{"id":1179,"date":"2025-12-17T06:32:55","date_gmt":"2025-12-17T06:32:55","guid":{"rendered":"https:\/\/qyra.cloud\/nis2\/"},"modified":"2026-03-27T12:20:11","modified_gmt":"2026-03-27T12:20:11","slug":"nis2","status":"publish","type":"page","link":"https:\/\/qyra.cloud\/en\/nis2\/","title":{"rendered":"NIS2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1179\" class=\"elementor elementor-1179 elementor-137\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffc7a61 e-con-full e-flex e-con e-parent\" data-id=\"ffc7a61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8add1f elementor-widget elementor-widget-slider_revolution\" data-id=\"d8add1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t\t\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"nis2-1\" data-id=\"18\" id=\"welcome\" class=\"rs-respect-topbar rs-ov-hidden\" data-version=\"6.7.52\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"welcome-37\" data-key=\"37\">\n\t\t\t\t\t\t\t<sr7-txt id=\"welcome-37-1\" class=\"sr7-layer\">Qyra & NIS2<\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"welcome-37-2\" class=\"sr7-layer\">Security as a system property<br>With NIS2, security becomes an ongoing organisational responsibility. <br>Ad hoc measures or retroactive safeguards are no longer sufficient.<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"welcome-38\" data-key=\"38\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\twindow.SR7 ??={};SR7.PMH ??={}; SR7.PMH[\"welcome\"] = {cn:100,state:false,fn: function() { if (window._tpt!==undefined && window._tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"welcome\",el:[868,868,768,960,720],type:'hero',shdw:'0',gh:[868,868,768,960,720],gw:[1240,1240,1024,778,480],vpt:['20%&#039;,&#039;20%&#039;,&#039;20%&#039;,&#039;20%&#039;,&#039;20%'],size:{fullWidth:true, fullHeight:true},fho:'#masthead,',mh:'0',onh:0,onw:0,bg:{color:'{\"type\":\"solid\",\"orig\":\"#2d3032\",\"string\":\"rgba(45, 48, 50, 1)\"}'},plType:'3',plColor:'#313437'});   SR7.PMH[\"welcome\"].state=true;} else if(SR7.PMH[\"welcome\"].cn-->0)\tsetTimeout( SR7.PMH[\"welcome\"].fn,19);}};SR7.PMH[\"welcome\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b73fbe4 e-flex e-con-boxed e-con e-parent\" data-id=\"b73fbe4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c5a9dc1 e-con-full e-flex e-con e-child\" data-id=\"c5a9dc1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88ee9f0 elementor-widget elementor-widget-heading\" data-id=\"88ee9f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">System topology &amp; NIS2-compliant architecture<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60d0122 elementor-widget elementor-widget-text-editor\" data-id=\"60d0122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>qyra is designed as a secure, modular system architecture. The platform runs containerized in a Docker environment or, alternatively, on dedicated Windows or Linux servers. This flexible deployment strategy enables both on-premises installations and operation in certified data centers.  <\/p><p>At the heart of the system topology is a real-time database. It ensures consistent processing, storage, and synchronization of all operational, control, and status data. The architecture is designed to be operated with high availability, scalability, and fault tolerance.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b2f5bc e-con-full e-flex e-con e-child\" data-id=\"1b2f5bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14c7111 elementor-widget elementor-widget-image\" data-id=\"14c7111\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"454\" src=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2025\/12\/nis2.jpg\" class=\"attachment-large size-large wp-image-1166\" alt=\"\" srcset=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2025\/12\/nis2.jpg 1000w, https:\/\/qyra.cloud\/wp-content\/uploads\/2025\/12\/nis2-300x170.jpg 300w, https:\/\/qyra.cloud\/wp-content\/uploads\/2025\/12\/nis2-768x435.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa94383 e-flex e-con-boxed e-con e-parent\" data-id=\"aa94383\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f6eeed6 e-con-full e-flex e-con e-child\" data-id=\"f6eeed6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-682b85b elementor-widget elementor-widget-heading\" data-id=\"682b85b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Architecture overview<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ec08d6 elementor-widget elementor-widget-text-editor\" data-id=\"3ec08d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>qyra as software\/application is preferably operated as a Docker container and can also be run as a Windows or Linux service, depending on the deployment scenario.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb481fd elementor-widget elementor-widget-text-editor\" data-id=\"cb481fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>qyra is composed of the following components:<\/p><ul><li>Real-time database (event processing, state management)<\/li><li>Integrated PLC (IEC 61131-3)<\/li><li>Web server for visualization (SCADA) and programming \/ configuration<\/li><li>User management with role-based access control (AD, SSO)<\/li><li>Database layer for connecting SQL and NoSQL databases<\/li><li>Driver Abstraction Layer<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbb3d34 elementor-widget elementor-widget-text-editor\" data-id=\"fbb3d34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Driver Abstraction Layer enables standardized integration of a wide range of hardware and communication protocols, including:<\/p><ul><li>OPC UA (incl. security profiles)<\/li><li>BACnet Secure Connect<\/li><li>Modbus (secured with TLS)<\/li><li>other industrial protocols<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b82332 elementor-widget elementor-widget-text-editor\" data-id=\"1b82332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This clear separation of layers reduces attack surfaces and enables a clean separation between the IT and automation levels.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df6dcbb e-con-full e-flex e-con e-child\" data-id=\"df6dcbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1fb4a2 elementor-widget elementor-widget-image\" data-id=\"a1fb4a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/02\/qyra-topologie-1-3.jpg\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"900\" height=\"945\" src=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/02\/qyra-topologie-4.jpg\" class=\"attachment-full size-full wp-image-1191\" alt=\"\" srcset=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/02\/qyra-topologie-4.jpg 900w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/02\/qyra-topologie-4-286x300.jpg 286w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/02\/qyra-topologie-4-768x806.