Skip to content

Is the NIS directive mandatory?

Explore some of our latest AI related thought leadership and research

6clicks has been built for cyber risk and compliance professionals to automate and streamline security compliance, IT risk management, vendor risk management, incident management, and more.

Learn more about our Hub & Spoke architecture, Hailey AI engine and explore the other content in our platform here

Risk, threat and vulnerability - what's the difference?

Risk, threat and vulnerability - what's the difference?

What is the difference between NIST 800-53 and NIST CSF?

What is the difference between NIST 800-53 and NIST CSF?

The top 5 vendor risk assessment questionnaires for 2023

The top 5 vendor risk assessment questionnaires for 2023

What is a risk register and how to automate

What is a risk register and why is it important?

Top management's key responsibilities for ISO 27001 implementation

Top management's key responsibilities for ISO 27001 implementation

The founder’s story: How 6clicks was born and what’s behind the name

The founder’s story: How 6clicks was born and what’s behind the name


What is the NIS directive?

The NIS Directive, which stands for the Network and Information Systems Directive, is a legislative framework that was adopted by the European Union in 2016. Its primary objective is to enhance the cybersecurity capabilities and resilience of Member States and to establish a common level of cybersecurity across the EU. The directive focuses on ensuring the security of network and information systems (NIS) within sectors that are vital for the economy and society. It sets out obligations for both public and private sector organizations, including essential service providers, digital service providers, and operators of online marketplaces. The NIS Directive aims to improve the overall level of cybersecurity across the EU by introducing incident reporting requirements, promoting cross-border cooperation, and providing a framework for the exchange of information and best practices.

Is the NIS directive mandatory?

The NIS (Network and Information Security) Directive is a framework established by the European Union to ensure the security and integrity of essential services and digital service providers across Member States. This directive is indeed mandatory, imposing specific requirements and obligations on operators of essential services and digital service providers.

Operators of essential services, such as those in the health sector or financial market infrastructures, must meet minimum security measures and report any incidents that could have a substantial impact on the continuity of those services. Digital service providers, including online marketplaces or cloud computing services, must also adhere to security requirements and adopt appropriate technical and organizational measures to safeguard their digital infrastructure.

Non-compliance with the NIS Directive can have significant consequences. Competent authorities at the national level are responsible for supervising and enforcing compliance, and they can impose penalties or fines on operators who fail to meet the necessary standards. In addition, operators of essential services and digital service providers have reporting obligations for security incidents. This involves an initial notification to the national authority, followed by detailed incident reports and cooperation in the investigation.

By making the NIS Directive mandatory, the European Parliament aims to enhance the level of cybersecurity across the EU and ensure a common level of protection against cyber threats. It promotes cross-border cooperation and the sharing of best practices among Member States. Compliance with the directive not only helps protect the digital infrastructure but also minimizes financial losses and operational disruptions caused by security incidents.

The scope of the NIS directive

The scope of the NIS Directive is extensive, covering both operators of essential services and digital service providers. Essential services include sectors such as healthcare and financial market infrastructures, which are vital for the functioning of society. These operators are required to meet minimum security measures and report any incidents that could potentially have a significant impact on the continuity of their services. Digital service providers, on the other hand, include online marketplaces and cloud computing services, among others. They must also comply with specific security requirements and implement appropriate technical and organizational measures to protect their digital infrastructure. The NIS Directive aims to ensure the security and resilience of critical digital services and infrastructure across the European Union.

Essential entities and services covered by the NIS directive

The NIS Directive, also known as the Directive on Security of Network and Information Systems, aims to enhance the overall level of cybersecurity across the European Union. This directive establishes a common level of security measures and reporting obligations for essential entities and services.

The essential entities and services covered by the NIS Directive include critical economic activities such as energy, transportation, banking, financial markets, health, water, and digital infrastructure. These sectors play a vital role in the functioning of society and the economy and thus require a higher level of cybersecurity protection.

Within the energy sector, the directive covers electricity and gas distribution networks as well as oil and gas transmission pipelines. In transportation, it includes air, rail, maritime, and road transportation systems. The banking and financial markets sector encompasses credit institutions, central banks, and financial market infrastructures. The healthcare sector includes hospitals, medical practices, and other healthcare providers. Water supply and distribution networks are also part of the entities covered by the directive.

