Trust Center

Reglyze is built on Reglyze

We use our own platform to manage Reglyze's NIS2 compliance posture. The data on this page is generated live from our own account — same scoring, same policies, same controls our customers use. No marketing fluff, just our actual numbers.

Last updated: 19 May 2026 at 21:36 • Refreshed hourly from api.reglyze.com/api/public/trust/reglyze

NIS2 Compliance Score
59/100
Organization

Name

Reglyze

Country

FR

Sector

digital_providers

Headcount

5

NIS2 Status

Out of scope
Reglyze is below the medium enterprise threshold (5 employees, EUR 0.1M turnover) and is not in a NIS2 special category. We comply voluntarily because our customers require evidence of security under their own NIS2 supply chain due diligence (Article 21(2)(d)).

NIS2 Article 21 Controls (72)

Each control is scored on implementation (0-3) and documentation (0-3). Maturity = combined.

nis2.20.1.a.1
nis2.20.1.a.1Established

The information security policy and board briefing deck show CEO approval of risk-management measures; formal board-level approval resolution is implied but no separate signed approval record is evidenced beyond the policy sign-off field.

Implementation: 2/3Documentation: 2/3
nis2.20.1.a.2
nis2.20.1.a.2Established

Active oversight is limited to a single director who is also the sole operator; the board briefing deck describes oversight intent but no recurring oversight meeting minutes or tracking artefacts are evidenced, making this ad hoc in practice.

Implementation: 2/3Documentation: 2/3
nis2.20.1.a.3
nis2.20.1.a.3Established

The board briefing deck explicitly flags Article 20 personal liability for management body members; Cyril's acknowledgement is implicit in policy approval but no signed liability acknowledgement form is evidenced.

Implementation: 2/3Documentation: 2/3
nis2.20.1.a.4
nis2.20.1.a.4Established

Policies state annual review cycles but no evidence of a completed review cycle exists yet (all documents are version 1.0 at initial issue); governance review cadence is planned but not yet operationally demonstrated.

Implementation: 2/3Documentation: 2/3
nis2.20.2.a
nis2.20.2.aEstablished

The training plan documents a mandatory cybersecurity training programme for the management body and Cyril is noted as self-trained per task 1.5; however, no auditable completion records or refresher cadence evidence exists yet, capping implementation at 2.

Implementation: 2/3Documentation: 2/3
nis2.20.2.a.1
nis2.20.2.a.1Established

The cybersecurity training plan establishes a mandatory programme for the management body; Cyril's self-training is noted but no formal enrolment or completion certificate is evidenced.

Implementation: 2/3Documentation: 2/3
nis2.20.2.a.2
nis2.20.2.a.2Established

The training plan specifies an annual refresher cadence; no evidence of a completed first refresher cycle exists given all policies are at initial version 1.0.

Implementation: 1/3Documentation: 2/3
nis2.20.2.a.3
nis2.20.2.a.3Partial

No auditable completion records (certificates, LMS logs, sign-off sheets) are evidenced in the policy digest; the training plan describes the requirement but does not demonstrate fulfilment.

Implementation: 1/3Documentation: 1/3
nis2.20.2.a.4
nis2.20.2.a.4Established

The management body consists solely of Cyril Poder; the training plan covers him, so coverage of all management body members is technically complete, though the single-person scope limits the robustness of this control.

Implementation: 2/3Documentation: 2/3
nis2.20.2.a.5
nis2.20.2.a.5Established

The training plan explicitly encourages staff cybersecurity training for all 5 FTE; implementation is plausible given the small team but no training completion records are evidenced.

Implementation: 2/3Documentation: 2/3
nis2.21.2.a
nis2.21.2.aEstablished

A comprehensive information security policy (REGLYZE-ISP-001) exists with a risk assessment framework, treatment plan, and review schedule; all documents are version 1.0 at initial issue with no evidence of a completed annual review cycle, capping documentation at 2.

Implementation: 2/3Documentation: 2/3
nis2.21.2.a.1
nis2.21.2.a.1Established

The information security policy defines a risk assessment framework including methodology, scope, and asset classification; no evidence of a completed risk assessment register or risk treatment output is provided in the digest.

