Network Infrastructure complete

Control over network topology, DNS, CDN, and connectivity infrastructure

L0 Unaware

No awareness of network infrastructure dependencies; DNS, CDN, and connectivity are unmanaged or entirely delegated without oversight

Criteria

  • NET-L0-C1 The organisation has no inventory of its DNS providers, CDN services, or network dependencies
    Evidence guidance

    Request documentation of DNS registrars, nameserver providers, CDN services, and ISP contracts; verify whether a network dependency register exists in any form (spreadsheet, CMDB, wiki)

  • NET-L0-C2 The organisation has no understanding of which external parties can modify its network configuration - routing, DNS, or firewall changes could be made by providers without the organisation's awareness
    Evidence guidance

    Ask who can make changes to DNS records, firewall rules, or routing configuration; determine whether the organisation would know if a provider made unilateral changes to its network setup

  • NET-L0-C3 DNS domain registrations and critical network accounts are tied to individual employee credentials rather than organisational accounts with role-based access
    Evidence guidance

    Audit DNS registrar account ownership, CDN console access, and ISP portal credentials; check whether accounts are registered under personal email addresses or shared credentials

Indicators

  • DNS registrations are tied to individual employee accounts rather than organisational accounts
  • No one in the organisation can describe the full network path from end-user to application
  • Network incidents are discovered through customer complaints rather than monitoring
  • No record exists of which CDN or DNS provider serves which domain

Regulatory mappings

RegulationArticlesRiskNote
GDPRart-5, art-32criticalUnmanaged network infrastructure cannot satisfy the integrity and confidentiality principles (Art 5(1)(f)) or the obligation to implement appropriate technical measures (Art 32). Network logs containing IP addresses constitute personal data under CJEU C-582/14 (Breyer) yet are not governed.
NDSGart-8highFailure to maintain visibility over network infrastructure violates the requirement to ensure data security through appropriate technical and organisational measures (Art 8 nDSG)
NIS2art-21criticalNIS2 Art 21(2) requires risk analysis and information system security policies. Complete absence of network awareness makes compliance with any of the enumerated measures impossible.

Upgrade path

Create an inventory of all DNS, CDN, and connectivity providers. Document the current network topology and assign organisational ownership to all network accounts. Establish a basic monitoring system that alerts on DNS resolution failures and connectivity outages.

Risk if stagnant

Without visibility into network infrastructure, the organisation cannot detect routing anomalies, DNS hijacking, or CDN misconfigurations. A single provider outage or account compromise could sever all connectivity with no recovery plan. If a key employee leaves, access to critical DNS or hosting accounts may be permanently lost.

Typical characteristics
  • No asset inventory. The organisation has no central record of which DNS registrars, nameserver providers, CDN services, or ISPs it depends on. Different teams may use different providers without coordination, and no one holds a complete picture of the network dependency chain.
  • Individual account ownership. Domain registrations, CDN dashboards, and ISP management portals are logged in under personal employee email addresses. If that employee leaves, the organisation may lose the ability to manage its own domains or network configuration.
  • No change management. Firewall rules, DNS records, and CDN configurations are modified directly in provider consoles without review, approval, or documentation. There is no audit trail of who changed what and when.
  • Reactive incident discovery. Network problems are discovered when users or customers report them, not through monitoring. The organisation has no alerting for DNS resolution failures, routing changes, or latency degradation.
Why this is dangerous

Network infrastructure is the foundation on which every other digital capability rests. Without visibility into DNS, routing, and connectivity dependencies, the organisation is unable to assess its own attack surface, plan for provider failures, or respond to incidents with any confidence.

DNS hijacking, for instance, can redirect all traffic intended for the organisation to an attacker-controlled server. If the organisation does not even know which nameservers it uses, it cannot detect such an attack, let alone respond to it. Similarly, BGP route leaks can silently redirect traffic through unintended jurisdictions, a risk the organisation cannot evaluate without a documented network topology.

The regulatory exposure is equally severe. Under GDPR, IP addresses constitute personal data (as confirmed by the CJEU in the Breyer ruling). Network logs that contain IP addresses are therefore subject to data protection requirements, yet at Level 0, the organisation has no awareness of where such logs exist or who processes them. NIS2 Art 21 requires essential and important entities to implement baseline cybersecurity measures including risk analysis and incident handling, none of which are possible without basic network awareness.

Sovereignty implications

At this level, network sovereignty is not a meaningful concept. The organisation lacks the foundational visibility required to reason about where its traffic flows, which jurisdictions it transits, or which providers could disrupt its connectivity. Establishing basic inventory and documentation is the prerequisite for any sovereignty consideration.