Frequently asked questions
Direct answers to the questions we hear most from CISOs, IT Managers, compliance leads and internal auditors.
Yes. RD 311/2022, Annex II, includes operational measures requiring identification, assessment and application of security updates across in-scope systems. Measure op.exp.4 is the most direct reference, although vulnerability management also feeds op.exp.10, op.exp.11, op.acc.6 and mp.eq.1. In Medium and High categories it is one of the most-reviewed controls during ENAC audit.
RD 311/2022 doesn't fix a single numerical frequency. Cadence must be proportional to asset criticality and to the system's category (Basic, Medium or High). The organization formalizes the frequency in its policy, justifies it and sustains it over time. The ENAC auditor then verifies the cadence is met and that traceable evidence exists.
No. An isolated scan is not vulnerability management. ENS requires a full cycle: detection, triage, documented decisions, remediation, verification and logging. Without that cycle and traceable evidence, the control is not satisfied at the ENAC audit, especially for Medium and High categories.
Signed operational policy, inventory of in-scope assets, scan logs with date and scope, documented triage, backlog prioritized by criticality, closure evidence per finding (re-scan or technical validation), KPIs and a periodic review record signed by leadership or the security lead. The auditor reviews a real sample, not just the document.
Basic allows self-assessment: policy, inventory and minimum logging. Medium requires an ENAC-accredited audit with formalized cadence, traceable records and prioritized backlog. High adds reinforcements on critical assets, cross-validation, auditable KPIs and exhaustive traceability. Hard2bit operates at HIGH category — certified.
It fits very well. ISO 27001 (controls A.8.8 and A.8.9), NIS2 (vulnerability and risk management) and ENS (op.exp.4 and connected) share nearly identical requirements. A well-designed implementation can satisfy all three frameworks at once if the evidence is built with traceability. We explain how in the ENS vs ISO 27001 vs NIS2 vs DORA comparison.
We execute the full cycle when in scope: detection, triage, coordination with your ITSM/CAB, patching, hardening, cloud or IAM changes and closure verification. Your organization keeps decision-making; we provide the operations, the evidence and the traceability for ENS audit.
An operational and auditable programme is typically built in 6–10 weeks: scope, inventory, policy, first scan cycle, triage and prioritized backlog. The governance side (periodic review, record, KPIs) consolidates within the first quarter. Organizations already certified under ISO 27001 can shorten timelines by reusing existing evidence.
Yes. ENS-compliant vulnerability management must cover any in-scope asset, including Microsoft 365, Entra ID, Azure, AWS, GCP and third-party dependencies. Excluding cloud or identity from the programme is one of the most frequent findings in ENS audits of modern tech providers.
If it's identified, prioritized and tracked with a documented action plan, it isn't necessarily a non-conformity — it's a managed vulnerability. It becomes a problem when there is no record, no documented decision or no closure verification. The line between a clean certification and a finding usually lies in evidence quality, not in the absence of vulnerabilities.
Yes — and it's the strongest combination for ENS Medium or High. Vulnerability management feeds the 24/7 managed SOC with critical assets to monitor; the SOC feeds the programme back with active-exploitation detection. Both share inventory, records and evidence.
Yes. We prepare technical defenses, organize evidence by audited control, address auditor requests and, if findings appear, close non-conformities with a documented action plan. Audit support is included in the service when the full programme is contracted.