Implementation: 2/3Documentation: 2/3
nis2.21.2.a.2
nis2.21.2.a.2Established

REGLYZE-ISP-001 is a written, version-controlled information security policy approved by the CEO; it is version 1.0 with next review 2026, so not yet confirmed reviewed within 12 months.

Implementation: 2/3Documentation: 2/3
nis2.21.2.a.3
nis2.21.2.a.3Partial

The information security policy references a risk treatment plan but no standalone risk treatment plan document or register is evidenced in the policy digest; treatment is described in principle only.

Implementation: 1/3Documentation: 1/3
nis2.21.2.a.4
nis2.21.2.a.4Partial

Risk acceptance criteria are referenced within the ISP framework section but no explicit documented risk acceptance criteria table or threshold definition is evidenced as a standalone artefact.

Implementation: 1/3Documentation: 1/3
nis2.21.2.a.5
nis2.21.2.a.5Established

The ISP mandates annual risk review; no completed review cycle is evidenced (version 1.0, next review 2026), so the process is planned but not yet operationally demonstrated, capping implementation at 1.

Implementation: 1/3Documentation: 2/3
nis2.21.2.b
nis2.21.2.bEstablished

A formal incident response plan exists (version 1.0) covering classification, detection, notification timelines, and post-incident review; however, the plan has never been triggered by a real incident and no tabletop or live test is evidenced, capping implementation at 2.

Implementation: 2/3Documentation: 2/3
nis2.20.1.a
nis2.20.1.aEstablished

Cyril Poder as sole director has approved policies and the board briefing deck evidences governance oversight; however, as a 5-person org with a single director, formal periodic governance review cadence and escalation paths are nascent and untested. Policies are version 1.0 and not yet confirmed reviewed within 12 months by an independent body.

Implementation: 2/3Documentation: 2/3
nis2.21.2.b.3
nis2.21.2.b.3Established

The incident response plan includes an incident classification and triage framework with severity levels; classification has not been exercised against a real event.

Implementation: 2/3Documentation: 2/3
nis2.21.2.b.4
nis2.21.2.b.4Established

The IRP documents NIS2 Article 23 notification timelines (early warning 24h, notification 72h, final report 1 month); no actual notification to ANSSI has been made, so the process is documented but untested operationally.

Implementation: 2/3Documentation: 2/3
nis2.21.2.b.5
nis2.21.2.b.5Established

The IRP includes a post-incident review section; since no real incident has occurred, no post-incident review has ever been conducted, making this entirely theoretical at present.

Implementation: 1/3Documentation: 2/3
nis2.21.2.c
nis2.21.2.cEstablished

A business continuity plan and a backup/disaster recovery policy both exist; daily rclone-to-Google-Drive backups are operational, but restore has never been tested in the past 12 months, capping implementation at 2.

Implementation: 2/3Documentation: 2/3
nis2.21.2.c.1
nis2.21.2.c.1Established

The BCP document covers scope, governance, RTO/RPO objectives, and recovery procedures; it is version 1.0 and has not been exercised, so operational maturity is documented-but-untested.

Implementation: 2/3Documentation: 2/3
nis2.21.2.c.3
nis2.21.2.c.3Established

The DR policy defines recovery procedures for Hetzner primary and Cloudflare CDN/DNS failover scenarios; no DR test or failover drill is evidenced, capping implementation at 2.

Implementation: 2/3Documentation: 2/3
nis2.21.2.c.4
nis2.21.2.c.4Established

Crisis management is addressed within the BCP at a high level; with a 5-person fully remote team and single on-call, a dedicated crisis management capability is structurally limited and no crisis simulation has been conducted.

Implementation: 1/3Documentation: 2/3
nis2.21.2.c.5
nis2.21.2.c.5Established

The BCP and DR policy both mandate annual testing and exercises; no test has been conducted (backups untested, BCP unexercised), so the testing programme exists on paper only.

