Oct.2025
23

TP-Link Strengthens Cybersecurity Compliance with EU NIS2 Directive

September 2025

TP-Link Systems Inc. affirms its commitment to cybersecurity and regulatory compliance through the implementation of industry standard governance, risk management, and technical controls. As part of this commitment, TP-Link is certified under ISO/IEC 27001:2022 (ISO/IEC 27001:2022) , the internationally recognized standard for Information Security Management Systems (ISMS), and has adopted a Secure Product Development Lifecycle (SPDL)

 

1. ISO/IEC 27001:2022 Certification

TP-Link’s ISMS is certified under ISO/IEC 27001:2022, which requires:

  • Policies on risk analysis and information system security
  • Incident and vulnerability management
  • Supply chain security controls
  • Secure Product Development Lifecycle
  • Continuous monitoring and improvement of mechanisms

Based on official guidance from ENISA(NIS2 Technical Implementation Guidance | ENISA), this certification demonstrates TP-Link’s alignment with the security measures outlined in Article 21 of the NIS2 Directive.

 

2. Mapping to NIS2 Directive Article 21

Specific Feature

Mapped NIS2 Article 21 Clause

VLAN-based Network Isolation

(g)basic cyber hygiene practices and cybersecurity training

(i)Human resources security, access control policies, and asset management 

Guest Network Separation

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

Controller Access Control

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

2-Factor Authentication SAML SSO

(j)The use of multi-factor authentication or continuous authentication solutions,

secured voice, video and text communications and secured

emergencycommunication systems within the entity, where appropriate

RBAC with custom role support

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

IP Access Rules

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

Time-based access controls

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

Client Access Control

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

LDAP integration

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

WPA3 Enhanced Security

Policies and procedures regarding the use of cryptography and, where

appropriate, encryption

RADIUS integration

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

MAC address filtering

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

Time-based access controls

(g) basic cyber hygiene practices and cybersecurity training

(i) Human resources security, access control policies, and asset management 

Intrusion Detection and Prevention (IDS/IPS)

(a) policies on risk analysis and information system security;

  1. Incident handling

DDoS protection

(a) policies on risk analysis and information system security;

  1. Incident handling

Firewall rules and policies

(a) policies on risk analysis and information system security;

  1. Incident handling

VPN connectivity

  1. policies on risk analysis and information system security;
  2. Incident handling

Real-time network
traffic analysis

(a) policies on risk analysis and information system security;

  1. Incident handling

Device connectivity monitoring

(a) policies on risk analysis and information system security;

  1. Incident handling

Bandwidth utilization tracking

(a) policies on risk analysis and information system security;

  1. Incident handling

Event Logging & Audit Log

(a) policies on risk analysis and information system security;

  1. Incident handling
  2. business continuity, such as backup management
    and disaster recovery, and crisis management;