NIS2 (secteurs essentiels et importants).&lt;/p&gt;

&lt;h3&gt;
  
  
  Cartographie des risques
&lt;/h3&gt;

&lt;p&gt;Documentez vos risques cybersécurité et vos mesures d'atténuation.&lt;/p&gt;

&lt;h3&gt;
  
  
  Surveillance continue
&lt;/h3&gt;

&lt;p&gt;Mettez en place une surveillance continue de votre infrastructure cloud. Des outils comme ConformScan peuvent automatiser cette vérification.&lt;/p&gt;

&lt;h3&gt;
  
  
  Formation des équipes
&lt;/h3&gt;

&lt;p&gt;Sensibilisez vos équipes aux nouvelles obligations et aux bonnes pratiques.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Les amendements de 2026 ne révolutionnent pas NIS2, mais ils clarifient des points obscurs. Pour les entreprises, l'heure est à la préparation active — pas à l'attente.&lt;/p&gt;

&lt;p&gt;La conformité NIS2 n'est pas une option, c'est une obligation légale. Mieux vaut s'y préparer maintenant que de faire face à des sanctions plus tard.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Publié par l'équipe ConformScan — Solutions de conformité cloud automatisée.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>nis2</category>
      <category>compliance</category>
      <category>cybersecurity</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Why CSPM Alone Won't Save Your Multi-Cloud Compliance in 2026</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Sat, 21 Mar 2026 00:12:43 +0000</pubDate>
      <link>https://dev.to/conformscan/why-cspm-alone-wont-save-your-multi-cloud-compliance-in-2026-3afh</link>
      <guid>https://dev.to/conformscan/why-cspm-alone-wont-save-your-multi-cloud-compliance-in-2026-3afh</guid>
      <description>&lt;p&gt;&lt;em&gt;Running multi-cloud compliance for your startup? I'd love to hear what combination of tools is working (or not working) for your team. Drop a comment.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cloudsecurity</category>
      <category>compliance</category>
      <category>devops</category>
      <category>security</category>
    </item>
    <item>
      <title>5 Cloud Compliance Mistakes Startups Make Before Their First SOC 2 Audit</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Fri, 20 Mar 2026 23:36:20 +0000</pubDate>
      <link>https://dev.to/conformscan/5-cloud-compliance-mistakes-startups-make-before-their-first-soc-2-audit-16kf</link>
      <guid>https://dev.to/conformscan/5-cloud-compliance-mistakes-startups-make-before-their-first-soc-2-audit-16kf</guid>
      <description>&lt;p&gt;SOC 2 compliance is no longer optional for SaaS startups selling to enterprise customers. But most teams approach it wrong — treating it as a one-time checkbox instead of a continuous process.&lt;/p&gt;

&lt;p&gt;Here are 5 mistakes I see repeatedly, and how to avoid them.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Starting Compliance Work 2 Months Before the Audit
&lt;/h2&gt;

&lt;p&gt;The #1 mistake. SOC 2 Type 2 evaluates controls &lt;strong&gt;over time&lt;/strong&gt; (typically 6-12 months). If you scramble to implement controls right before the audit window, you won't have enough history.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fix:&lt;/strong&gt; Start automated monitoring at least 6 months before your target audit date. Tools like Prowler, CloudSploit, or ConformScan can continuously scan your cloud infrastructure and create an evidence trail from day one.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Treating Security Policies as Templates to Copy-Paste
&lt;/h2&gt;

&lt;p&gt;Downloading SOC 2 policy templates and sticking your logo on them feels productive. Auditors see through it immediately. They'll ask your team about the policies — and blank stares mean findings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fix:&lt;/strong&gt; Write policies that reflect what you &lt;em&gt;actually do&lt;/em&gt;. Keep them short, specific, and version-controlled (Git is perfect for this). Map each policy directly to the Trust Services Criteria you've selected.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Manual Evidence Collection with Screenshots
&lt;/h2&gt;

&lt;p&gt;Screenshots rot. They're impossible to verify, hard to organize, and auditors increasingly reject them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fix:&lt;/strong&gt; Automate evidence collection. Connect your cloud provider, identity provider, and endpoint management to a compliance platform. Every control should produce machine-readable evidence automatically.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Ignoring Infrastructure-as-Code Security Scanning
&lt;/h2&gt;

&lt;p&gt;You've got Terraform modules, Kubernetes manifests, and CI/CD pipelines. But are you scanning them for misconfigurations &lt;em&gt;before&lt;/em&gt; deployment?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fix:&lt;/strong&gt; Add IaC scanning to your CI pipeline. Tools like KICS, Checkov, or tfsec catch compliance violations at the PR stage — before they become audit findings. This is "shift-left compliance" in practice.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Not Knowing Which Frameworks Overlap
&lt;/h2&gt;

&lt;p&gt;If you need SOC 2 &lt;em&gt;and&lt;/em&gt; GDPR &lt;em&gt;and&lt;/em&gt; ISO 27001, you'll discover that ~60-70% of controls overlap. Building three separate compliance programs wastes time and creates inconsistencies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fix:&lt;/strong&gt; Build a unified control framework. Map controls once, reuse evidence across audits. Modern compliance platforms like Vanta, Sprinto, or Drata handle cross-mapping, but even a spreadsheet works if you're just starting out.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Takeaway
&lt;/h2&gt;

&lt;p&gt;Compliance isn't a project. It's a posture. The sooner you embed automated scanning, policy-as-code, and continuous monitoring into your development workflow, the less painful every audit becomes.&lt;/p&gt;

&lt;p&gt;Start early. Automate everything you can. And treat your compliance evidence like code — versioned, reviewed, and continuously integrated.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;What's your biggest compliance headache? Drop a comment — I'd love to hear what's working (and what's not) for your team.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cloud</category>
      <category>compliance</category>
      <category>devops</category>
    </item>
    <item>
      <title>BSI C5 Audit Preparation: A Step-by-Step Guide for Cloud Teams 2026</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Thu, 19 Mar 2026 23:15:16 +0000</pubDate>
      <link>https://dev.to/conformscan/bsi-c5-audit-preparation-a-step-by-step-guide-for-cloud-teams-2026-33n5</link>
      <guid>https://dev.to/conformscan/bsi-c5-audit-preparation-a-step-by-step-guide-for-cloud-teams-2026-33n5</guid>
      <description>&lt;p&gt;BSI C5 (Cloud Computing Compliance Criteria Catalogue) is the German federal standard for cloud security. Originally designed for cloud service providers, it is increasingly required in enterprise procurement and referenced by NIS2 implementation guidelines in Germany. This guide explains what C5 audits check and how to prepare efficiently.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is BSI C5?
&lt;/h2&gt;

