October 2024
NIS2 enforcement deadline -- EU member states transposed the directive into national law
EUR 10M
maximum fine for essential entities under NIS2 (or 2% of global annual turnover, whichever is higher)
24 hours
deadline to notify your national authority after becoming aware of a significant incident (initial notification)

NIS2 took effect across EU member states in October 2024. The directive's language -- 'appropriate and proportionate technical and organisational measures' -- is intentionally broad, which means security teams are left to determine what that means for their specific organization. This checklist translates the key articles of NIS2 into specific technical controls with implementation status tracking. It is not legal advice; have your legal team confirm applicability and national-law variations.

Is Your Organization In Scope? Quick Applicability Check

Before implementing anything, confirm scope. NIS2 applies if your organization meets ALL of the following:

Step 1: Sector check Are you operating in one of these sectors?

  • Essential sectors: Energy, Transport, Banking, Financial market infrastructure, Health, Drinking water, Wastewater, Digital infrastructure (DNS, TLDs, cloud, data centers, CDN, TSP, electronic communications), ICT service management (B2B), Public administration, Space
  • Important sectors: Postal and courier services, Waste management, Chemicals, Food, Manufacturing (medical devices, computers, electronics, machinery, motor vehicles), Digital providers (online marketplaces, search engines, social networks), Research institutions

Step 2: Size check Medium entity or larger: 50+ employees OR EUR 10M+ annual turnover (Some categories apply regardless of size: TLDs, DNS providers, cloud providers, certain digital infrastructure operators)

Step 3: Geography check Established in the EU, OR providing services to EU essential/important entities from outside the EU (in which case you must designate an EU representative)

If all three apply: NIS2 applies. Continue with this checklist. If uncertain: Engage legal counsel in the relevant EU member state(s). Member states vary in how they've transposed NIS2 into national law.

Article 21: Technical and Organisational Measures -- Control Mapping

Article 21 is the core technical requirement. It mandates an all-hazards approach covering the following (Article 21(2) a-j):

a) Risk analysis and information system security policies

RequiredSpecific controlImplementation status
Risk analysis processDocumented risk assessment methodology, reviewed annually☐ Not started / ☐ In progress / ☐ Complete
Information security policyWritten, board-approved information security policy☐ / ☐ / ☐
Policy review cycleAnnual review of policy, documented evidence☐ / ☐ / ☐

b) Incident handling

RequiredSpecific controlImplementation status
Incident detectionSIEM or log aggregation with alerting capability☐ / ☐ / ☐
Incident response planWritten IR plan with defined roles, escalation, and containment procedures☐ / ☐ / ☐
Incident loggingCentralized log retention for minimum 12 months☐ / ☐ / ☐
Incident classificationWritten definition of what constitutes a 'significant incident' triggering notification☐ / ☐ / ☐
IR team/retainerNamed IR contact or external IR retainer with 24/7 availability☐ / ☐ / ☐

c) Business continuity and crisis management

RequiredSpecific controlImplementation status
BCP/DR planWritten business continuity and disaster recovery plan☐ / ☐ / ☐
Backup and recoveryAutomated backups with tested restoration; documented RTO/RPO☐ / ☐ / ☐
Backup testingBackup restore test completed within the last 12 months☐ / ☐ / ☐
Crisis managementDefined crisis management process with named decision makers☐ / ☐ / ☐

d) Supply chain security

RequiredSpecific controlImplementation status
Critical vendor inventoryList of all vendors with access to systems or data, classified by criticality☐ / ☐ / ☐
Vendor security assessmentsSecurity questionnaire or assessment for all critical vendors☐ / ☐ / ☐
Contractual security requirementsWritten security requirements in vendor contracts (right to audit, breach notification, data handling)☐ / ☐ / ☐
Vendor access controlsJust-in-time or scoped access for vendors; no persistent admin access☐ / ☐ / ☐

e) Security in network and information systems acquisition, development and maintenance

RequiredSpecific controlImplementation status
Secure developmentSecure SDLC process documented and followed☐ / ☐ / ☐
Vulnerability managementDefined process for tracking and remediating CVEs in used software☐ / ☐ / ☐
Patch managementSLA-based patching: Critical <7 days, High <30 days☐ / ☐ / ☐
Security testingPenetration testing or vulnerability scanning, at least annually☐ / ☐ / ☐

f) Policies and procedures to assess the effectiveness of cybersecurity risk-management measures

