Recent Breaches
Breaches
View All →
Compliance

Regulatory Alignment

How Offline Secure Storage helps organisations demonstrate compliance with the frameworks that matter most.

Regulatory frameworks increasingly demand demonstrable technical measures for data protection. Physical disconnection is not a workaround. It is the strongest possible answer to Article 32, NIS2 risk management, and DORA operational resilience requirements.

£4.88M

Average cost of a data breach (IBM 2024)

72 hours

GDPR breach notification window

Zero

Firevault customer breaches since inception

NIS2 Directive

Network and Information Security Directive 2

EU / UKOctober 2024 (EU), UK Cyber Security and Resilience Bill 2025

NIS2 expands cybersecurity obligations to essential and important entities across critical sectors. It mandates risk-based security measures, incident reporting within 24 hours, and supply chain security assessments.

Key Requirements

Risk Management

Implement appropriate and proportionate technical, operational and organisational measures to manage risks.

Incident Reporting

Report significant incidents to competent authorities within 24 hours of becoming aware.

Supply Chain Security

Assess and address security risks in the supply chain and service provider relationships.

Business Continuity

Ensure continuity of essential services including backup management and disaster recovery.

How OSS Helps

Layer 1 physical air gap eliminates network-based attack vectors entirely

Dedicated hardware removes supply chain and multi-tenant risks

Identity-locked access with full audit trails for incident evidence

RAID 1 mirrored resilience ensures business continuity of critical data

Physical disconnection provides verifiable, auditable security posture

DORA

Digital Operational Resilience Act

EU (applies to UK financial services operating in EU)January 2025

DORA establishes a comprehensive framework for digital operational resilience in the financial sector. It requires ICT risk management, incident reporting, resilience testing, and third-party risk management.

Key Requirements

ICT Risk Management

Maintain a sound, comprehensive and well-documented ICT risk management framework.

Resilience Testing

Conduct regular threat-led penetration testing and advanced testing of ICT tools and systems.

Third-Party Risk

Monitor and manage risks from ICT third-party service providers with contractual arrangements.

Information Sharing

Establish arrangements to exchange cyber threat intelligence with other financial entities.

How OSS Helps

Physical disconnection removes ICT risk at the infrastructure level

No third-party cloud dependencies to monitor or manage

Hardware encryption with Quantum Key Exchange exceeds cryptographic requirements

Zero standing privileges and time-limited access windows support least-privilege mandates

Complete audit trails provide evidence for regulatory examinations

GDPR

General Data Protection Regulation

UK / EUIn force since 2018

GDPR requires organisations to implement appropriate technical and organisational measures to protect personal data. Article 32 specifically mandates security proportionate to the risk.

Key Requirements

Data Protection by Design

Implement appropriate technical measures at the time of design and processing (Article 25).

Security of Processing

Ensure confidentiality, integrity, availability and resilience of processing systems (Article 32).

Breach Notification

Notify the ICO within 72 hours of becoming aware of a personal data breach (Article 33).

Data Minimisation

Ensure personal data is adequate, relevant, and limited to what is necessary.

How OSS Helps

Physical disconnection is the strongest possible 'appropriate technical measure' under Article 32

Data stored offline cannot be subject to a reportable breach via network compromise

Identity-locked access ensures only authorised individuals can reach personal data

Hardware encryption at rest satisfies pseudonymisation and encryption requirements

Dedicated hardware ensures no data co-mingling with other organisations

ISO 27001

Information Security Management Systems

InternationalOngoing certification

ISO 27001 is the international standard for establishing, implementing, maintaining and continually improving an information security management system (ISMS). Annex A controls require demonstrable technical and organisational measures.

Key Requirements

A.8 Asset Management

Classify information assets and apply appropriate protection levels based on their value and sensitivity.

A.9 Access Control

Restrict access to information and processing facilities based on business and security requirements.

A.10 Cryptography

Ensure proper and effective use of cryptography to protect the confidentiality, integrity, and authenticity of information.

A.12 Operations Security

Ensure correct and secure operations of information processing facilities including backup and logging.

