Article 21 Compliance: NIS2 Requirements for Container-Based Workloads

By
Debra Hopper
April 20, 2026

The NIS2 directive is now in full force across the EU. Senior executives face personal liability for cybersecurity failures, and enforcement is tightening. Most compliance discussions have focused on governance frameworks, network segmentation, and access controls, all of which are necessary, but incomplete.

There's a significant blind spot that most organisations are only now confronting: the container images running in production. If your workloads are built on unvetted base images pulled from public registries, you may already be failing multiple Article 21 requirements before writing a single policy document.

This guide maps NIS2 requirements directly to container security controls. It's written for platform and DevSecOps engineers, to help you understand what compliance looks like at the infrastructure layer and what to actually do about it.

NIS2 Requirements: 10 Requirement Areas Under Article 21(2)a

Article 21 is the operational core of the NIS2 directive. It mandates that all covered essential and important entities implement "appropriate and proportionate technical, operational and organisational measures" to manage cybersecurity risk. There are ten specific NIS2 requirement areas defined under Article 21(2):

  • (a) Risk analysis and information system security policies
  • (b) Incident handling
  • (c) Business continuity and crisis management
  • (d) Supply chain security, including relationships with direct suppliers and service providers
  • (e) Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure
  • (f) Policies and procedures to assess the effectiveness of cybersecurity risk-management measures
  • (g) Basic cyber hygiene practices and cybersecurity training
  • (h) Policies and procedures regarding the use of cryptography and encryption
  • (i) Human resources security, access control policies and asset management
  • (j) Multi-factor authentication and secured communications

For container-based workloads, the clauses that bite hardest are (d), (e), (f), (g), and (i). These cover software supply chain security, vulnerability management, effectiveness assurance, cyber hygiene, and asset inventory, all areas where container infrastructure is directly in scope and frequently under-addressed.

Why Containers Matter for NIS2 Compliance

Container images are software supply chain inputs. When your platform engineers run docker pull nginx or reference python:3.11 in a Dockerfile, they're introducing a third-party software component and all its included packages, dependencies, and CVEs into the core of your production infrastructure.

This matters for NIS2 compliance in several concrete ways:

Base images carry significant CVE debt.

Public registry images like node:latest or ubuntu:22.04 routinely contain hundreds of known CVEs. Most are inherited from underlying OS packages that have nothing to do with your application; but they're present, they're scannable, and under NIS2 Article 21(e), you're responsible for them.

A compromised base image touches everything built on top of it,

If your base image has a critical vulnerability, every service, microservice, and job that extends that image inherits the same risk. A single unpatched base can be a lateral movement vector across your entire container estate, which is precisely the kind of systemic supply chain risk NIS2 is designed to address.

Containers are explicitly in scope under NIS2.

Containerised workloads are part of your "network and information systems" as defined by the directive. They process data, expose services, and form part of your ICT infrastructure. There's no container exemption, and regulators are increasingly sophisticated about what modern production environments look like. Running unpatched container images is not a defensible position under audit.

Mapping NIS2 Requirements to Container Security Controls

The table below maps the most relevant Article 21 clauses to specific container security controls. This is the framework for understanding where your container posture either supports or undermines your NIS2 compliance position.

Article 21 Clause Requirement Summary Container Security Control
21(2)(d): Supply chain security Assess and manage risks from direct suppliers and service providers SBOMs; hardened, provenance-verified images from a trusted source
21(2)(e): Vulnerability handling Policies to identify, disclose, and remediate vulnerabilities in systems Continuous CVE scanning with exploitability-based prioritisation; minimal images to reduce the CVE surface
21(2)(f): Effectiveness assessment Prove that your security controls are actually working Compliance dashboards; audit-ready attestations against CIS and NIST benchmarks
21(2)(g): Cyber hygiene Apply basic security practices and remove unnecessary risk Minimal images strip out unused packages, shells, and tools that expand attack surface
21(2)(i): Asset management Maintain an inventory of all relevant assets and their security state SBOM-based component tracking gives a precise inventory of every package in every image

The following sections expand on each of these requirements and what "done" actually looks like in practice.

21(2)(d): Supply Chain Security

Article 21(d) requires organisations to manage security risks arising from direct suppliers and service providers. For container workloads, the question is simple: do you know exactly what software is inside your images?

