NIS2 Art 21 · EU Dual-Use · Tier-N verification

Every subcontractor. Every handover. Cryptographically attested.

A defence prime with Tier-2 and Tier-3 suppliers across 15 countries cannot manually verify the identity of every engineer, technician, or courier touching sensitive components. Today, most sub-tier verification is document-based, paper-based, or simply implicit.

A primary contractor in Munich ships a classified electronics module to an assembly subcontractor in Bucharest. The subcontractor hands it to a courier, who routes through a hub in Istanbul for onward delivery. Four handovers, four countries, four identity regimes — and a single piece of paper travelling with the package to record who touched it at each point.

When the module arrives with tampering evidence, the investigation begins: was it the courier? The Bucharest technician? The hub handler in Istanbul? The paper trail gives names; it does not cryptographically prove which human performed which handover. NIS2 Article 21 now requires that proof — and your existing ERP and supply-chain systems were never built to produce it.
Worldwide
Any contractor · 179 NFC countries
Oct 2024
NIS2 transposition deadline — already in force
AdES
Every handover signed
Every tier
From prime contractor to last-mile carrier

Defence procurement is a distributed trust problem with a 2007-era identity layer.

Modern defence primes operate networks of hundreds of sub-tier suppliers across dozens of countries. A single fighter aircraft programme involves suppliers from 20+ nations; a single armoured vehicle platform has Tier-3 subcontractors in every permissive jurisdiction.

Supply-chain identity governance has not kept pace. Most programmes rely on vendor questionnaires, bilateral agreements, and periodic site audits — processes that were state-of-the-art in 2007 and are no match for 2026 threat actors targeting the defence supply chain.

NIS2 Article 21 requires critical entities to manage supplier cybersecurity risk. The EU Dual-Use Regulation requires documented identity controls across the technology chain. Neither is satisfiable with paper documentation and annual audits.

Art 21
NIS2 clause requiring documented supply-chain security measures
Directive (EU) 2022/2555
€1B
European Defence Fund 2026 budget with supply chain resilience as a named priority
European Commission, EDF 2026 Work Programme
31
EDF 2026 topics — including SME-led disruptive technologies and supply chain integrity
European Commission, EDF 2026 Work Programme

Where vendor identity fraud compounds into programme risk.

Not every defence supplier relationship carries the same identity risk. These are the patterns where a single sub-tier breach creates cascading programme exposure.

01
🔧

Primes with deep Tier-N chains

Aerospace, naval, and land-system primes with Tier-2 and Tier-3 suppliers in 15+ countries. The prime cannot manually verify every contractor. IdentiGate bridges the gap at individual level.

02
🌐

EDF consortia with SME participants

EDF consortia routinely include SMEs from multiple member states — each with their own national ID regimes. A shared passport-anchored identity layer simplifies consortium operations and audit.

03
📦

Dual-use technology chains

Semiconductor, optics, AI, and quantum suppliers often span civil and defence ecosystems. Dual-use export controls require individual-level identity evidence most ERPs cannot produce.

Your supplier portal tracks companies. It doesn't track the people inside them.

Vendor management platforms, supplier portals, and procurement ERPs were built around companies — SAP Ariba, Oracle, Coupa. They handle company-level onboarding, contract management, and compliance tracking. None of them verify, cryptographically, which individual engineer or courier is touching sensitive components at any given moment — because they were never designed to.

What Most Supply-Chain Stacks Do Today
  • Company-level onboarding in supplier portal
  • Annual vendor questionnaires
  • Periodic site audits by compliance teams
  • Paper-based handover receipts
  • ERP tracking at consignment level
  • Implicit trust in sub-tier vendor's HR
What IdentiGate Adds
  • Individual-level passport-verified identity
  • Every handover signed at eIDAS AdES level
  • Cryptographic evidence chain across Tier-N
  • NIS2 Article 21 audit artefacts on demand
  • Company ↔ person binding verified in-chain
  • Works for contractors worldwide

How does IdentiGate compare?

Defence supply chain has three existing approaches today — ERP supplier modules, specialised defence supplier platforms, and the US CMMC-style accreditation model for cybersecurity. Each handles company-level governance; none produces individual-level cryptographic evidence.

Capability ERP Supplier Module CMMC-style Accreditation IdentiGate
Individual-level identity verificationNoPartial — via HRYes — passport chip
Per-handover cryptographic signatureNoNoYes — AdES
Tier-N coverage (sub-tier contractors)Company level onlyPolicy-basedIndividual level
NIS2 Article 21 audit artefactsNoPolicy documentationCryptographic evidence
Non-EU supplier coverageVariesUS-focusedWorldwide — 179 NFC + document route
Personal data returned to primeFull identity recordFull identity recordSigned attestation only
Integration with company identity (LEI)LimitedNoYes — ISO 17442

Keep your ERP. Keep your supplier portal. IdentiGate adds the individual-level identity layer that company-focused systems cannot produce — turning vendor questionnaires into cryptographic evidence, and paper handovers into audit-ready records.

