Network and Information Security Directive
“
Specifications
Product Name: Network and Information Security
Directive (NIS 2)
Manufacturer: Belden
Effective Date: January 1, 2023
Compliance Deadline: October 17, 2024
Product Information
The Network and Information Security Directive (NIS 2) is a
cybersecurity standard established by the European Union to enhance
network and information security. It builds upon the requirements
of the original NIS Directive and aims to be implemented into
national law across EU member states.
Contents of the NIS 2 Directive
- Registration Obligations
- Verification Obligations
- Reporting Obligations
- Director’s Obligations
- Risk Management Measures
How Belden Supports NIS 2 Implementation
Belden offers various solutions to support NIS 2
implementation:
- Cyber Assessment Service
- Backbone Equipment & Network Management
- Industrial Ethernet Switches
- Network Access Control
- Industrial Firewalls
- Data Diodes
- Secure Remote Access
Product Usage Instructions
1. Registration Obligations
Ensure timely registration of essential and important entities
as per the directive’s requirements.
2. Verification Obligations
Conduct regular assessments to verify compliance with NIS 2
standards within the specified timeframe.
3. Reporting Obligations
Submit necessary reports as mandated by the directive, detailing
security measures and any incidents.
4. Risk Management Measures
Implement robust risk management measures to mitigate
cybersecurity threats and ensure data protection.
Frequently Asked Questions (FAQ)
Q: What are the consequences of noncompliance with NIS 2?
A: Noncompliance may result in fines for companies failing to
meet risk management measures or reporting obligations, following a
structured sanction system similar to the GDPR.
Q: How are fines calculated under NIS 2?
A: Fines are determined based on company size, revenue, and
compliance levels, with examples provided in the directive for
reference.
“`
Your Guide to the Network and Information Security Directive (NIS 2)
Implementing and enforcing the European Cybersecurity Standard with Belden
The European Union’s Network and Information Security Directive (NIS 2) first took effect in January 2023. It extends the minimum requirements for network and information security of the first version of the NIS Directive (established in 2016) and must be shifted into national law in European Union (EU) member states by Oct. 17, 2024.
Despite the regulation, there are still significant differences in how cybersecurity measures are implemented and enforced among member states. NIS 2 intends to harmonize and align cybersecurity standards across EU member states. Increasing dependency on digital infrastructureis occurring in almost all critical areas of society. For example, due to the larger attack surface created by IT-OT convergence, manufacturers are increasingly becoming targets of cyberattacks. As a result, they must be given more consideration in cybersecurity legislation.
Executive Summary While the NIS 2 Directive includes high-level risk mitigation measures to help critical companies protect their infrastructure and environments in an evolving threat landscape, it isn’t specific enough to guide implementation strategies, design architectures or technology selection. Belden can help you find your path through NIS 2 and develop customized solutions that improve your cybersecurity posture and it all begins with our Cyber Assessment Service. The white paper provides insights into NIS 2 and explains how Belden can support it.
WHITE PAPER
Contents
Introduction………………………………………………. 1 Executive Summary ……………………………. 1 NIS 2 Facts & Figures…………………………. 2
Contents of the NIS 2 Directive……………….4 Registration Obligations……………………..4 Verification Obligations ………………………4 Reporting Obligations ………………………..4 Director’s Obligations ………………………..4 Risk Management Measures ……………….5
How Belden Supports NIS 2 Implementation …………….. 7
Cyber Assessment Service ………………… 7 Backbone Equipment & Network Management …………………….. 8 Industrial Ethernet Switches ……………. 10 Network Access Control……………………. 11 Industrial Firewalls ……………………………..12 Data Diodes …………………………………………13 Secure Remote Access……………………… 14 An Overview of Belden Solutions……. 15
Conclusion ……………………………………………….16
belden.com
NIS 2 Facts & Figures
NIS = Network and Information Security
Timeframe
1
entered into force
2
Transposition into national law
2023
2024
3
Identification and Registration
2025
2026
4
Verification of Compliance
2027
2028
1 Jan 16, 2023 NIS2 Directive takes effect 2 Oct. 17, 2024 Transposition into national law 3 April 17, 2025 Identification and registration of essential and important entities 4 2027 Initial verification of company compliance
Noncompliance Fines
The NIS2 Directive has a structured system for sanctions. Companies that don’t comply with risk management measures or reporting obligations will pay fines. This is an adapted version of the fine model of the General Data Protection Regulation (GDPR).