A Software Bill of Materials (SBOM) is the mechanism for answering that question. An SBOM is a machine-readable inventory of every package, library, and component inside an image, along with version information and provenance data. Under NIS2, SBOMs are the audit artefact that proves you understand what's in your software supply chain and that you can identify and respond to vulnerabilities within it.

SBOMs also enable the downstream requirement: when a new CVE drops, you need to know which of your images are affected and whether any of those CVEs are under active exploit. Without an SBOM, that triage is manual and slow. With one, it's automated.

21(2)(e): Vulnerability Handling

NIS2 requires policies and procedures to identify, assess, and remediate vulnerabilities in your systems. For containers, this breaks into two complementary strategies:

  • Reduce the vulnerability surface at the source: Standard public registry images include OS shells, package managers, debug tools, and dozens of packages your application never uses, all of which carry CVE risk. Minimal, hardened images strip out everything non-essential. If a package isn't there, it can't be exploited.
  • Prioritise what remains by exploitability, not just severity score. Not every CVE is equal. A CVSS score tells you theoretical severity; what matters operationally is whether a CVE is under active exploit and whether it's reachable in your specific environment. Real-time threat intelligence feeds that flag exploited CVEs mean your team works the right list, not the longest one.

21(2)(f): Effectiveness Assessment 

"Appropriate measures" under NIS2 aren't self-certifying; you must be able to demonstrate them to auditors and national competent authorities. For container security, demonstrable compliance means:

  • Alignment with recognised security benchmarks such as CIS Controls and NIST standards
  • Native reporting that shows compliance posture at a glance, not a manual spreadsheet exercise
  • Automated, continuously updated attestations rather than point-in-time snapshots that go stale

This is where many teams struggle. They may have done the right things technically, but they can't produce evidence quickly when an audit arrives. Compliance dashboards that report against CIS and NIST standards in real time close that gap.

21(2)(g): Cyber Hygiene, The Principle of Least Privilege, Applied to Images

Basic cyber hygiene for containers means running only what you need. Public registry images violate this principle routinely; they're built for developer convenience, not production security. A typical node:20 image includes a full Debian/Ubuntu base, a package manager, build tools, and often shells. None of that belongs in a production container.

Minimal images enforce hygiene by default. Without a shell, an attacker who achieves container escape has significantly fewer post-exploitation options. Without a package manager, installing additional malicious tooling becomes much harder. This is attack surface reduction in its most literal form, and it's a direct implementation of Article 21(g).

21(2)(i): Asset Management

NIS2 requires organisations to maintain an overview of all relevant assets and ensure they're properly handled. In a containerised environment, your images and their constituent packages are assets. 

SBOMs provide a precise, machine-readable inventory of exactly what's running, including which images, which packages, and which versions, at a level of granularity that traditional IT asset management tools don't reach.

When a new vulnerability disclosure hits, an SBOM-backed inventory means you can answer "are we affected?" in seconds rather than days.

Meeting NIS2 Requirements: What Auditors and NCAs Will Look For

National Competent Authorities (NCAs) responsible for NIS2 directive enforcement have broad audit powers, including on-site inspections, targeted security assessments, and requests for documented evidence of controls. For container security specifically, expect scrutiny on:

  • Supplier security posture: Where do your base images come from? What is the security track record of that source? Can you demonstrate due diligence on third-party components?
  • Vulnerability identification and response times: How quickly can you identify an affected image when a new CVE is disclosed? What is your patching cadence?
  • Asset inventory completeness: Can you enumerate every image running in production and its component inventory?
  • Evidence of baseline benchmarks: Are your images aligned to recognised security standards such as CIS? Can you demonstrate this in a report, not just assert it?

The common thread: compliance requires evidence, not just intent. Automated, continuously maintained compliance artefacts, such as SBOMs, benchmark reports, and CVE dashboards are what turn good security practices into defensible compliance positions.

How Minimus Addresses NIS2 Requirements

Minimus is built specifically to solve the container security compliance problem. Its core capabilities map directly to the NIS2 requirements covered in this guide, delivering compliance artefacts and security controls that work by default.