&lt;p&gt;Published by Germany's Federal Office for Information Security (BSI), C5 defines 17 control domains covering the security requirements for cloud services. Two attestation levels exist:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Type 1&lt;/strong&gt;: Point-in-time assessment — confirms controls are designed appropriately&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Type 2&lt;/strong&gt;: Period-based assessment (typically 6-12 months) — confirms controls operate effectively over time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Type 2 is required for most public sector contracts and is increasingly expected by German enterprise buyers.&lt;/p&gt;

&lt;h2&gt;
  
  
  The 17 C5 control domains
&lt;/h2&gt;

&lt;p&gt;C5 2020 covers:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Organization of Information Security (OIS)&lt;/li&gt;
&lt;li&gt;Security Policies (SP)&lt;/li&gt;
&lt;li&gt;Human Resources (HR)&lt;/li&gt;
&lt;li&gt;Asset Management (AM)&lt;/li&gt;
&lt;li&gt;Physical Security (PS)&lt;/li&gt;
&lt;li&gt;Operations Security (OS)&lt;/li&gt;
&lt;li&gt;Identity and Access Management (IAM)&lt;/li&gt;
&lt;li&gt;Cryptography and Key Management (CKM)&lt;/li&gt;
&lt;li&gt;Communication Security (CS)&lt;/li&gt;
&lt;li&gt;Portability and Interoperability (PI)&lt;/li&gt;
&lt;li&gt;Availability of Services (AVL)&lt;/li&gt;
&lt;li&gt;Incident Management (IM)&lt;/li&gt;
&lt;li&gt;Procurement, Development and Maintenance (PDM)&lt;/li&gt;
&lt;li&gt;Compliance (CO)&lt;/li&gt;
&lt;li&gt;Information Security Policies for Suppliers (SSO)&lt;/li&gt;
&lt;li&gt;Security Testing (ST)&lt;/li&gt;
&lt;li&gt;Penetration Testing (PT)&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Infrastructure controls auditors check first
&lt;/h2&gt;

&lt;p&gt;C5 auditors focus heavily on these areas when reviewing cloud infrastructure:&lt;/p&gt;

&lt;h3&gt;
  
  
  IAM (C5-IAM)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;MFA enforced for privileged accounts&lt;/li&gt;
&lt;li&gt;Privileged access managed via PAM tooling or temporary elevation&lt;/li&gt;
&lt;li&gt;IAM reviews performed at least quarterly&lt;/li&gt;
&lt;li&gt;Service accounts follow least-privilege principle&lt;/li&gt;
&lt;li&gt;Access revoked immediately on employee departure&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cryptography (C5-CKM)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Encryption at rest for all data classified as confidential&lt;/li&gt;
&lt;li&gt;KMS key rotation enabled (annual minimum) — AWS KMS, Azure Key Vault, GCP Cloud KMS&lt;/li&gt;
&lt;li&gt;TLS 1.2+ enforced everywhere&lt;/li&gt;
&lt;li&gt;No deprecated cipher suites (SSLv3, TLS 1.0, TLS 1.1)&lt;/li&gt;
&lt;li&gt;Customer-managed keys for highly sensitive data&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Operations Security (C5-OS)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;CloudTrail multi-region, log file validation enabled (AWS)&lt;/li&gt;
&lt;li&gt;Azure Monitor / Activity Log with ≥12 months retention&lt;/li&gt;
&lt;li&gt;GCP Cloud Audit Logs enabled with log sinks for long-term storage&lt;/li&gt;
&lt;li&gt;Centralized log management with tamper protection&lt;/li&gt;
&lt;li&gt;Change management process for infrastructure (IaC, no manual changes)&lt;/li&gt;
&lt;li&gt;Vulnerability scanning on all EC2, Azure VMs, and GCP Compute workloads&lt;/li&gt;
&lt;li&gt;Patch management within defined SLAs&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Availability (C5-AVL)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;RDS Multi-AZ enabled for production (AWS) / Azure SQL geo-redundancy / GCP Cloud SQL HA&lt;/li&gt;
&lt;li&gt;Automated backups with tested restore procedures&lt;/li&gt;
&lt;li&gt;Backup retention ≥ 30 days for regulated data&lt;/li&gt;
&lt;li&gt;Recovery Time Objective (RTO) and Recovery Point Objective (RPO) documented&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Evidence collection: the biggest audit bottleneck
&lt;/h2&gt;

&lt;p&gt;The hardest part of a C5 audit is not the controls themselves — it is collecting evidence that they work. Auditors need configuration exports, log samples, access review records, and more. Manual collection takes weeks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://conformscan.com/bsi-c5-cloud-audit" rel="noopener noreferrer"&gt;ConformScan&lt;/a&gt; automates evidence collection by running 270+ checks against your AWS, Azure, and GCP infrastructure and generating a structured PDF report mapped to BSI C5 control domains. You get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pass/fail status for every C5-relevant control&lt;/li&gt;
&lt;li&gt;Timestamped scan history for Type 2 audit evidence&lt;/li&gt;
&lt;li&gt;German-language reports accepted by BSI-certified auditors&lt;/li&gt;
&lt;li&gt;Remediation code (Terraform/CLI) for every finding&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Timeline: how long does a C5 audit take?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Preparation&lt;/strong&gt;: 2-6 months (documentation, gap remediation)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Type 1 assessment&lt;/strong&gt;: 2-4 weeks&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Type 2 assessment period&lt;/strong&gt;: 6-12 months of evidence collection&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Auditor review and reporting&lt;/strong&gt;: 4-8 weeks&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Starting automated scanning early gives you a continuous evidence trail — making Type 2 assessment much faster and cheaper.&lt;/p&gt;

&lt;h2&gt;
  
  
  BSI C5 vs ISO 27001 vs NIS2
&lt;/h2&gt;

