From NIS2 Compliance To End‑To‑End Zero‑Trust: Building A Full ZTNA 2.0 Architecture
- Cedric KTORZA
- Dec 8, 2025
- 11 min read
Updated: Dec 15, 2025

Introduction: NIS2 Is Just The Beginning
NIS2 changes the rules of the game.
Across Europe, the new NIS2 Directive is forcing organisations to strengthen their security posture, rethink risk management and prove cyber resilience. But aligning with NIS2 requirements is not enough on its own: real resilience comes from moving towards a comprehensive Zero‑Trust architecture, powered by modern ZTNA 2.0 approaches.
In this article, we explain how to move post‑NIS2 from compliance “on paper” to a practical, end‑to‑end Zero‑Trust model, and how a global integrator like Score Group – through our Noor ITS, Noor Technology and Noor Energy divisions – can help you build a secure, high‑performance digital foundation.
Understanding NIS2: What Changes For Your Cybersecurity Strategy?
What Is NIS2 And Who Is Concerned?
The NIS2 Directive, adopted by the European Union and applicable from October 2024 in Member States, extends and strengthens the original NIS framework on the security of network and information systems. It:
Significantly expands the scope to many more sectors (energy, transport, health, manufacturing, digital providers, public administration and more).
Introduces more stringent security and reporting obligations for “essential” and “important” entities.
Raises the bar on governance, risk management and supply‑chain security.
Establishes stronger supervision and sanctions in case of non‑compliance.
For many organisations, NIS2 is a catalyst to modernise architectures, documentation and operational practices across IT and OT (operational technology) environments.
Key NIS2 Requirements Relevant To Zero‑Trust
Among the obligations introduced or reinforced by NIS2, several align directly with a Zero‑Trust and ZTNA 2.0 approach, including:
Risk‑based security: continuous risk analysis, security by design and by default.
Access control and identity management: strong authentication, least privilege, account lifecycle management.
Network and information system security: segmentation, monitoring, incident detection and response.
Supply‑chain and third‑party risk: assessing and controlling access for partners, suppliers and service providers.
Business continuity and resilience: backup, disaster recovery and crisis management.
In other words, NIS2 creates a regulatory push toward Zero‑Trust principles, even if the directive does not explicitly use that term.
Zero‑Trust & ZTNA 2.0: Beyond Traditional Perimeter Security
From “Trust But Verify” To “Never Trust, Always Verify”
Traditional security models assumed a “trusted” internal network and “untrusted” external world. Once inside the perimeter, users and systems enjoyed broad access. This approach is no longer viable in a world of cloud, remote work and sophisticated attackers.
Zero‑Trust reverses this logic: every access request is treated as untrusted by default, regardless of network location. Access is granted dynamically based on identity, device posture, context and continuous verification. Core principles include:
Verify explicitly every user, device, application and workload.
Use least‑privilege access with granular authorisations.
Assume breach and minimise blast radius through segmentation and monitoring.
What Is ZTNA 2.0?
Zero‑Trust Network Access (ZTNA) is the technical implementation of Zero‑Trust for network and application access. ZTNA 1.0 mainly replaced VPNs with application‑level access, but often with limited visibility and coarse‑grained policies.
ZTNA 2.0 (a term popularised by several leading vendors) goes further by:
Applying continuous, identity‑centric access control at the application and user level.
Evaluating device posture (patch level, security agent, configuration) before and during sessions.
Providing deep visibility into application traffic, user behaviour and threats.
Enabling micro‑segmentation and context‑aware policies across datacenters, clouds and remote users.
For organisations under NIS2, ZTNA 2.0 is a powerful way to converge compliance, security and user experience.
Post‑NIS2: Why A Full Zero‑Trust Architecture Is The Logical Next Step
From Compliance Checklist To Living Security Architecture
Passing an audit or publishing procedures is not enough to withstand modern cyber threats. A “paper‑compliant” NIS2 posture can still leave critical gaps, such as lateral movement within the network, over‑privileged accounts or unmanaged third‑party access.
An end‑to‑end Zero‑Trust design helps you:
Operationalise NIS2 requirements through concrete controls, not just documents.
Reduce attack surface across cloud, datacenter, OT and remote access.
Improve detection and response through unified visibility and telemetry.
Support digital transformation and remote work without sacrificing security.
Typical Gaps Revealed By NIS2 Assessments
In practice, organisations preparing for NIS2 often discover issues such as:
Flat networks with little or no segmentation between critical systems and standard users.
Legacy VPNs granting broad network access instead of application‑level access.
Lack of unified identity and access management across on‑premises and cloud.
Shadow IT and uncontrolled SaaS usage.
Limited monitoring of third‑party and contractor access.
