NIS2 & GDPR Readiness
Why discovering your SaaS environment matters for
NIS2 and GDPR
The Network and Information Security Directive 2 (NIS2) is one of the most significant cybersecurity regulations introduced in the European Union in recent years. It expands the scope of the original directive and requires a much broader range of organizations to implement structured cybersecurity risk management practices.
One of the most important shifts introduced by NIS2 is accountability.
Under the directive, management bodies can be held personally responsible for cybersecurity governance and risk oversight. This means executives are no longer only responsible for strategy and operations, they are also expected to understand:
which systems the organization relies on
which vendors handle company data
how risks are identified, monitored, and managed
In theory, this sounds straightforward.
But in practice, many organizations encounter a fundamental challenge long before they implement any controls: visibility.
Modern companies rely heavily on cloud software and SaaS platforms. At the same time, employees can adopt these tools independently — often without formal IT involvement or centralized approval.
This creates a critical gap.
Regulations like NIS2 assume that organizations have a clear overview of their systems and vendors. But in reality, many companies are operating in environments where parts of their software ecosystem are simply not visible.
As a result, software visibility — especially SaaS visibility — has become a foundational step in regulatory readiness.
When organizations begin preparing for NIS2 or reviewing their GDPR responsibilities, they often start with a basic question: "Do we actually know which systems we are using?"
For many, the answer is less clear than expected. What begins as a compliance exercise often turns into a discovery process. Teams realize that software has been adopted across the organization over time by different departments, for different purposes, and without centralized tracking.
This is not necessarily the result of poor governance. It is the natural outcome of how modern SaaS works:
You might not have heard the term Shadow IT before, but you've probably already experienced it in your organization.
A marketing manager signs up for a new analytics platform. She is in a hurry, so she uses her private card. It takes less than a minute to create the account and connect company CRM data.
An HR manager tries a free recruitment tool recommended by a colleague. It works great. Months later, she leaves the company — but the account remains active, still storing applicant data covered under GDPR.
A finance team experiments with a SaaS budgeting tool to speed up reporting.
Each decision makes sense. Each tool solves a real problem. But over time, something changes. Nobody in the company has a complete picture anymore. This situation is extremely common in modern organizations. Cloud software is so easy to adopt that employees can introduce new applications without any formal approval or IT involvement.
This phenomenon is known as Shadow IT.
Instead of appearing in official software inventories, these tools operate quietly in the background — still accessing company data, still storing information, and still a potential liability under frameworks such as GDPR or NIS2. Research shows that a large share of SaaS services used within companies are introduced outside formal IT processes, creating significant visibility gaps across organizations.
For small and medium-sized businesses, this raises a difficult question:
How can we manage security, cost control, and regulatory obligations if we cannot fully see our software environment?
Understanding Shadow IT is the first step.
Shadow IT refers to software or digital services used within an organization without the knowledge or approval of IT or leadership. Today, it most commonly appears in the form of SaaS applications. Employees adopt these tools because they solve problems quickly:
From an employee perspective, the decision is logical. They want to work faster. However, when software adoption happens outside oversight, companies lose visibility into their digital environment, and that visibility gap is exactly what makes compliance with frameworks like NIS2 and GDPR more difficult.
In other words:
Shadow IT is not just an IT issue.
It is a visibility problem — and a compliance risk.
Once organizations realize Shadow IT may exist, the next step is SaaS discovery.
SaaS discovery means identifying which applications are actually used across the organization — regardless of whether they were officially approved. Because SaaS adoption happens continuously, this process usually evolves into an ongoing SaaS management practice.
A structured SaaS discovery process typically involves several stages.
The first step is identifying which SaaS tools employees are using.
Because SaaS applications can be adopted quickly, manual tracking often becomes unreliable. Many organizations therefore use automated discovery tools that detect applications across the environment.
The goal of this stage is to build a complete SaaS inventory.
SaaS adoption never stops.
Employees regularly test new tools to improve workflows, which means the SaaS environment constantly evolves.
Continuous monitoring helps organizations detect new services as they appear, preventing Shadow IT from growing unnoticed.
Once tools are identified, organizations need to understand:
This stage often reveals surprising insights.
Companies frequently discover:
Each discovered service should be reviewed to understand:
This step is particularly important for GDPR and NIS2 readiness, where organizations must demonstrate control over systems handling data.
Finally, organizations can streamline their SaaS environment by:
This stage often delivers both cost savings and improved security oversight.
When you lack visibility into your SaaS environment, risks accumulate — often without anyone realizing it.
The overarching problem is simple:
Organizations may not know what data is stored, where it is stored, or what access external services have to internal systems. Without a structured review process, risky services can slip through unnoticed. Several types of risks commonly emerge.
Unknown SaaS tools may access sensitive company data without proper evaluation.
Security risks include:
applications gaining broad access to company workspaces via OAuth or API permissions
personal data being stored in tools that have not been vetted for GDPR compliance
services with weak authentication or security controls
unknown vendors processing company or customer information
Without visibility, security teams cannot properly assess or mitigate these risks.
Shadow IT can also make regulatory compliance extremely difficult.
Modern frameworks such as GDPR and NIS2 require organizations to understand:
which systems process personal data
where that data is stored
which services are business critical
who has access to those systems
In practice, not knowing what services your organization is actually using makes compliance impossible.
Shadow IT often leads to uncontrolled SaaS spending.
Over time, companies commonly discover:
multiple tools solving the same problem
subscriptions purchased independently by different teams
unused licenses continuing to renew
This is why organizations increasingly adopt SaaS management practices — structured processes for discovering, monitoring, and optimizing software usage across the company.
SaaS visibility is necessary for security, cost control, and compliance readiness. However, manually tracking software across departments is extremely difficult. This is why SMEs increasingly rely on lightweight tools that help detect Shadow SaaS.
A well-designed SaaS discovery platform can help organizations:
Automatically detect new SaaS tools
Monitor and optimize SaaS usage
Identify waste, overlap, and unused licenses
By improving visibility, organizations can not only strengthen compliance readiness, but also manage their SaaS environment more effectively overall.
Once organizations recognize the importance of SaaS visibility, the next step is implementing tools that provide it. Substly is a SaaS management platform designed to help companies discover and manage their SaaS environment.
With Substly, organizations can:
By providing transparency into SaaS environments, SaaS management platforms help companies move from reactive IT management to proactive governance.
Shadow IT is not unusual.
In fact, it is often a natural result of teams exploring new tools to improve productivity.
The goal is not to stop innovation.
The goal is to make the software environment visible, manageable, and secure.
Understanding your SaaS environment helps your organization:
Strengthen security
Reduce software waste
Improve regulatory readiness
Maintain better control over data and access
Substly helps organizations discover Shadow IT, monitor SaaS usage, and gain clarity across their digital environment.