· essential entities: Penalties of up to EUR 10 million or 2% of global revenue (whichever’s the largest)
· important entities: Penalties of up to EUR 7 million or 1.7% of global revenue (whichever’s the largest)
Threshold values for affected companies
Company
Employees
Small Company
A
0 49
Medium-Sized Company
B
50 249
Large company
C
250
D
and
Revenue
EUR 10 Mio.
(max. EUR 50 Mio.)
and
< EUR 50 Mio.
and
Balance Sheet
EUR 10 Mio.
(max. EUR 43 Mio.)
or
< EUR 43 Mio.
> EUR 50 Mio.
or
> EUR 43 Mio.
02
belden.com
Two Examples for Fine Levels
EXAMPLE A ESSENTIAL ENTITY
2% = 1,4 Million
10 Million
70 Million
REVENUE
10 Million
20 Million
30 Million
40 Million
50 Million
60 Million
70 Million
EXAMPLE B IMPORTANT ENTITY
1.7% = 600.000 TSD
7 Million
35 Million
REVENUE
5 Million
10 Million
15 Million
20 Million
25 Million
30 Million
35 Million
Key Take Away: In relation, the maximum penalties for companies with low revenues are significantly higher.
Scope of the directive
· Strongly expanded: applies to around 10 times as many companies in Europe · In addition to the increase in sectors, smaller companies (from 50 employees) are also affected · Classification is based on revenue, branch and criticality of the company
10X MORE AFFECTED
10x times more companys affected than from NIS1
SMALL MEDIUM LARGE
also smaller companies (from 50 employees) affected
REVENUE BRANCH CRITICALITY
classification based on revenue, branch & ciritcality
Affected sectors and companies
Essential entities | Sectors with high criticality
· Energy sector · Transportation · Banking · Financial market infrastructures · Healthcare · Drinking Water · Wastewater · Digital infrastructure · Management of ICT services · Public administration · Space
belden.com
Important entities | Companies added (expansion)
· Postal and courier services · Waste management · Production, manufacturing, and trade of chemicals · Production, manufacturing, and distribution of food · Manufacturing industry/production of goods · Providers of digital services · Research and development
Companies in the special public interest
· Defense equipment and IT Defense · Value creation · Hazardous substances
03
Contents of the NIS 2 Directive
The NIS 2 Directive has an impact that extends beyond EU borders. Much like the General Data Protection Regulation (GDPR), the NIS 2 Directive will set a new international standard. CRITIS (critical infrastructure) suppliers and companies with a European location must also meet the minimum-security standards of the NIS 2 Directive. This is required to ensure supply chain security and prevent international disruptions from affecting services within the EU.
Registration obligations
defined in §27 of the NIS 2 Directive
§27
Companies must determine whether they are subject to the NIS 2 Directive and register with the respective responsible authority. Failure to register will result in fines. Companies that are classified as “essential” will be regularly inspected by the responsible authority. In the case of “important” facilities, inspections will be carried out on a random basis or following security incidents.
Verification obligations
defined in §32 of the NIS 2 Directive
§32
“Essential” facilities must comply with certain obligations for verification purposes, including:
The following time frame must be observed for reporting:
I Initial report within 24 h
II Report within 72 h III Interim report
IV Progress report V Final report
after one month
Continuous communication is required to assess the impact of the security incident.
Notification obligations stipulate that customers of the company must be informed of significant security incidents. Both obligations are intended to improve transparency and the ability to respond to security incidents.
Directors must be aware: !
Risks can’t be delegated.
Cybersecurity always needs to be a C-Level topic.
· Implementing risk management measures and industry standards
· Performing audits
· Maintaining specific certificates
This is the biggest difference between “essential” and “important” facilities.
