Skip to content

Why Siloed Domain Data Threatens Your Audit-and Your Revenue

Every organisation responsible for domain registration under NIS 2 Article 28 faces an emerging existential threat: siloed, outdated, or fragmented domain records that undermine operational integrity-and, by extension, your ability to close deals, pass regulatory scrutiny, and maintain customer trust. As cyber regulations tighten and audit windows shrink, even a brief misalignment between internal databases, outdated WHOIS exports, or unsynced registrar systems can become the spark that derails strategic momentum. For compliance leaders, legal officers, CISOs, and practitioners, the message is clear: High-performing organisations now treat seamless, unified domain data as both a regulatory necessity and a revenue-multiplying asset.

Audits don’t wait for you to reconcile records. Every disconnected data point is a risk travelling at the speed of your slowest system.

The Silent Costs of Fragmentation

Fragmented domain data isnt a hypothetical problem; its the most common root cause of compliance findings, failed audits, and business slowdowns for organisations subject to NIS 2. Outdated WHOIS pulls and legacy dumps fall out of sync-invisible during day-to-day operations, painfully visible when an audit or major client review lands unannounced. As the regulatory environment moves closer to near-real-time oversight, over 23% of companies discover material gaps in their domain data only after the fact-a margin no competitive player can afford. The impact is fiercely practical: enforcement action when you cannot present unified, instant proof; business deal delays as your team scrambles to render a whole truth from partial records; and, increasingly, exclusion from contracts that require instant, evidence-backed compliance.

Mapping your domain ecosystem-internal databases, external registries, registrar feeds, WHOIS, RDAP, and related exports-reveals at a glance where lags, blank fields, or unsynchronized sources breed risk. Identifying these now pre-empts audit crisis with proactive control.

Book a demo


Which Data Fields and Processes Are Now Non-Negotiable Under Article 28?

NIS 2 Article 28 raises the bar far beyond “best effort.” For every registered domain, you must now prove-instantly, in machine-readable, audit-defensible form-ownership, chain-of-custody, date/time stamps, authorised change agents, status, and retention cycles. Anything less is an explicit compliance gap.

No more best-effort records-only fully evidenced, permanent, and system-verifiable submissions pass under Article 28.

Article 28’s Audit Baseline-Fields & Evidence

  • Unified, Complete Record: You must log and attest for each domain: registration date, renewal/expiry, assigned registrar, current and historical contact points (including proxies or privacy services), relevant DNS data, and all status updates.
  • Machine-Readability & Digital Signatures: The era of PDF exports and unsigned emails is over. Article 28 mandates digitally signed, tamper-evident logs that prove authenticity and block manipulation.
  • Change/Deletion Traceability: Every field change-by whom, on what legal basis, and with what approval-must be logged, retrievable, and justified in line with GDPR and NIS 2 principles.
  • Role Ownership & Approval Mapping: The system must record who last updated each field, under which authority, and who authorised the action-fragmented or team-shared logins no longer pass audit muster.
  • APIs, Workflows, and Notifications: The full process chain-from form to backend API to notification-must be mapped and testable for every field.

A best-practise audit prep exercise: crosswalk your current data fields and update logs with every Article 28 must-have; colour code any that are optional, manual, blank, or not mapped to digital proof.

Compliance under Article 28 is defined by your ability to answer, for every field: who, what, when, why, how, and with what authority? Any uncertainty or manual gap is now a live vulnerability.




illustrations desk stack

Centralise risk, incidents, suppliers, and evidence in one clean platform.




How Does Interoperability Shape Your NIS 2 Article 28 Compliance?

NIS 2 introduces a paradigm shift: domain registry data is now a cross-border asset. No organisation can secure compliance with homegrown, local-only systems or incompatible exports. Registry architecture must synchronise, validate, and export records instantly to any authorised EU authority-or face cross-border exposure and enforcement.

The higher the number of borders your data crosses, the greater the expectation for seamless, verified, machine-readable transfer.