By including these essential entities and services in the NIS Directive, the aim is to ensure their security and resilience against cyber threats. This helps prevent potential disruptions and protect critical infrastructures and services that are vital for society and the economy.

National level regulatory requirements under the NIS directive

At the national level, the NIS Directive imposes regulatory requirements on Member States to ensure the effective implementation of cybersecurity measures. These requirements include the establishment of National Competent Authorities (NCAs) and Single Points of Contact (SPOCs) for cybersecurity monitoring, reporting, and incident response.

The NCAs play a crucial role in overseeing and coordinating the implementation of the NIS Directive within their respective countries. They are responsible for ensuring compliance with the directive's provisions and for coordinating the cooperation between relevant entities, such as essential service operators and digital service providers. The NCAs also act as a central point for contact and communication with other NCAs and the European Union Agency for Cybersecurity (ENISA).

On the other hand, the SPOCs serve as a direct contact point for receiving and exchanging information related to cybersecurity incidents, as well as for reporting these incidents to the relevant authorities. They also play a role in facilitating cross-border cooperation and information sharing between Member States.

Furthermore, each Member State is required to establish Computer Security Incident Response Teams (CSIRTs) to handle cybersecurity incidents at the national level. These teams are responsible for monitoring and responding to security incidents, coordinating incident response efforts, and providing guidance and support to affected entities.

In addition to these regulatory requirements, the NIS Directive also mandates Member States to develop and implement a national cybersecurity strategy. This strategy aims to identify the priorities and objectives for improving cybersecurity capabilities and resilience within each country. It also serves as a framework for coordinating and aligning national efforts in response to cyber threats.

Digital service providers affected by the NIS directive

Digital service providers, including online marketplaces, online search engines, and cloud computing services, are directly affected by the NIS Directive. These entities play a crucial role in the digital landscape by providing various services to users worldwide.

Online marketplaces serve as platforms where buyers and sellers can engage in e-commerce activities. They facilitate the exchange of goods and services, connecting consumers with sellers and vice versa. Online search engines, on the other hand, enable users to search for information, products, and services on the internet. They provide search results based on user queries, helping users find relevant content quickly.

Cloud computing services offer storage, processing, and networking capabilities through remote servers, allowing users to access and use data and applications over the internet. They provide scalable and flexible computing resources, enabling businesses and individuals to manage and store their digital assets efficiently.

Digital service providers covered by the NIS Directive are required to implement regulatory requirements and security measures to ensure the security and resilience of their services. These measures include the implementation of technical and organizational measures to protect against cyber threats, ensuring the security of their networks and systems, and establishing incident notification procedures. They are also required to have appropriate risk management processes in place and to cooperate with relevant authorities in incident response and mitigation.

By adhering to these regulatory requirements and implementing robust security measures, digital service providers contribute to the overall cyber resilience of the digital ecosystem, safeguarding the interests of users and maintaining trust in the digital services they provide.

Network and information systems covered under the NIS directive

The NIS Directive encompasses a wide range of network and information systems that are critical to the functioning of various sectors of the economy. These sectors include energy, transport, water, and healthcare, among others. Additionally, the directive applies to certain online marketplaces, search engines, and cloud computing services.

Network and information systems covered under the NIS Directive refer to the digital infrastructure and services that are essential to the functioning of these sectors. This includes the systems and networks that support the provision of critical services, as well as digital service providers that play a crucial role in delivering these services.

For example, in the energy sector, network and information systems involved in the generation, transmission, and distribution of electricity are covered by the directive. Similarly, in the healthcare sector, systems and networks that support the delivery of healthcare services and the management of patient data are included.

Other sectors, such as transportation, water supply, and finance, also have specific network and information systems covered under the NIS Directive. Additionally, online marketplaces, search engines, and cloud computing services that meet certain criteria are considered digital service providers and are subject to the directive's requirements.

Security requirements for essential entities and services covered under the NIS directive

Security requirements for essential entities and services covered under the NIS Directive are a key aspect of ensuring the resilience and protection of critical infrastructure and digital services. The directive sets out a range of obligations that essential entities and services must adhere to in order to enhance their cybersecurity defenses. These requirements include the establishment of security policies and measures, conducting regular risk assessments and audits, and reporting of security incidents to the competent authority. Essential entities and services are also required to implement technical and organizational measures to mitigate cyber threats, ensuring a common level of security across the EU. Furthermore, the directive emphasizes the importance of cross-border cooperation and information sharing between Member States to effectively respond to security incidents and enhance the overall cybersecurity posture at a national level. By imposing these security requirements, the NIS Directive aims to enhance the resilience and stability of critical infrastructure and digital services against cyber threats.

