SYSTOLA
FROM THE NEWS
How SystoLOCK Elevates NIS2 Compliance
In this era of heightened digital security, the NIS2 Directive mandates that regulated entities implement robust security measures to protect against cyber threats. The directive underscores the importance of Multi-Factor Authentication (MFA) as an essential component. SystoLOCK offers a comprehensive MFA solution that not only fulfills the NIS2 MFA requirements but also goes above and beyond to safeguard critical user accounts, resources, and access methods.
Roman Kuznetsov @ 05.11.2023
Follow Roman Kuznetsov on LinkedIn
Understanding NIS2 MFA Requirements
To ensure compliance with NIS2, it is crucial to break down the directive's MFA requirements into three key areas that are most likely to be attacked by a potential adversary
1
User Accounts
What accounts would an adversary most likely desire to compromise? What are the most valuable accounts within the organization? What accounts would a potential adversary benefit most from?
2
Access Methods
How malicious actors could gain unauthorized access to your systems? Are there various ways the attempts can be carried out?
3
Organizational Resources
What are the resources that adversaries are most likely to target? How are they protected?
The foundation of a successful MFA implementation hinges on addressing these factors effectively. In doing so, it is essential to view them through the lens of potential attackers, drawing on previous analysis and investigation of cyber threats.

Let us explore each aspect individually: which users, access methods, and resources should be safeguarded with MFA?
Implementing MFA for Maximum Security
  • MFA for Safeguarding Privileged Users
    The compromise of privileged user accounts remains a top priority for cyber adversaries. These users typically include administrators, helpdesk personnel, and IT teams, who wield significant access privileges within your organization's environment. Ensuring MFA protection for these users is of paramount importance.
  • MFA for Command-Line Access
    Attackers leverage compromised credentials to carry out lateral movement, escalating their initial access and infiltrating the targeted environment. This lateral spread serves as a critical component in large-scale ransomware and data theft attacks. Adversaries frequently utilize command line access tools like PowerShell or even PsExec. Implementing MFA for users accessing resources through these tools is the ultimate defense against such threats.
  • MFA for Critical Applications and Servers
    Adversaries strategically target critical resources to maximize their gains, whether through ransomware attacks that disrupt mission-critical applications or the theft of sensitive business data and intellectual property. Identifying these resources and implementing MFA protection for user access to them should be a top priority.
How SystoLOCK Stands Out
SystoLOCK is a standout choice for organizations looking to enhance their security posture and meet NIS2 compliance standards. Here's why:
1
Unified Protection Platform
SystoLOCK introduces a cutting-edge protection platform that offers real-time defense against identity threats stemming from compromised credentials. While maintaining passwordless approach to authentication, SystoLOCK always require it to be multi-factor, ensuring industry standard protection for all activities.
2
Seamless Active Directory Integration
SystoLOCK seamlessly integrates with Active Directory, a common directory service used in most organizations. This integration allows it to extend MFA to all authentications within Active Directory environments, irrespective of user types, authentication protocols, or resource types.
How does it work?
Client processes forward all incoming passwordless multi-factor access requests to SystoLOCK servers on premises, which then assess these requests against existing access policies. SystoLOCK's analysis determines whether to permit or deny access. Upon successful verification, SystoLOCK issues, transparently to the user, a short-lived x509 digital certificate and that certificate is then uses to access the AD. This architectural approach ensures comprehensive coverage of all authentications and access attempts within the protected environment.
SystoLOCK in Action
Here's how SystoLOCK addresses crucial aspects of NIS2 MFA requirements:
  • MFA for Privileged Access
    SystoLOCK simplifies the configuration and enforcement of MFA policies for highly-privileged users with a single click. It also effectively removes passwords on those accounts, making it impossible for password-based attacks to be carried out against those accounts. This proactive approach effectively thwarts any attempts to misuse compromised credentials for malicious access.
  • MFA for Command Line Access
    SystoLOCK goes a step further by extending MFA protection to command line tools like Cmd, PowerShell, etc. This is particularly noteworthy because traditional MFA solutions struggle to integrate with these tools due to text-based authentication protocols. SystoLOCK overcomes this challenge by enforcing MFA with impersonation when users need to utilize these tools, ensuring protection for these critical access methods and mitigating the risk of ransomware propagation.
  • MFA for Legacy Applications
    Many organizations rely on legacy applications for core operations. Implementing MFA in these applications can be challenging, often requiring changes to the application's source code. SystoLOCK simplifies this by seamlessly enforcing MFA through its Kerberos integration with AD, eliminating the operational risk associated with legacy application security.
SystoLOCK is not just a compliance solution:
It is a comprehensive identity protection platform that offers seamless integration, robust MFA coverage, and proactive defense against evolving cyber threats. By choosing SystoLOCK, organizations can confidently elevate their security posture, meet NIS2 compliance requirements, and stay ahead in the battle against cyber threats.