Qualify exposure
Map the supplier against processed data, operational dependency and connections to customer systems.
NIS2 supply chain readiness
Spot in 10 minutes the security gaps that can block an NIS2 procurement review: governance, backups, MFA, incidents, subcontractors and evidence expected by customers.
Crawlable FR/EN content, usable without an account, built for SME suppliers and their B2B customers.
The kit turns NIS2 expectations into simple evidence to collect before procurement reviews, customer due diligence or cyber insurance requests.
Map the supplier against processed data, operational dependency and connections to customer systems.
Review minimum controls: MFA, backups, patching, logging, access governance and incidents.
Prepare a clear procurement response with policies, incident procedure and remediation email.
Answer yes, partial or no. The score shows whether the supplier is presentable, needs work, or is too risky for a critical relationship.
Six pragmatic measures to put in place before answering a customer questionnaire.
Mandatory MFA on administrators, email, VPN, cloud consoles and development tools.
Offline or immutable backups, dated restoration test and assigned owner.
Severities, contacts, customer escalation timelines, evidence retention and crisis channel.
Critical asset list, CVE tracking, remediation priority and accepted exceptions.
Listed subcontractors, minimum clauses, data location and security contacts.
Shared folder with policies, test logs, attestations, screenshots and owners.
Short texts to start supplier remediation without waiting for an external consultancy.
Policy
Policy base to attach to procurement files or customer contracts.
Subject: minimum supplier security controls We maintain MFA on privileged access, tested backups, a critical asset register and an incident procedure including customer notification. Exceptions are documented, dated and tracked until remediation.
Email ready to send to a supplier before an NIS2 review.
Hello, As part of our NIS2 review, please confirm within 10 days that MFA is active on administrator accounts, VPN, email and cloud consoles. If any scope remains excluded, please share the target date and compensating control. Regards,
Procedure
Procedure outline for the first 24 hours.
Trigger: suspected impact on customer data or service. Actions: isolate, log, qualify severity, notify the customer contact, preserve evidence and communicate updates until closure.
SEO pages to capture supplier compliance searches and convert them into audits.
Priority questions to ask an SME supplier before a critical relationship.
Realistic minimum controls for an SME that needs to reassure customers.
Templates for policy, MFA remediation and incident notification.
The form opens a pre-filled email to request a short NIS2 review. No secret or sensitive data is stored by the site.