Follow us on social networks

Back to Terminology

NIS2 Compliance: How TrueConf Server Keeps Your Communications Secure

NIS2 compilance with TrueConf

NIS2 (Network and Information Security Directive 2) is the EU’s updated cybersecurity framework, which entered into force on 16 January 2023 replacing the original NIS Directive from 2016. Member states had until 17 October 2024 to transpose it into national legislation, with the rules applying from 18 October 2024, and many organizations are still working out what it means for their day-to-day operations.

The directive draws a clear line between two types of organizations:

Essential entities: large organizations in sectors like energy, transport, banking, healthcare, digital infrastructure, and public administration. These face the most rigorous supervision and mandatory incident reporting requirements.

Important entities: mid-sized organizations spread across a broader range of sectors. Oversight is somewhat lighter, but the underlying security obligations are largely the same.

What NIS2 actually requires organizations to do:

  • Maintain risk analysis and information security policies
  • Handle and report incidents within defined timeframes
  • Plan for business continuity and crisis scenarios
  • Assess supply chain security
  • Ensure secure acquisition, development, and maintenance of systems
  • Run cybersecurity training and awareness programs
  • Apply cryptography and encryption where appropriate
  • Enforce access controls and manage assets properly
  • Implement multi-factor authentication (MFA) across secure communications

For important entities, the maximum fine is €7 million or 1.4% of global annual turnover, whichever is higher. Notably, NIS2 also introduces direct management liability, meaning executives can be held personally accountable.

Why Your Communication Stack Is a Compliance Risk?

Here’s something that often gets overlooked: NIS2 risk-management obligations apply to the network and information systems organizations use to store, process, and transmit data, including communication tools that carry sensitive organizational information.

These systems touch strategic decisions, client communications, and internal data that organizations genuinely cannot afford to expose.

Where standard communication tools tend to fall short:

  • Unauthorized access to live meetings or archived message histories
  • Video, audio, and file transfers sent without encryption in transit
  • Data sovereignty gaps when content is processed or stored by non-EU cloud providers
  • Weak access controls that let unauthorized participants into calls or file repositories
  • Absent audit trails that make incident investigation, and NIS2 reporting, practically impossible
  • Uncontrolled third-party integrations that quietly expand your attack surface

NIS2 holds organizations accountable for the security posture of their technology vendors. If your cloud conferencing provider suffers a breach that exposes your data, that’s your compliance problem too. Deploying on your own infrastructure cuts out this third-party dependency entirely.

Security Risks Broken Down by Communication Channel?

Video Conferencing

Risk

What It Means in Practice

Uncontrolled external sharing

Consumer-grade file tools routinely bypass corporate security policies

Missing access controls

Files without role-based permissions create broad, unnecessary data exposure

No integrity verification

Without versioning, spotting unauthorized modifications is extremely difficult

Insecure sync integrations

Tools that connect to personal cloud storage are a persistent data leakage risk

Messaging

Risk

What It Means in Practice

Plaintext storage

Messages stored without encryption at rest are fully exposed in any breach scenario

No transit encryption

Messages routed via external servers can be read by the provider or intercepted en route

Uncontrolled retention

Without configurable policies, sensitive conversations accumulate without limit

Missing audit logs

Reconstructing communications during an incident investigation becomes impossible

File Sharing

Risk

What It Means in Practice

Uncontrolled external sharing

Consumer-grade file tools routinely bypass corporate security policies

Missing access controls

Files without role-based permissions create broad, unnecessary data exposure

No integrity verification

Without versioning, spotting unauthorized modifications is extremely difficult

Insecure sync integrations

Tools that connect to personal cloud storage are a persistent data leakage risk

How TrueConf Server Addresses NIS2 Requirements?

How TrueConf Server Addresses NIS2 Requirements?

TrueConf Server is a self-hosted unified communications platform that organizations deploy on their own infrastructure, whether that’s on-site servers, a private cloud environment, or a fully air-gapped network. The organization controls the deployment environment, security configuration, data flows, and integration choices, which can make the communications layer easier to align with internal security and compliance policies.

Data Sovereignty

In an on-premises or isolated deployment, video conferences, chats, files, and recordings can remain within the organization’s own infrastructure. This reduces reliance on third-party cloud processing and supports NIS2 supply-chain risk management, although external integrations, federation, streaming, SMTP, and push-notification flows should still be reviewed as part of the organization’s security assessment.

