NIS2 Evidence for Web-Facing Assets: What to Track Across Domains, SSL, DNS, and Renewals
Learn what NIS2 evidence for web-facing assets can include across SSL, DNS, domains, email authentication, renewals, and monthly proof reports.
Updated 19 May 2026
See exactly where your client domains stand.
Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.
NIS2 evidence for web-facing assets means keeping practical records that show which public domains, SSL certificates, DNS records, email-authentication records, renewal dates, and trust signals were reviewed, when they were reviewed, what changed, and what still needs action. This evidence does not prove NIS2 conformity by itself. Public web-facing assets are only one part of a broader cybersecurity governance effort.
For agencies, MSPs, and IT teams, the value is operational clarity. Client websites often depend on public infrastructure that is easy to forget: certificates, registrars, nameservers, DNS records, mail authentication, and third-party renewals. A recurring evidence workflow helps teams show that those visible assets are being monitored and that exceptions are not buried in inboxes or spreadsheets. Start with the free 10-domain agency audit when you need a portfolio snapshot, and use the CertPilot methodology when explaining public data sources and limitations.
Direct Answer
Web-facing asset evidence can include a current domain inventory, SSL/TLS certificate status, DNS record snapshots, nameserver visibility, RDAP/domain expiry signals where visible, email-authentication configuration, public trust-signal checks, renewal ownership, and recurring proof reports.
That evidence can support internal NIS2-related preparation because NIS2 includes cybersecurity risk-management expectations. The official NIS2 Directive on EUR-Lex is broader than website monitoring, so teams should confirm interpretation with qualified legal or cybersecurity specialists. CertPilot's role is narrower: help teams document public web-facing asset signals and recurring operational review.
Why This Matters
Web-facing assets are operational dependencies. A domain expiry, certificate lapse, broken DNS record, missing email-authentication record, or unmanaged renewal can affect websites, email, client trust, and incident response. These failures are not always complex attacks. Many are ordinary operational gaps.
Evidence matters because management, client stakeholders, consultants, and technical teams need more than verbal assurance. They need records that show:
- Which assets were in scope.
- What was checked.
- When the check happened.
- What the public result showed.
- What changed since the last review.
- Who owns unresolved action.
- Which limitations apply.
For NIS2-related preparation, this does not replace the broader governance process. It gives one clean evidence stream for public digital assets.
What Counts as a Web-Facing Asset
A web-facing asset is any public technical dependency that supports a website, landing page, client portal, support domain, email domain, or brand domain.
Common examples:
- Root domains and subdomains.
- SSL/TLS certificates.
- Nameservers.
- DNS A, AAAA, MX, NS, TXT, and CAA records.
- SPF, DKIM, DMARC, MTA-STS, TLS-RPT, and BIMI records where relevant.
- Registrar and domain expiry signals.
- Website security and trust headers.
security.txt, sitemap, robots, and other public trust files.- Hosting, CDN, DNS, certificate, and registrar renewals.
- Monthly domain-health and renewal-risk reports.
The Domain Operations Guide for Agencies is a useful pillar for the ownership and handover side of this inventory.
What Evidence Can Be Collected From Public Checks
Public checks are useful because they do not require private system access. They can be repeated, stored, compared, and explained to non-specialists. They also have limits.
Public evidence can show:
- Whether HTTPS responds with a valid certificate.
- Certificate issuer and expiry date.
- DNS records currently visible.
- Nameserver values.
- Public TXT records used for mail and verification.
- RDAP/domain data where available.
- Visible trust-signal headers and files.
- Changes between two public snapshots.
Public evidence cannot show:
- Whether an organization is NIS2-conformant.
- Whether every internal system is protected.
- Whether registrar billing is current.
- Whether a DNS provider account is secure.
- Whether a hosting panel is configured correctly.
- Whether a vulnerability exists behind authentication.
- Whether policy, training, incident response, and governance measures are complete.
Use public evidence as one operational evidence stream, not as a final determination.
SSL Certificate Evidence
SSL certificate evidence should answer practical questions:
- Which hostnames were checked?
- Was the certificate valid at check time?
- When does it expire?
- Who issued it?
- Did issuer or certificate details change?
- Is the renewal window short enough to need action?
- Who owns renewal follow-up?
This evidence is especially useful as certificate lifetimes shorten. The SSL monitoring Watchtower guide explains how expiry tracking, issuer visibility, and calendar workflow fit together.
For NIS2-related evidence, certificate records support operational continuity and change review. They do not prove that the whole organization has effective cybersecurity risk management.
DNS Evidence
DNS evidence should show which public records exist and whether they changed. Useful evidence includes:
- Current A and AAAA records.
- MX records.
- NS records.
- TXT records.
- CAA records.
- Nameserver changes.
- Removed or newly added values.
- Review date.
- Owner and action note.
The DNS monitoring for agencies guide covers drift, ownership, and client website risk. For evidence workflows, the key is repeatability. A one-time DNS screenshot is weaker than a recurring record of what changed and what was reviewed.
Domain/RDAP Evidence
Domain evidence can include registrar visibility, domain status, expiry date where visible, nameserver values, and the confidence level of the data source. RDAP can provide structured public domain information, but availability and completeness vary by TLD, registrar, and registry.
Use careful wording:
- "Public expiry data visible."