Interoperability: The Non-Negotiable Standard

  • Cross-Member State Exchange: Registration data must be formatted and exportable for any EU authority, with full chain-of-custody and audit signatures. Legacy “siloed” or country-specific templates create technical debt and regulatory exposure.
  • Transition to RDAP: The Registration Data Access Protocol (RDAP), not WHOIS, is the new technical baseline; all exports and live views must comply by 2025.
  • Vendor & Outsourcing Traceability: Every partner, outsourced function, or sub-processor must support machine-verifiable exports with chain-of-custody evidence. Isolated or air-gapped processes disqualify compliance.
  • GDPR Privacy Overlap: Every transmission, export, or data share must be logged, privacy-checked, and mapped back to GDPR requirements.
  • Executive Readiness: Board-level dashboards must surface, on demand, the live status of every registry and chain-of-evidence export across jurisdictions.

A registry data-flow map-integration points, interface standards, and evidence outputs-makes weak spots and technical debt immediately actionable long before they are a problem.

No organisation is an island; your compliance perimeter is only as strong as its weakest interoperability link. Invest now in unified, EU-ready data pipelines-before audit or deal-driven deadlines expose the cracks.




Can Your Data Lifecycle Management Detect Errors Before They Become Audits?

With Article 28, regulators expect organisations to surface issues themselves-not wait until an audit, breach, or third-party notification. Automated, verifiable lifecycle management isn’t just about workload efficiency; it’s the only way to detect and resolve data and process flaws before they trigger penalties or business delays.

Systems that catch, log, and flag issues before audits begin earn regulator trust-and save you from costly surprise failures.

Proactive Lifecycle Assurance

  • Trigger-Based Automated Logging: Every new, changed, or removed domain event must immediately log evidence, user identity, and reason code-delaying documentation is fatal.
  • Scheduled Reverification: Sustain system health by running scheduled database reviews (minimum annual) on core fields-registration, expiration, ownership, contact-to catch unsanctioned drift or silent expiry.
  • Source and Path Logging: All changes, regardless of who initiates-registrar, staffer, API, or vendor-must be logged with origin, timestamp, approval trace.
  • Third-Party Edits: Any “change on behalf” is flagged by source and role, along with the evidence trail for each party.
  • Real-Time Error Alerts: Your systems should auto-flag deletions, anomalies, or lagging confirmations-creating instant notification and correction opportunities.

Visualising this as a record lifecycle loop supports proactive, system-led assurance-closing gaps before they become audit failures.




platform dashboard nis 2 crop on mint

Launch with a proven workspace and templates – just tailor, assign, and go.




Which Security and Privacy Controls Pass Modern Audit-and Which Fail?

With NIS 2 Article 28 drawing direct lines between IT, legal, and governance teams, only a harmonised, defence-in-depth approach passes muster. Compliance is no longer technical box-ticking-it’s the fusion of operational practise, technical control, and board-level visibility.

When every update is accounted for-who, what, when, why-your registry becomes a governance asset, not an audit liability.

Passing the Modern Audit: Checklist

  • Role-Based Access Controls: Document every user and service permission. Routinely review access to ensure “least privilege” is strictly enforced.
  • End-to-End Encryption: Secure all registry data in-transit and at-rest; audit every key management action.
  • Immutable Logging: Log every event, approval, exception, and override; prove logs cannot be altered post facto.
  • Vendor Oversight: Map every vendor, registrar, and API to permission logs and access cycles; carry out contracted, periodic reviews.
  • Board View: Boards and compliance officers must have real-time dashboards that visualise current risk exposures, recent events, and compliance status tied directly to active evidence.

An access control matrix-mapping users, privileges, data fields, and roles-recalibrates controls from audit stop gap to competitive advantage.




Are You Audit-Ready? Logging and Instant Evidence Recall

Instant, complete, and immutable logs are the new currency of trust. Article 28 places them above all on every auditor’s checklist. Missed entries, ambiguous linkages, or weak mapping between events and policies can unravel months of effort.

One missing or ambiguous log entry can undo months of diligence and open the door to enforcement.