Implementation: 1/3Documentation: 2/3
nis2.21.2.d
nis2.21.2.dEstablished

A supply chain security policy (REGLYZE-POL-SC-001) exists covering supplier risk assessment, contractual requirements, and monitoring; no evidence of completed supplier questionnaires or audit outputs is provided, capping implementation at 2.

Implementation: 2/3Documentation: 2/3
nis2.21.2.d.1
nis2.21.2.d.1Established

The supply chain security policy defines a supplier risk assessment framework; key suppliers (Anthropic, Stripe, Hetzner, Cloudflare, GitHub, Resend) are identifiable from the stack profile but no completed risk assessment records are evidenced.

Implementation: 2/3Documentation: 2/3
nis2.21.2.d.2
nis2.21.2.d.2Established

The supply chain policy specifies contractual security requirements to be imposed on suppliers; no evidence of executed supplier contracts with security clauses or DPA addenda is provided in the digest.

Implementation: 1/3Documentation: 2/3
nis2.21.2.d.3
nis2.21.2.d.3Established

Supplier monitoring is described in the policy but no recurring supplier review cadence, scorecard, or monitoring log is evidenced; at 5 persons this is likely informal at best.

Implementation: 1/3Documentation: 2/3
nis2.21.2.d.4
nis2.21.2.d.4Established

Dependabot and Renovate are actively enabled on the TypeScript/Node.js monorepo, providing automated software supply chain dependency monitoring; the vulnerability management policy also covers software supply chain risk.

Implementation: 2/3Documentation: 2/3
nis2.21.2.d.5
nis2.21.2.d.5Partial

Coordinated risk assessments with suppliers or sector peers are not evidenced; at Reglyze's scale and OOS status, participation in coordinated assessments (e.g. ANSSI sector exercises) has not been described.

Implementation: 1/3Documentation: 1/3
nis2.21.2.e
nis2.21.2.eEstablished

A vulnerability management policy exists and Dependabot/Renovate provide automated dependency hygiene; a secure development lifecycle is implied by the TypeScript monorepo and GitHub pipeline but not formally documented as an SDLC policy.

Implementation: 2/3Documentation: 2/3
nis2.21.2.e.1
nis2.21.2.e.1Established

Development practices on the TypeScript/Node.js monorepo with GitHub CI/CD imply a repeatable build and review process; no formal written secure development lifecycle (SDLC) policy or secure coding standard is evidenced in the digest.

Implementation: 2/3Documentation: 1/3
nis2.21.2.e.2
nis2.21.2.e.2Established

The supply chain and vulnerability management policies reference security in procurement; no procurement checklist or vendor security evaluation form is evidenced as an operational artefact.

Implementation: 1/3Documentation: 2/3
nis2.21.2.e.3
nis2.21.2.e.3Established

Dependabot and Renovate provide automated vulnerability detection and patch management for dependencies; the vulnerability management policy (REG-SEC-POL-003) documents scanning, patching, and CVD procedures.

Implementation: 2/3Documentation: 2/3
nis2.21.2.e.4
nis2.21.2.e.4Established

The vulnerability management policy includes a coordinated vulnerability disclosure (CVD) process section; no public security.txt, bug bounty programme, or CVD disclosure record is evidenced operationally.

Implementation: 1/3Documentation: 2/3
nis2.21.2.e.5
nis2.21.2.e.5Established

GitHub-based CI/CD with pull-request workflows implies change management controls; no formal change and configuration management policy or change log is evidenced as a standalone written document.

Implementation: 2/3Documentation: 1/3
nis2.21.2.f
nis2.21.2.fEstablished

An effectiveness testing policy (REG-POL-ETP-001) exists defining audit cadence, KPIs, and management review; no completed audit, penetration test, or KPI measurement cycle is evidenced, capping implementation at 1.

Implementation: 1/3Documentation: 2/3
nis2.21.2.f.1
nis2.21.2.f.1Established

The effectiveness testing policy mandates periodic security audits with a quarterly checklist template (Annex A); no completed audit report or checklist output is evidenced.

