Gianluca
May 16, 2026
3 min read

PART 1: THE LEGAL SOURCES (Where does it come from?)

You are not acting on vague advice; you are complying with specific Articles of EU Law.
1. NIS2 Directive (Directive (EU) 2022/2555)
2. DORA (Regulation (EU) 2022/2554)
3. EU PQC Recommendation (C(2024) 2490 final)
PART 2: REQUIREMENTS BY COMPANY PROFILE
Find your profile below to see exactly what Regulation applies to you and what you must do.
PROFILE A: Critical Industry and Infrastructure
Who: Energy, Transport, Health, Water, Digital Infrastructure (Cloud/Data Centers), Manufacturing (Food, Pharma).
Legal Basis: NIS2 Directive
| Requirement | Source | What you must do in 2025 |
|---|---|---|
| Cryptography Policy | NIS2 Art 21(2)(h) | You must have a written document defining which algorithms you use and why they are secure. If you use RSA-2048 without a migration plan, you are failing this requirement. |
| Supply Chain Security | NIS2 Art 21(2)(d) | You must assess the security of your direct suppliers. If your firewall vendor has no PQC roadmap, they are a supply chain risk you must document. |
| Asset Management | NIS2 Art 21(2)(i) | You need an inventory of digital assets. This is the foundation for the "Crypto-Inventory" (knowing where your keys are). |
PROFILE B: Traditional Finance (Banks, Insurers, PSPs)
Who: Banks, Insurance, Payment Institutions, Investment Firms.
Legal Basis: DORA (Primary) + NIS2 (Secondary)
| Requirement | Source | What you must do in 2025 |
|---|---|---|
| Register of Information | DORA Art 28(3) | You must submit a standardized register of every ICT third-party provider to your regulator. This includes the exact function they perform. |
| Exit Strategy | DORA Art 28(8) | You must prove you can leave a critical cloud or software provider without disrupting payments. This is legally binding. |
| Technological Resilience | DORA Art 7 | Systems must be "technologically resilient." Relying on legacy cryptography that is known to be vulnerable (even in the future) violates this resilience principle. |
PROFILE C: Crypto-Assets and Blockchain (Web3)
Who: Crypto Exchanges, Custodians, Token Issuers (CASPs).
Legal Basis: MiCA (Regulation (EU) 2023/1114) + DORA
Note: Under MiCA, authorized CASPs are classified as "Financial Entities," bringing them fully under DORA.
| Requirement | Source | What you must do in 2025 |
|---|---|---|
| ICT Risk Management | DORA Art 6 | You can no longer say "the user holds the key." If you provide the wallet interface, you are responsible for the ICT risk of that interface. |
| Custody Policy | MiCA Art 75 | Specific mandate for CASPs to have a "Custody Policy" ensuring crypto-assets are segregated and unencumbered. Quantum theft of keys is a direct threat to this legal obligation. |
| Business Continuity | DORA Art 11 | You must have a BCP (Business Continuity Plan) for "ICT-related incidents." A blockchain hard fork or consensus failure is now a reportable regulatory incident. |
PART 3: THE "HIDDEN" OBLIGATIONS (For Everyone)
These are the requirements that usually catch companies by surprise during an audit.
1. The "State of the Art" Trap
2. The Personal Liability of the Board
3. Reporting Speed