RequiredSpecific controlImplementation status
Security metrics programDefined KPIs tracked and reported to management☐ / ☐ / ☐
Internal auditAnnual internal security audit or review☐ / ☐ / ☐
Management reviewSecurity posture reviewed by senior management at least annually☐ / ☐ / ☐

g) Basic cyber hygiene practices and cybersecurity training

RequiredSpecific controlImplementation status
Security awareness trainingAnnual security awareness training for all employees☐ / ☐ / ☐
Role-based trainingAdditional training for IT staff, developers, and executives☐ / ☐ / ☐
Cyber hygiene baselineMFA, password manager, endpoint protection, software update policy☐ / ☐ / ☐

h) Policies and procedures regarding the use of cryptography and, where appropriate, encryption

RequiredSpecific controlImplementation status
Encryption at restSensitive data encrypted at rest (AES-256 or equivalent)☐ / ☐ / ☐
Encryption in transitTLS 1.2+ for all internal and external data transmission☐ / ☐ / ☐
Certificate managementCertificate expiry monitoring; automated renewal where possible☐ / ☐ / ☐
Key management policyWritten policy for cryptographic key generation, storage, rotation, and destruction☐ / ☐ / ☐

i) Human resources security, access control policies and asset management

RequiredSpecific controlImplementation status
Access control policyWritten policy: least privilege, role-based access, review schedule☐ / ☐ / ☐
Privileged access managementMFA for all admin accounts; privileged account inventory☐ / ☐ / ☐
Access reviewQuarterly or semi-annual access rights review☐ / ☐ / ☐
Offboarding processDocumented process to revoke all access within 24 hours of employee departure☐ / ☐ / ☐
Asset inventoryComprehensive inventory of hardware, software, and data assets☐ / ☐ / ☐

j) The use of multi-factor authentication or continuous authentication solutions, secure voice, video and text communications and secured emergency communication systems

RequiredSpecific controlImplementation status
MFA for all usersMFA enforced on all user accounts accessing company systems☐ / ☐ / ☐
MFA for privileged accessPhishing-resistant MFA (hardware key or passkey) for admin accounts☐ / ☐ / ☐
Secure communicationsEncrypted channels for sensitive internal communications☐ / ☐ / ☐
Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Article 23: Incident Reporting -- What to Build Before You Need It

Article 23 requires a three-stage reporting process. Build the infrastructure for this before an incident occurs.

Stage 1: Early warning (within 24 hours of awareness)

What to send:

- Date and time of detection
- Nature of the incident (brief description; no full analysis required)
- Whether the incident is suspected to involve unlawful or malicious acts
- Whether the incident has potential cross-border impact
- Affected services (brief)

Who to send it to: Your national NIS2 competent authority (varies by member state and sector). Find yours at: https://www.enisa.europa.eu/topics/incident-response/nis-cooperation/certs-in-europe

Stage 2: Incident notification (within 72 hours)

What to add:

- Initial assessment: severity and impact
- Indicators of compromise if available
- Whether the incident is ongoing
- Affected systems and services
- Estimated number of users affected

Stage 3: Final report (within 1 month)

What to include:

- Detailed description of the incident
- Type of threat or root cause
- Applied mitigation measures and those that are ongoing
- Cross-border impact assessment
- Actions taken to prevent recurrence

Build these templates in advance:

# /ir-templates/nis2-early-warning.md
# /ir-templates/nis2-incident-notification.md
# /ir-templates/nis2-final-report.md

Include your competent authority's contact information, preferred submission method (web form, email, or secure portal), and the name of the person authorized to submit notifications in your IR plan.

What constitutes a 'significant incident' requiring notification: Define this in your IR plan before an incident occurs:

Significant incident triggers (examples -- adapt to your sector):
- Service unavailability affecting >X% of users for >Y hours
- Confirmed unauthorized access to systems containing customer data
- Ransomware encryption of production systems
- Confirmed data exfiltration of any volume of sensitive data
- Any incident requiring public disclosure under other regulatory frameworks
(GDPR, financial regulations, etc.)

Management Accountability Under Article 20

NIS2 Article 20 is frequently overlooked: management bodies (board of directors, executive teams) are personally responsible for approving cybersecurity risk management measures and monitoring their implementation. They can be held personally liable for non-compliance.

What this means for security teams:

RequirementHow to implement
Management approves security measuresGet board/exec sign-off on your information security policy, risk management approach, and significant security investments
Management monitors implementationQuarterly security reporting to board or executive team (see board report template guide)
Management trainingBoard members must complete cybersecurity training; document completion
Liability for non-complianceManagement cannot delegate accountability away; they can delegate implementation

Practical steps:

  1. Get your security policy formally approved by the board with signatures and date
  2. Establish quarterly board-level security reporting (see the CISO board report guide)
  3. Schedule annual cybersecurity briefing for board members (even 60 minutes annually satisfies the training requirement if documented)
  4. Create a paper trail: every significant security decision should have an email or meeting record showing executive awareness and approval

Gap Assessment Template: Tracking Your NIS2 Implementation

Use this to track progress and present to management.