Hardened Images with Near-Zero CVEs

Minimus provides hundreds of hardened, minimal container images built from source with the latest security patches. By stripping out everything unnecessary, such as shells, package managers, debug tools, and unused OS packages, Minimus images address NIS2 requirements at the foundation. Customers consistently achieve over a 97% reduction in CVEs compared to standard public registry alternatives.

Signed SBOMs for Every Image

Every Minimus image comes with an automatically generated, cryptographically signed SBOM. You don't have to add an SBOM generation step to your pipeline; it's produced as a standard output for every image. This gives you the package-level inventory required for NIS2 Article 21(d) and 21(i) by default, with artefacts that are immediately usable as audit evidence.

CIS and NIST Benchmark Compliance with Native Reporting

Minimus images are built and validated against CIS Controls and NIST standards. Compliance posture is visible directly in the Minimus web console, with native reporting that lets you demonstrate benchmark alignment without manual evidence collection. For NIS2 compliance, this is the difference between telling an auditor "we follow best practices" and showing them a real-time compliance dashboard.

Continuously Rebuilt from Source

Minimus images are rebuilt from source automatically whenever an upstream package changes: not on a weekly schedule, not when a scan happens to catch something, but continuously. This means your images are always current against the latest patches, eliminating the CVE drift that accumulates when images are built once and left running. For the vulnerability patching cadence that NIS2 Article 21(e) expects, this is the operationally correct answer.

Real-Time CVE Intelligence with Exploitability Prioritisation

Minimus maintains a real-time feed of CVEs and automatically alerts you when a new vulnerability affects one of your images. CVEs are prioritised by exploitability, not just CVSS score, so your team focuses remediation effort where it actually matters. For NIS2's vulnerability handling requirements, this closes the loop between disclosure and response, and provides the documented response timeline that auditors ask for.

Getting Your Container Environment NIS2 Ready: Where to Start

If your container security posture needs work, here's a practical sequence to follow:

  1. Audit what you're actually running: Inventory your current base images. How many come from public registries? When were they last updated? Run a CVE scan across your image estate if you haven't recently. The results are often a significant wake-up call.
  2. Replace public registry images with hardened alternatives: This is the highest-leverage single action you can take. Switching base images eliminates the vast majority of CVEs without changing anything about your application code or deployment pipeline.
  3. Ensure SBOMs are available for all images: Your image inventory should have machine-readable, signed SBOMs. These are the audit artefacts that prove supply chain visibility under Article 21(d) and 21(i).
  4. Establish a continuous patching cadence: Images that were secure at build time drift over time as new CVEs are disclosed. Continuous rebuilds from source eliminate this drift. Periodic rebuilds on a fixed schedule leave windows of exposure.
  5. Implement exploitability-based CVE triage: Not every vulnerability needs immediate response. A prioritisation system that flags CVEs under active exploit, and makes it clear which of your images are affected, means your team works efficiently rather than reactively.
  6. Document everything for audit readiness: Compliance controls are only half the job. Compliance reports, benchmark alignments, and CVE response records are the other half. Build this into your process rather than assembling it under audit pressure.

NIS2 Compliance Starts at the Container Layer

NIS2 Article 21 compliance isn't just a governance exercise; it reaches into the infrastructure layer. For organisations running containerised workloads, the container image is where compliance starts. CVE-laden images inherited from public registries are a direct Article 21 liability, and the absence of SBOMs, benchmark reporting, and a continuous patching process are the specific gaps that audits will expose.

The regulatory stakes are real: essential entities face fines of up to €10 million or 2% of global revenue, and senior executives bear personal liability for cybersecurity failures. The good news is that the container security layer is one of the most addressable parts of a NIS2 compliance programme. Hardened images, automated SBOMs, and continuous CVE intelligence close the gaps that matter most, and produce the audit artefacts that make compliance demonstrable rather than merely asserted.

Operationalising NIS2 Compliance with Minimus

Minimus provides hardened, minimal container images built from source, with signed SBOMs, CIS and NIST benchmark attestations, and real-time CVE intelligence generated automatically for every image. Organisations using Minimus achieve a 97% reduction in container CVEs on average compared to standard public registry images. Schedule a demo to see how Minimus addresses NIS2's container security requirements in practice.

Debra Hopper
Marketing
Sign up for minimus

Avoid over 97% of container CVEs

Access hundreds of hardened images, secure Helm charts, the Minimus custom image builder, and more.