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b7cb2b e-flex e-con-boxed e-con e-parent\" data-id=\"4b7cb2b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c5c897a e-con-full e-flex e-con e-child\" data-id=\"c5c897a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71f8c73 elementor-widget elementor-widget-heading\" data-id=\"71f8c73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber threat model for building automation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f12768 elementor-widget elementor-widget-text-editor\" data-id=\"1f12768\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Building and infrastructure systems are now highly networked cyber-physical systems. Attacks are not limited to IT, but directly affect operations, safety, and availability. Manipulation can impair comfort, energy efficiency, production processes, or even people\u2019s safety.  <\/p><p>Relevant threat scenarios include, among others:<\/p><ul><li>Manipulation of field devices and control loops<\/li><li>Insider attacks via service, maintenance, or supply chains<\/li><li>Misuse of insecure or unauthenticated protocols<\/li><li>Sabotage through malware, faulty updates, or third-party software<\/li><li>Failure of central services such as network, cloud, or management systems<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16d660c elementor-widget elementor-widget-text-editor\" data-id=\"16d660c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>NIS2 requires these risks to be assessed systematically\u2014not only organizationally, but also architecturally.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-147482f e-con-full e-flex e-con e-child\" data-id=\"147482f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07812c1 elementor-widget elementor-widget-image\" data-id=\"07812c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1050\" height=\"1050\" src=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-ec-1.png\" class=\"attachment-full size-full wp-image-1180\" alt=\"\" srcset=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-ec-1.png 1050w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-ec-1-300x300.png 300w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-ec-1-1024x1024.png 1024w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-ec-1-150x150.png 150w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-ec-1-768x768.png 768w\" sizes=\"(max-width: 1050px) 100vw, 1050px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2faf612 e-flex e-con-boxed e-con e-parent\" data-id=\"2faf612\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b7762f e-con-full e-flex e-con e-child\" data-id=\"1b7762f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9f40fd elementor-widget elementor-widget-heading\" data-id=\"d9f40fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why traditional OT architectures are no longer sufficient<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92a4f0a elementor-widget elementor-widget-text-editor\" data-id=\"92a4f0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1231\" data-end=\"1440\">Traditional OT architectures often rely on <strong data-start=\"1282\" data-end=\"1306\">implicit trust<\/strong> within the network. Anyone with access is considered authorized. Under today\u2019s threat assumptions, this model is no longer viable.  <\/p><p data-start=\"1442\" data-end=\"1740\">A lack of separation of functions, unclear responsibilities, and limited traceability mean that security measures are often implemented only reactively. This is exactly where QYRA comes in: not through additional protective layers, but through a <strong data-start=\"1698\" data-end=\"1739\">fundamentally secure system architecture<\/strong>. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acdcd3c elementor-widget elementor-widget-text-editor\" data-id=\"acdcd3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>NIS2 requires these risks to be assessed systematically\u2014not only organizationally, but also architecturally.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d43a4dd e-con-full e-flex e-con e-child\" data-id=\"d43a4dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79be040 elementor-widget elementor-widget-image\" data-id=\"79be040\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1050\" height=\"1050\" src=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-2.png\" class=\"attachment-full size-full wp-image-1181\" alt=\"\" srcset=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-2.png 1050w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-2-300x300.png 300w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-2-1024x1024.png 1024w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-2-150x150.png 150w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-2-768x768.png 768w\" sizes=\"(max-width: 1050px) 100vw, 1050px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9941de e-flex e-con-boxed e-con e-parent\" data-id=\"c9941de\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5ddddc9 e-con-full e-flex e-con e-child\" data-id=\"5ddddc9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20e4196 elementor-widget elementor-widget-heading\" data-id=\"20e4196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">QYRA risk reduction through architecture<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c59c2c elementor-widget elementor-widget-text-editor\" data-id=\"1c59c2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>QYRA reduces security risks not selectively, but structurally. Key principles include: <\/p><ul><li>clear separation of control, visualization, and management<\/li><li>role-based access concepts instead of blanket network approvals<\/li><li>full traceability of all changes and configurations<\/li><li>automated recovery and rollback processes<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-644d6ab elementor-widget elementor-widget-text-editor\" data-id=\"644d6ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Security is achieved not through trust, but through transparency, control, and repeatability\u2014across planning, implementation, and operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e3737c