The Script Era Is Over: Compliance Just Ended the Debate
For decades, scripts have been a testament to the ingenuity of network engineers. They were the original automation tool, born from necessity to tame sprawling, complex networks. We built our networks on them, and for a long time, they worked. This approach, however, has run headfirst into a wall of regulation. The arrival of the EU's NIS2 Directive and the Digital Operational Resilience Act (DORA) is not a technical debate about engineering preferences. It is a fundamental shift in legal and financial liability.

The Unavoidable Collision of Network Scripts and Modern Regulation
For decades, scripts have been a testament to the ingenuity of network engineers. They were the original automation tool, born from necessity to tame sprawling, complex networks. We built our networks on them, and for a long time, they worked. This approach, however, has run headfirst into a wall of regulation. The arrival of the EU's NIS2 Directive and the Digital Operational Resilience Act (DORA) is not a technical debate about engineering preferences. It is a fundamental shift in legal and financial liability.
As a CTO, my responsibility is to see beyond the code and assess business risk. The core issue is this: script-driven approaches are structurally incapable of meeting modern regulatory demands for identity, traceability, auditability, and accountability. Continuing to rely on them is no longer a technical choice but a strategic gamble with significant financial and operational consequences. This isn't about criticizing the engineers who built our networks; it's about recognizing that the regulatory landscape has permanently changed the rules of the game.
Understanding the New Mandate: NIS2 and DORA Requirements
To appreciate the scale of this shift, we must understand what these regulations demand. NIS2 and DORA are designed to enforce a high common level of cybersecurity and operational resilience across critical infrastructure and the financial sector. If your organization operates in the EU, these rules apply to you, making this a global concern. They move network management from a back-office function to a board-level risk conversation. The core mandates for network operations are no longer suggestions; they are legal requirements with severe penalties for non-compliance.
According to guidance from ENISA, these frameworks require a new standard of governance. Specifically, organizations must now demonstrate:
- Verified Digital Identity: Every action performed on the network, whether manual or automated, must be tied to a specific, verified human being. The days of changes happening under a generic "net-admin" service account are over. Auditors will ask "who" made a change, and an individual's name is the only acceptable answer.
- Immutable Audit Trail: All configuration changes, script executions, and access events must be logged in a tamper-evident manner. This creates a verifiable network compliance audit trail that can be presented to regulators on demand. If your logs can be altered or deleted, they are worthless for compliance purposes.
- Documented Change Management: "Just fixing it" is no longer a valid process. Every change must be justified, formally approved through a documented workflow, and, where possible, be reversible. The "why" behind a change is now as important as the change itself.
- Continuous Monitoring and Reporting: You must have systems in place to continuously monitor your network for unauthorized changes and be able to produce inspectable proof of compliance at any time. Annual audits are being replaced by a state of constant readiness.
Under these frameworks, a lack of formal governance is not technical debt; it is a material business risk. The penalties for failing to prove who did what, when, and why are substantial. This is the new reality of DORA NCM compliance and NIS2 network automation. For more insights into emerging trends in network management, you can explore the perspectives we share on our company's blog.
The Identity and Traceability Failure of Script-Driven NCM
The structural flaws of script-based network management become immediately apparent when measured against the identity and traceability requirements of NIS2 and DORA. These are not minor gaps that can be patched with another script; they are foundational failures.
The Anonymity of Service Accounts
Scripts almost always run with elevated privileges, often using a shared service account or a handful of powerful administrator credentials. Think about it: when a script executes a change across a hundred routers, who made that change? From a logging perspective, the system reports that "service-admin" did it. This is an immediate compliance failure. Regulators demand individual accountability, and a generic account provides none. Without a direct link between an action and a person, the chain of custody is broken before it even begins. This anonymity, once a convenience for automation, is now a critical liability.
The Chaos of Informal Repositories
The traceability problem is just as severe. Where do your network scripts live? For many organizations, the answer is a messy collection of shared drives, personal laptops, and informal Git repositories. You can almost picture the file names: `update_ACL_v2_final.pl`, `config_backup_new_final_final.py`. This is the definition of a script-driven NCM risk. There is no formal version control, no metadata explaining what a script does or why it was created, and no enforceable lifecycle management. An auditor asking to see the approved version of a script used six months ago would send most teams into a panic of searching through old emails and folders. This lack of a centralized, controlled source of truth makes a verifiable audit trail impossible to construct.
A modern platform that offers realtime network change monitoring is designed to solve this exact problem by logging every action against a specific user identity, creating the traceability that regulations now mandate.
| Compliance Requirement | Script-Driven Approach (The Gap) | Governed NCM Platform (The Solution) |
|---|---|---|
| Identity Attribution | Actions tied to generic service accounts; no individual accountability. | Role-Based Access Control (RBAC) links every action to a verified user. |