Encryption

TrueConf Server protects communications traffic with encryption mechanisms built into its architecture:

  • TLS-based protection for signaling and control data
  • AES-256 for media traffic in the TrueConf protocol
  • DTLS/SRTP for WebRTC media paths
  • H.235 for H.323 scenarios

These protections are part of the platform’s communications architecture. For stored recordings, chat files, and other data at rest, organizations should also apply appropriate infrastructure-level controls, such as disk or partition encryption, retention policies, and access restrictions.

Access Control and Multi-Factor Authentication

  • Integration with Active Directory and LDAP for centralized enterprise identity management
  • Role-based access controls applied consistently across all platform functions
  • MFA support for all users, directly aligned with NIS2’s explicit MFA requirement
  • Administrator-defined permissions governing who can schedule meetings, access recordings, share files, and manage the system

Audit Logging

TrueConf Server provides reports and logs covering user connections, calls, messages, conference recordings, server events, and settings-change history:

  • Ongoing internal security monitoring
  • Meeting NIS2’s incident reporting obligations
  • Providing the evidentiary record needed for post-incident forensic reconstruction

Isolated and Air-Gapped Deployment

TrueConf Server can operate in completely isolated environments with zero internet connectivity. For organizations in defense, critical infrastructure, government, and other high-assurance environments where strict network segregation may be required, this capability is essential rather than optional.

Secure External Collaboration

Guests and external participants can join TrueConf meetings through a browser-based WebRTC client, without installing a dedicated conferencing application or creating accounts on external conferencing platforms. Access is controlled through:

  • Guest permissions
  • Conference-level access restrictions
  • Registration and approval settings
  • Administrator-defined policies for external usersl

There’s no dependency on external authentication providers or third-party identity systems.

Business Continuity

TrueConf Server can support business continuity planning by giving organizations control over the deployment environment and operational procedures:

  • Backup and restore of server settings
  • Real-time and historical server monitoring
  • Organization-controlled maintenance windows
  • Disaster recovery planning based on the organization’s own infrastructure architecture

NIS2 Requirement Mapping

NIS2 Requirement

TrueConf Server Capability

Cryptography and encryption

TLS-based protection for signaling/control data, AES-256 for TrueConf media traffic, DTLS/SRTP for WebRTC, SRTP for SIP, H.235 for H.323 scenarios

Access control and MFA

AD/LDAP integration, group-based permissions, role-based administration, and 2FA/MFA support depending on configuration

Incident handling and audit

Reports and logs for connections, calls, messages, recordings, server events, and settings-change history

Supply chain security

On-premises or isolated deployment reduces third-party cloud processing, external integrations still require risk assessment

Business continuity

Backup and restore, monitoring, organization-controlled maintenance, and infrastructure-level disaster recovery planning

Data protection

Communications data can remain within the organization’s infrastructure in properly configured on-premises or isolated deployments

Secure communications policy

Security settings, access rules, authentication options, and user permissions can be configured and enforced at platform level

Empower your video conferencing experience with TrueConf!

FAQ

Does TrueConf Server guarantee NIS2 compliance?

No single product can guarantee NIS2 compliance, and any vendor that claims otherwise is oversimplifying. Compliance depends on how an organization implements, configures, and operates its systems, alongside broader internal policies and governance. TrueConf Server provides technical controls that can help organizations address NIS2 requirements at the communications layer; overall compliance remains the organization’s responsibility.

Is TrueConf Server appropriate for NIS2 essential entities?

Yes, the on-premises deployment model, encryption, MFA support, role-based access controls, comprehensive audit logging, and air-gapped deployment capability make TrueConf Server a strong candidate for organizations classified as essential entities, provided it is configured, governed, and operated in line with the organization’s broader NIS2 compliance program.

Does TrueConf Server work with existing security infrastructure?

Yes, TrueConf Server integrates with enterprise identity providers via LDAP and Active Directory, can support SIEM workflows through log or report export, depending on the organization’s integration approach, and deploys behind existing firewalls and network security controls without requiring architectural changes.

How does TrueConf Server support NIS2 incident reporting?

The platform’s audit logs provide the evidentiary foundation that incident investigation and regulatory reporting depend on. Reports and logs covering connections, calls, messages, recordings, server events, and settings-change history can help security teams investigate communications-layer activity and prepare incident evidence where relevant.

How should organizations evaluate TrueConf Server for their NIS2 requirements?

TThe most effective starting point is a technical consultation with TrueConf focused on your organization’s sector, infrastructure model, communication workflows, and applicable NIS2 obligations. TrueConf specialists can help assess deployment options, security controls, integration requirements, and compliance-related configuration scenarios for your environment.