Organization: [NAME]
Assessment date: [DATE]
Assessor: [NAME, TITLE]
Next review: [DATE + 6 months]

OVERALL STATUS:
  Controls fully implemented:    ___ / ___ (___% complete)
  Controls in progress:          ___
  Controls not started:          ___
  Controls not applicable:       ___

CRITICAL GAPS (any Not started with High/Critical risk rating):
  1. [CONTROL] -- [TARGET DATE] -- [OWNER]
  2. [CONTROL] -- [TARGET DATE] -- [OWNER]

ROADMAP SUMMARY:
  Q[X] 2026 (immediate): Complete all incident reporting infrastructure
  Q[X+1] 2026: Supply chain vendor assessments, access review, backup testing
  Q[X+2] 2026: Management training, internal audit, policy reviews
  Q[X+3] 2026: Full compliance review; engage external auditor or consultant

NOTES:
  [National law variations relevant to your member state]
  [Sector-specific guidance issued by your competent authority]
  [Date of last legal review confirming applicability]

The bottom line

NIS2 is less prescriptive than PCI-DSS and more outcome-focused than ISO 27001. 'Appropriate and proportionate measures' means your controls should match your risk profile and sector. A small health sector organization and a large cloud provider face the same directive but implement it very differently. Map what you have against Article 21's ten categories, build your incident reporting infrastructure before you need it, and get management accountability documented before an enforcement inspection arrives.

Frequently asked questions

Who does NIS2 apply to?

NIS2 applies to medium and large organizations operating in sectors deemed critical by the EU: energy, transport, banking, financial market infrastructure, health, drinking water, wastewater, digital infrastructure, ICT service management, public administration, and space. Medium means 50+ employees or EUR 10M+ annual turnover. The directive also extends to postal services, waste management, chemicals, food, manufacturing, digital providers, and research. If you operate in the EU or provide services to EU entities in these sectors, consult legal counsel to confirm applicability to your specific situation.

What is the difference between 'essential entities' and 'important entities' under NIS2?

Essential entities (EE) are subject to proactive supervision: the competent authority can conduct audits and inspections without an incident trigger. Important entities (IE) face reactive supervision: oversight is typically triggered by an incident or complaint. Fines differ: EE maximum is EUR 10M or 2% of global turnover; IE maximum is EUR 7M or 1.4% of global turnover. Both face the same technical requirements -- the difference is supervision intensity and fine levels.

What does NIS2 require for incident notification?

Article 23 requires a three-stage notification process: (1) Early warning within 24 hours of becoming aware of a significant incident -- basic facts, no investigation required yet. (2) Incident notification within 72 hours -- assessment of impact, severity, indicators of compromise. (3) Final report within one month -- full description, root cause, cross-border impact assessment, remediation measures. 'Significant incident' means one that causes or can cause severe operational disruption or financial loss. Define your severity threshold in your IR plan now.

Does NIS2 require specific security certifications?

NIS2 does not mandate specific certifications like ISO 27001 or SOC 2. However, EU cybersecurity certification schemes (under ENISA) may be recognized as evidence of compliance with NIS2's technical requirements. Practically, organizations that already have ISO 27001 certification have significant overlap with NIS2's requirements -- map your existing ISMS controls to NIS2 Articles 21 and 23 before assuming gaps.

What is 'all-hazards approach' in NIS2 Article 21?

Article 21 requires security measures covering all relevant hazards, not just cyber threats. This includes physical security (protecting network and information systems from physical access), environmental risks (flood, fire, power failure), and supply chain risks (third-party providers). In practice: your security program must address physical access controls for server rooms, business continuity for non-cyber disruptions, and vendor security assessments -- not just network and application security.

How does NIS2 handle supply chain security?

Article 21(2)(d) explicitly requires organizations to address security in supply chains, including the security practices of direct suppliers and service providers. This means: vendor security questionnaires or assessments for critical suppliers, contractual security requirements in vendor agreements, and an inventory of critical dependencies. You are responsible for the security posture of vendors with access to your systems or data -- 'we relied on our vendor' is not a defense under NIS2.

Sources & references

  1. EU NIS2 Directive Official Text (EUR-Lex)
  2. ENISA NIS2 Guidance
  3. NIST Cybersecurity Framework
  4. CIS Controls
  5. Ponemon Institute / IBM Cost of Data Breach Report

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.