The site is under construction!!! Copyright © 2025-2026 NoFuss Consulting DOOEL - All rights reserved.

Manage compliance

Compliance should prove good practice, not replace it. We can help you meet regulatory or customer requirements by building on what works.

Compliance, audit, and certification are related but distinct. Compliance means fulfilling requirements, while audit and certification deal with independent verification and recognition. Specializing in security and risk management systems, NoFuss Consulting focuses on implementation and operation, not auditing or certification.

Homepage hero image

What we cover

Requirements generally come from two sources: legislation that applies based on where you operate or what sector you’re in, and industry standards you choose to adopt — often to satisfy customer expectations or demonstrate maturity to the market. The underlying work is similar: understand the requirements, assess your gaps, implement controls, and maintain evidence. The difference is who’s asking and what happens if you fall short.

Legislation

Icon EU law

In Europe, legislative requirements are often driven by the EU, with EEA and candidate countries usually adopting compatible laws. Within the EU there are several types of legislation, of which regulations and directives are most relevant. Non-compliance typically carries penalties, and in some cases personal liability.

Types of EU legislation ↗

NIS2 Directive

The NIS2 Directive expands EU cybersecurity requirements to essential and important entities across 18 sectors including energy, transport, health, digital infrastructure, and ICT service providers. It mandates risk management measures, incident reporting, supply chain security, and management accountability.

We can help with scoping and applicability assessment (helping you determine if and how NIS2 applies to your organization), gap analysis against requirements, risk management framework implementation, policy development, supply chain security processes, and management briefings on accountability obligations. ISO 27001 provides a strong foundation — we can help you build on it.

We don’t provide formal legal opinions, entity classification determinations, or legal representation with regulatory authorities. With support from trusted partners, we can help you navigate jurisdictional requirements where legal clarity is needed.

GDPR

The General Data Protection Regulation governs how organizations process personal data of individuals in the EU. It applies regardless of where your organization is based if you offer goods or services to people in the EU or monitor their behavior.

We can help with security-related requirements covered in Article 32 (security of processing) and Article 25 (data protection by design and default). This includes implementing technical and organizational measures, building secure processes that respect data minimization and retention principles, and ensuring your ISMS addresses data protection risks. We can also support breach response procedures and gap assessments where security and privacy requirements overlap.

We don’t offer DPO services, data subject rights processes (access requests, erasure, portability), data protection impact assessments, legal interpretation of processing lawfulness, or representation with supervisory authorities. These require privacy expertise positioned as independent function.

CRA

The Cyber Resilience Act sets cybersecurity requirements for products with digital elements placed on the EU market — including software applications, mobile apps, and connected devices. It requires secure development practices, vulnerability handling processes, and security support throughout the product lifecycle.

If you develop software for the EU market, we can help you assess development practices against CRA requirements and build compliant processes: secure SDLC implementation, vulnerability management workflows, incident reporting procedures, and documentation practices. Our background in software development and security engineering makes this a natural fit.

We don’t handle CE marking, conformity assessments for critical products, or act as your authorized representative.

DORA

The Digital Operational Resilience Act applies to financial entities in the EU — banks, insurers, investment firms, payment providers — and their critical ICT service providers. It mandates ICT risk management frameworks, incident reporting, resilience testing, and third-party risk oversight.

We can help with ICT risk management framework development, gap assessments against DORA requirements, policy development, and third-party risk processes. If you already have ISO 27001, we can help map your existing controls to DORA requirements and close gaps. With support from trusted partners, we can also help you assess whether DORA applies to your organization and in what capacity.

Penetration testing, audits, and ongoing legal consulting or regulatory filings are outside our scope. Independent verification should be sourced separately from implementation support.

Standards

Icon EU law
Standards provide structured approaches to security tested across industries. Some are certifiable by accredited bodies; others serve as control catalogues for benchmarking or mapping. Adopting a recognized standard often satisfies multiple compliance needs at once.
ISO/IEC 27001

The international standard for Information Security Management Systems (ISMS). Certification demonstrates that your organization manages information security through a structured, risk-based approach. Widely recognized, often required by enterprise customers, and serves as a foundation for meeting multiple regulatory requirements.