| Change Traceability | No centralized, version-controlled repository for scripts. | Immutable, time-stamped log of all changes and script executions. |
| Version Control | Informal; relies on file names (e.g., 'config_script_v2_final_final'). | Built-in versioning for all configurations and automation jobs. |
| Audit Trail Integrity | Logs are disparate, non-standardized, and can be altered or deleted. | Centralized, tamper-evident audit logs ready for inspection. |
This table outlines the structural deficiencies of script-based methods in meeting the identity and traceability mandates of NIS2 and DORA.
Closing the Unsolvable Auditability and Accountability Gap
Beyond identifying who made a change, regulators now demand proof that the change was authorized and correctly implemented. This is where the concepts of auditability and accountability come into focus, and it is where script-driven methods completely break down. Auditability is about proving compliance systematically, while accountability is about assigning responsibility for outcomes. Scripts fail at both.
Imagine an auditor asks for a report of all firewall rule changes in the last quarter that were related to a specific compliance policy. With a script-based approach, this request triggers a painful, manual fire drill. Teams must dig through device logs, cross-reference them with ticketing systems, and manually piece together a narrative. The process is slow, prone to human error, and produces a report that is difficult to verify. It is a reactive, forensic exercise, not a proactive demonstration of control.
In contrast, governed NCM platforms are built for this exact scenario. They integrate change execution with approval workflows, automatically linking every action to a ticket and a policy. Generating that same report becomes a matter of a few clicks, producing an automated, compliance-ready document that maps every change to its justification. This is the difference between scrambling for evidence and having it readily available.
This leads directly to the accountability crisis. As one senior network engineer recently noted on LinkedIn, "the ease of the CLI came at the cost of clear ownership when things went wrong." When a script causes an outage or a security breach, who is accountable? The engineer who wrote it? The one who ran it? The manager who informally approved it? This ambiguity violates the "duty of care" principle embedded in NIS2. Without a clear, documented line of responsibility, the organization itself is exposed. True regulated network automation requires a system where accountability is built-in, not debated after an incident.
The Market's Decisive Shift to Governed NCM Platforms
This isn't just a theoretical argument; the market is already voting with its budget. Recent market data from CACI shows a dramatic rise in the adoption of governed NCM platforms, jumping from 22% of enterprises in 2023 to 48% in early 2025. This trend is not driven by a sudden desire for new tools but by the undeniable pressure of NIS2 and DORA compliance deadlines. Senior leaders now see this technology as an essential component of their risk management strategy.
This shift is also reflected in how vendors position their solutions. Marketing has moved away from simply promising speed and efficiency to highlighting "compliance-first" architectures. These governed platforms directly address the gaps left by scripts by providing:
- Embedded Role-Based Access Control (RBAC) to enforce identity-based permissions.
- Immutable, centralized change logs that serve as a single source of truth for auditors.
- Automated compliance dashboards and reporting to prove adherence to policies on demand.
- Native integration with ticketing and approval workflows to document the "why" behind every change.
This investment trend confirms that the industry recognizes the limitations of DIY tools in a regulated environment. A concrete example of such a platform is a solution like our rconfig V8 Enterprise, which is designed from the ground up to meet these modern compliance challenges.
Navigating the Practical Challenges of Transition
Acknowledging the necessity of this shift does not make it easy. Migrating away from a deeply entrenched scripting culture presents real-world obstacles. Engineers may be resistant to giving up the direct control and flexibility they are used to. This is more than just a preference; it's a workflow that has been refined over years. In fact, Tenable’s 2025 exposure study quantifies this risk, reporting that 37% of surveyed organisations cite “legacy script reliance” as the top barrier to full NIS2 compliance.
Other practical hurdles include managing a heterogeneous network with a mix of legacy and modern devices from different vendors and the need to upskill staff on a new platform. These are not reasons for inaction but are critical project risks that must be managed. A successful transition requires a clear migration strategy, strong executive sponsorship to overcome cultural inertia, and a commitment to training. Modern platforms help ease this burden. For instance, solutions designed for multi-vendor configuration management can interface with a wide array of hardware, simplifying the process of bringing your entire network under a single governance model.
Why Compliance-First Is the Only Path Forward
The debate over scripts versus platforms is over. Regulations like NIS2 and DORA have settled it by making verifiable identity, traceability, and accountability non-negotiable pillars of network operations. Only governed NCM platforms are structurally capable of meeting these requirements at the scale modern enterprises demand. The future of network automation is no longer just about moving faster or being more efficient. It is about building a resilient, auditable, and defensible network infrastructure. As leaders, our job is to guide our organizations toward that future. The era of unaccountable automation is definitively over.
About the Author
rConfig
All at rConfig
The rConfig Team is a collective of network engineers and automation experts. We build tools that manage millions of devices worldwide, focusing on speed, compliance, and reliability.
More about rConfig TeamRead Next

NIS2, DORA, and Network Automation: What CISOs Must Get Right in 2026

Why Network Configuration Is Now a Legal Responsibility, Not an Engineering Choice


