NIS 2 Directive
Technical

Cryptography & Encryption Policy Template

Defines policies and procedures for the use of cryptography and encryption to protect network and information systems, aligned with NIS 2 Article 21(2)(h).

What This Policy Covers

Purpose and Scope-Policy objectives and NIS 2 encryption requirements.
Approved Cryptographic Standards-Approved algorithms, key lengths, and TLS versions.
Encryption at Rest-Data storage encryption requirements and standards.
Encryption in Transit-TLS, mTLS, and VPN encryption requirements.
Key Management-Key generation, distribution, rotation, and destruction.
Certificate Management-PKI, certificate lifecycle, and renewal procedures.
End-to-End Encryption-Requirements for sensitive communications and data flows.

Required Sections

A compliant Cryptography & Encryption Policy for NIS 2 Directive must include the following7 sections. Each section addresses a specific control requirement that auditors will review.

1

Purpose and Scope

Policy objectives and NIS 2 encryption requirements.

2

Approved Cryptographic Standards

Approved algorithms, key lengths, and TLS versions.

3

Encryption at Rest

Data storage encryption requirements and standards.

4

Encryption in Transit

TLS, mTLS, and VPN encryption requirements.

5

Key Management

Key generation, distribution, rotation, and destruction.

6

Certificate Management

PKI, certificate lifecycle, and renewal procedures.

7

End-to-End Encryption

Requirements for sensitive communications and data flows.

Generate a Customized Version

This template shows the required structure. PoliWriter generates a fully customized Cryptography & Encryption Policy that references your actual cloud providers, identity systems, tools, and team practices — ready for auditor review.

Policy Details

Category

Technical

Sections

7 total (7 required)

Other NIS 2 Directive Templates