Technical expertise for network security measures

Technical expertise is a crucial component when it comes to implementing network security measures in accordance with the NIS (Network and Information Systems) Directive. This directive aims to ensure the security of essential services and critical infrastructures against cyber threats.

To effectively implement network security measures, organizations need to possess a deep understanding of the latest cybersecurity risks, vulnerabilities, and mitigation techniques. Technical expertise is required to evaluate and select adequate security measures, implement them across the digital infrastructure, and maintain their effectiveness over time.

Moreover, expertise is necessary for monitoring and ensuring compliance with the NIS directive. This involves continuously evaluating the level of security, investigating security incidents, and identifying areas that require improvement.

To support the implementation of the directive, Member States are obligated to provide competent authorities and single points of contact with the necessary technical expertise, financial resources, and human resources. These competent authorities play a crucial role in enforcing compliance by collaborating with relevant stakeholders, conducting audits, and issuing the necessary guidelines.

Cybersecurity training requirements

The NIS directive includes specific cybersecurity training requirements that organizations must adhere to. These requirements are essential for preventing security incidents and ensuring the overall effectiveness of network security measures.

Cybersecurity training plays a crucial role in equipping employees with the necessary knowledge and skills to identify and respond to potential threats and vulnerabilities. By understanding the latest cybersecurity risks and mitigation techniques, employees can effectively contribute to the overall security posture of the organization.

To comply with the NIS directive, organizations should implement specific measures and best practices for effective cybersecurity training. This includes conducting regular training sessions that cover topics such as identifying phishing emails, creating strong passwords, and recognizing social engineering techniques. Additionally, organizations should provide training on incident response procedures, data protection regulations, and best practices for securing digital assets.

Furthermore, organizations should establish a culture of cybersecurity awareness, encouraging employees to report potential incidents and promoting a proactive approach to security. Regularly evaluating the effectiveness of training programs, updating them based on emerging threats, and providing ongoing education and awareness are also important measures to consider.

Security incident response teams (SIRT) requirement

Under the NIS directive, the requirement for Security Incident Response Teams (SIRT) is an essential component of effective cybersecurity. SIRTs play a vital role in providing incident support and assistance to Operators of Essential Services (OESs) and Relevant Digital Service Providers (RDSPs).

One key responsibility of SIRTs is to monitor security incidents and provide early warnings to organizations. By continuously monitoring cybersecurity threats and vulnerabilities, SIRTs can alert OESs and RDSPs to potential risks, allowing them to take proactive measures in mitigating these risks.

In addition to monitoring, SIRTs are also responsible for responding to security incidents promptly and effectively. They are equipped with the technical expertise and resources to analyze and investigate security incidents, identify the root cause, and implement necessary remediation measures. By responding promptly, SIRTs help minimize the potential impact of security incidents on OESs and RDSPs, reducing the risk of financial losses and operational disruption.

Furthermore, SIRTs also play a crucial role in analyzing and assessing risks related to cybersecurity incidents. By evaluating the nature and severity of incidents, SIRTs can provide valuable insights and recommendations to organizations, enabling them to strengthen their cybersecurity posture and develop effective risk mitigation strategies.

The National Cyber Security Centre (NCSC) serves as the Computer Security Incident Response Team (CSIRT) under the NIS regulations. As the CSIRT, the NCSC has the responsibility to coordinate and support incident response activities across various sectors. This includes providing guidance, sharing information and best practices, and facilitating cross-border cooperation to enhance the overall cybersecurity resilience of the nation.

Notification obligations for security incidents

Heading: Notification Obligations for Security Incidents under the NIS Directive

Under the NIS Directive (Directive on Security of Network and Information Systems), organizations have specific obligations to fulfill in the event of a security incident. These obligations comprise timely reporting to the competent authority, ensuring effective incident response, and mitigating risks to digital infrastructures.

