Two Frameworks, One Problem
Defense contractors with operations in both the US and EU now face two major cybersecurity compliance mandates: CMMC Level 2 (based on NIST SP 800-171 Rev 2) and the NIS2 Directive (Article 21 risk-management measures). Both are enforceable. Both carry real consequences for non-compliance. And both landed on roughly the same timeline.
The instinct is to build two separate compliance programs — one for each framework. That instinct is expensive and unnecessary. The control requirements overlap by roughly 70-80%. A single on-premise zero-trust architecture, designed correctly, can satisfy both.
Where the Frameworks Come From
CMMC Level 2 maps directly to the 110 security requirements in NIST SP 800-171. It protects Controlled Unclassified Information (CUI) in the defense supply chain. Assessment is performed by C3PAOs (CMMC Third-Party Assessment Organizations). Failure means loss of DoD contracts — and with the October 2026 deadline approaching fast, the timeline is tight.
NIS2 Article 21 mandates ten categories of cybersecurity risk-management measures for essential and important entities. It protects the operational resilience of critical infrastructure across the EU. Enforcement is now active across most EU member states. Failure means fines up to EUR 10M or 2% of global turnover, plus potential personal liability for management.
Different origins. Different enforcement bodies. But when you read the actual control requirements side by side, the overlap is substantial.
The Overlap: Control-by-Control Mapping
The following table maps the major control domains across both frameworks. Where both frameworks require the same capability, a single implementation satisfies both.
| Control Domain | CMMC Level 2 (NIST 800-171) | NIS2 Article 21 | Overlap |
|---|---|---|---|
| Access Control | AC 3.1.1–3.1.22 (22 requirements) | Art. 21(2)(i) — access control policies | Full — both require least-privilege, MFA, session controls |
| Network Segmentation | SC 3.13.1–3.13.16 (system/comms protection) | Art. 21(2)(a) — risk analysis, network security | Full — both require boundary protection and segmentation |
| Incident Response | IR 3.6.1–3.6.3 | Art. 21(2)(b) — incident handling | Full — both require detection, response, reporting, and post-incident review |
| Monitoring & Audit | AU 3.3.1–3.3.9 | Art. 21(2)(a) — risk analysis, effectiveness assessment | Full — both require logging, audit trail, and review |
| Risk Assessment | RA 3.11.1–3.11.3 | Art. 21(2)(a) — risk analysis policies | Full — both require periodic risk assessment |
| Business Continuity | CP 3.8.9 (limited) | Art. 21(2)(c) — business continuity and crisis management | Partial — NIS2 is broader; CMMC focuses on CUI availability |
| Supply Chain Security | SR 3.17.1–3.17.3 (NIST 800-171 Rev 3 adds more) | Art. 21(2)(d) — supply chain security | Partial — NIS2 requires broader vendor risk management |
| Encryption | SC 3.13.8, 3.13.11 (CUI in transit and at rest) | Art. 21(2)(h) — cryptography and encryption | Full — both require encryption for sensitive data |
| Personnel Security | PS 3.9.1–3.9.2 | Art. 21(2)(j) — human resources security | Full — both require screening and termination procedures |
| Vulnerability Management | SI 3.14.1–3.14.7 | Art. 21(2)(e) — vulnerability handling and disclosure | Full — both require patching, scanning, and remediation |
| Configuration Management | CM 3.4.1–3.4.9 | Art. 21(2)(a) — security policies for information systems | Full — both require baselines, change control, and hardening |
| Physical Security | PE 3.10.1–3.10.6 | Art. 21(2)(a) — security of physical environment | Full — both require physical access controls |
| Authentication | IA 3.5.1–3.5.11 | Art. 21(2)(i) — multi-factor authentication | Full — both require MFA and identity management |
| CUI-Specific Handling | MP 3.8.1–3.8.9 (media protection, marking) | Not specifically addressed | CMMC only — CUI marking, handling, and destruction |
| Management Liability | Not addressed | Art. 20, Art. 32(5) — personal liability for management | NIS2 only — no CMMC equivalent |
Out of 14 control domains, 11 overlap fully, 2 overlap partially, and each framework has one unique requirement the other does not address.