A Zero‑Trust and ZTNA 2.0 roadmap addresses these issues systematically, turning regulatory pressure into an opportunity to modernise the entire infrastructure.
A Tripartite Approach: How Score Group Supports Your Zero‑Trust Journey
Score Group: Integrating Energy, Digital And New Tech
Score Group acts as a global integrator at the crossroads of energy, digital infrastructure and new technologies. Our mission is to support organisations in their energy and digital transformation with tailor‑made solutions, where operational efficiency meets innovation.
Our architecture is built on three complementary pillars:
Noor Energy – Intelligent, sustainable and profitable energy management.
Noor ITS – The digital infrastructure and cybersecurity backbone.
Noor Technology – Advanced technologies such as AI, RPA, IoT and bespoke applications.
This tripartite vision positions Score Group as a strategic partner to design and deploy Zero‑Trust‑ready infrastructures that are both energy‑efficient and digitally resilient.
Noor ITS: The Digital Infrastructure And Cybersecurity Foundation
Our division Noor ITS provides the core IT capabilities required for a Zero‑Trust and ZTNA 2.0 strategy, including:
Infrastructure IT: network and system design, optimisation and maintenance.
Cybersecurity: audits, protection measures, incident response and security operations.
DataCenters: design and optimisation for availability, performance and security.
Cloud & Hosting: private, public and hybrid cloud architectures.
Digital Workplace: secure, collaborative work environments adapted to hybrid work.
PRA / PCA: disaster recovery and business continuity planning.
Within this framework, we help clients evolve from perimeter‑based models to identity‑centric, segmented and monitored architectures aligned with NIS2 obligations.
Noor Technology: Enabling Intelligent, Context‑Aware Security
Noor Technology brings advanced capabilities that amplify Zero‑Trust and ZTNA 2.0, such as:
Artificial Intelligence for anomaly detection, predictive analytics and automated classification.
RPA (Robotic Process Automation) to automate security workflows, provisioning and compliance checks.
Smart Connecting (IoT) to integrate sensors and connected devices into a unified, monitored fabric.
Application development (web, mobile, business applications) embedding security and Zero‑Trust principles by design.
By combining these capabilities, we help organisations build adaptive security controls able to react to risk signals in real time.
Noor Energy: Securing Smart Buildings And Critical Energy Assets
Zero‑Trust extends beyond pure IT – it must also cover buildings, industrial sites and energy systems. Our division Noor Energy focuses on:
Energy management: monitoring, control and optimisation of consumption.
Building management: intelligent BMS/BAS systems and smart building solutions.
Sustainable mobility: EV charging infrastructure, green fleets, electromobility.
Renewable energies: solar, self‑consumption and storage solutions.
By securing the digital interfaces of these systems, we help ensure that your energy and building infrastructure is both efficient and cyber‑resilient, a key consideration for many NIS2‑regulated sectors.
Designing A Post‑NIS2 Zero‑Trust & ZTNA 2.0 Architecture
Core Building Blocks Of A Full Zero‑Trust Architecture
A mature, enterprise‑wide Zero‑Trust design typically includes the following components:
Identity & Access Management (IAM) with strong authentication, SSO and role‑based access control.
Endpoint security and device posture checking for laptops, mobiles, servers and IoT devices.
ZTNA 2.0 for secure, application‑level access from anywhere.
Network segmentation and micro‑segmentation in datacenters, OT networks and cloud.
Security monitoring & analytics: SIEM, UEBA, SOC capabilities with incident response playbooks.
Data protection: classification, DLP, encryption and backup/restore strategies.
At Score Group, our Noor ITS teams help design these building blocks to fit your existing environment and regulatory context, while Noor Technology can enrich them with AI‑driven analytics and automation.
Zero‑Trust And ZTNA 2.0 Architecture Overview
Conceptually, a ZTNA 2.0‑enabled Zero‑Trust architecture positions identity and context at the centre, orchestrating access to applications and data regardless of where they run (on‑premises, private cloud, public cloud, SaaS). Each request is evaluated against security policies that consider user role, device posture, location and risk signals.
This approach:
Eliminates implicit trust based on network location.
Simplifies secure remote work by replacing broad VPN access with targeted application access.
Improves resilience by limiting lateral movement opportunities in case of compromise.
Supports NIS2 reporting through detailed logs, audit trails and centralised visibility.
Typical Migration Path From Legacy VPN To ZTNA 2.0
Moving from perimeter VPNs to ZTNA 2.0 is a journey that usually follows these steps:
Inventory and classify applications (internal, SaaS, OT interfaces, admin consoles).
Integrate identity sources (directory services, HR systems, identity providers).
Pilot ZTNA 2.0 for a subset of users and critical applications.
