PRACTITIONER GUIDE | GRC
Practitioner Guide14 min read

NIS2 Directive Compliance: A Technical Implementation Guide for Security Teams

€10M
maximum fine for essential entities under NIS2 — or 2% of global annual turnover, whichever is higher
24 hours
maximum time to notify the national CSIRT of a significant incident after becoming aware of it
160,000+
entities across the EU now subject to NIS2 — roughly 10x the scope of NIS1
Oct 2024
NIS2 transposition deadline — most member states are still completing national implementation legislation

NIS2 (Directive 2022/2555) is the EU's updated network and information security framework, replacing NIS1 with significantly broader scope, stricter obligations, and personal liability for management. Unlike GDPR, which focuses on data protection, NIS2 focuses on operational cybersecurity: the security measures organizations must implement, the speed at which they must report incidents, and the accountability of senior management when they fail. Essential entities (energy, transport, banking, health, water, digital infrastructure) face more intensive supervision than important entities (postal services, waste management, manufacturing, digital providers), but both categories face binding obligations. This guide translates NIS2's Article 21 requirements into specific technical controls and explains what national competent authorities are actually looking for in supervisory assessments.

Who NIS2 Applies To: Essential vs. Important Entities

NIS2 dramatically expanded scope compared to NIS1. The key classification thresholds:

Essential entities — subject to proactive supervision, higher fines:

  • Energy (electricity, oil, gas, hydrogen, district heating)
  • Transport (air, rail, water, road)
  • Banking and financial market infrastructure
  • Health (hospitals, EU reference laboratories, pharmaceutical manufacturers)
  • Drinking water and wastewater
  • Digital infrastructure (IXPs, DNS providers, TLD registries, cloud providers, data centers, CDNs, trust service providers, public electronic communications networks)
  • Public administration (central government, regional where member states designate)
  • Space

Important entities — subject to reactive supervision (after incident or complaint):

  • Postal and courier services
  • Waste management
  • Manufacture of chemicals, food, medical devices, computers, machinery, motor vehicles
  • Digital providers (online marketplaces, online search engines, social networking platforms)
  • Research organizations

Size thresholds: Medium enterprises (50+ employees, €10M+ turnover) and large enterprises (250+ employees, €50M+ turnover) in covered sectors. Micro and small enterprises are generally exempt unless they are a sole provider of a critical service in a member state.

Geographic scope: NIS2 applies to entities established in the EU, and to entities outside the EU that provide services to EU member states in covered sectors. A US cloud provider with EU customers in the digital infrastructure category must comply.

Member state registration: Entities must register with their national competent authority. Most member states are building registries for 2025-2026. Registration is not optional — it is a prerequisite for demonstrating compliance.

Article 21 Security Measures: What NIS2 Actually Requires

Article 21 is the technical core of NIS2. It requires entities to take "appropriate and proportionate technical, operational and organisational measures" to manage risks. The measures must be based on an all-hazards approach and specifically include:

1. Policies on risk analysis and information system security A documented risk management framework is mandatory. The risk assessment must be conducted before implementing security measures and reviewed regularly. This is not a CVSS scan — it requires business impact analysis, threat modelling, and risk acceptance documentation tied to the entity's specific operations and threat landscape.

2. Incident handling Documented incident response procedures including detection, containment, eradication, recovery, and post-incident review. The procedures must be tested — tabletop exercises and simulated incident drills are expected to be documented. ENISA's guidance explicitly calls for incident response capability that can be activated without delay.

3. Business continuity and crisis management Backup management, disaster recovery, and crisis management procedures covering essential services. NIS2 expects RPO and RTO defined for critical systems, backup integrity testing on a documented schedule, and crisis management contacts and escalation paths.

4. Supply chain security Entities must assess and address security risks from their direct suppliers and service providers. This is the most operationally demanding requirement for many organizations. ENISA guidance specifies: vendor security questionnaires, contractual security requirements in supplier contracts, and monitoring of supplier security posture. For ICT products and services, entities should prefer vendors with certified products (EUCC, cloud security certifications under ENISA's scheme).

5. Security in network and information systems acquisition, development and maintenance Vulnerability handling and disclosure policies for ICT assets. Patch management processes with defined SLAs by severity. Security testing for developed or customized software.

6. Policies and procedures to assess the effectiveness of cybersecurity risk management measures Regular review of security measures — this means audit programs, penetration testing on a defined cadence, and metrics demonstrating control effectiveness. Annual review is the minimum expectation.