Where They Diverge
CMMC-Specific: CUI Handling
CMMC Level 2 includes requirements that exist solely because of Controlled Unclassified Information:
- Media protection — CUI must be marked, tracked, and destroyed when no longer needed
- CUI boundary definition — You must define exactly where CUI lives and flows (the CUI enclave)
- FIPS 140-2 validated encryption — Not just "encryption" but specifically FIPS-validated modules
- Assessment methodology — CMMC requires C3PAO assessment against a specific scoring methodology
NIS2 has no concept of CUI. It does not require data classification at this level.
NIS2-Specific: Supply Chain and Governance
NIS2 goes further than CMMC in two areas:
- Supply chain security — Article 21(2)(d) requires assessing the security of direct suppliers and service providers, including vulnerabilities specific to each supplier
- Management body accountability — Article 20 requires management approval and oversight of cybersecurity measures, with personal liability for gross negligence
- Business continuity — Article 21(2)(c) requires comprehensive continuity planning beyond what CMMC demands for CUI availability
The Single Architecture Approach
Here is how one on-premise zero-trust deployment satisfies both frameworks simultaneously:
1. Network Segmentation (CMMC SC + NIS2 Art. 21(2)(a))
Deploy an Access Gate appliance or VM at the boundary between IT and OT, and between network zones. This creates:
- The CUI enclave boundary required by CMMC (CUI only flows within defined segments)
- The network security architecture required by NIS2 (risk-proportionate segmentation)
One segmentation deployment. Two compliance checkboxes.
2. Zero-Trust Access Control (CMMC AC/IA + NIS2 Art. 21(2)(i))
Enforce per-session, identity-verified access with MFA at every zone boundary:
- CMMC requires least-privilege access to CUI with multi-factor authentication
- NIS2 requires access control policies and MFA where appropriate
Same policy engine. Same enforcement point. Both frameworks satisfied.
3. Audit Logging and Monitoring (CMMC AU + NIS2 Art. 21(2)(a))
Capture all access events, session recordings, and policy changes in tamper-evident logs stored on-premise:
- CMMC requires audit logs sufficient to reconstruct security-relevant events
- NIS2 requires measures to assess the effectiveness of cybersecurity risk management
One log stream. Two audit trails.
4. Incident Detection and Response (CMMC IR + NIS2 Art. 21(2)(b))
Protocol-aware monitoring on OT traffic with alerting on anomalous access patterns:
- CMMC requires incident response capability with reporting to DoD
- NIS2 requires incident handling with 24-hour initial notification and 72-hour detailed report
Same detection engine. Different reporting templates.
5. Encryption (CMMC SC + NIS2 Art. 21(2)(h))
FIPS 140-2 validated encryption for data in transit and at rest:
- CMMC specifically requires FIPS validation
- NIS2 requires encryption proportionate to risk
Using FIPS-validated modules satisfies both. There is no scenario where FIPS validation fails to meet NIS2's "proportionate" standard.
What You Still Need Separately
Even with a unified architecture, each framework has unique administrative requirements:
| Requirement | Framework | What to Do |
|---|---|---|
| CUI marking and handling procedures | CMMC | Document CUI flow, apply markings, train staff |
| C3PAO assessment preparation | CMMC | Prepare SSP, POA&M, and evidence packages |
| Management body training | NIS2 | Train executives, document participation |
| Supplier risk assessments | NIS2 | Assess and document supply chain security |
| National authority notification setup | NIS2 | Establish 24h/72h incident reporting channels |
These are documentation and process items. They do not require separate technical infrastructure.
Build Once, Certify Twice
The math is simple. Building two separate compliance architectures doubles your infrastructure cost, doubles your maintenance burden, and creates two sets of controls that will inevitably drift apart. A single on-premise zero-trust architecture — with the CUI enclave defined within it and NIS2 governance layered on top — gives you one infrastructure to maintain, one set of controls to audit, and two frameworks satisfied. Start with the harder standard (CMMC Level 2's specificity), and NIS2 compliance follows with minimal additional effort.
For more CMMC resources, case studies, and implementation guides, visit the CMMC Compliance for On-Premise hub.
For more NIS2 resources, sovereign deployment options, and compliance guides, visit the NIS2 Compliance for On-Premise OT hub.