What stands between you and a verified defence supply chain.

The sub-tier visibility problem

You verify your Tier-1 suppliers. Your Tier-1 claim to verify Tier-2. The claim is usually a vendor questionnaire. By Tier-3, nobody really knows who is handling what. The default posture across European defence procurement today.

Passport-anchored individual identity, issued to every contractor, creates continuous sub-tier visibility without rebuilding Tier-1 HR.

The non-EU contractor coverage problem

A Turkish electronics subcontractor, a South Korean optics supplier, a Ukrainian software integrator — all legitimate, all outside EUDI Wallet. National ID regimes vary wildly in cryptographic rigour.

Passport-anchored identity works the same way in every country — a nation-signed NFC chip is a nation-signed NFC chip, whether Madrid, Ankara, or Seoul.

The NIS2 Article 21 evidence problem

NIS2 requires documented supplier cybersecurity controls. Regulators know vendor questionnaires prove nothing. They will increasingly demand cryptographic artefacts that independently verify identity without self-report.

IdentiGate's evidence layer produces exactly these artefacts — tamper-evident chains satisfying NIS2, DORA, EU Dual-Use Regulation, and export-control audits.

The SME consortium participation problem

EDF consortia include SMEs whose identity tooling does not match primes. This creates a ceiling on SME participation — or forces primes to absorb the cost.

Passport-anchored identity is independent of enterprise tooling investments. A five-person SME in Lithuania uses the same layer as a 50,000-person prime in France.

Not just one product. The complete defence supply chain identity stack.

Each capability below solves a specific moment in the defence supply chain — from the first contractor at the gate, through multi-tier sub-suppliers, to the cryptographic handover chain a regulator or programme office will eventually audit. Deployable today, built on our existing products.

SOLVE TODAY
01
🛂

Individual Contractor Verification

NFC passport scan, performed once per person, cryptographically verified — closes the visibility gap at every tier simultaneously.

02
🏢

Supplier Company Verification (LEI)

GLEIF LEI support produces one verifiable answer across jurisdictions, linked cryptographically to authorised signers.

03
📦

Cryptographic Handover Chain

AdES signature at each handover, from the verified individual — tamper-evident chain from origin to delivery, audit-provable.

04
📋

NIS2 Article 21 Evidence

Cryptographic evidence chain produces the NIS2 supervisory record as a structural artefact — regulator-verifiable without re-disclosing personal data.

05
✍️

Multi-Party Contract Signing

Prime + Tier-1 + Tier-2 + ministry = seven signatures, seven jurisdictions. Each with own verified passport-anchored identity. No weak link.

06
🚀

Consortium Batch Onboarding

12 partners across 8 countries provisioned in one operation. Revoked uniformly if a partner exits. Months-long work becomes one API call.

TOMORROW'S EDGE

The procurement systems aren't here yet. Our architecture already is.

07
🔒

Zero-Knowledge Clearance Attestation

Confirms "holds clearance at or above the required level" without disclosing the actual level or issuing authority. Fit for multi-national consortia.

✦ Waiting for ecosystem adoption
08
🤖

Autonomous Systems Supply Chain

AI QA systems, autonomous vehicles, agent scheduling. Every non-human action traceable to a named human supervisor via cryptographic delegation.

✦ Waiting for industry adoption
09
🌐

Cross-Consortium Identity Portability

Verified contractor moves to new consortium. Identity travels with them. New programme consumes attestation, not fresh documents.

✦ Waiting for industry adoption

Two paths from pilot to production.

01

Supplier Portal API 🔌

Embed IdentiGate verification into SAP Ariba, Oracle Procurement, Coupa, or a bespoke supplier portal. Scales from single-prime deployments to consortium-wide EDF identity layers with NIS2 Article 21 evidence built-in.

REST API · SAML/OIDC/SCIM · SAP Ariba/Oracle/Coupa integrations · NIS2/DORA/Dual-Use audit reporting · dedicated SLA at volume
See product pageIdentity Verification
+ integration scoped
02

Signing Portal ✍️

Hosted path for SME sub-tier suppliers, consortium members, and tier-N partners without internal identity tooling. Every signer is a passport-verified person — ideal for NIS2 Article 21 supplier attestations, EDF consortium agreements, and cross-border supply chain documents where counterparties span USA, EU, Asia, Africa.

Passport-verified signing · eIDAS AdES · worldwide · available as standalone product
Free–€28Free · €12 Pro · €28 Business · Enterprise

For full pricing details, see product pages: Identity Verification, Authentication, AdES Signing, Signing Portal. Integration fees are scoped per engagement — we quote after a short discovery call.

Request a supply chain briefing.

For defence primes, EDF consortium leads, and procurement digital teams: a technical briefing covering architecture, NIS2 Article 21 evidence production, and integration paths for your specific programme. Remote or in-person — wherever suits your team.

Security researchers: disclose vulnerabilities responsibly at security@identigate.com