Gradually replace VPN access with application‑level access policies.
Extend to third parties (suppliers, partners, contractors) and OT use cases.
Automate provisioning and de‑provisioning with workflows and RPA where relevant.
Our Noor ITS and Noor Technology divisions can support every phase, from initial assessment to industrialisation across multiple sites and countries.
Key Architectural Decisions To Get Right
Several design choices are critical for a sustainable Zero‑Trust and ZTNA 2.0 deployment:
Centralised vs. distributed enforcement of access policies.
Integration with existing security tools (firewalls, EDR, SIEM, OT monitoring).
Coverage of OT and building systems, not just office IT.
Performance and user experience, especially for remote and mobile users.
Energy efficiency and sustainability, aligning cyber investments with environmental goals.
At Score Group, we design architectures where security, performance and energy efficiency go hand in hand, in line with our mission: “Where efficiency embraces innovation”.
Illustrative HTML Table: Mapping NIS2 Themes To Zero‑Trust & ZTNA 2.0 Controls
How NIS2 Requirements Align With Zero‑Trust And ZTNA 2.0
NIS2 Theme | Zero‑Trust / ZTNA 2.0 Control | Score Group Divisions Involved |
|---|---|---|
Risk management & governance | Zero‑Trust strategy, architecture reviews, continuous risk assessments | Noor ITS (cybersecurity), Noor Technology (analytics) |
Access control & identity | IAM, MFA, role‑based access, ZTNA 2.0 for application‑level access | Noor ITS (infrastructure & IAM), Noor Technology (automation) |
Network & system security | Segmentation, micro‑segmentation, secure remote access, endpoint posture checks | Noor ITS (network, datacenter, cloud) |
Operational resilience | Backups, PRA/PCA, incident response playbooks, SOC integration | Noor ITS (PRA/PCA), Noor Technology (RPA, orchestration) |
Supply‑chain & third‑party access | Granular third‑party access via ZTNA 2.0, continuous monitoring, vendor risk assessments | Noor ITS (cybersecurity), Noor Technology (monitoring & integration) |
Physical & environment‑related security | Secure smart building systems, protected OT networks, integrated monitoring | Noor Energy (buildings & energy), Noor ITS (OT/IT convergence) |
Best Practices For A Successful Post‑NIS2 Zero‑Trust Program
1. Start With A Clear Vision And Executive Sponsorship
Zero‑Trust is not a single product but a multi‑year transformation. It requires a clear vision aligned with business objectives, endorsed by leadership. Defining a high‑level roadmap – from quick wins (securing remote access, critical admin interfaces) to long‑term goals (micro‑segmentation, OT coverage) – helps prioritise investments and maintain momentum.
2. Build On Strong Identity Foundations
A robust identity layer is essential. This includes unified directories, clean role definitions, lifecycle processes for joiners/movers/leavers, and strong authentication. Without this, Zero‑Trust policies are difficult to implement consistently. Noor ITS can help rationalise identity stores and integrate them with ZTNA 2.0 platforms.
3. Prioritise Critical Assets And High‑Risk Use Cases
Rather than trying to “do everything at once”, focus first on:
Critical applications for NIS2‑regulated services.
Admin and remote access to sensitive systems.
Third‑party access (maintenance, support, partners).
OT and building management system interfaces.
This risk‑based approach delivers measurable risk reduction early in the program and supports NIS2‑related reporting.
4. Integrate Monitoring, Analytics And Automation
Modern attackers move quickly. To keep pace, organisations benefit from:
Centralised logging and monitoring across network, endpoints, cloud and OT.
Analytics and AI to detect anomalies and suspicious behaviour.
Automated responses for common scenarios (account disablement, access revocation, isolation of compromised devices).
Our Noor Technology teams can help embed AI and RPA into your security operations, making your Zero‑Trust architecture more responsive and cost‑effective.
5. Consider Energy Efficiency And Sustainability
Security projects are often seen as pure cost centres. By working with Score Group, you can design architectures that also improve energy efficiency and environmental performance. For example:
Consolidating datacenter resources and security appliances to reduce power usage.
Optimising building and cooling systems through Noor Energy, while securing their digital controls.
Using modern cloud services where they demonstrably improve both security and energy footprint.
This integrated view turns your Zero‑Trust journey into a driver of both resilience and sustainability.
Practical Examples Of Post‑NIS2 Zero‑Trust Use Cases
Securing Remote Maintenance Of Critical Systems
Many NIS2‑regulated organisations rely on external vendors for maintenance of critical systems (SCADA, industrial controllers, building management). Instead of granting VPN access to an entire network segment, ZTNA 2.0 enables:
Granular access to specific admin consoles and APIs only.