Reporting obligations
defined in §23 of the NIS 2 Directive
§23
Reporting obligations are tighter compared to the first NIS Directive. In the event of significant security incidents, companies must report to the responsible authority. A security incident is considered significant if it leads to serious operational disruptions or monetary losses, or if there is a possibility of this occurring. A security incident is also considered significant if a person suffers material or immaterial damage.
Director’s obligations
defined in §20 of the NIS 2 Directive
§20
With NIS 2, the legal framework was created to make cybersecurity a top priority. The following points must be ensured by management through the approval, monitoring, and training obligation for managers of essential and important entities:
· Implementation of security measures across the company
· Approval and monitoring of risk management measures
· Regular participation in training courses
· Monitoring and active participation in the implementation of compliance measures
· Proactive cybersecurity management woven into corporate culture
04
belden.com
! NIS 2 Compliance
Network and information security falls within the scope of compliance under NIS 2 and must therefore also be considered in auditing as part of business risk management.
Risk management measures
defined in §21 of the NIS 2 Directive
§21
Risk management measures include processes and organizational measures that serve the company’s network and information security. Primary company assets should be protected according to state-of-the-art cybersecurity. Key measures for IT and OT operations must be adapted to appropriate risk exposure, company size and potential scope of security incidents.
The following risk management measures must be taken:
a Policies risk analysis and security
for information systems
·Identification and assessment of security gaps, vulnerabilities and internal cyber risks (e.g. through configurations, informal workarounds and functionality of thirdparty systems)
·Asset inventory through asset discovery and description of existing assets
·Regular risk analyses, cybersecurity assessments and derivations of security measures
b Incident handling
·Clear rules to handle security incidents
·Security incident response plans
·Regular assessments of security incident response plans
·Incident handling and response management that support fast response times
·Anomaly and attack detection
·Rapid forensic analysis to assess impact after attacks
·The ability to fend off malware and attackers at network boundaries
c Business continuity
such as backup management and disaster recovery and crisis management
·Secure data and networks
·Business continuity plans
·Multi-level back-up management
·Fast system recovery after an incident
·Security measures that do not negatively impact operations
·Crisis management, including an emergency plan with defined roles and responsibilities and clear communication
d Supply chain security
including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers
·Selection of cyber-resilient supplier companies
·Secure network access for suppliers and service providers
·Principle of least privilege for supplier access (suppliers should only be granted the minimum level of access necessary to perform tasks)
e Security in network
and information systems acquisition development and maintenance, including vulnerability handling and disclosure
·Security measures for the acquisition, development and maintenance of network and information systems
·Vulnerability testing of third-party software
·Enforcement of security measures for IoT devices
·Disclosure and handling of vulnerabilities
f Policies and procedures to assess
the effectiveness of cybersecurity riskmanagement measures
·Ongoing review of cybersecurity-measure effectiveness
·Regular review of cybersecurity risk situations and associated risk exposure
belden.com
05
1. Governance and Risk Management
· Network and Cybersecurity Assessment Services · Improvement of existing Networks
with resilient Network Designs
+ Advisory contribution by Belden CIC
5
5. Records and Reports that simplify Reporting Obligations of:
· Inventories
· Logical Access
· Operational Events
4
· Data & Information Flows
· Asset Lifecycles
· Change Control
+ Advisory contribution by Belden CIC
4. Collaboration and Information Sharing
· Advisory contribution by Belden CIC
2. Cybersecurity Measures
· TXCare, Provize, Industrial HiVision & macmon NAC to design, validate, secure and manage resilient ICS networks across all levels
· Hirschmann Eagle Next-Gen Industrial Firewalls,
Embedded Security Features of Hirschmann’s active portfolio (HiOS Firmware),
Data Diodes and Application Access
1
100%
Control to protect ICS networks
80%
· Secure Remote Access & Secure
Edge Computing to build proper
60%
perimeter defenses
40%
20%
+ Advisory contribution by Belden CIC
0%
2
3
3. Incident Reporting and Response
· Network and Cybersecurity Assessment Services · Improvement of existing Networks