7. Basic cyber hygiene practices and cybersecurity training Documented security awareness training for all staff, with role-based training for staff with elevated access or security responsibilities. "Basic cyber hygiene" in ENISA guidance includes: password policies, MFA, software update procedures, and phishing awareness.

8. Policies and procedures on the use of cryptography and encryption Documented cryptography policy covering encryption at rest and in transit, key management procedures, and algorithm standards. TLS 1.2 minimum; TLS 1.3 preferred. Deprecated algorithms (MD5, SHA-1, DES, RC4) must be actively removed.

9. Human resources security, access control policies and asset management Background checks for roles with access to critical systems (to the extent permitted by local law), formal access provisioning and de-provisioning processes, and an asset inventory covering hardware, software, and data assets.

10. Multi-factor authentication and continuous authentication MFA is explicitly required by Article 21 for access to network and information systems. This is not optional — supervisory authorities are specifically checking MFA coverage. At minimum: MFA for all remote access, all privileged access, and all cloud service administration.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Incident Reporting: The 24/72/Month Timeline

NIS2's incident reporting requirements are the most operationally impactful change from NIS1. The three-stage timeline is mandatory:

Stage 1 — Early warning: within 24 hours Notify the national CSIRT (Computer Security Incident Response Team) or national competent authority if there is reason to suspect a significant incident. This is not a full report — it is a notification that a significant incident may have occurred, including whether the incident appears to be criminal or cross-border in nature. The 24-hour clock starts when the entity first becomes aware of the incident, not when it is confirmed.

Stage 2 — Incident notification: within 72 hours Submit an incident notification with: initial assessment of the incident (severity, impact), likely cause if known, whether it is ongoing, and containment measures applied. This replaces and expands the Stage 1 early warning if it was submitted separately.

Stage 3 — Final report: within 1 month A detailed final report covering: description of the incident, type of threat or root cause, mitigation measures applied and ongoing, cross-border impact if applicable. Supervisory authorities may request additional information.

What constitutes a "significant incident": NIS2 defines significance by impact thresholds. ENISA's implementing regulation sets specific criteria: more than 10% service disruption for more than 30 minutes, physical damage, financial loss exceeding €500K, death or serious injury to individuals, unauthorized access to sensitive data at scale, or incidents with cross-border impact. Entities should define internal thresholds that map to these criteria so reporting decisions can be made quickly.

Practical gap most organizations have: The 24-hour clock runs from awareness, not from confirmation. An organization that quarantines a suspicious system at 2 AM must notify its national CSIRT by 2 AM the next day even if the investigation is ongoing. Build this into your incident response procedures explicitly. Designate who can make the reporting decision and to which national authority.

National contact points by country: Each EU member state has a designated national CSIRT for NIS2 notifications. Germany: BSI. France: ANSSI. Netherlands: NCSC-NL. Spain: INCIBE-CERT / CCN-CERT. Each national authority may have a specific reporting portal — check the current contact point as part of your incident response pre-planning.

Supply Chain Security Under NIS2: What Auditors Check

Article 21(2)(d) requires entities to address "security in supply chains including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers." This is where early NIS2 supervisory assessments are finding the most gaps.

What the obligation means in practice:

Supplier inventory: You must know who your critical suppliers and service providers are. "Critical" means those whose compromise could affect your ability to deliver essential or important services. Cloud providers, managed service providers, network operators, and software vendors providing systems in scope are the starting point.

Contractual requirements: Supplier contracts must include security provisions. ENISA guidance specifies minimum contractual elements: right to audit (or third-party audit), incident notification obligations on the supplier (aligned to your NIS2 timelines), data security requirements, and the supplier's obligation to notify you of relevant security changes.

Risk assessments of key suppliers: For critical suppliers, entities must conduct and document risk assessments. This does not necessarily mean an on-site audit of every supplier — it means reviewing available evidence (certifications, SOC 2 reports, ISO 27001 certificates, responses to security questionnaires) and documenting the residual risk you accept.

ICT product and service security: Where possible, prefer ICT products and services with European Cybersecurity Certification Scheme (EUCS for cloud, EUCC for products) certification. The EUCS cloud certification scheme covers cloud providers at three assurance levels (basic, substantial, high). This is not yet mandatory but ENISA guidance signals it will be expected for high-criticality services.