- "Public expiry data unavailable."
- "Registrar confirmation recommended."
- "RDAP returned limited data."
Do not pretend that every public domain check exposes a renewal date. Link to the CertPilot methodology when explaining that public checks have limits.
Email-Authentication Evidence
Email-authentication evidence helps show whether public mail-domain configuration is being reviewed. Useful records include:
- SPF.
- DKIM selectors.
- DMARC policy.
- DMARC reporting addresses.
- MTA-STS.
- TLS-RPT.
- BIMI.
- MX records.
The Email Authentication for Agencies pillar is the best internal reference. This evidence does not guarantee inbox placement. It shows visible configuration status and exceptions that need review.
Renewal Evidence
Renewal evidence covers domains, certificates, hosting, SaaS tools, plugins, licenses, and other client-operational assets. A renewal-risk record should include:
- Asset name.
- Owner.
- Renewal date.
- Billing or renewal cadence.
- Status.
- Risk note.
- Last review date.
- Next action.
The Renewal Ledger for Agencies explains how this fits into agency operations. For NIS2-related preparation, renewal evidence can support continuity and accountability conversations.
What This Does Not Prove
Web-facing asset evidence does not prove that an organization satisfies NIS2 obligations. It also does not replace:
- Legal interpretation.
- Governance ownership.
- Internal risk assessment.
- Incident response planning.
- Identity and access management review.
- Endpoint or network security review.
- Supplier contract review.
- Specialist cybersecurity review.
It is better to describe the output as "operational evidence for public web-facing assets" than as "NIS2 proof."
Practical Evidence Checklist
| Evidence area | What to keep | Why it helps | Limitation | |---|---|---|---| | Asset inventory | Domains, subdomains, owners | Shows scope | May miss shadow assets | | SSL/TLS | Expiry, issuer, validity | Supports renewal review | Does not assess app security | | DNS | Record snapshots and drift | Shows public configuration changes | Does not show account controls | | Domain/RDAP | Registrar and expiry where visible | Supports continuity review | Expiry data can be limited | | Email authentication | SPF, DKIM, DMARC, MTA-STS, TLS-RPT | Shows visible mail-domain setup | Does not guarantee delivery | | Renewals | Dates, owners, status | Shows operational accountability | Does not confirm payment success | | Reports | Monthly findings and actions | Shows recurring review | Must include limitations |
How CertPilot Helps
CertPilot helps agencies, MSPs, and IT teams collect public operational signals across SSL, DNS, domain expiry, email authentication, trust signals, and renewal risk. The goal is to make recurring review visible.
Use:
- Run Free Agency Audit for a broad multi-domain evidence snapshot.
- View CertPilot Methodology for public-data boundaries.
- Monthly Proof Report for Agencies for recurring report structure.
CertPilot does not make a NIS2 determination. It helps teams keep better public-signal records.
Romania-Specific NIS2 Planning Note
If your organization is preparing under GEO 155/2024, CertPilot can help with operational evidence around public web-facing assets. For broader internal preparation, NIS2 Pilot helps Romanian teams organize planning information before discussions with consultants, legal advisors, or cybersecurity specialists.
Related Resources
- Monthly Proof Report for Agencies
- Domain Operations Guide for Agencies
- DNS Monitoring for Agencies
- SSL Monitoring Watchtower Guide
- Renewal Ledger for Agencies
Frequently Asked Questions
What is NIS2 evidence for web-facing assets?
NIS2 evidence for web-facing assets is documentation that shows public websites, domains, certificates, DNS records, email-authentication records, and renewals are being reviewed. It can include screenshots, structured reports, public check results, change records, and assigned actions. This evidence may support internal governance discussions, but it does not establish NIS2 conformity by itself.
Can CertPilot make an organization NIS2 compliant?
No. CertPilot is not a NIS2 compliance platform and does not determine whether an organization meets NIS2 obligations. It helps teams document public web-facing asset signals, such as SSL, DNS, domain expiry, email authentication, trust signals, and renewal risk. Broader NIS2 preparation should involve qualified legal, governance, and cybersecurity specialists.
Why should agencies and MSPs track this evidence?
Agencies and MSPs often manage client-facing domains, DNS, certificates, and renewals without owning every account behind them. Evidence helps them show what was checked, when it was checked, what changed, and what still needs owner follow-up. That makes client conversations and internal reviews less dependent on memory.
Does SSL and DNS evidence prove cybersecurity risk management is effective?
No. SSL and DNS evidence covers only public technical signals. It can support one part of a risk-management conversation, but it cannot show internal access controls, policy adoption, incident response maturity, supplier contracts, endpoint protection, or network controls. Treat it as a narrow evidence stream.
How often should web-facing asset evidence be collected?
Monthly evidence is a practical baseline for many agency and MSP workflows, with more frequent monitoring for high-risk domains, certificates close to expiry, DNS migrations, and critical clients. The right cadence depends on asset importance, risk tolerance, and contractual responsibilities.
What should a monthly evidence record include?
A useful record includes the assets checked, public signal results, date checked, changes since the previous review, unresolved risks, assigned owners, and limitations. It should also distinguish visible public findings from private checks that require registrar, DNS provider, hosting, or email platform access.
Monitor every client domain from one dashboard.
CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.