with resilient Network Designs
+ Advisory contribution by Belden CIC
g Basic cyber hygiene practices
and cybersecurity training
·Defense-in-depth security architecture ·Password guidelines ·Regular cybersecurity training for employees ·Updated operating systems and firmware ·Particularly strong monitoring of systems and
assets that cannot be patched regularly ·Compliance with basic security norms and
industry standards ·Contain potential attack impact
(e.g. network segmentation, traffic filtering) ·Restrict use of system applications
to the essential
h Policies and procedures regarding the use
of cryptography and, where appropriate, encryption
·Secure protocols to ensure secure communication
·Encrypted transmission of sensitive information
i Human resources security, access control
policies and asset management
·Visibility of users and devices in the network ·Insight into network and communication
structure ·Identification and inventory of assets ·Documentation of asset properties ·Role-based access to systems ·Prevent physical unauthorized access
to systems
j The use of multi-factor authentication
or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems
·Secure multi-factor authentication solutions
06
belden.com
How Belden supports NIS 2 Implementation
Current Status of Existing Networks
The NIS 2 Directive prompts companies to implement cybersecurity standards and completely reconsider the processes required to do so. Security measures for networks and information security were not previously the focus in industrial environments, but rather system availability and efficiency. This not only results in the difficulty that numerous security mechanisms do not exist, but also that updating the systems with corresponding specifications is a challenge. Due to the long lifecycles of industrial control systems and machines, existing programming is often old and poorly documented. In some cases, available computing power is not sufficient for modern cybersecurity solutions. In addition, most OT networks have significant shortcomings in terms of inventory and visibility. Network devices and endpoints are not only partially unknown but also lack visibility of vulnerabilities and log data.
Product and Service Solutions
From the I/O block to the cloud, Belden offers many hardware and software solutions to build secure and resilient networks. The intuitive and flexible network and security solutions help organizations across a wide range of industries to implement cybersecurity measures, reduce network complexity, strengthen cyber resilience and ensure data integrity.
For OT networks, some of the required cybersecurity standards are completely new territory and there is a lack of specialists to implement them.
Belden continuously extends their product and development lifecycle certifications and work with a wide range of common standards and frameworks (e.g. IEC 62443, DNV and EN 61580).
The certifications can be found on the website.
Cyber Assessment Service
Belden offers a comprehensive cyber assessment service to collect and remediate the most impactful cyber risks of industrial environments. This results in a dedicated cyber-scoring, provisioning of a detailed
remediation guide and a preliminary solution design to improve the risk posture with the help of Belden’s technologies and services.
§ Helps to comply with the following NIS2 articles: 21a 21b 21c 21d 21e 21f 21g 22 23 24 25 29 30
The effectiveness of taken security measures are evaluated and gaps get identified to:
· Identify and document internal and external threats
· Identify risk exposure and potential mission impacts
· Identify and prioritize risk responses
The Cyber Assessment Service is intended to facilitate the long-term transfer of Belden’s industrial expertise to the respective company and the development of internal know-how and security expertise. Because cybersecurity is constantly evolving, regular cyber assessments are important. Instead of infrequent or informal checks, Belden recommends a
compliance program designed around continuous compliance. This approach proves to be more cost effective and identifies risks sooner. One approach is to take annual assessments and break them into smaller parts such as quarterly.
Belden’s Cyber Assessment Service supports the following NIS 2 risk management measures:
Policies on risk analysis and information system security
· Assessing the effectiveness of risk management
· Planning the implementation of all the directive’s risk management measures
belden.com
07
Backbone Equipment and Network Management
Belden offers various tools to plan, configure and administer networks and network components. These are tailored to the needs and conditions of
different industries to provide first-class connectivity across the backbone, aggregation and access layers of mission-critical industrial networking environments.
For harsh environments especially energy, transportation, mining and oil and gas industries the XTran networking solution offers MPLS-TP backbone technologies.