Implementation: 1/3Documentation: 2/3
nis2.21.2.f.2
nis2.21.2.f.2Partial

The effectiveness testing policy references penetration testing as a planned measure; no penetration test has been conducted and no test report is evidenced; implementation is zero at this time.

Implementation: 0/3Documentation: 2/3
nis2.21.2.b.2
nis2.21.2.b.2Established

Detection relies on Cloudflare WAF alerts, Dependabot/Renovate notifications, and on-call monitoring by Cyril; no SIEM or SOC is in place, but tooling provides partial automated detection coverage documented in the IRP.

Implementation: 2/3Documentation: 2/3
nis2.21.2.f.5
nis2.21.2.f.5Established

Continuous improvement is described as a principle in the effectiveness testing policy and ISP; no improvement log, corrective action register, or PDCA cycle evidence is provided.

Implementation: 1/3Documentation: 2/3
nis2.21.2.g
nis2.21.2.gEstablished

A cybersecurity training plan exists covering awareness, role-based training, and hygiene baseline for all 5 staff; no training completion records or effectiveness measurement outputs are evidenced, capping implementation at 2.

Implementation: 2/3Documentation: 2/3
nis2.21.2.g.1
nis2.21.2.g.1Established

The training plan establishes a cybersecurity awareness programme for all personnel; no completion records or awareness campaign artefacts (e.g. phishing simulation results) are evidenced.

Implementation: 2/3Documentation: 2/3
nis2.21.2.g.2
nis2.21.2.g.2Established

Management body training is covered in both the training plan and the board briefing deck; Cyril's self-training is noted but no completion certificate or formal record exists.

Implementation: 2/3Documentation: 2/3
nis2.21.2.g.3
nis2.21.2.g.3Established

The training plan specifies role-based security training; with only 5 staff and no dedicated security or development roles differentiated in the digest, role-based differentiation is limited in practice.

Implementation: 1/3Documentation: 2/3
nis2.21.2.g.4
nis2.21.2.g.4Established

MFA enforced everywhere, encryption at rest and in transit, Dependabot/Renovate, and Cloudflare WAF constitute a strong cyber hygiene baseline operationally; the training plan and ISP document these as baseline requirements.

Implementation: 2/3Documentation: 2/3
nis2.21.2.g.5
nis2.21.2.g.5Established

The training plan describes training effectiveness measurement requirements; no measurement data, quiz results, or effectiveness assessment outputs are evidenced as having been produced.

Implementation: 1/3Documentation: 2/3
nis2.21.2.h
nis2.21.2.hEstablished

A cryptography and encryption policy (REG-SEC-POL-CRYPTO-001) exists; encryption at rest and in transit is operationally enforced (Cloudflare TLS, Hetzner storage encryption); key management procedures are documented but not independently audited.

Implementation: 2/3Documentation: 2/3
nis2.21.2.h.1
nis2.21.2.h.1Established

REG-SEC-POL-CRYPTO-001 defines cryptographic standards, approved algorithms, and usage requirements; it is version 1.0 and not yet confirmed reviewed within 12 months.

Implementation: 2/3Documentation: 2/3
nis2.21.2.h.2
nis2.21.2.h.2Mature

Encryption at rest is operationally enforced across Postgres, Redis, MinIO on Hetzner and Google Drive backups; this is a genuine operational strength. Documentation exists in the cryptography policy but not yet through a completed annual review.

Implementation: 3/3Documentation: 2/3
nis2.21.2.h.3
nis2.21.2.h.3Mature

TLS is enforced via Cloudflare for all in-transit communications; this is fully implemented and covers all in-scope assets. Documentation exists in the cryptography policy at version 1.0.

Implementation: 3/3Documentation: 2/3
nis2.21.2.h.4
nis2.21.2.h.4Established

Key management procedures are described in the cryptography policy; operational key management relies on platform-managed keys (Cloudflare, Hetzner, Google) which is appropriate at this scale but no independent key management audit is evidenced.