Building True Audit Readiness

  • Systematic Event Logging: All events (create, update, delete, export) are auto-logged, justified, and retained in an unalterable archive.
  • Direct Evidence Mapping: Logs must reference a specific control and policy, visible in your Statement of Applicability (SoA).
  • Simulation and Drill: Test audit-readiness by simulating regulator reviews; challenge teams to pull and explain evidence at speed.
  • Executive Dashboards: Role-based dashboards surface real-time registry and control status for board and compliance teams.
  • Cryptographic Integrity: Each log export secured by digital signature, timestamp, and non-repudiation logic.

Registry Traceability Mini-Table

Trigger Event Risk Update Control / SoA Link Evidence Logged
New domain added Data quality A.5.9 Asset Inventory Auto-log create event
Contact changed Owner ambiguity A.5.18 Access Rights Changelog + sign-off
Deletion triggered Incomplete erasure A.5.11 Return of Assets Deletion log + proof
Vendor access Unauthorised use A.15 Supplier Mgmt Vendor session log
Policy updated Siloed authority A.5.1 Info Sec Policy Review log, export

Statement of Applicability (SoA): Maps each implemented control in your ISMS and how you address it in your environment-every auditor and board’s first stop when reviewing governance.




platform dashboard nis 2 crop on moss

From Articles 20–23 to audit plans – run and prove compliance, end-to-end.




How Can ISO 27001 Integration Build Board and Supervisor Confidence?

True compliance isn’t a one-time certification; it’s a continuously visible, strategically valuable asset. Boards, risk committees, and regulators want traceable controls, mapped from registry field to policy to SoA entry. Integration with ISO 27001 makes this possible-and persuasive-across audits, contracts, and key customer engagements.

From field to policy, every action and artefact must flow up to a recognised framework-ISO 27001 is your compliance lingua franca.

ISO 27001 Compliance Bridge Table

Expectation Operationalisation ISO 27001 / Annex A Ref
Unified asset registry Documented asset inventory A.5.9, A.8.1, A.8.30
Automatic data retention Systematic retention/deletion logs A.5.10, A.8.13
Role-based access reviews RBAC (Role-Based Access Control) A.5.16, A.5.18
Tamper-evident logs Live evidence dashboards A.8.15, A.8.16, A.8.17
Policy sign-off auditing Supervisor/board attestations 9.3, A.5.35

Every Article 28 control must be bidirectionally mapped to ISO 27001 Annex A controls and SoA entries-and must stand up under real auditor and board review.




Is Your Registry Ready for Continuous Assurance-and Future Audits?

Article 28 marks a transition: compliance is now about live assurance and operational readiness-every day, not just at audit time. Automated monitoring, rapid evidence recall, and scheduled review cycles are your new baseline.

The organisations regulators trust are always ready-not just once a year, but every day.

Next Steps in Living Compliance

  • Ongoing Monitoring: Dashboards automatically flag data staleness, missed change logs, and open risk exposures-keeping readiness front-of-mind for all stakeholders.
  • Comprehensive Logging: Every action across your registry and vendor ecosystem is signed and timestamped, available for export or review within minutes.
  • Configurable, Adaptable Processes: Quickly adjust workflows and evidence logic for new regulatory directives or sector-specific mandates.
  • Resilience Metrics: Track time-to-resolution of flagged issues, fraction of audit findings caught preemptively, and evidence retrieval speed.
  • Visible Proof: Use strategic, system-generated audit exports as real-time trust signals for regulators and business partners.

Continuous Assurance Micro-Steps

  1. Automate Compliance Checks: Configure your registry to run rolling logic for every Article 28 data requirement, raising internal alerts instantly if misalignments emerge.

  2. Quarterly Audit Drills: Hold unscheduled, internal audit simulations-sample logs, evidence, and approvals for executive or board review. The discipline becomes habit, and “audit panic” becomes a non-factor.




Book a Live Compliance Walkthrough-See ISMS.online in Action

Understanding your audit posture shouldn’t start with a knock on the door. Schedule an interactive session with ISMS.online’s compliance architects to see how leading registry teams unify their domain data, automate evidence capture, and demonstrate control mastery mapped directly to NIS 2 Article 28 and ISO 27001. Discover the difference between reactive, “once-a-year” preparedness and genuinely living assurance-earning regulator approval and unlocking new business opportunities. Start today and shift compliance from a last-minute fire drill to a built-in driver of business confidence and speed.