&lt;p&gt;These frameworks overlap significantly. BSI C5 aligns closely with ISO 27001 Annex A controls and satisfies most NIS2 Article 21 requirements. Companies pursuing all three can use &lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;ConformScan's cross-framework scanning&lt;/a&gt; to identify gaps across all standards simultaneously.&lt;/p&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>aws</category>
      <category>cloud</category>
    </item>
    <item>
      <title>GDPR/DSGVO Cloud Security: What AWS, Azure &amp; GCP Users Must Fix in 2026</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Thu, 19 Mar 2026 23:11:18 +0000</pubDate>
      <link>https://dev.to/conformscan/gdprdsgvo-cloud-security-what-aws-azure-gcp-users-must-fix-in-2026-2m2n</link>
      <guid>https://dev.to/conformscan/gdprdsgvo-cloud-security-what-aws-azure-gcp-users-must-fix-in-2026-2m2n</guid>
      <description>&lt;p&gt;GDPR Article 32 requires "appropriate technical and organisational measures" to protect personal data. For teams running on AWS, Azure, or GCP, this is not abstract — it translates into specific infrastructure settings. This guide maps Article 32 to concrete cloud configuration checks.&lt;/p&gt;

&lt;h2&gt;
  
  
  The legal basis: GDPR Article 32
&lt;/h2&gt;

&lt;p&gt;Article 32(1) lists four key measures:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Pseudonymisation and encryption of personal data&lt;/li&gt;
&lt;li&gt;Ability to ensure ongoing confidentiality, integrity, availability, and resilience&lt;/li&gt;
&lt;li&gt;Ability to restore availability after an incident&lt;/li&gt;
&lt;li&gt;Process for regularly testing, assessing, and evaluating the effectiveness of measures&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The fines for violations: up to &lt;strong&gt;€20 million or 4% of global turnover&lt;/strong&gt; (Article 83).&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS: critical GDPR misconfigurations
&lt;/h2&gt;

&lt;h3&gt;
  
  
  S3 — the most common GDPR failure
&lt;/h3&gt;

&lt;p&gt;Public S3 buckets containing personal data are the single most common GDPR violation in cloud environments. Check:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;BlockPublicAcls&lt;/code&gt; and &lt;code&gt;BlockPublicPolicy&lt;/code&gt; enabled on ALL buckets&lt;/li&gt;
&lt;li&gt;Server-side encryption enabled (SSE-S3 or SSE-KMS)&lt;/li&gt;
&lt;li&gt;Bucket policy enforcing HTTPS only (&lt;code&gt;aws:SecureTransport&lt;/code&gt; condition)&lt;/li&gt;
&lt;li&gt;Access logging enabled for buckets containing personal data&lt;/li&gt;
&lt;li&gt;Object-level logging via CloudTrail for GDPR audit trail&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  RDS &amp;amp; databases
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Storage encryption enabled at instance creation (cannot be changed after)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;rds.force_ssl = 1&lt;/code&gt; parameter group setting&lt;/li&gt;
&lt;li&gt;No publicly accessible RDS instances&lt;/li&gt;
&lt;li&gt;Automated backups with ≥7 day retention&lt;/li&gt;
&lt;li&gt;Deletion protection enabled on production instances&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  IAM — access to personal data
&lt;/h3&gt;

&lt;p&gt;Article 5(1)(f) requires confidentiality and integrity. This means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MFA required for all users who can access personal data&lt;/li&gt;
&lt;li&gt;IAM policies scoped to minimum required permissions&lt;/li&gt;
&lt;li&gt;No long-lived access keys for service accounts (use IAM roles)&lt;/li&gt;
&lt;li&gt;Regular access reviews via IAM Access Analyzer&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  CloudTrail — the audit trail GDPR requires
&lt;/h3&gt;

&lt;p&gt;GDPR Article 30 requires records of processing activities. CloudTrail provides this for AWS:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Multi-region trail enabled&lt;/li&gt;
&lt;li&gt;Log file validation enabled (proves logs haven't been tampered with)&lt;/li&gt;
&lt;li&gt;CloudTrail logs encrypted with KMS&lt;/li&gt;
&lt;li&gt;Log retention ≥ 12 months in S3 with lifecycle rules&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Azure: critical GDPR misconfigurations
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Storage Accounts
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Secure transfer required (HTTPS only)&lt;/li&gt;
&lt;li&gt;Blob public access disabled&lt;/li&gt;
&lt;li&gt;Soft delete enabled for blob data&lt;/li&gt;
&lt;li&gt;Storage encryption with customer-managed keys (for sensitive data)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Azure SQL
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Transparent Data Encryption enabled&lt;/li&gt;
&lt;li&gt;Advanced Threat Protection enabled&lt;/li&gt;
&lt;li&gt;Auditing enabled and logs sent to storage account or Log Analytics&lt;/li&gt;
&lt;li&gt;No public network access for production databases&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  GCP: critical GDPR misconfigurations
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Cloud Storage
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Uniform bucket-level access enabled (no per-object ACLs)&lt;/li&gt;
&lt;li&gt;Default encryption with CMEK for buckets containing personal data&lt;/li&gt;
&lt;li&gt;Audit logging for bucket access enabled via Cloud Audit Logs&lt;/li&gt;
&lt;li&gt;No public allUsers or allAuthenticatedUsers access&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cloud SQL
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;SSL connections required (&lt;code&gt;ssl_mode = ENCRYPTED_ONLY&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;No publicly accessible Cloud SQL instances (no authorized networks &lt;code&gt;0.0.0.0/0&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Automated backups enabled with ≥7 day retention&lt;/li&gt;
&lt;li&gt;CMEK encryption for databases containing sensitive personal data&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  IAM &amp;amp; Audit Logs (GCP)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Workload Identity for GKE (no service account keys)&lt;/li&gt;
&lt;li&gt;Cloud Audit Logs: Admin Activity + Data Access logs enabled&lt;/li&gt;
&lt;li&gt;Log retention ≥ 12 months via log sinks to Cloud Storage&lt;/li&gt;
&lt;li&gt;No service accounts with owner/editor roles at project level&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  EU data residency — the Schrems II requirement
&lt;/h2&gt;

&lt;p&gt;Following the Schrems II ruling (2020), transferring personal data to the US is restricted unless appropriate safeguards are in place. For cloud infrastructure, this means verifying that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All EC2, RDS, S3, and Lambda resources are in EU regions (&lt;code&gt;eu-central-1&lt;/code&gt;, &lt;code&gt;eu-west-1&lt;/code&gt;, &lt;code&gt;eu-west-3&lt;/code&gt;, etc.)&lt;/li&gt;
&lt;li&gt;Azure resources are in EU regions (West Europe, North Europe, Germany West Central)&lt;/li&gt;
&lt;li&gt;GCP resources are in EU regions (&lt;code&gt;europe-west1&lt;/code&gt;, &lt;code&gt;europe-west3&lt;/code&gt;, &lt;code&gt;europe-north1&lt;/code&gt;, etc.)&lt;/li&gt;
&lt;li&gt;No cross-region replication to US regions without explicit consent mechanism&lt;/li&gt;
&lt;li&gt;CloudFront / Azure CDN / Cloud CDN distributions don't route data outside the EU without consent&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://conformscan.com/dsgvo-aws-scanner" rel="noopener noreferrer"&gt;ConformScan's EU residency checks&lt;/a&gt; explicitly verify every resource region across your AWS, Azure, and GCP accounts.&lt;/p&gt;