Common gaps found in early audits:

  • Critical suppliers identified but no documented risk assessment for them
  • Security requirements in contracts are generic ("comply with applicable law") rather than specific and verifiable
  • No mechanism to receive security notifications from critical suppliers
  • Software vendors not included in supplier scope despite delivering critical systems

Management Liability: What Executives Need to Know

NIS2 Article 20 is unprecedented in EU cybersecurity law: it explicitly requires management bodies to approve cybersecurity risk management measures, oversee their implementation, and can be held personally liable for breaches of these obligations.

What Article 20 requires:

  • Management bodies must approve the cybersecurity risk management measures required under Article 21
  • Management bodies must oversee their implementation
  • Management bodies can be held liable for infringements by the entity
  • Member states must require management bodies to follow cybersecurity training and encourage regular training for all employees

Personal liability mechanisms: Member states may designate natural persons who are responsible for NIS2 compliance and may temporarily prohibit them from exercising managerial functions in the event of serious NIS2 violations. This is not hypothetical — several member states have included this in their transposition legislation.

Practical implications for CISOs and boards:

  • Board-level cybersecurity reporting is no longer optional — it is a governance requirement
  • The CISO must be able to demonstrate to regulators that management was informed of and approved the cybersecurity risk management framework
  • Document board or executive committee sign-off on the risk management measures, the risk assessment, and the incident response framework
  • Management cannot credibly claim ignorance of cybersecurity obligations as a defense under NIS2

Enforcement progression: NIS2 supervisory authorities have a graduated enforcement toolkit: binding instructions to remediate, temporary prohibition of certain activities, fines, and in serious cases the prohibition of management from exercising their roles. The first major enforcement actions under national NIS2 legislation are beginning in 2025-2026 as member states complete transposition.

NIS2 vs. GDPR: Key Differences for Security Teams

Security teams often conflate NIS2 and GDPR obligations. They are distinct frameworks with overlapping but different requirements.

DimensionNIS2GDPR
FocusOperational cybersecurity of servicesPersonal data protection
Who regulatesNational competent authorities / CSIRTsData protection authorities (DPAs)
Incident reporting triggerSignificant impact on service availability, integrity, or confidentialityPersonal data breach affecting individuals
Reporting deadline24h early warning, 72h notification, 1 month final72h to supervisory authority (DPA)
ScopeEssential and important entities in covered sectorsAny organization processing EU personal data
Management liabilityExplicit in Article 20; personal liability possibleOrganization-level fines; less direct individual liability
Supply chainExplicit obligation for critical suppliersSecurity obligations for processors (contracts required)
FinesUp to €10M or 2% global turnover (essential); €7M or 1.4% (important)Up to €20M or 4% global turnover

Where they overlap and create dual obligations: A healthcare provider covered by NIS2 that has a ransomware incident affecting patient records must report under both frameworks simultaneously: the NIS2 early warning to the national CSIRT within 24 hours and the GDPR personal data breach notification to the DPA within 72 hours. These may go to different authorities and require different information. Build separate reporting procedures for each, with a coordinator who manages both in parallel during an incident.

Building a NIS2 Compliance Program: Practical Roadmap

For organizations approaching NIS2 from scratch, here is a sequenced roadmap based on what supervisory authorities have indicated they prioritize in early assessments.

Phase 1 — Scoping and registration (immediate)

  1. Determine whether your entity qualifies as essential or important
  2. Register with the relevant national competent authority (most have online registration)
  3. Identify which member states your operations span — multi-jurisdiction entities may have obligations in multiple countries
  4. Designate a point of contact for NIS2 regulatory communications

Phase 2 — Risk management foundation (30-60 days)

  1. Conduct a risk assessment covering the NIS2 Article 21 scope — threats to availability, integrity, and confidentiality of in-scope systems
  2. Document an asset inventory of network and information systems in scope
  3. Establish or formalize the cybersecurity risk management framework with documented management approval
  4. Map current controls against Article 21 requirements and identify gaps

Phase 3 — Technical control implementation (60-180 days)

  1. MFA deployment for all remote access, privileged access, and cloud administration (the most commonly checked control)
  2. Patch management program with defined SLAs by severity
  3. Backup and recovery procedures with tested restoration
  4. Incident response plan with the 24/72-hour reporting procedure built in
  5. Security awareness training for all staff, documented and tracked

Phase 4 — Supply chain and governance (ongoing)

  1. Identify critical suppliers and service providers
  2. Add NIS2-aligned security provisions to supplier contracts (right to audit, incident notification, data security)
  3. Conduct and document risk assessments for critical suppliers
  4. Establish board-level cybersecurity reporting cadence

Mapping to existing frameworks: If you have ISO 27001:2022 certification, the overlap with NIS2 Article 21 is substantial — ISO 27001 Annex A controls cover most Article 21 requirements. Use your ISO 27001 control set as the baseline and identify gaps specific to NIS2 (particularly the specific incident reporting timeline and the supply chain security depth). Similarly, NIST CSF, CIS Controls, and SOC 2 Type II can all be mapped to NIS2 Article 21 to reduce duplication.