XTran network structures can be planned and managed with TXCare. Thanks to SNMP-based monitoring, the software can also manage hardware components from other manufacturers.
Belden’s PROVIZE enables efficient planning and configuration of aggregation and access layers of industrial networks clearly arranged and adapted to the purpose of the network. With just a few clicks, network segmentation can be set up or device requirements can be stored. The PROVIZE Planner offers a network overview and various tools to reduce network complexity in day-to-day operations.
In addition, XTran interface cards connect legacy systems that are frequently encountered in OT environments. In existing backbone networks, asset discovery and all configurations can be managed via TXCare. Another central component is traffic engineering. Each network application is assigned a priority and corresponding bandwidth so that mission-critical processes can always be maintained. XTran and TXCare comply with ISA 99, IEC 62443-4-1 and IEC 62443-4-2.
Furthermore, RFC 5920 is used as reference to protect the backbone network against common attack scenarios to follow “Security-by-Design” principles. All traffic passing over a link is encrypted in compliance with IEEE 802.1AE, utilizing 128or 256-bit AES keys to ensure that the backbone can operate securely on the management, control and data plane.
HiVision is a network management tool that is used for the operation of Hirschmann hardware operating mainly on the aggregation and access layer. Hirschmann offers switches, routers and firewalls for industrial environments. HiVision enables network mapping, identification and extensive field-level monitoring capabilities.
All assets are documented in the application. This visibility is an important first step for risk analysis and the development of security concepts for information systems. The software can also be used to ensure the secure commissioning of devices. It provides real-time performance data for devices. In addition, multi-configuration is possible for all devices or device groups.
08
belden.com
§ Helps to comply with the following NIS2 articles: 21a 21b 21c 21d 21e 21f 21g 22 23 24 25 29 30
Belden’s backbone equipment and network management solutions support the following NIS 2 risk management measures:
Policies on risk analysis and information system security:
· Asset management · Network monitoring Incident handling: · Detection and diagnosis of network failures · IT forensics and event logs
Business continuity: · Installation of redundancies · Secure connection of legacy systems · Traffic engineering
Basic cyber hygiene practices and cybersecurity training:
· Network segmentation · Configuration hardening
of device requirements · Reduction of network complexity
belden.com
09
Industrial Ethernet Switches
Infrastructure components play a significant role in OT network security, reliability and efficiency. Our industrial Ethernet switches run with the
Hirschmann Operating System (HiOS), which provides built-in security features and a way to connect further industrial cybersecurity solutions.
§ Helps to comply with the following NIS 2 articles: 21a 21b 21c 21d 21e 21f 21g 22 23 24 25 29 30
Belden’s Hirschmann is a technology and market leader for industrial Ethernet switches. They’re made for harsh environments and ensure seamless communication between various control systems, devices and sensors.
Belden’s Industrial Ethernet Switches provide support for the following NIS 2 risk management measures:
Incident handling:
· Effective monitoring and visibility of network traffic
· Port security · Denial of Service protection · Dynamic ARP inspection · DHCP snooping
Business continuity:
· HiOS enables high availability and redundancy, ensuring uninterrupted network operation with link aggregation control protocol (LACP), media redundancy protocol (MRP), spanning tree protocol (STP) and loop protection
· Redundant power supplies and security status indicators ensure hardware reliability
Basic cyber hygiene practices and cybersecurity training:
· Segmentation of OT networks (VLAN support, private VLANs)
· Audit trails and persistent logging
Policies and procedures regarding the use of cryptography and, where appropriate, encryption:
· SSH and HTTPS · MACsec (IEEE 802.1AE)*
Human resources security, access control policies and asset management:
· HiOS supports access control mechanisms, including: » IEEE 802.1X authentication » TACACS+* » MAC address filtering » Role-based access control » IP access restriction » Management VLAN
· Traffic filtering and control
*available as a software update in 2025
10
belden.com
Network Access Control
Network access control is a central element of a holistic security concept and a powerful tool for implementing several of the risk management measures of the NIS2 Directive. Our NAC solution provides granular access authorization through
role-based access control and explicit identity management. In combination with efficient authentication and authorization procedures, this ensures secure access to IT and OT networks.