&lt;h2&gt;
  
  
  GDPR compliance is not a checkbox — it's continuous
&lt;/h2&gt;

&lt;p&gt;A one-time audit does not guarantee compliance. Configuration drift happens: a developer creates a public S3 bucket, someone disables CloudTrail to reduce costs, an RDS instance is created without encryption. Automated daily scanning catches these regressions before your DPA does.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;ConformScan&lt;/a&gt; runs 270+ GDPR-mapped checks across AWS, Azure, and GCP infrastructure — and alerts you the moment a misconfiguration appears.&lt;/p&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>azure</category>
      <category>devops</category>
    </item>
    <item>
      <title>NIS2 Compliance Checklist for AWS, Azure &amp; GCP: The Complete 2026 Guide</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Thu, 19 Mar 2026 23:05:56 +0000</pubDate>
      <link>https://dev.to/conformscan/nis2-compliance-checklist-for-aws-azure-gcp-the-complete-2026-guide-4bak</link>
      <guid>https://dev.to/conformscan/nis2-compliance-checklist-for-aws-azure-gcp-the-complete-2026-guide-4bak</guid>
      <description>&lt;p&gt;The EU NIS2 Directive has been enforceable since &lt;strong&gt;October 17, 2024&lt;/strong&gt;. If your company runs on AWS, Azure, or GCP and falls under its scope, you need a clear checklist of what to fix — and a way to verify it automatically. This guide covers both.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who is affected by NIS2?
&lt;/h2&gt;

&lt;p&gt;NIS2 applies to any company operating in the EU with either:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;50+ employees&lt;/strong&gt; or &lt;strong&gt;€10M+ annual revenue&lt;/strong&gt;, AND&lt;/li&gt;
&lt;li&gt;Operations in a covered sector: energy, transport, healthcare, water, digital infrastructure, ICT services, banking, financial market infrastructure, or manufacturing of critical products.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Unlike NIS1, NIS2 also covers &lt;strong&gt;important entities&lt;/strong&gt; (medium-sized companies) — not just operators of essential services. This means tens of thousands of European companies are newly in scope.&lt;/p&gt;

&lt;h2&gt;
  
  
  What NIS2 requires (Article 21)
&lt;/h2&gt;

&lt;p&gt;Article 21 mandates a risk-based approach to security. For cloud infrastructure, this translates into 8 concrete categories:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. IAM &amp;amp; Access Control
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS:&lt;/strong&gt; MFA on all IAM users (especially root), no wildcard &lt;code&gt;*&lt;/code&gt; permissions, access keys rotated within 90 days, no hardcoded credentials in Lambda or EC2 user data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure:&lt;/strong&gt; MFA enforced via Conditional Access, no over-privileged roles, managed identities instead of service principal secrets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCP:&lt;/strong&gt; MFA on all accounts, no primitive roles (Owner/Editor) on production projects, Workload Identity Federation instead of service account keys.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Encryption at Rest
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS:&lt;/strong&gt; S3 SSE-KMS, RDS storage encryption, EBS encrypted volumes, DynamoDB encryption, secrets in Secrets Manager (not env vars).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure:&lt;/strong&gt; Azure Storage with CMK, SQL TDE, Key Vault for secrets, disk encryption sets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCP:&lt;/strong&gt; GCS CMEK, Cloud SQL encryption, Secret Manager for credentials, CMEK on Persistent Disks.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Encryption in Transit
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS:&lt;/strong&gt; S3 bucket policies enforce HTTPS-only, &lt;code&gt;rds.force_ssl&lt;/code&gt; enabled, ELB/ALB TLS 1.2+ listeners, CloudFront HTTPS redirect.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure:&lt;/strong&gt; Secure transfer required on Storage Accounts, TLS minimum version 1.2, HTTPS-only on App Service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCP:&lt;/strong&gt; Cloud Storage uniform bucket-level access + HTTPS, Cloud SQL SSL enforcement, load balancer HTTPS redirect.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Network Security
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS:&lt;/strong&gt; No security groups open to &lt;code&gt;0.0.0.0/0&lt;/code&gt; on SSH (22) or RDP (3389), VPC Flow Logs enabled, RDS not publicly accessible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure:&lt;/strong&gt; NSG rules reviewed (no 0.0.0.0/0 on sensitive ports), NSG Flow Logs enabled, Azure SQL not accessible from internet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCP:&lt;/strong&gt; VPC firewall rules — no 0.0.0.0/0 on SSH/RDP, VPC Flow Logs enabled, Cloud SQL no public IP without authorized networks.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Logging &amp;amp; Monitoring
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS:&lt;/strong&gt; CloudTrail multi-region with log file validation + KMS encryption, GuardDuty enabled, Config rules, log retention ≥ 12 months.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure:&lt;/strong&gt; Azure Monitor + Activity Log retention ≥ 12 months, Microsoft Defender for Cloud enabled, diagnostic settings on all resources.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCP:&lt;/strong&gt; Cloud Audit Logs (Admin Activity + Data Access) enabled, Security Command Center enabled, log retention ≥ 12 months via log sinks.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Incident Response (Article 23)
&lt;/h3&gt;

&lt;p&gt;NIS2 requires reporting significant incidents within &lt;strong&gt;24 hours&lt;/strong&gt; (initial warning) and &lt;strong&gt;72 hours&lt;/strong&gt; (full notification). This means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CloudWatch / Azure Monitor / GCP Cloud Monitoring alarms for critical events (root/admin login, policy changes, failed auth)&lt;/li&gt;
&lt;li&gt;Automated alerts on GuardDuty / Defender / SCC findings routed to PagerDuty or Slack&lt;/li&gt;
&lt;li&gt;Documented incident classification and escalation process&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  7. Supply Chain Security
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS:&lt;/strong&gt; Cross-account roles scoped down, IAM Access Analyzer, ECR image scanning.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure:&lt;/strong&gt; Third-party access via Entra ID with limited scope, Microsoft Defender for Containers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCP:&lt;/strong&gt; Artifact Registry vulnerability scanning, VPC Service Controls for data exfiltration prevention, Binary Authorization for GKE.&lt;/p&gt;

