NIS2 raises the EU-wide cybersecurity bar substantially — broadening scope, tightening enforcement and embedding governance-based accountability at the executive level across essential and important sectors throughout the Union.
The NIS2 Directive is a European Union cybersecurity law that establishes minimum cybersecurity requirements and incident reporting obligations for organizations operating in critical and important sectors across the EU.
As the successor to the original NIS Directive (2016), NIS2 is designed to strengthen the cyber resilience of essential services across the EU. It expands the scope of regulated sectors, sets minimum cybersecurity requirements for both public and private entities, and enforces supply chain security, board-level accountability, and continuous risk management.
Name
Network and Information Security 2 (NIS2) Directive
Type
Statutory (Law)
Authoritative Source
EU Directive 2022/2555
Adopted
December 2022
Member State Deadline
October 17, 2024
Enforced By
National competent authorities & CSIRTs per member state
Applies To
Essential and important entities in regulated sectors
Certification Available
No official certification. SCF CAP can demonstrate conformity.
TL / DR — Too Long / Didn’t Read
NIS2 raises the EU-wide cybersecurity bar substantially. It broadens scope, tightens enforcement and embeds governance-based accountability at the executive level. It is converging with other regulatory frameworks like GDPR, DORA, and the EU Cyber Resilience Act — making a unified, framework-driven approach to compliance essential.
Organizations that invest in integrated security frameworks, mature governance models and robust documentation will be better positioned — not only to comply — but also to deliver reliable, secure services in an increasingly regulated digital economy.
NIS2 dramatically broadens both reach and accountability compared to its predecessor — expanding to more sectors, strengthening penalties, and introducing direct personal liability for senior executives who fail to govern cybersecurity adequately.
The original NIS Directive (2016) introduced the EU’s first binding cybersecurity rules for critical infrastructure. However, inconsistent transposition, limited scope and insufficient enforcement left significant gaps. NIS2 was designed to close those gaps.
NIS2 dramatically broadens both reach and accountability: it now governs entities in transport, energy, finance, healthcare, digital infrastructure, ICT service management, public administration and more. It also mandates board-level engagement in cybersecurity governance and introduces personal liability for executives.
Energy, transport, banking and financial services, healthcare, drinking water, and digital infrastructure. Essential entities face the highest level of regulatory scrutiny, supervisory oversight and enforcement.
Manufacturing of critical products (e.g., medical, defense, ICT), postal and courier services, waste management, public administration, and food production and distribution. Important entities are subject to lighter but still meaningful compliance requirements.
NIS2 enforces stringent sanctions at both organizational and leadership levels:
Fines up to €10 million or 2% of global turnover, whichever is greater.
Fines up to €7 million or 1.4% of turnover.
Regulatory powers include ordering audits, issuing binding instructions and suspending service operations.
Senior executives may face personal liability or temporary bans from holding leadership roles in cases of gross negligence — a direct accountability mechanism with no equivalent under the original NIS Directive.
NIS2 compels organizations to implement a robust, structured cybersecurity program encompassing:
Mandatory board-level approval of cybersecurity strategies and oversight of risk measures; senior management must actively oversee implementation steps and changes.
Organizations must apply technical, organizational and operational controls, scaled to their risk profile and business context.
Requires documented incident handling procedures, early warning, intermediate and final reporting timelines to national CSIRTs and affected users.
Plans must address business continuity, backup and recovery and crisis management.
Entities must establish supplier security policies, assess dependencies and integrate security into procurement and vendor management.
Cybersecurity awareness programs and regular training are mandatory for all employees.
To meet NIS2 Directive obligations, organizations typically follow these strategic steps:
Determine if your organization is essential or important and falls within its sector definitions.
Maintain an up-to-date inventory of systems, networks, services and critical functions to define your compliance boundary.
Employ a risk-based approach, aligning responses to NIS2’s proportionality principle.
Align with internal standards (e.g., Secure Controls Framework (SCF), ISO 27001, NIST CSF, CIS Controls) and ENISA guidelines to establish required organizational, technical and operational measures.
Regularly validate control effectiveness through audits, pen testing and tabletop exercises.
Establish workflows for incident classification, reporting to authorities and communication with stakeholders.
Embed security clauses in contracts, vet suppliers and monitor third-party cyber hygiene.
Define executive accountability, reporting mechanisms and oversight bodies — supported by ENISA’s ECSF role mappings.
NIS2’s accountability framework requires that organizations not only comply, but prove they comply. Auditors and regulators will expect structured, current and accessible documentation as evidence of your cybersecurity program’s maturity.
Methodologies, findings, and risk treatment plans that demonstrate a systematic, repeatable approach to identifying and addressing cyber risks proportionate to the organization’s profile.
Board minutes, approval memos, and management reviews demonstrating executive engagement; along with current, version-controlled incident response, business continuity, access control and supply chain security policies.
Evidence of staff competence programs; incident classifications, notifications, response actions and remediation tracking — all of which must be retained and producible on request.
Supplier assessments and contractual security clauses demonstrating that supply chain obligations are being actively managed and enforced throughout the vendor lifecycle.
NIS2 — and 200+ more laws, regulations, and frameworks — is mapped to the SCF’s 1,400+ controls across 33 domains. Download the Common Controls Framework™ free.