How OSS Helps

Physical disconnection provides the strongest asset protection classification measure

Identity-locked access with KYC and MFA satisfies Annex A.9 access control requirements

AES-256 hardware encryption with Quantum Key Exchange exceeds A.10 cryptography standards

RAID 1 mirrored storage and full audit trails support A.12 operations security controls

Zero standing privileges align with least-privilege access principles

SOC 2 Type II

Service Organisation Controls for Security and Availability

International (AICPA)Annual audit cycle

SOC 2 Type II evaluates an organisation's information systems relevant to security, availability, processing integrity, confidentiality, and privacy. It requires sustained evidence of controls operating effectively over time.

Key Requirements

Security (CC)

Protect information and systems against unauthorised access, disclosure, and damage.

Availability

Ensure information and systems are available for operation and use as committed.

Confidentiality

Protect information designated as confidential throughout its lifecycle.

Processing Integrity

Ensure system processing is complete, valid, accurate, timely, and authorised.

How OSS Helps

Physical air gap eliminates unauthorised access vectors: the strongest security control evidence

RAID 1 mirrored drives ensure availability even in single-drive failure scenarios

Dedicated single-tenant hardware guarantees confidentiality with zero data co-mingling

Complete audit trails and identity-locked access provide processing integrity evidence

Time-limited connectivity windows demonstrate controlled, authorised access patterns

CAF 4.0

NCSC Cyber Assessment Framework

UKOngoing (critical infrastructure operators)

The NCSC Cyber Assessment Framework provides systematic assessment of organisations managing cyber risks to essential functions. CAF 4.0 focuses on four objectives: managing security risk, protecting against cyber attack, detecting events, and minimising impact.

Key Requirements

A: Managing Security Risk

Appropriate organisational structures, policies, and processes to understand, assess and manage security risks.

B: Protecting Against Cyber Attack

Proportionate security measures to protect systems and data from cyber attack.

C: Detecting Cyber Security Events

Capabilities to detect cyber security events affecting essential functions.

D: Minimising the Impact

Capabilities to minimise the impact of a cyber security incident on essential functions.

How OSS Helps

Physical disconnection is the most proportionate security measure for crown jewel data (Objective B)

Zero network attack surface means zero events to detect on disconnected assets (Objective C)

Offline storage ensures critical data survives total network compromise, minimising impact (Objective D)

Full audit trails and identity governance demonstrate mature risk management (Objective A)

Out-of-band control plane removes admin interface as an attack vector

PCI DSS 4.0

Payment Card Industry Data Security Standard

GlobalMarch 2025 (v4.0 mandatory)

PCI DSS 4.0 introduces significant updates to cardholder data protection requirements including stronger authentication, expanded encryption mandates, and continuous security monitoring. It applies to any entity that stores, processes, or transmits cardholder data.

Key Requirements

Requirement 3

Protect stored account data with strong cryptography and access controls.

Requirement 7

Restrict access to system components and cardholder data by business need-to-know.

Requirement 9

Restrict physical access to cardholder data and systems.

Requirement 12

Support information security with organisational policies and programs.

How OSS Helps

AES-256 hardware encryption exceeds Requirement 3 cryptographic standards

Identity-locked KYC/MFA access enforces need-to-know principles (Requirement 7)

Physical air gap and CNI-grade bunker locations satisfy Requirement 9 physical access controls

Full audit trails and zero standing privileges support Requirement 12 governance

Dedicated hardware eliminates shared infrastructure risks inherent in cloud PCI scope

FCA Operational Resilience

Financial Conduct Authority, PS21/3

UKMarch 2025 (full compliance)

The FCA's operational resilience framework requires UK financial firms to identify important business services, set impact tolerances, and ensure they can remain within tolerance during severe but plausible scenarios including cyber attacks.

Key Requirements

Important Business Services

Identify and map services that, if disrupted, could cause intolerable harm to consumers or market integrity.

Impact Tolerances

Set maximum tolerable levels of disruption for each important business service.

Scenario Testing

Test ability to remain within impact tolerances during severe but plausible disruption scenarios.