&lt;h3&gt;
  
  
  8. Business Continuity
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS:&lt;/strong&gt; RDS automated backups ≥7 days, Multi-AZ for production databases, S3 versioning on critical buckets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure:&lt;/strong&gt; Azure SQL geo-redundant backup, Availability Zones for VMs and databases, Recovery Services Vault.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCP:&lt;/strong&gt; Cloud SQL automated backups + point-in-time recovery, multi-region storage for critical data, GKE regional clusters.&lt;/p&gt;

&lt;h2&gt;
  
  
  NIS2 penalties for non-compliance
&lt;/h2&gt;

&lt;p&gt;Under Article 34, NIS2 imposes maximum fines of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Essential entities&lt;/strong&gt;: up to &lt;strong&gt;€10 million&lt;/strong&gt; or 2% of global annual turnover&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Important entities&lt;/strong&gt;: up to &lt;strong&gt;€7 million&lt;/strong&gt; or 1.4% of global annual turnover&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Management boards can also be held &lt;strong&gt;personally liable&lt;/strong&gt;, and temporary bans from management functions are possible for repeated violations.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to automate NIS2 compliance checks
&lt;/h2&gt;

&lt;p&gt;Manual audits against this checklist take weeks — and go stale the moment someone creates a new resource. Automated scanning solves both problems.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;ConformScan&lt;/a&gt; runs 270+ NIS2-mapped checks against your live AWS, Azure, and GCP infrastructure in under 2 minutes. You get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A prioritized list of findings with SLA countdowns (3 → 14 → 30 days)&lt;/li&gt;
&lt;li&gt;Terraform and CLI remediation code for every finding&lt;/li&gt;
&lt;li&gt;A PDF report ready for your auditor or DPO&lt;/li&gt;
&lt;li&gt;Cross-framework view: NIS2 findings that also affect DORA, GDPR, BSI C5&lt;/li&gt;
&lt;li&gt;Scheduled daily scans so you catch drift before your auditor does&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;NIS2 compliance on AWS, Azure, and GCP is not a one-time project — it is a continuous process. The 8 categories above cover the core technical requirements across all three major cloud providers. Automate the verification via &lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;conformscan.com&lt;/a&gt;, fix the gaps, and keep evidence for your auditor. The cost of a scan is far lower than the cost of a fine.&lt;/p&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>azure</category>
      <category>devops</category>
    </item>
    <item>
      <title>DORA Compliance for Cloud Infrastructure: AWS, Azure &amp; GCP Guide 2026</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Thu, 19 Mar 2026 22:50:24 +0000</pubDate>
      <link>https://dev.to/conformscan/dora-compliance-for-cloud-infrastructure-aws-azure-gcp-guide-2026-5cb9</link>
      <guid>https://dev.to/conformscan/dora-compliance-for-cloud-infrastructure-aws-azure-gcp-guide-2026-5cb9</guid>
      <description>&lt;p&gt;The Digital Operational Resilience Act (DORA — EU 2022/2554) has been fully applicable since &lt;strong&gt;17 January 2025&lt;/strong&gt;. If your institution runs on AWS, Azure, or GCP and operates in banking, insurance, investment management, or payment services, DORA's ICT requirements are now legally binding. As of 2026, supervisory authorities across the EU have begun active enforcement. This guide maps the regulation's infrastructure obligations to concrete cloud configuration checks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who is affected by DORA?
&lt;/h2&gt;

&lt;p&gt;DORA applies to a broad range of financial entities operating in the EU:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Credit institutions (banks) and payment institutions&lt;/li&gt;
&lt;li&gt;Investment firms and asset management companies&lt;/li&gt;
&lt;li&gt;Insurance and reinsurance undertakings&lt;/li&gt;
&lt;li&gt;Crypto-asset service providers (CASPs)&lt;/li&gt;
&lt;li&gt;ICT third-party service providers designated as "critical" by the ESAs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Unlike NIS2, which uses employee and revenue thresholds, DORA applies by &lt;strong&gt;sector&lt;/strong&gt; — not by size. A two-person fintech accepting payments falls in scope just as a large bank does.&lt;/p&gt;

&lt;h2&gt;
  
  
  DORA ICT risk requirements (Articles 5–16)
&lt;/h2&gt;