§ Helps to comply with the following NIS 2 articles: 21a 21b 21c 21d 21e 21f 21g 22 23 24 25 29 30
With macmon NAC, Belden offers a software solution for network access control (NAC). In addition, macmon NAC enables continuous access monitoring across all users, network devices and endpoints. This allows network visibility and implementation of asset management.
Belden’s Network Access Control solution can specifically support the following NIS 2 risk management measures:
Policies on risk analysis and information system security:
· Visibility of all assets and consideration for risk analyses
· Monitoring users and devices on the company network
Incident handling:
· Storage of network events for 60 to 90 days · macmon NAC Past Viewer collection and
structuring of network events over a long period of time (up to several years) · IT forensic analyses with log data · Use for documentation of reports within the scope of reporting and verification obligations · Define reactions and policies on how to handle certain events (e.g. trigger tickets, alerts, emails to administrators, execute certain scripts, encapsulate a field-level zone from the rest of the network for a certain period of time)
Basic cyber hygiene practices and cybersecurity training:
· macmon NAC Compliance: enforce security policies
· macmon NAC VLAN Manager for uncomplicated network segmentation
· High availability options with macmon NAC Scalability
Human resources security, access control policies and asset management:
· Granular access management for users and devices with Network Access Control
Supply chain security:
· Secure temporary network access via macmon NAC Guest Service for suppliers and service providers with restricted access rights
belden.com
11
Industrial Firewalls
Firewalls contribute to maintaining operations by securing network boundaries from attackers and malware. Belden offers hardware solutions specifically for industrial security, such as our robust industrial firewalls.
§ Helps to comply with the following NIS 2 articles: 21a 21b 21c 21d 21e 21f 21g 22 23 24 25 29 30
Hirschmann includes various Layer 2 and Layer 3 firewalls in its portfolio, including industrial firewalls with industrial protocol deep packet inspection (DPI) and routing functionalities.
Hirschmann’s implementation of DPI moves beyond signatures to block traffic that does not conform to the protocol specification to provide protection against zero-day attacks. The industrial firewalls
can be used to implement the zone and conduit model for network segmentation. They also provide micro segmentation for a last line of defense for PLCs and controllers by only allowing certain commands, services and function codes by authorized workstations for changes to control logic. In this way, the potential impact radius of intruders or malware can be restricted. The firewall solutions provide round-the-clock network edge protection. By monitoring data traffic and using various encryption techniques, Belden’s industrial firewalls enable secure communication in OT networks.
Belden’s firewall solutions can specifically support the following NIS 2 risk management measures:
Incident handling:
· Security incident management and response · Mitigation of cyberattacks · Inspection of SCADA logs · Defense against malware and attackers
at network boundaries
Business continuity:
· Protection of network boundaries · Setting up zones and control systems · Separating functional areas or production
sub-sections
Policies and procedures regarding the use of cryptography and, where appropriate, encryption:
· Encrypted data traffic in the network
12
belden.com
Data Diodes
Data diodes are network components that function as unidirectional network appliances. The singular data flow protects networks from external cyber threats. Data diodes securely transfer Ethernet data to the public internet without putting the system at risk.
§ Helps to comply with the following NIS 2 articles: 21a 21b 21c 21d 21e 21f 21g 22 23 24 25 29 30
Hirschmann’s Rail Data Diode secures mission-critical Ethernet networks through guaranteed one-way data traffic, while also transferring data out of the secure part of the system in a highly controlled, deterministic manner.
Belden’s data diodes specifically support the following NIS 2 risk management measures:
Policies on risk analysis and information system security:
· Network component to gain control of network communication
· Securing transition zones with different security standards
· Ensures high security for mission-critical Ethernet networks
Incident handling: · Protection from external cyber-attacks by unidirectional data flow
Business continuity: · Extremely robust network components
that resist harsh environments and weather conditions
Basic cyber hygiene practices and cybersecurity training:
· Eliminate access to paths into the secure part of the network
belden.com
13
Secure Remote Access
To reduce downtime and related costs, companies must be able to react fast. When a certain issue appears, authorized technicians and service providers should be able to connect to a specific machine remotely. Remote access can be used to troubleshoot or perform routine maintenance without having to
be onsite. This not only reduces travel costs but also keeps up with Industry 4.0 security and maintenance requirements. Regardless of its advantages, remote access can also be a gateway for cyberattacks if it isn’t integrated in a secure way.
