NIS2-compliant AI for critical infrastructure.
Supply chain cybersecurity by hardware. Incident timelines by attestation. EU jurisdiction with direct cooperation channels to ANSSI and national CSIRTs.
Who NIS2 covers
Essential and important entities.
The transposition deadline (17 October 2024) is passed. Most Member States have published national implementing legislation through 2025 and are enforcing in 2026. NIS2 broadens scope dramatically compared to NIS1: now most mid-market companies in critical sectors are in scope, plus their cybersecurity supply chain — which includes AI inference vendors.
Essential entities
- Energy (electricity, gas, oil, hydrogen)
- Transport (air, rail, water, road)
- Banking and financial market infrastructures
- Health (hospitals, manufacturers of medical devices)
- Drinking water and wastewater
- Digital infrastructure (DNS, TLD, cloud, data centres)
- ICT service management (B2B)
- Public administration
- Space
Important entities
- Postal and courier services
- Waste management
- Chemicals manufacturing and distribution
- Food production, processing, distribution
- Manufacturing (medical devices, electronics, machinery, motor vehicles)
- Digital providers (online marketplaces, search engines, social platforms)
- Research organisations
Article 21 — supply chain security
AI inference is part of your cybersecurity supply chain.
Article 21(2)(d) requires essential and important entities to manage supply chain security including security-related aspects of relationships with direct suppliers and service providers. ENISA guidance from 2025 confirms that AI/ML services qualify when they support critical workflows. The entity must assess vendor cybersecurity practices, contractually require security measures, and verify them on an ongoing basis. Hardware-sealed inference is the highest-grade evidence available today.
Verifiable confidentiality
TDX hardware sealing means an AI vendor breach cannot leak prompts or outputs in plaintext. Provider-blind by construction.
Verifiable integrity
ECDSA attestation per request. Tampering with model version, enclave or compute environment shows up as a quote mismatch.
European cybersecurity certification alignment
Aligned with EUCC and EUCS scheme directions. Intel TDX has a public TCB recovery process and signed measurements.
EU jurisdiction
VOLTAGE EI is based in France. Cooperation with ANSSI, BSI, AgID and other national CSIRTs is direct, no transatlantic detour.
Article 23 — incident reporting
24h, 72h, one month — evidence ready in minutes.
NIS2 incident reporting timelines are tight: 24h early warning, 72h notification, one month final report. When the incident touches an AI workflow, your responders need forensic evidence about which prompt ran, on which model, and inside which enclave — fast. Per-request attestation gives them that data as a signed JSON-LD bundle, not a ticket back-and-forth with a vendor.
24h early warning
Signed quote stream filterable by tenant, model, time window. Initial classification material in minutes.
72h notification
Full attestation log export, severity assessment, indication of cross-border impact and IoCs.
1 month final report
Tamper-evident chain of custody, root cause analysis backed by signed measurements, mitigations applied.
NIS2 FAQ
Questions critical infrastructure teams ask.
Who is in scope of NIS2?
Essential entities (energy, transport, banking, financial market infrastructures, health, drinking water, wastewater, digital infrastructure, ICT service management, public administration, space) and important entities (postal, waste management, chemicals, food production, manufacturing, digital providers, research). Member States had to transpose by 17 October 2024 and many enforcement timelines are now active in 2026.
Is an AI vendor part of my supply chain under Article 21?
Yes, when the AI service supports a workflow that touches the cybersecurity posture of an essential or important entity. ENISA guidance from 2025 confirms that AI/ML services qualify. You must assess vendor cybersecurity practices, contractually require measures, and verify them on an ongoing basis.
How does VoltageGPU support NIS2 incident reporting?
Per-request ECDSA attestation gives your incident response team a tamper-evident timeline of every AI invocation. Suspicious activity in an inference path can be triangulated against signed quotes. EU jurisdiction (VOLTAGE EI, France) means cooperation channels with ANSSI and other national CSIRTs are direct.
What about management body accountability under Article 20?
NIS2 makes management bodies personally responsible for cybersecurity risk-management measures. We provide attestation evidence and contractual provisions that map directly to Article 21 measures, so your CISO and management body can demonstrate due diligence to the national authority.
What about the Cyber Resilience Act?
The CRA covers products with digital elements. AI services delivered as a service are not in CRA scope, but customers integrating AI into a CRA-regulated product benefit from hardware sealing as evidence of cybersecurity by design.
Related compliance pages
Article 12, 14, 15 and 32 obligations enforceable from 2 August 2026.
Article 28 native DPA, Article 32 confidentiality.
ICT third-party risk for banks, insurers and investment firms.
Sample attestation log JSON, retention and API access.
Vertical agents for legal, finance, regulated professionals.
Verify any request against the public attestation root.
Intel TDX, Protected PCIe, attested GPUs as raw compute.
Full agent line-up across legal, finance, healthcare and operations.
Add an NIS2-aligned AI vendor to your supply chain.
Hardware-sealed processing. Per-request attestation. EU jurisdiction with direct CSIRT cooperation.