&lt;p&gt;Chapter II of DORA defines a comprehensive ICT risk management framework. For cloud infrastructure, this breaks down into five technical domains:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Identification and classification (Art. 8)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;All ICT assets inventoried — including cloud accounts, regions, and services&lt;/li&gt;
&lt;li&gt;Business functions supported by each asset documented&lt;/li&gt;
&lt;li&gt;Data classification applied to all storage resources (S3, RDS, Azure Blob, SQL, GCS, Cloud SQL)&lt;/li&gt;
&lt;li&gt;Dependencies on ICT third-party providers (AWS, Azure, GCP) formally documented&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Protection (Art. 9)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;MFA enforced on all IAM users and privileged accounts&lt;/li&gt;
&lt;li&gt;Encryption at rest on all storage: S3 (SSE-KMS), RDS, EBS, DynamoDB, Azure SQL (TDE), Azure Storage, GCS (CMEK), Cloud SQL&lt;/li&gt;
&lt;li&gt;Encryption in transit: TLS 1.2+ enforced, no deprecated cipher suites&lt;/li&gt;
&lt;li&gt;Network segmentation: no security groups / firewall rules open to &lt;code&gt;0.0.0.0/0&lt;/code&gt; on sensitive ports&lt;/li&gt;
&lt;li&gt;KMS / Cloud KMS key rotation enabled (annual minimum)&lt;/li&gt;
&lt;li&gt;Secrets stored in AWS Secrets Manager, Azure Key Vault, or GCP Secret Manager — never in environment variables&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Detection (Art. 10)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;CloudTrail enabled in all regions with log file validation and KMS encryption&lt;/li&gt;
&lt;li&gt;Azure Monitor / Activity Log retention ≥ 12 months&lt;/li&gt;
&lt;li&gt;GCP Cloud Audit Logs enabled (Admin Activity + Data Access) with retention ≥ 12 months&lt;/li&gt;
&lt;li&gt;GuardDuty (AWS) / Defender for Cloud (Azure) / Security Command Center (GCP) enabled&lt;/li&gt;
&lt;li&gt;VPC Flow Logs and Azure NSG Flow Logs / GCP VPC Flow Logs active&lt;/li&gt;
&lt;li&gt;CloudWatch / Azure Monitor / GCP Cloud Monitoring alarms on privileged account usage, IAM changes, and failed auth events&lt;/li&gt;
&lt;li&gt;Centralised SIEM ingestion with tamper-evident log storage&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Response and recovery (Art. 11–12)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;RDS automated backups with ≥7 day retention; tested restores documented&lt;/li&gt;
&lt;li&gt;Multi-AZ / multi-region enabled for production databases&lt;/li&gt;
&lt;li&gt;S3 versioning and cross-region replication for critical data&lt;/li&gt;
&lt;li&gt;Azure SQL geo-redundant backup enabled&lt;/li&gt;
&lt;li&gt;GCP Cloud SQL automated backups with point-in-time recovery enabled&lt;/li&gt;
&lt;li&gt;Recovery Time Objective (RTO) and Recovery Point Objective (RPO) formally defined&lt;/li&gt;
&lt;li&gt;Business continuity plan updated at least annually and after major incidents&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Learning and evolving (Art. 13)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Post-incident reviews documented with root cause analysis&lt;/li&gt;
&lt;li&gt;Threat intelligence feeds integrated into detection tooling&lt;/li&gt;
&lt;li&gt;Vulnerability scanning on all EC2, container, and GCE workloads (Amazon Inspector, Defender for Cloud, GCP Security Command Center)&lt;/li&gt;
&lt;li&gt;Patch management within defined SLAs (DORA does not specify windows — you must define and prove them)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Incident reporting (Article 19) — the 72-hour clock
&lt;/h2&gt;

&lt;p&gt;DORA sets a strict three-stage reporting timeline for major ICT incidents:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Initial notification&lt;/strong&gt;: within 4 hours of classification as major (or 24h of first awareness)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intermediate report&lt;/strong&gt;: within 72 hours — updated impact assessment and containment status&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Final report&lt;/strong&gt;: within 1 month — full root cause analysis and corrective actions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This requires that your detection and alerting stack can identify, classify, and escalate an ICT incident within hours. CloudWatch alarms, GuardDuty findings routed to PagerDuty or Slack, and a documented classification process are minimum requirements.&lt;/p&gt;

&lt;h2&gt;
  
  
  ICT third-party risk (Articles 28–44)
&lt;/h2&gt;

&lt;p&gt;DORA imposes significant obligations on how you manage cloud providers like AWS, Azure, and GCP. Key requirements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Written contractual arrangements with all ICT third-party providers (Art. 30) — your AWS, Azure, or GCP MSA and DPA satisfy the baseline&lt;/li&gt;
&lt;li&gt;Register of all ICT third-party dependencies maintained and updated&lt;/li&gt;
&lt;li&gt;Exit strategy documented for critical third-party dependencies&lt;/li&gt;
&lt;li&gt;Annual risk assessment of third-party concentration — if 90% of your workload runs on a single cloud provider (AWS, Azure, or GCP), this must be assessed and mitigated&lt;/li&gt;
&lt;li&gt;For &lt;strong&gt;critical ICT third-party providers&lt;/strong&gt; (designated by ESAs): enhanced oversight framework applies directly — currently under assessment for major cloud hyperscalers including AWS, Azure, and GCP&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  DORA vs NIS2 — what overlaps?
&lt;/h2&gt;

&lt;p&gt;DORA and NIS2 share approximately &lt;strong&gt;40% of technical controls&lt;/strong&gt; at the infrastructure level. Both require encryption, access control, logging, incident response, and business continuity. The key differences:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Scope&lt;/strong&gt;: NIS2 covers critical infrastructure broadly; DORA is financial-sector specific&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Incident timelines&lt;/strong&gt;: NIS2 requires 24h early warning + 72h notification; DORA requires 4h initial + 72h intermediate + 1 month final&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Third-party risk&lt;/strong&gt;: DORA goes much further — Art. 28-44 are largely absent from NIS2&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Testing&lt;/strong&gt;: DORA mandates annual TLPT (Threat-Led Penetration Testing) for significant entities — NIS2 recommends but does not mandate&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If your organisation is subject to both, fixing the NIS2 gaps first covers most of the DORA baseline — then focus on DORA-specific additions (third-party registers, TLPT, 4h classification process).&lt;/p&gt;

&lt;h2&gt;
  
  
  DORA penalties
&lt;/h2&gt;

&lt;p&gt;Supervisory authorities (national competent authorities — NCAs) can impose:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Administrative fines up to &lt;strong&gt;1% of average daily worldwide turnover&lt;/strong&gt; per violation, per day of non-compliance&lt;/li&gt;
&lt;li&gt;Periodic penalty payments of up to 1% of daily turnover for up to 6 months&lt;/li&gt;
&lt;li&gt;Public statements naming the institution and the nature of the breach&lt;/li&gt;
&lt;li&gt;For critical ICT third-party providers: fines up to &lt;strong&gt;€5 million&lt;/strong&gt; or 1% of global turnover&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to automate DORA compliance checks
&lt;/h2&gt;

&lt;p&gt;DORA's ICT risk requirements map directly to infrastructure configuration. Every encryption, access control, and logging requirement in Articles 9–10 can be verified automatically against your live cloud environment.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;ConformScan&lt;/a&gt; runs DORA-mapped checks across your AWS, Azure, and GCP accounts in under 2 minutes — covering encryption at rest and in transit, IAM controls, logging completeness, backup configuration, and network exposure. You get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DORA-mapped findings with SLA countdowns (3 → 14 → 30 days, aligned with Art. 19 timelines)&lt;/li&gt;
&lt;li&gt;Cross-framework view: see which findings affect DORA, NIS2, and ISO 27001 simultaneously&lt;/li&gt;
&lt;li&gt;Terraform and CLI remediation code for every finding&lt;/li&gt;
&lt;li&gt;PDF reports ready for your compliance officer, auditor, or NCA submission&lt;/li&gt;
&lt;li&gt;Scheduled daily scans to catch configuration drift before it becomes a reportable incident&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Where to start
&lt;/h2&gt;