Frequently Asked Questions

Who has direct responsibilities under Article 28 NIS 2-and what fundamentally changes for domain name registries and service providers?

If you operate or maintain a Top-Level Domain (TLD) registry-including country-code TLDs,.eu, or any domain registration system serving users in an EU Member State-Article 28 NIS 2 places direct, non-delegable responsibilities on your organisation. This also applies to registrars and resellers if you manage the process or database of domain registrations for EU-based users, regardless of your company’s headquarters.

The core shift is operational transparency and auditable compliance: it’s no longer sufficient to simply store registration data. From January 2025, your organisation must track and evidence all actions-registrations, updates, transfers, and deletions-in real time, and respond to regulators, auditors, or law enforcement via machine-readable protocols such as RDAP (Registration Data Access Protocol). Legacy WHOIS systems and manual workflows are not compliant (EURid, 2024). If you can’t prove what happened, when it happened, and who performed the action-including access and verification steps-you risk operational suspension and regulatory fines (nic.lv, 2024).

Proof of compliance is not a static report; it’s a living, mapped history your registry must be ready to surface at a moment’s notice.


What exact information must be collected for each domain, and how stringent are verification and lifecycle processes?

Registries and registrars must capture, update, and systematically verify these mandatory data fields for every registered domain:

  • Domain details: Name, creation date, expiry date (if set).
  • Registrant: Full legal name, address, verified email, and phone (for both organisations and natural persons).
  • Administrative contacts: Name, email, phone (if different from registrant).
  • Lifecycle actions: Every change, update, transfer, and deletion must be timestamped and tied to authenticated user or system credentials.

Verification is no longer a one-off, box-ticking exercise:

  • At initial registration:
  • Emails and mobile phones must be actively verified (click-to-confirm, SMS codes). For legal entities, expect registry/extractive KYC (know your customer) using national databases or corporate eID, especially for public, sensitive, or high-value names.
  • Ongoing:
  • Re-verification is required at every significant update, upon suspicion of abuse, or as part of scheduled hygiene reviews (often annual). Each change log entry captures who made the change and how verification occurred-manual review or automated process (DENIC, 2023).
Field Verification Mechanism Typical Evidence
Email Link/click; delivery tracking Email server logs, timestamp
Phone SMS code, input confirmation Provider log, code entry
Legal entity eID/corporate registry check EID file, KYC log
Changes Authenticated, signed logs Immutable log, user credentials

Failing to maintain verified, complete data or skipping updates can trigger regulatory findings, loss of contract, or fines (OpenProvider, 2024).


How is access to registration data managed, and what’s the balance between GDPR, transparency, and audit trails?

Article 28 NIS 2 explicitly tightens and documents the transparency/privacy divide:

  • Legal entities:
  • Basic details (business name, address, main contact) must be accessible to the public by default-using real-time, machine-readable protocols (RDAP). Mass/bulk exports are prohibited; all access is individually logged and available for audit.
  • Natural persons (private registrants):
  • Protected by GDPR; sensitive details are *not* public. Lawful disclosure only occurs upon “duly substantiated requests” from recognised authorities or litigants (police, IP claims, courts)-each reviewed for legal basis, necessity, and scope, with all access events and denials logged (EURid, 2024).
  • Access logs must record: requester identity, purpose, legal justification, scope of data released, and response time (usually within 72 hours).

Transparency isn’t global exposure. It means every access is justified, proportionate, and logged-building trust with both authorities and registrants.

Any unlogged, blanket, or preemptive access is strictly prohibited, and can result in findings during regulator or DPA audits.


Which technical and procedural controls must a registry or registrar implement to comply with Article 28?

