- Oct.2025
 - 23
 
TP-Link Strengthens Cybersecurity Compliance with EU NIS2 Directive
September 2025
TP-Link Systems Inc. affirms its commitment to cybersecurity and regulatory compliance through the implementation of industry standard governance, risk management, and technical controls. As part of this commitment, TP-Link is certified under ISO/IEC 27001:2022 (ISO/IEC 27001:2022) , the internationally recognized standard for Information Security Management Systems (ISMS), and has adopted a Secure Product Development Lifecycle (SPDL)
1. ISO/IEC 27001:2022 Certification
TP-Link’s ISMS is certified under ISO/IEC 27001:2022, which requires:
- Policies on risk analysis and information system security
 - Incident and vulnerability management
 - Supply chain security controls
 - Secure Product Development Lifecycle
 - Continuous monitoring and improvement of mechanisms
 
Based on official guidance from ENISA(NIS2 Technical Implementation Guidance | ENISA), this certification demonstrates TP-Link’s alignment with the security measures outlined in Article 21 of the NIS2 Directive.
2. Mapping to NIS2 Directive Article 21
| 
			 Specific Feature  | 
			
			 Mapped NIS2 Article 21 Clause  | 
		
| 
			 VLAN-based Network Isolation  | 
			
			 (g)basic cyber hygiene practices and cybersecurity training (i)Human resources security, access control policies, and asset management  | 
		
| 
			 Guest Network Separation  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 Controller Access Control  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 2-Factor Authentication & SAML SSO  | 
			
			 (j)The use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergencycommunication systems within the entity, where appropriate  | 
		
| 
			 RBAC with custom role support  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 IP Access Rules  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 Time-based access controls  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 Client Access Control  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 LDAP integration  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 WPA3 Enhanced Security  | 
			
			 Policies and procedures regarding the use of cryptography and, where appropriate, encryption  | 
		
| 
			 RADIUS integration  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 MAC address filtering  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 Time-based access controls  | 
			
			 (g) basic cyber hygiene practices and cybersecurity training (i) Human resources security, access control policies, and asset management  | 
		
| 
			 Intrusion Detection and Prevention (IDS/IPS)  | 
			
			 (a) policies on risk analysis and information system security; 
  | 
		
| 
			 DDoS protection  | 
			
			 (a) policies on risk analysis and information system security; 
  | 
		
| 
			 Firewall rules and policies  | 
			
			 (a) policies on risk analysis and information system security; 
  | 
		
| 
			 VPN connectivity  | 
			
			
  | 
		
| 
			 Real-time network  | 
			
			 (a) policies on risk analysis and information system security; 
  | 
		
| 
			 Device connectivity monitoring  | 
			
			 (a) policies on risk analysis and information system security; 
  | 
		
| 
			 Bandwidth utilization tracking  | 
			
			 (a) policies on risk analysis and information system security; 
  | 
		
| 
			 Event Logging & Audit Log  | 
			
			 (a) policies on risk analysis and information system security; 
  |