Regulations & Standards

How PKI Supports Compliance Requirements

Requirements such as NIS2, DORA or KRITIS frameworks demand state-of-the-art safeguards, traceable processes and reliable evidence. PKI is a key building block because it enables authenticity, integrity and encrypted communication at scale—provided the certificate lifecycle (CLM) is managed and keys are adequately protected (e.g., using HSMs).

Practical PKI Relevance

  • Authenticity
    mTLS and client certificates for unambiguous identification of devices/services.
  • Integrity
    Signatures (including code signing and documents) provide proof of origin and integrity.
  • Confidentiality
    TLS/HTTPS as the standard for encryption in transit (external and internal).
  • Governance
    CLM: policies, approvals, audit trail, rotation/revocation, and reports as evidence.
  • Key‑Custody
    HSM: protection of private keys, role models, quorum/M-of-N, and logging.

Typical Evidence (Artifacts)

Audit‑Trail

Evidence of who requested, issued, renewed, or revoked certificates and when.

Policy‑Evidence

Documented policies (SAN constraints, validity periods, algorithms, environment rules).

Outage Prevention

Monitoring and automated renewal as a contribution to operational resilience.

HSM Controls

Key generation in the HSM, dual control, separated roles, as well as logging and reviews.

Note

This content does not constitute legal advice. Legal and compliance teams should be involved for binding interpretation and implementation.

NIS2

Strengthens requirements for risk management, governance, and reporting mechanisms. PKI/CLM support secure communication, strong authentication, and auditable processes.

DORA

Focus on ICT risk management, resilience testing, and third-party risk. PKI/CLM provide technical controls and evidence artifacts.

KRITIS (DE)

Requires appropriate technical and organizational measures. PKI and HSM-backed key processes are typical building blocks for traceable security controls.

TISAX

Assessment mechanism for information security in the automotive supply chain. PKI supports partner trust, secure communication, and signatures (e.g., software updates).

What would you like to do next?

XELANED specialists are available to support your next steps. Together, we prioritize topics, clarify dependencies, and choose an approach that fits your environment both technically and organizationally.

Knowledge Building

In a compact workshop, we clarify objectives, current state, and the next steps.

Project Planning

We discuss scope and dependencies, then create a robust implementation plan.