To satisfy both NIS 2 and its Implementing Regulations (notably 2024-2690), organisations must weave together technical, procedural, and evidence controls:

  • Role-based access control (RBAC): prevents unauthorised system/user access; every access or modification is logged and reviewed (ISO 27001:2022, A.5.9).
  • Field-level encryption: is mandatory for personally identifiable data-applies both at rest and in transit (including database backups and live replication).
  • Append-only, timestamped audit logging: for every database event (read, update, delete); logs must be digitally signed, machine-readable, and exportable.
  • Standardised machine-readable APIs: (e.g., RDAP, with Unicode and non-Latin support) for all queries and updates-ensuring audit trails and real-time accuracy (EURid, 2024).
  • Continuous, automated monitoring and alerts: for stale data, incomplete records, anomalous editing patterns, and failed verification events; issue escalation and manual review must be logged.
  • Certified export/migration interoperability: to support business continuity or registry transitions-complete record, log, and control export required (Interoperable Europe, 2024).
Technical Control Required Capability Compliance Evidence
Access RBAC Authz systems, approval workflows Change logs, audit reports
Encryption AES-256/TLS for all PII Encryption configs, audit
Logging Append-only, digital signature logs Log extracts, forensic proof
APIs RDAP, Unicode-international support Integration test logs
Monitoring Alerts, remediation traceability Alert/test logs, incident
Interoperability Export/migrate, chain-of-custody Export proof, SoA linkage

Cyber-Security agencies and DPAs are entitled to review these technical controls and evidence at any time, as part of planned or triggered audits. Incomplete logs or gaps between stated and actual practise are regulatory findings.


What are the business and regulatory consequences if you fall short of Article 28 NIS 2 requirements?

Failing in any of these domains-technical, operational, or procedural-carries escalating risks:

  • Immediate financial penalties:
  • Authorities may levy proportionate, severe fines, depending on the scale and duration of non-compliance.
  • Corrective orders: can impose technical, infrastructure, or policy fixes with tight turnaround times-sometimes requiring registry downtime.
  • Market exclusion or suspension:
  • Continued failure or unremedied critical gaps can lead to partial or full exclusion from registry operations or contracts, as well as relationships with international partners or resellers.
  • Public warning and reputational damage:
  • Regulators can publicise non-compliance and audit findings, impacting business prospects, trust, and negotiations for renewals, deals, or M&A (CENTR, 2024).
  • Operational blockages:
  • You may be prevented from registering, updating, or transferring critical domains, impacting both revenue and strategic growth (DENIC, 2023).

Regulators inspect evidence in action, not written intentions. If your logs, controls, or mappings aren’t verifiably live, it’s as if they don’t exist.

True operational resilience comes from proving compliance, not just claiming it. Stakeholders look to see if you can map every operational process-especially under incident pressure-to an auditable control and evidence path.


In practical terms, how does ISO 27001 help map and evidence Article 28 compliance?

ISO 27001:2022 functions as your “control map”-an established framework to demonstrate, log, and audit every Article 28 domain in live operations:

Article 28 Requirement ISO 27001 Reference Mapping & Evidence Example
Asset/registry management A.5.9 Exported registry, asset log
Retention/backups A.5.10, A.8.13 Retention logs, backup schedules
Access privileges A.5.18 Role assignment logs, reviews
Monitoring & logging A.8.15, A.8.16 Sample log, alert workflow
Governance / sign-off 9.3, A.5.35 Board review minutes, SoA

Every registrant record, field, and lifecycle step should link to an ISO 27001 control in your Statement of Applicability (SoA), with evidence-screenshots, log exports, and approval histories-on tap for audits or regulator reviews. Gaps in mapping, documentation, or real-time retrieval are considered material weaknesses.


Ready to operationalise NIS 2 Article 28?

Being audit-ready means transforming registration data management into a live, mapped, evidence-first system-eliminating last-minute scrambles and restoring business confidence. With ISMS.online, you can automate ISO 27001 mapping, centralise proof (logs, controls, policy records), and provide dashboards built for real-time audit or authority review.

The difference between “hoping you’re compliant” and “showing your proof” could mean regulatory peace of mind, ongoing contracts, and your organisation’s future.
If you’re ready for a frictionless walkthrough or to view a mapped compliance system in action, see how ISMS.online keeps you ahead.

Book a compliance walkthrough with ISMS.online.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.