&lt;p&gt;If you are starting your DORA compliance programme today, prioritise in this order:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Run a baseline scan&lt;/strong&gt; — know your current exposure across all ICT risk domains&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fix critical findings first&lt;/strong&gt; — encryption gaps, public databases, missing MFA&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Build your ICT asset register&lt;/strong&gt; — document cloud accounts, services, and third-party dependencies&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Establish your incident classification process&lt;/strong&gt; — the 4h clock starts when you become aware, not when you decide it is major&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Document third-party contracts&lt;/strong&gt; — review your AWS, Azure, and GCP agreements against DORA Art. 30 requirements&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;DORA is not a project with an end date — it requires continuous monitoring of your ICT risk posture. Automated scanning via &lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;conformscan.com&lt;/a&gt; ensures your controls remain effective between audits.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>azure</category>
      <category>devops</category>
    </item>
    <item>
      <title>How to audit your AWS infrastructure for NIS2 and DORA compliance (practical guide)</title>
      <dc:creator>ConformScan</dc:creator>
      <pubDate>Thu, 19 Mar 2026 12:22:26 +0000</pubDate>
      <link>https://dev.to/conformscan/how-to-audit-your-aws-infrastructure-for-nis2-and-dora-compliance-practical-guide-1dpf</link>
      <guid>https://dev.to/conformscan/how-to-audit-your-aws-infrastructure-for-nis2-and-dora-compliance-practical-guide-1dpf</guid>
      <description>&lt;p&gt;With NIS2 mandatory since October 2024 and DORA in force since January 2025, EU cloud teams are scrambling to figure out what actually needs to change in their AWS infrastructure. This guide walks through the specific checks, the tooling, and the common gaps we see.&lt;/p&gt;

&lt;h2&gt;
  
  
  What NIS2 and DORA actually require on AWS
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;NIS2 Art. 21&lt;/strong&gt; defines minimum security measures for "essential" and "important" entities. For AWS infrastructure, the relevant requirements translate to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Encryption at rest and in transit (Art. 21(2)(h))&lt;/li&gt;
&lt;li&gt;Access control and least privilege (Art. 21(2)(i))&lt;/li&gt;
&lt;li&gt;Multi-factor authentication (Art. 21(2)(j))&lt;/li&gt;
&lt;li&gt;Logging and audit trails — minimum 12 months retention&lt;/li&gt;
&lt;li&gt;Incident response capability (Art. 21(2)(b))&lt;/li&gt;
&lt;li&gt;Backup and recovery procedures (Art. 21(2)(c))&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;DORA Art. 9&lt;/strong&gt; (for financial services: banks, insurance, investment firms) adds:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ICT risk management framework documented and tested&lt;/li&gt;
&lt;li&gt;Encryption of data at rest AND in transit with current standards&lt;/li&gt;
&lt;li&gt;Full logging coverage across all regions (not just primary)&lt;/li&gt;
&lt;li&gt;Incident classification and reporting: 72h initial report, 1 month final (Art. 19)&lt;/li&gt;
&lt;li&gt;Third-party ICT provider risk assessment (Art. 28-44) — this includes AWS itself&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The overlap between NIS2 and DORA is roughly 40%. If you're a fintech or bank, you're essentially auditing the same infrastructure twice without proper tooling.&lt;/p&gt;

&lt;h2&gt;
  
  
  The most common AWS compliance gaps
&lt;/h2&gt;

&lt;p&gt;After running automated checks across many AWS accounts, these are the findings that appear most frequently:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. S3 encryption disabled (~60% of accounts)
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Check all S3 buckets for encryption&lt;/span&gt;
aws s3api list-buckets &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'Buckets[].Name'&lt;/span&gt; &lt;span class="nt"&gt;--output&lt;/span&gt; text | &lt;span class="se"&gt;\&lt;/span&gt;
  xargs &lt;span class="nt"&gt;-I&lt;/span&gt;&lt;span class="o"&gt;{}&lt;/span&gt; aws s3api get-bucket-encryption &lt;span class="nt"&gt;--bucket&lt;/span&gt; &lt;span class="o"&gt;{}&lt;/span&gt; 2&amp;gt;&amp;amp;1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Fix: Enable default encryption on all buckets. SSE-S3 satisfies basic requirements; SSE-KMS with CMK satisfies stricter DORA requirements.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;aws s3api put-bucket-encryption &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--bucket&lt;/span&gt; your-bucket-name &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--server-side-encryption-configuration&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="s1"&gt;'{"Rules":[{"ApplyServerSideEncryptionByDefault":{"SSEAlgorithm":"aws:kms","KMSMasterKeyID":"your-key-id"}}]}'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  2. CloudTrail not enabled in all regions
&lt;/h3&gt;

&lt;p&gt;NIS2 and DORA require comprehensive logging for incident reconstruction. CloudTrail must be active in &lt;strong&gt;all regions&lt;/strong&gt;, not just your primary one.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Check which regions have CloudTrail enabled&lt;/span&gt;
&lt;span class="k"&gt;for &lt;/span&gt;region &lt;span class="k"&gt;in&lt;/span&gt; &lt;span class="si"&gt;$(&lt;/span&gt;aws ec2 describe-regions &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'Regions[].RegionName'&lt;/span&gt; &lt;span class="nt"&gt;--output&lt;/span&gt; text&lt;span class="si"&gt;)&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;do
  &lt;/span&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="nt"&gt;-n&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="nv"&gt;$region&lt;/span&gt;&lt;span class="s2"&gt;: "&lt;/span&gt;
  aws cloudtrail describe-trails &lt;span class="nt"&gt;--region&lt;/span&gt; &lt;span class="nv"&gt;$region&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
    &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'trailList[?IsMultiRegionTrail==`false`].Name'&lt;/span&gt; &lt;span class="nt"&gt;--output&lt;/span&gt; text
&lt;span class="k"&gt;done&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Fix: Create a multi-region trail that logs to a dedicated S3 bucket with 12+ months retention.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. MFA not enforced on IAM users
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Find IAM users without MFA enabled&lt;/span&gt;
aws iam generate-credential-report
aws iam get-credential-report &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'Content'&lt;/span&gt; &lt;span class="nt"&gt;--output&lt;/span&gt; text | &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nb"&gt;base64&lt;/span&gt; &lt;span class="nt"&gt;-d&lt;/span&gt; | &lt;span class="nb"&gt;awk&lt;/span&gt; &lt;span class="nt"&gt;-F&lt;/span&gt;&lt;span class="s1"&gt;','&lt;/span&gt; &lt;span class="s1"&gt;'NR&amp;gt;1 &amp;amp;&amp;amp; $4=="false" {print $1, "- no MFA"}'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  4. RDS instances without encryption
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Check RDS encryption status&lt;/span&gt;
aws rds describe-db-instances &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'DBInstances[?StorageEncrypted==`false`].[DBInstanceIdentifier,Engine]'&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--output&lt;/span&gt; table
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note: You cannot encrypt an existing unencrypted RDS instance in-place. The process requires creating a snapshot, copying it with encryption enabled, and restoring from the encrypted snapshot.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. No VPC Flow Logs
&lt;/h3&gt;

