28 Nov 2025
Learn how NIS2 and DORA make network configuration a regulated control. Understand key requirements for authentication, integrity, and audit logs to ensure your tools are ready.
rConfig
All at rConfig
For years, Network Configuration Management (NCM) has been considered an IT best practice, a hallmark of a well-run department. That era is over. With the introduction of new EU regulations, what was once a recommendation is now a legal mandate. The NIS2 Directive and the Digital Operational Resilience Act (DORA), taking full effect in 2024 and 2025, have officially made regulated NCM a reality. If your organization conducts any business with or within the European Union, these rules apply to you, regardless of where your headquarters are located. This article translates these complex legal texts into clear, actionable requirements for your network team and clarifies what a compliant toolset looks like in this new environment.
Understanding NIS2 and DORA's Impact on Your Network
The arrival of these regulations signals a fundamental shift in how authorities view network security. Regulators now formally recognize that an insecure router, a misconfigured firewall, or an outdated switch is not just a technical problem but a primary vector for major security breaches. The core message is clear: a network misconfiguration is now a significant business liability. This scrutiny extends to every piece of hardware that directs traffic across your network.
While both regulations target operational resilience, their scopes differ. NIS2 casts a wide net, applying to a broad range of "essential" and "important" sectors, from energy to digital services. DORA, on the other hand, zooms in on the financial industry, demanding stringent DORA configuration control to protect the entire European financial ecosystem. The common thread is accountability. As a recent analysis by ISACA highlights, senior management is now directly responsible for proving compliance. This elevates configuration governance from a back-office IT task to a C-suite concern, making robust network management systems essential for any organization with EU operations, especially those managing large and complex networks.
Core NCM Requirements in Plain English
The language in NIS2 and DORA can be dense, but the underlying requirements for network teams are straightforward. Meeting the new standard for NIS2 configuration management requirements boils down to mastering four key areas. These are no longer suggestions but auditable mandates.
Authentication and Identity Governance
The days of shared "admin" accounts for network devices are over. Regulators demand that every action be tied to a specific individual. This means implementing unique credentials for every user and enforcing Role-Based Access Control (RBAC). If a change is made to a core router, you must be able to prove exactly who made it and that they were authorized to do so. There can be no ambiguity.
Configuration Integrity and Change Control
Your systems must have a secure, approved "golden" configuration baseline for every device. Think of it as the master blueprint for your network's security posture. The regulations require that you can prove this baseline is enforced. More importantly, your tools must be able to detect any unauthorized deviation from it. This is not about running a weekly check; it requires solutions capable of real-time network change monitoring to catch and flag improper modifications the moment they happen.
Comprehensive and Immutable Audit Logs
If an action is not logged, it effectively did not happen in the eyes of an auditor. NIS2 and DORA mandate tamper-proof, comprehensive audit trails for all configuration activities. These logs must be centralized and securely stored, providing a clear record of who did what, when they did it, and from where. At a minimum, your logs must capture:
The unique User ID of the person making the change
A precise timestamp for the activity
The source IP address of the user or system
The exact commands executed or changes made
The success or failure of the action
Demonstrable Evidence for Audits
Being compliant is only half the battle. You must be able to prove it on demand. When an auditor asks for a report of all firewall changes made in the last quarter or a list of devices that deviate from your security policy, "we'll get back to you" is not an acceptable answer. Your team needs the ability to generate clear, comprehensive reports instantly. This requirement shifts the focus from manual data gathering to having a system that makes NCM audit readiness an automated, default state.
Why DIY Scripts and Legacy Tools Fail the Compliance Test

Many network teams rely on a collection of homegrown scripts and older tools to manage configurations. While these may have been sufficient for routine tasks, they create critical gaps under the new regulatory microscope. A patchwork of Python or Bash scripts, often maintained by a single engineer, creates information silos. There is no central source of truth, making enterprise-wide configuration governance nearly impossible.
The most significant failure of these DIY methods is their inability to produce the secure, centralized, and easily searchable audit logs that NIS2 and DORA mandate. A script might back up a configuration, but does it log who ran it in a tamper-proof, centralized system? Can you instantly correlate a change with an approved ticket? For most script-based systems, the answer is no. This approach fundamentally lacks the "proof of compliance" capability, turning a simple audit request into a frantic, manual scramble for data.
These methods also introduce serious scalability and security risks. As a network grows, a collection of disparate scripts becomes unmanageable and prone to human error. They are rarely security-hardened, often containing embedded credentials or lacking proper access controls. For scalable and secure automation, you need more than what simple scripts can offer, which is where a dedicated script integration engine becomes necessary. The table below starkly illustrates the compliance gaps.
Compliance Requirement | DIY Scripts & Legacy Tools | Modern NCM Platform |
|---|---|---|
Centralized Audit Logs | Fragmented, inconsistent, often insecure | Centralized, immutable, and searchable by default |
Role-Based Access Control (RBAC) | Difficult to implement and enforce consistently | Integrated with enterprise identity systems (e.g., AD, LDAP) |
Configuration Integrity | Manual checks; no real-time alerting | Automated baseline monitoring and instant deviation alerts |
Evidence for Audits | Manual, time-consuming data collection | Automated, one-click report generation |
Scalability | Poor; becomes unmanageable as network grows | Designed for tens of thousands of devices |
This table illustrates the fundamental gaps between traditional, manual methods and the integrated capabilities required to meet modern regulatory standards for network compliance tools.
Key Features of a Modern, Audit-Ready NCM Platform
Navigating the world of regulated NCM requires a purpose-built solution. Modern network compliance tools are designed not just to manage configurations but to prove compliance continuously. When evaluating a platform, ensure it delivers on these core, non-negotiable capabilities:
Automated Configuration Management: The platform must provide automated, version-controlled backups of all network device configurations. This creates a complete historical record, enabling reliable rollbacks and clear visibility into every change over time.
Built-in Compliance Auditing: A modern tool automates configuration governance. It should continuously check device settings against security policies, whether they are industry standards like CIS Benchmarks or custom rules tailored to NIS2 and DORA, and immediately flag any deviations.
Integrated Access Control: The system must connect with your existing enterprise identity providers (like Active Directory or LDAP) to enforce granular RBAC. This ensures users can only see and act on the devices and functions they are explicitly authorized for.
Centralized, Actionable Reporting: A compliant platform provides a single dashboard for an at-a-glance view of your network's compliance posture. Crucially, it must generate comprehensive, audit-ready reports with just a few clicks, turning a weeks-long manual effort into a minutes-long task.
With regulators now empowered to levy significant penalties for non-compliance, some of which, as Expel.com reports, can be tied to a company's global turnover, investing in a modern NCM platform is no longer an optional expense. It is a foundational component of modern risk management and operational resilience.
Legacy NCM and Technical Debt: How Insecure Tooling Creates Real Liability
Explore how outdated network configuration management tools accumulate technical debt, creating significant compliance, legal, and financial liabilities under NIS2, DORA, and cyber insurance policies.

rConfig
All at rConfig
If Your NCM Has No Authentication, It’s Not Open Source—It’s Negligence
Discover why open-source NCM tools lacking authentication represent a critical compliance and security failure. Understand the inherent risks and learn how to select a secure solution.

rConfig
All at rConfig
Scripting with Netmiko & Jinja Is Fun — Until the Regulators Come Knocking
Explore the hidden risks of using Netmiko and Jinja for network automation. Learn why your favorite Python scripts might fail a regulatory audit under NIS2 or DORA and how to build a compliant strategy.

rConfig
All at rConfig