Implementation: 2/3Documentation: 2/3
nis2.21.2.h.5
nis2.21.2.h.5Partial

Cryptographic agility (ability to migrate algorithms) is not explicitly addressed as an operational capability; the cryptography policy does not evidence a tested algorithm migration plan or agility assessment.

Implementation: 1/3Documentation: 1/3
nis2.21.2.i.1
nis2.21.2.i.1Established

The asset management policy (REGLYZE-POL-ASM-001) defines asset inventory and classification requirements; the tech stack (Hetzner, Cloudflare, GitHub, Postgres, Redis, MinIO, etc.) is identifiable but no completed asset register is evidenced as an operational artefact.

Implementation: 2/3Documentation: 2/3
nis2.21.2.i.2
nis2.21.2.i.2Established

The access control policy (REG-SEC-POL-001) documents least-privilege, need-to-know, and role-based access principles; MFA is enforced everywhere, providing strong operational backing.

Implementation: 2/3Documentation: 2/3
nis2.21.2.i.3
nis2.21.2.i.3Established

MFA is enforced across all systems; identity and access management relies on platform-native controls (GitHub, Hetzner, Cloudflare) with no centralised IAM platform, which is proportionate for 5 persons but limits maturity.

Implementation: 2/3Documentation: 2/3
nis2.21.2.i.4
nis2.21.2.i.4Established

The HR security policy covers pre-employment screening and onboarding security requirements; no completed onboarding checklist, background check record, or NDA execution log is evidenced for the current 5-person team.

Implementation: 1/3Documentation: 2/3
nis2.21.2.i.5
nis2.21.2.i.5Established

The HR security policy addresses termination and role-change procedures including access revocation; no offboarding checklist completion record or access revocation log is evidenced operationally.

Implementation: 1/3Documentation: 2/3
nis2.21.2.j
nis2.21.2.jEstablished

MFA is enforced everywhere per the profile and documented in the MFA/secured communications policy (REGLYZE-POL-SEC-007); secured communications rely on standard SaaS tooling (not end-to-end encrypted dedicated platforms) and no secured emergency communication system is evidenced.

Implementation: 2/3Documentation: 2/3
nis2.21.2.j.1
nis2.21.2.j.1Mature

MFA is enforced everywhere across all systems and accounts; this is a genuine operational strength fully covering all in-scope assets. The MFA policy documents this requirement at version 1.0.

Implementation: 3/3Documentation: 2/3
nis2.21.2.j.2
nis2.21.2.j.2Partial

Continuous authentication (beyond MFA at login) is not described as an operational capability; no session risk scoring, device trust, or continuous authentication tooling is evidenced.

Implementation: 1/3Documentation: 1/3
nis2.21.2.j.3
nis2.21.2.j.3Established

The MFA/secured communications policy references requirements for secured voice and video communications; no dedicated end-to-end encrypted voice/video platform (beyond standard commercial tools) is evidenced as operationally deployed.

Implementation: 1/3Documentation: 2/3
nis2.21.2.f.3
nis2.21.2.f.3Established

The effectiveness testing policy defines KPI thresholds and an escalation matrix (Annex B); no KPI measurement data or dashboard output is evidenced as having been produced.

Implementation: 1/3Documentation: 2/3
nis2.21.2.j.5
nis2.21.2.j.5Established

Secured emergency communications are addressed in the MFA/secured communications policy; no dedicated emergency communication channel, out-of-band contact list, or emergency comms test is evidenced operationally.

Implementation: 1/3Documentation: 2/3
nis2.20.1.a.5
nis2.20.1.a.5Partial

With a single-person management body, a formal escalation path to the management body is structurally trivial but not documented as a distinct procedure; no escalation matrix or on-call escalation chain to a board level is evidenced beyond the incident response plan's internal escalation.

Implementation: 1/3Documentation: 1/3
nis2.21.2.b.1
nis2.21.2.b.1Established

The incident response plan is a documented, structured procedure covering containment, eradication, and recovery; it has never been activated in a real incident, so operational maturity is repeatable-on-paper but untested.