§ Helps to comply with the following NIS 2 articles: 21a 21b 21c 21d 21e 21f 21g
22
23
24
25
29
30
Belden Horizon is an industrial remote connectivity and edge orchestration software platform that’s engineered for secure mission-critical industrial processes. It offers streamlined, secure access for remote equipment from anywhere at any time. With multi-user and multi-project-based access, it’s possible to collaborate and work from different sites.
The ability to establish role-based access for users in different operation zones is an important feature to ensure access while maintaining operations. Belden Horizon can be used to create a persistent data network (PDN), which is a managed remote infrastructure communication network. A PDN connects geographically dispersed assets and enables companies to access resources and field devices securely. To ensure safe data transport, the PDN uses multi-layered, defense-in-depth techniques.
Belden’s Secure Remote Access solution can specifically support the following NIS 2 risk management measures:
Policies on risk analysis and information system security:
· Secure remote access to machines and resources
· Secure connection to the cloud
Business continuity:
· Secure data transport using multi-layered, defense-in-depth techniques
· Monitor gateways to troubleshoot issues
Human resources security, access control policies and asset management:
· Access control for users and devices on the local network, at the edge and in the cloud
· Role-based user and device access
Policies and procedures regarding the use of cryptography and, where appropriate, encryption:
· End-to-end encryption
· 256-bit AES encryption
The use of multi-factor authentication:
· Token-based two-factor authentication · Built-in multi-factor authentication capabilities
that utilize user-device-agent-dependencies
14
belden.com
An Overview of Belden Solutions
Whether it’s protecting critical assets at the data source on the field level or securing communication pathways across the control, operations, and enterprise layers, Belden’s comprehensive product portfolio provides robust, adaptable solutions. From industrial firewalls, data diodes and secure remote access to Network and Application Access Control and network visibility tools, our technology safeguards industrial environments through every
layer of the Purdue Model. As we help organizations bridge their IT/OT networks, our industrial networking products enable resilience, compliance with regulations, and the secure convergence of operational technologies with cloud-based systems.
Belden ensures that organizations can confidently remediate their risks and strengthen their cybersecurity posture, from the shop floor to the top floor.
CLOUD
Belden’s unique End-to-End approach to build resilient Industrial Networks
MALNEAVGELEMENT
4
Secure Remote Access on the Network & Application Layer ZTNA-focused
SULPEEVREVILSORY
Core, Distribution & Access Layer
built, commissioned & managed with:
&
All levels monitored and secured with:
& 0
LCEOVNETLROL
1
ZONE 1
PLLEAVNELNING
MAMMUTHUS Enterprise
Managed Switches
3
IT/OT
CONVERGENCE
AREA
2
Eagle Industrial Firewalls
(routingmode)
XTRAN MPLS-TP Backbone
Hirschmann Industrial Switches
Lion-X I/O Link Master
Eagle Industrial Firewalls (transparent mode)
ZONE 2
ZONE 3
LEFIVEELLD
PLC
ERP
MES
Hyperscaler Integrations
,,Cloud-Ready” Harmonized Data
On-Prem Deployment
VPN
VM IDS/IPS
OpEdge
Secure data access, collection, transmission & contextualization
SC&AHDMAI
Data Diode LV/ HV/Train
PLC
300+ industrial protocols, systems & over 20.000 IO-Sensors from
various vendors
ZONE 4
S&ENSISGONRASLS
Belden is able to meet client needs at every touchpoint in their cybersecurity journey.