Time‑limited sessions with stronger approval flows.
Full session logging for forensic analysis and compliance.
Continuous posture checks on the vendor’s device.
This reduces both regulatory risk under NIS2 and operational risk from supplier compromise.
Protecting Smart Buildings And Energy Infrastructure
Through Noor Energy and Noor ITS, Score Group can help secure the digital layer of smart buildings and energy systems by:
Segmenting building management networks from corporate IT.
Applying Zero‑Trust controls to remote access for facility managers.
Monitoring anomalous behaviours on IoT devices and controllers.
Integrating building and energy data with security monitoring platforms.
The result is a building or industrial site that is not only energy‑optimised, but also resilient against cyber incidents that could impact safety or availability.
Supporting Hybrid Work With Strong Security And Good UX
With NIS2, many organisations must prove they can secure hybrid workforces. By replacing traditional VPNs with a modern ZTNA 2.0 solution, supported by Noor ITS, you can:
Provide fast, seamless access to applications from any location.
Enforce context‑aware policies (device compliance, geolocation, time of day).
Reduce exposure to credential theft and lateral movement.
Simplify the user experience with SSO and unified portals.
This demonstrates to regulators and stakeholders that security measures are embedded in everyday operations, not just theoretical.
FAQ: Moving From NIS2 Compliance To A Full Zero‑Trust & ZTNA 2.0 Strategy
What is the relationship between NIS2 and Zero‑Trust?
NIS2 is a regulatory framework setting out obligations for risk management, governance and operational security, while Zero‑Trust is a security architecture and mindset. They are complementary: Zero‑Trust provides a practical way to implement many NIS2 requirements, such as strict access control, segmentation and continuous monitoring. By designing your infrastructure around Zero‑Trust principles, you can demonstrate to regulators that security is enforced through concrete technical controls, not only policies and documentation. This alignment helps reduce both compliance risk and real‑world cyber‑attack impact.
How does ZTNA 2.0 improve on traditional VPNs in a NIS2 context?
Traditional VPNs extend the internal network perimeter to remote users, often giving them broad access once connected. This conflicts with least‑privilege principles and makes it harder to limit lateral movement. ZTNA 2.0 replaces this model with application‑level access, where each user and device is continuously verified and granted access only to specific resources. For NIS2‑regulated organisations, this brings finer control over third‑party and remote access, richer logging for incident reporting, and an easier way to prove that access rights are aligned with roles and risk levels.
Is Zero‑Trust only relevant for IT systems, or also for OT and buildings?
Zero‑Trust is highly relevant for operational technology (OT) and smart buildings. Many NIS2‑covered services depend on industrial control systems, building management solutions and energy infrastructure. These environments increasingly rely on IP networks and remote access, which exposes them to cyber threats. Applying Zero‑Trust to OT and building systems means segmenting control networks, tightly controlling remote maintenance, and monitoring device behaviour. With its Noor Energy and Noor ITS divisions, Score Group can help you extend Zero‑Trust controls beyond the office network to the entire operational ecosystem.
How long does it typically take to move towards a full Zero‑Trust architecture?
The duration depends on your starting point, size and regulatory scope, but Zero‑Trust is generally a multi‑year journey. Many organisations begin with a six‑ to twelve‑month phase focused on quick wins: securing remote access with ZTNA 2.0, improving identity management and protecting critical applications. Subsequent phases extend to micro‑segmentation, OT environments and automation. The key is to adopt a phased roadmap, aligned with NIS2 milestones, rather than aiming for a “big bang”. Score Group can help you define this trajectory and prioritise initiatives providing the highest risk reduction.
How can Score Group support our NIS2 and Zero‑Trust projects?
Score Group combines cyber expertise, infrastructure know‑how and energy optimisation. Through Noor ITS, we assist with security audits, architecture design, network and cloud transformation, and PRA/PCA planning. Noor Technology brings AI, automation and application development capabilities to modernise monitoring and workflows. Noor Energy ensures that your buildings and energy systems are both efficient and secure. Together, these divisions allow us to build integrated, Zero‑Trust‑ready environments tailored to your operational, strategic and environmental challenges. You benefit from a single partner capable of orchestrating technology, process and governance changes.
What’s Next?
NIS2 is a powerful driver to modernise your security posture, but real resilience comes from embracing a full Zero‑Trust and ZTNA 2.0 architecture across IT, OT and energy infrastructure. At Score Group, we design and integrate end‑to‑end solutions where efficiency meets innovation, through our Noor ITS, Noor Technology and Noor Energy divisions. To discuss your current situation and explore a tailored roadmap, visit our homepage at score-grp.com and reach out to our teams. Together, we can turn regulatory pressure into a strategic advantage for your organisation.