The bottom line

NIS2 is active enforcement, not future planning. The transposition deadline passed in October 2024 and national supervisory authorities are building their supervisory programs now. Early enforcement is concentrating on the controls that are most verifiable and most commonly absent: MFA deployment, documented incident reporting procedures, supply chain security contractual provisions, and evidence of management body approval of the risk management framework. Start there. The entities that will face enforcement actions first are those that cannot demonstrate they have documented and implemented the Article 21 measures — not those with perfect security programs.

Frequently asked questions

What is the difference between NIS2 essential and important entities?

Essential entities are in higher-criticality sectors (energy, transport, banking, health, digital infrastructure, water, space, public administration) and subject to proactive supervision — national authorities can audit them without waiting for an incident. Important entities are in broader sectors (manufacturing, postal, waste, digital providers) and subject to reactive supervision — authorities typically act after an incident or complaint. Fines are also different: essential entities face up to €10M or 2% of global annual turnover; important entities face up to €7M or 1.4%. Both categories have the same Article 21 technical obligations.

When does the 24-hour NIS2 incident reporting clock start?

The clock starts when the entity 'becomes aware' of a significant incident — not when the incident is confirmed or fully investigated. If a security team detects anomalous activity at 2 AM that suggests a significant incident, the 24-hour early warning obligation begins at 2 AM. This means incident response procedures must include an immediate reporting decision step, not just a containment step. Designate who can authorize the notification and to which national CSIRT before an incident occurs.

Does NIS2 apply to non-EU companies?

Yes, if the entity provides services to EU member states in a covered sector. A US cloud provider delivering services to EU essential entities in the digital infrastructure category must comply. A non-EU entity must designate a representative established in the EU as its point of contact with national competent authorities. The registration and supervisory obligations apply to the EU representative.

How does NIS2 relate to ISO 27001?

ISO 27001:2022 certification covers most of the Article 21 NIS2 requirements. The ISO 27001 risk management framework, Annex A controls (access control, cryptography, incident management, supplier relationships, business continuity), and ISMS documentation map closely to NIS2 obligations. Gaps specific to NIS2 include: the precise 24/72-hour incident reporting procedure, management body sign-off and personal liability provisions, and the specific supply chain contractual requirements. ISO 27001 certified organizations should conduct a gap analysis against NIS2 rather than building from scratch.

What are the most common NIS2 compliance gaps in early audits?

Based on early supervisory assessments: (1) MFA not deployed for all remote and privileged access; (2) incident reporting procedures that do not specify the 24-hour notification decision point; (3) supply chain contracts without specific security provisions or audit rights; (4) no documented management body approval of the risk management framework; (5) asset inventories that exclude cloud services and SaaS applications. The first three are the most frequently cited.

Can management be personally liable under NIS2?

Yes. NIS2 Article 20 requires member states to hold management bodies personally responsible for compliance with Article 21 obligations. Member states may designate natural persons responsible for NIS2 compliance and, in cases of serious violations, temporarily prohibit them from exercising managerial functions. Several member states have included personal prohibition provisions in their NIS2 transposition legislation. This is a departure from GDPR, where fines are levied on organizations rather than individuals in most cases.

What is the NIS2 reporting timeline for incidents?

Three stages: (1) Early warning within 24 hours of becoming aware of a significant incident — notify the national CSIRT with basic information and whether the incident appears criminal or cross-border. (2) Incident notification within 72 hours — submit an updated report with severity assessment, likely cause if known, and containment measures. (3) Final report within one month — detailed description, root cause, remediation applied, cross-border impact. Significant incidents are defined by ENISA implementing regulation: service disruption exceeding defined thresholds, financial loss over €500K, unauthorized data access at scale, or physical harm.

Sources & references

  1. EU Directive 2022/2555 (NIS2) — Official Journal of the European Union
  2. ENISA NIS2 Implementation Guidance 2025
  3. ENISA Guidelines on Security Measures for NIS2
  4. European Commission NIS2 Transposition Tracker 2026

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.