NIS2 Art. 21(2) requires entities to implement measures covering: encryption, multi-factor authentication, incident handling, supply chain security, and network security.
Encryption (Art. 21(2)(h)): Paramant encrypts all data client-side using ML-KEM-768 (post-quantum key encapsulation, NIST FIPS 203) combined with ECDH P-256. Ciphertext is padded to a fixed 5 MB block to prevent size-based traffic analysis. No plaintext ever leaves the sender’s device.
No data retention: Files exist in RAM only and are deleted immediately after the first download (burn-on-read). There is no database, no object storage, and no disk write path. A breached server contains no recoverable data.
Network security: All relay endpoints enforce TLS 1.3. The Ghost Pipe architecture routes sectors into isolated relay instances (relay, health, legal, finance, IoT) to limit blast radius.
Art. 21 requires appropriate encryption and data minimisation — paramant delivers post-quantum encryption with zero server-side data retention.