We offer full implementation support — from initial gap analysis through certification. We help you build an ISMS that works for your organization: scope definition, risk assessment, control selection, policy development, internal audits, and management reviews. Our goal is a system your team can operate independently.

Certification audits are performed by independent and accredited certification bodies.

PCI DSS, 3DS & SSF

The Payment Card Industry Data Security Standard applies to organizations handling payment card data. The 3-D Secure Standard covers authentication components. The Software Security Framework (SSF) — comprising the Secure Software Standard and Secure Software Lifecycle Standard — applies to payment software vendors. Required by card brands and enforced through acquiring banks and brand programs. SSF is increasingly relevant for software companies whose products touch payment data.

We offer implementation and management support across all three — gap analysis, policy development, control design, as well as implementation and audit support. Our software engineering background makes SSF work a natural fit.

Formal assessments require a Qualified Security Assessor (QSA), PCI 3DS Assessor, or SSF Assessor depending on the standard.

SOC 2

System and Organization Control reports demonstrate that a service organization has controls in place to protect customer data. Based on the AICPA Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy). Increasingly requested by US enterprise customers and investors evaluating SaaS providers.

If you are a European organization targeting the US market, we can help with readiness assessments, control design and implementation, policy development, and evidence preparation. If you already have ISO 27001, we can help you leverage existing controls and fill gaps specific to SOC 2 criteria.

The SOC 2 examination itself must be performed by a licensed CPA firm.

CSA STAR

The Cloud Security Alliance STAR (Security, Trust, Assurance, and Risk) program provides assurance for cloud service providers. It ranges from self-assessment to third-party certification, built on the Cloud Controls Matrix (CCM). Increasingly requested by enterprise customers evaluating cloud and SaaS vendors, particularly those with mature security requirements.

We can help with gap assessments against CCM controls and preparation for STAR self-assessment or certification. If you already have ISO 27001, we can help you leverage existing controls and fill gaps specific to CCM.

STAR certification audits are performed by CSA-authorized certification bodies, and technical cloud implementation work is outside our scope.

How we deliver compliance

Compliance isn’t a milestone, but an ongoing state of meeting requirements. The work doesn’t end when you pass an audit — it continues as long as the requirements apply to you. That said, when organisations seek help with compliance, they typically need one of three things: someone to own a domain and keep them compliant over time, someone to build a compliant system they can operate, or an expert to consult on specific questions. These map directly to how we deliver our services:

Leadership retainers

Ownership of domain-specific compliance issues is included in our leadership retainer services.

See pricing →

Implementation projects

Our projects take your current state as input and deliver management systems that ensure sustainable compliance.

See pricing →

Review & Advice

Whether you need a light advisory project, fixed-price deliverable, or on-demand consultancy, support is available as needed.

See pricing →


About us and our take on compliance

NoFuss Consulting is an independent consultancy specialising in risk and security governance. We help organisations build and operate management systems appropriate to their needs, enabling due diligence through transparency and clarity.

We intentionally don’t position compliance as an independent service category. Compliance should be an outcome — what happens when security and risk are addressed appropriately — not a destination in itself.

Standards and legislation play a valuable role. They set baselines, create accountability, and often provide the external pressure that drives action when governance is lacking. But your true goal should be understanding what’s worth protecting, what could go wrong, and what’s proportionate. When that’s clear, meeting requirements becomes straightforward. When it’s not, you end up maintaining compliance artefacts that don’t reflect how you actually operate.

Credentials

PECB ISO/IEC 27001 Senior Lead Implementer badge

ISO/IEC 27001 Senior Lead Implementer

ISACA Certified Information Security Manager badge

Certified Information Security Manager

ISACA Certified in Risk and Information Systems Control badge

Certified in Risk and Information Systems Controls

Supported by our network

partnership icon

We work with a small network of trusted specialists that live up to our standards and can complement our services. These include lawyers focusing on EU privacy and data protection law, as well as IT architects, penetration testers and security engineers experienced in cloud and application security, which can be contracted on-demand.