From the data source on the field level, up to the cloud and across all levels of industrial networks.
belden.com
15
Conclusion
The scope of the NIS2 Directive is comparable to the General Data Protection Regulation (GDPR), with a significantly expanded range of affected companies. To implement the required security measures associated with the NIS2 Directive, swift action is required across many companies even if they aren’t sure how to begin or what to do.
As they prioritize implementation, companies impacted by this directive should seek partners with the expertise to guide these changes and ensure compliance.
Belden’s Customer Innovation CentersTM (CIC) can guide and support this journey. Belden’s mission is to accelerate the design and implementation of robust, reliable and secure industrial networks that provide the data and insights necessary to drive enhanced business performance.
TECHNICAL CONSULTING
Confidently build the network you need
The convergence of OT and IT offers big potential for businesses. However, to leverage this potential, companies must overcome numerous challenges to achieve seamless and efficient connectivity between OT and IT systems while maintaining cyber- resilience. In OT environments, the risk management strategies required by the NIS2 Directive often need to be rethought.
PILLARS
PROJECT MANAGEMENT
Bring your customized networking solution to life
Belden possesses the expertise to implement these measures while simultaneously ensuring business continuity. Belden’s technical consulting is centered around close collaboration with customers to design, deploy and validate tailored-made solutions that address the specific needs of each business.
EDUCATION & EVENTS
Own your future by learning new skills
SERVICE & SUPPORT
Ensure your network availability 24/7
Belden experts engage in an iterative process to solve complex network challenges, optimize existing infrastructure and guide transitions to new standards. Belden provides local support and extensive market expertise in mass transit, discrete manufacturing, process automation, energy and smart buildings.
OPTIMIZE
MODERNIZE
AUTOMATE
SECURE
16
belden.com
Belden`s CICs: Defining the roadmap for your digitization journey
We design and validate customized network solutions that make your digital journey simpler, smarter & more secure.
Belden offers technical demos, proof of concepts and validation testing to enhance the customer’s understanding of the features and capabilities that are possible. These capabilities demonstrate how the solutions can be applied in specific use cases, including IIoT connectivity and industrial cybersecurity.
Belden supports companies in bringing customized, futureproof networking solutions to life, guiding them step by step from planning to implementation. To complete the process, Belden offers training and education to develop the necessary know-how and skills to stay ahead of technological developments and manage day-to-day needs of company networks.
Belden’s support services include corrective, preventive and predictive measures to ensure network health, performance and reliability. With the expertise to prepare companies for NIS2 compliance, Belden lays the foundation for meeting future requirements.
belden.com
4 GO-LIVE DESIGN 2
3 COMMISSION PLAN 1
17
About Belden
Belden Inc. delivers the infrastructure that makes the digital journey simpler, smarter and secure. We’re moving beyond connectivity, from what we make to what we make possible through a performance-driven portfolio, forward-thinking expertise and purposebuilt solutions. With a legacy of quality and reliability spanning 120-plus years, we have a strong foundation to continue building the future. We are headquartered in St. Louis and have manufacturing capabilities in North America, Europe, Asia, and Africa.
For more information, visit us at: www.belden.com
and follow us on Linkedin, Facebook and X/ Twitter
© 2024 | Belden and its affiliated companies claim and reserves all rights to its graphic images and text, trade names and trademarks, logos, service names, and similar proprietary marks, and any other intellectual property rights associated with this publication. BELDEN® and other distinctive identifiers of Belden and its affiliated companies as used herein are or may be pending or registered or unregiste-red trademarks of Belden, or its affiliates, in the United States and/or other jurisdictions throughout the world. Belden’s trade names, trademarks, logos, service names, and similar proprietary marks shall not be reprinted or displayed without Belden’s or its affiliated companies’ permission and/or in any form inconsistent with Belden’s business interests. Belden reserves the right to demand the discontinuation of any improper use at any time.
BELDEN-NIS 2-CYBERSECURITY-DIRECTIVE-2024-10-PB362-EN
belden.com
Documents / Resources
![]() |
BELDEN Network and Information Security Directive [pdf] User Guide Network and Information Security Directive, Information Security Directive, Security Directive, Directive |