&lt;p&gt;Without VPC Flow Logs, incident reconstruction under DORA Art. 19 (72h reporting) becomes nearly impossible.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Check which VPCs have Flow Logs enabled&lt;/span&gt;
aws ec2 describe-vpcs &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'Vpcs[].VpcId'&lt;/span&gt; &lt;span class="nt"&gt;--output&lt;/span&gt; text | &lt;span class="se"&gt;\&lt;/span&gt;
  xargs &lt;span class="nt"&gt;-I&lt;/span&gt;&lt;span class="o"&gt;{}&lt;/span&gt; aws ec2 describe-flow-logs &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--filter&lt;/span&gt; &lt;span class="nv"&gt;Name&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;resource-id,Values&lt;span class="o"&gt;={}&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'FlowLogs[].{VpcId:ResourceId,Status:FlowLogStatus}'&lt;/span&gt; &lt;span class="nt"&gt;--output&lt;/span&gt; table
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  6. Security groups with 0.0.0.0/0 on sensitive ports
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Find overly permissive security groups&lt;/span&gt;
aws ec2 describe-security-groups &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'SecurityGroups[?IpPermissions[?IpRanges[?CidrIp==`0.0.0.0/0`] &amp;amp;&amp;amp; (ToPort==`22` || ToPort==`3389` || ToPort==`3306`)]].[GroupId,GroupName]'&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--output&lt;/span&gt; table
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Integrating compliance checks into CI/CD
&lt;/h2&gt;

&lt;p&gt;The most effective approach is running these checks automatically after every Terraform apply in staging. Here's a GitHub Actions step:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;NIS2/DORA compliance check&lt;/span&gt;
  &lt;span class="na"&gt;run&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;|&lt;/span&gt;
    &lt;span class="s"&gt;curl -s -X POST https://conformscan.com/api/v1/scans \&lt;/span&gt;
      &lt;span class="s"&gt;-H "X-API-Key: ${{ secrets.CONFORMSCAN_KEY }}" \&lt;/span&gt;
      &lt;span class="s"&gt;-H "Content-Type: application/json" \&lt;/span&gt;
      &lt;span class="s"&gt;-d '{&lt;/span&gt;
        &lt;span class="s"&gt;"account_id": "${{ vars.AWS_ACCOUNT_ID }}",&lt;/span&gt;
        &lt;span class="s"&gt;"frameworks": ["nis2", "dora"],&lt;/span&gt;
        &lt;span class="s"&gt;"fail_on": "critical"&lt;/span&gt;
      &lt;span class="s"&gt;}'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If a critical finding is introduced — open S3 bucket, unencrypted RDS, missing CloudTrail — the pipeline fails before it reaches production.&lt;/p&gt;

&lt;h2&gt;
  
  
  Drift detection: the underrated compliance tool
&lt;/h2&gt;

&lt;p&gt;The initial scan is embarrassing (everyone has gaps). The second scan is where compliance gets hard: &lt;strong&gt;drift&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Drift happens when:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Someone clicks in the AWS Console to "quickly fix" something&lt;/li&gt;
&lt;li&gt;A Terraform module is updated and changes a default&lt;/li&gt;
&lt;li&gt;A temporary exception becomes permanent&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Comparing your live AWS state against your Terraform declarations automatically catches these regressions before your next audit.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key differences between NIS2 and DORA for AWS teams
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Requirement&lt;/th&gt;
&lt;th&gt;NIS2&lt;/th&gt;
&lt;th&gt;DORA&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Incident reporting&lt;/td&gt;
&lt;td&gt;No fixed timeframe specified&lt;/td&gt;
&lt;td&gt;72h initial + 1 month final&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Log retention&lt;/td&gt;
&lt;td&gt;Not explicitly specified&lt;/td&gt;
&lt;td&gt;Full audit trail required&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cloud provider risk&lt;/td&gt;
&lt;td&gt;Implicit&lt;/td&gt;
&lt;td&gt;Explicit Art. 28-44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sector scope&lt;/td&gt;
&lt;td&gt;All "essential/important" entities&lt;/td&gt;
&lt;td&gt;Financial sector only&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Encryption standard&lt;/td&gt;
&lt;td&gt;Current standards&lt;/td&gt;
&lt;td&gt;"State of the art"&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;If you're in financial services, prioritize DORA — NIS2 compliance typically follows.&lt;/p&gt;

&lt;h2&gt;
  
  
  Checklist
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;[ ] S3: Default encryption enabled (SSE-KMS preferred)&lt;/li&gt;
&lt;li&gt;[ ] CloudTrail: Multi-region trail active, 12+ months retention&lt;/li&gt;
&lt;li&gt;[ ] IAM: MFA enforced for all users (especially root)&lt;/li&gt;
&lt;li&gt;[ ] RDS/EBS: All storage encrypted at rest&lt;/li&gt;
&lt;li&gt;[ ] VPC: Flow Logs enabled, exported to CloudWatch or S3&lt;/li&gt;
&lt;li&gt;[ ] GuardDuty: Active in all regions&lt;/li&gt;
&lt;li&gt;[ ] Security Groups: No 0.0.0.0/0 on SSH/RDP/DB ports&lt;/li&gt;
&lt;li&gt;[ ] KMS: Customer-managed keys for sensitive data&lt;/li&gt;
&lt;li&gt;[ ] Config: AWS Config enabled for resource change tracking&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Resources
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://conformscan.com" rel="noopener noreferrer"&gt;ConformScan&lt;/a&gt; — automated NIS2/DORA/ISO27001 scanner for AWS and Azure (free tier: 1 account/month)&lt;/li&gt;
&lt;li&gt;NIS2 Directive full text: EUR-Lex 2022/2555&lt;/li&gt;
&lt;li&gt;DORA Regulation full text: EUR-Lex 2022/2554&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>devops</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