e-con-full e-flex e-con e-child\" data-id=\"9e3737c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-258793b elementor-widget elementor-widget-image\" data-id=\"258793b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1050\" height=\"1050\" src=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-3.png\" class=\"attachment-full size-full wp-image-1184\" alt=\"\" srcset=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-3.png 1050w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-3-300x300.png 300w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-3-1024x1024.png 1024w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-3-150x150.png 150w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-3-768x768.png 768w\" sizes=\"(max-width: 1050px) 100vw, 1050px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71d7e0c e-flex e-con-boxed e-con e-parent\" data-id=\"71d7e0c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4855cc e-con-full e-flex e-con e-child\" data-id=\"c4855cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e28780a elementor-widget elementor-widget-heading\" data-id=\"e28780a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Protocol and zone strategy based on NIS2 logic<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad92711 elementor-widget elementor-widget-text-editor\" data-id=\"ad92711\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>QYRA follows a clear protocol and zone strategy aligned with modern security requirements.<\/p><p>Preferred protocols:<\/p><ul><li>OPC UA: security by design with certificates, role models, and auditability<\/li><li>EtherCAT: deterministic real-time communication within a clearly delineated OT domain<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4894060 elementor-widget elementor-widget-text-editor\" data-id=\"4894060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Traditional protocols such as BACnet or KNX can still be integrated, but only within defined security zones and with additional protective measures. This keeps existing systems usable without compromising security requirements. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c09495 e-con-full e-flex e-con e-child\" data-id=\"4c09495\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-605338c elementor-widget elementor-widget-image\" data-id=\"605338c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1050\" height=\"1050\" src=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-5.png\" class=\"attachment-full size-full wp-image-1183\" alt=\"\" srcset=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-5.png 1050w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-5-300x300.png 300w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-5-1024x1024.png 1024w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-5-150x150.png 150w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-5-768x768.png 768w\" sizes=\"(max-width: 1050px) 100vw, 1050px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45cba45 e-flex e-con-boxed e-con e-parent\" data-id=\"45cba45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3e8c65e e-con-full e-flex e-con e-child\" data-id=\"3e8c65e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-255492b elementor-widget elementor-widget-heading\" data-id=\"255492b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Audit, compliance, and management benefits<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4dae79 elementor-widget elementor-widget-text-editor\" data-id=\"d4dae79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>QYRA supports key requirements from NIS2, ISO\/IEC 27001, and the GDPR directly in the system design:<\/p><ul><li>Access control through role models and multi-factor authentication<\/li><li>Traceability via Git-based versioning, journals, and logging<\/li><li>Resilience through redundancy and automated recovery<\/li><li>Incident response support through alerting and recovery<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c51a6db elementor-widget elementor-widget-text-editor\" data-id=\"c51a6db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>For management, this means:<\/p><ul><li>reduced liability and operational risks<\/li><li>improved audit and reporting capability<\/li><li>lower organizational effort<\/li><li>a sustainable, future-proof architecture<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e196a elementor-widget elementor-widget-text-editor\" data-id=\"a3e196a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tThis turns NIS2 from a regulatory obligation into a strategic quality attribute of the entire automation solution.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-810e1de e-con-full e-flex e-con e-child\" data-id=\"810e1de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f46127 elementor-widget elementor-widget-image\" data-id=\"1f46127\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1050\" height=\"1050\" src=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-4.png\" class=\"attachment-full size-full wp-image-1182\" alt=\"\" srcset=\"https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-4.png 1050w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-4-300x300.png 300w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-4-1024x1024.png 1024w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-4-150x150.png 150w, https:\/\/qyra.cloud\/wp-content\/uploads\/2026\/01\/qyra-cyber-sec-4-768x768.png 768w\" sizes=\"(max-width: 1050px) 100vw, 1050px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>System topology &amp; NIS2-compliant architecture qyra is designed as a secure, modular system architecture. The platform runs containerized in a Docker environment or, alternatively, on dedicated Windows or Linux servers. This flexible deployment strategy enables both on-premises installations and operation in certified data centers. At the heart of the system topology is a real-time database. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1179","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/pages\/1179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/comments?post=1179"}],"version-history":[{"count":6,"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/pages\/1179\/revisions"}],"predecessor-version":[{"id":1241,"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/pages\/1179\/revisions\/1241"}],"wp:attachment":[{"href":"https:\/\/qyra.cloud\/en\/wp-json\/wp\/v2\/media?parent=1179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}