Self-Assessment

Document and regularly review operational resilience arrangements and third-party dependencies.

How OSS Helps

Crown jewel data protected offline ensures critical services can recover from total network compromise

Zero third-party cloud dependencies eliminate single points of failure in the supply chain

Physical disconnection provides demonstrable resilience against severe cyber attack scenarios

6-second access recovery supports tight impact tolerance windows

Dedicated hardware and RAID 1 mirroring ensure data availability under disruption

Cyber Essentials Plus

UK Government-Backed Cyber Hygiene Certification

UKAnnual certification

Cyber Essentials Plus is the highest level of the UK Government-backed scheme. It includes a hands-on technical verification of controls covering firewalls, secure configuration, access control, malware protection, and patch management.

Key Requirements

Firewalls & Gateways

Ensure boundary firewalls and internet gateways are configured to prevent unauthorised access.

Secure Configuration

Ensure computers and network devices are configured to reduce vulnerabilities.

Access Control

Ensure only authorised individuals have access to systems and data, with appropriate privilege levels.

Malware Protection

Ensure protection against malware using anti-malware software or application whitelisting.

How OSS Helps

Physical disconnection is the ultimate firewall: no network path means no unauthorised access

Dedicated hardware with hardened configuration removes misconfiguration risks entirely

Identity-locked access with KYC/MFA exceeds standard access control requirements

Offline storage is immune to malware, as ransomware cannot encrypt what is not connected

No patch dependency for disconnected storage reduces operational maintenance burden

NHS DSPT

Data Security and Protection Toolkit

UKAnnual submission (30 June)

The NHS DSPT is the mandated self-assessment tool for all organisations accessing NHS patient data and systems. It maps to the National Data Guardian's 10 data security standards and requires evidence of technical controls proportionate to data sensitivity.

Key Requirements

Standard 7: Data Security

Ensure confidentiality, integrity and availability of data through access controls and encryption.

Standard 8: Unsupported Systems

Ensure unsupported systems are segregated and do not expose data to risk.

Standard 9: IT Protection

Implement effective IT security measures including network controls and monitoring.

Standard 10: Accountable Suppliers

Ensure third-party suppliers meet the same data security standards.

How OSS Helps

Hardware encryption and physical isolation exceed Standard 7 data security requirements

Dedicated, maintained hardware eliminates unsupported system risks (Standard 8)

Zero network exposure means zero IT protection gaps to monitor (Standard 9)

No third-party cloud suppliers in the data path removes supply chain accountability risks (Standard 10)

Patient data stored offline cannot be subject to network-based breach or ransomware

SRA Standards

Solicitors Regulation Authority, Data Protection

UKOngoing obligation

The SRA requires law firms to have effective systems and controls for identifying and mitigating risks to client data. Following high-profile cyber attacks on UK law firms, the SRA has intensified scrutiny on data protection measures.

Key Requirements

Client Confidentiality

Keep the affairs of current and former clients confidential with effective information barriers.

Information Security

Implement and maintain appropriate systems for managing risks to information security.

Third-Party Risk

Ensure outsourced services maintain equivalent standards of data protection.

Incident Response

Have effective systems for detecting and responding to cyber security incidents.

How OSS Helps

Physical disconnection ensures client matter data is unreachable by cyber attack

Identity-locked access with full audit trails satisfies client confidentiality obligations

Zero third-party cloud dependencies eliminate outsourced service risks entirely

Offline storage survives ransomware, ensuring firm data remains intact for incident response

Dedicated hardware prevents any co-mingling of client data between organisations

Compliance is not a checkbox. It is an architecture.

Physical disconnection provides the strongest possible evidence of appropriate technical measures. Speak to us about how Firevault aligns with your specific regulatory obligations.

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Simplify your compliance journey

Tell us which frameworks apply to your organisation and we will map the offline storage solution that satisfies them.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy

    Firevault

    Firevault is Offline Secure Storage. Hardware you own, physically disconnected by default, with KYC-verified access. Ransomware-proof by design, not by patch.

    © 2026 Firevault Limited. Disconnect to Protect®