Implementation: 2/3Documentation: 2/3
nis2.21.2.c.2
nis2.21.2.c.2Established

Daily rclone backups to Google Drive are operationally running; the backup/DR policy (REGLYZE-POL-BDR-001) documents retention and recovery objectives, but restore testing has not been performed in the past 12 months.

Implementation: 2/3Documentation: 2/3
nis2.21.2.f.4
nis2.21.2.f.4Established

The effectiveness testing policy mandates management body review of audit outputs; no completed management review meeting record or remediation backlog review is evidenced.

Implementation: 1/3Documentation: 2/3
nis2.21.2.i
nis2.21.2.iEstablished

HR security, access control, and asset management policies all exist as separate written documents; MFA is enforced everywhere and least-privilege access is described; no evidence of completed onboarding/offboarding checklists or asset inventory register as operational artefacts.

Implementation: 2/3Documentation: 2/3
nis2.21.2.j.4
nis2.21.2.j.4Established

Text communications likely use standard encrypted messaging (e.g. Signal or equivalent) consistent with a remote-first tech team; the policy documents secured text communication requirements, though no specific tool mandate or enforcement evidence is provided.

Implementation: 2/3Documentation: 2/3

Critical Suppliers (7)

The third parties we depend on. NIS2 Article 21(2)(d) requires organizations to manage supply chain risk.

Hetzner Online GmbH

Cloud infrastructure / hosting

critical

Data shared: All application data, customer accounts, encrypted backups

Cloudflare

CDN, DNS, WAF, TLS termination

critical

Data shared: All HTTP/S traffic metadata, no plaintext payloads

Stripe

Payment processing and billing

high

Data shared: Customer billing details, subscription metadata

Anthropic

AI/LLM (Claude API for document generation)

high

Data shared: Customer organization context for document generation prompts

GitHub

Source code hosting and CI/CD

high

Data shared: Source code, deployment secrets via Actions

Resend

Transactional email delivery

medium

Data shared: Recipient email addresses (customer admins, vendor questionnaire contacts), email bodies (compliance notifications, vendor questionnaire requests, billing notices).

Google (Workspace + Drive via rclone)

Off-site backup destination

high

Data shared: Encrypted daily Postgres dumps + MinIO blob backups mirrored via rclone. Encryption at rest by Google; Reglyze does not currently apply client-side encryption on top.

Security Policies (15)

All generated by Reglyze itself, tailored to our environment.

NIS2 Article 20(2) Training Certificate — Cyril Poder

Updated 17 May 2026

Approved

Reglyze Information Security Policy

Updated 17 May 2026

Approved

Reglyze Incident Response Plan

Updated 17 May 2026

Approved

Reglyze Business Continuity Plan

Updated 17 May 2026

Approved

Reglyze Backup and Disaster Recovery Plan

Updated 17 May 2026

Approved

Reglyze Supply Chain Security Policy

Updated 17 May 2026

Approved

Reglyze Vulnerability Management Policy

Updated 17 May 2026

Approved

Reglyze Effectiveness Testing Policy

Updated 17 May 2026

Approved

Reglyze Cybersecurity Training Plan

Updated 17 May 2026

Approved

Reglyze Cryptography Policy

Updated 17 May 2026

Approved

Reglyze HR Security Policy

Updated 17 May 2026

Approved

Reglyze Access Control Policy

Updated 17 May 2026

Approved

Reglyze Asset Management Policy

Updated 17 May 2026

Approved

MFA & Secured Communications Policy

Updated 17 May 2026

Approved

Board/Management Cybersecurity Briefing Deck

Updated 17 May 2026

Approved

Why we publish this

Most compliance vendors talk about security but never show their own posture. We think that's backwards. If our platform is good enough for our customers, it's good enough for us.

Every score, control, supplier, and policy on this page comes from the same Reglyze platform we sell. There's no separate trust portal, no manually-curated security PDF. It's the live data, refreshed hourly via our own public API.

You can verify it yourself: api.reglyze.com/api/public/trust/reglyze

Build your own trust page

Get your NIS2 compliance score, generate policies, and manage suppliers in one platform — the same one we use.