Organizations must adhere to a strict timeline for notification as mandated by the NIS Directive. They are required to report security incidents to the national authority within a designated timeframe. The precise duration may vary from country to country, but it typically ranges from a few hours to a maximum of 72 hours.

When notifying the competent authority, organizations must include certain essential information about the incident. This includes the nature and impact of the incident, the affected services or systems, and any related and subsequent incidents. Furthermore, organizations should provide details about the mitigating measures taken or planned to address the incident and prevent a recurrence.

The recipients of the notification vary depending on the sector and the specific jurisdiction. Typically, organizations are required to report incidents to the national supervisory authority. However, in some cases, additional entities such as regulatory authorities or sector-specific competent authorities may also need to be notified.

By adhering to these reporting obligations, organizations contribute to the overall improvement of cybersecurity resilience and facilitate cross-border cooperation in combating cyber threats. Compliance with the NIS Directive's notification requirements ensures a harmonized response to security incidents and minimizes potential financial losses and operational disruptions.

Impact of a breach on essential entities and services under the NIS directive

The NIS Directive sets out clear obligations for organizations in the event of a security incident, with a focus on ensuring the security and continuity of essential entities and services. Breaches can have a substantial impact on these critical infrastructures, resulting in financial losses, operational disruption, and potential harm to national security. In this section, we will explore the specific requirements and measures outlined in the NIS Directive to safeguard essential entities and services and mitigate the impact of a breach on the overall cybersecurity landscape.

Initial notification to competent authority

Under the NIS Directive, operators of essential services and digital service providers have certain obligations, including the requirement to provide an initial notification to the competent authority in the event of a security incident.

The process of providing this initial notification involves several key steps. Firstly, the operator or provider must promptly assess the impact of the incident on the security of its network and digital infrastructure. They must then determine if the incident has had a substantial impact on the provision of essential services or digital services.

If the incident is deemed to be significant, the operator or provider is obligated to notify the competent authority without undue delay. The notification should include relevant information about the incident, such as the nature, impact, and possible mitigation measures. Additionally, if the incident affects more than one Member State, the operator or provider must notify the competent authorities of all affected countries.

The parameters used to determine the significance of the impact of a security incident include factors such as the number of users affected, the geographical spread of the incident, and the duration of the disruption. These parameters help assess the potential severity of the incident and provide guidance for the initial notification process.

Substantial impact on operators of essential services or digital Service providers

Under the NIS directive, both operators of essential services and digital service providers may experience a substantial impact in the event of a cybersecurity incident. However, there are some differences in treatment between these two groups.

Operators of essential services, such as those in the health sector or financial market infrastructures, play a critical role in society and are thus subject to stricter requirements. A cybersecurity incident could result in significant financial losses, operational disruptions, or harm to individuals. Therefore, operators of essential services are expected to have a higher level of cybersecurity in place and must promptly assess the impact of an incident on their network and digital infrastructure.

On the other hand, digital service providers, such as online marketplaces or cloud computing services, are subject to a lower level of security requirements. While they may not have the same level of impact as operators of essential services, they still have an obligation to assess the impact of an incident. The focus for digital service providers is on maintaining the security of their systems and providing essential information in their initial notification.

Exceptions and additional requirements may apply depending on the nature and extent of the cybersecurity incident. Cross-border cooperation is crucial for incidents that affect more than one Member State, as digital service providers and operators of essential services must notify the competent authorities of all affected countries. Compliance requirements, incident reporting obligations, and potential regulatory authority involvement may also vary between the two groups.

General thought leadership and news

The buyers guide for MSPs and advisors considering 6clicks

The buyer’s guide for MSPs and advisors considering 6clicks

Selecting a cybersecurity, risk, and compliance platform like 6clicks involves a range of important considerations for managed service providers...

Regulatory changes and their impact on GRC

Regulatory changes and their impact on GRC

The ever-shifting regulatory landscape impels organizations to constantly recalibrate their GRC strategy according to all relevant laws and...

Growing together: our partnership philosophy

Growing together: our partnership philosophy

Our commitment to your success in the cybersecurity risk and compliance market is unwavering. At 6clicks, our motto, "GRC software that's smart, not...

Digital transformation for your MSP or advisory business

Digital transformation for your MSP or advisory business

This article follows our research and interviews with cyber, risk and compliance leaders. These industry leaders spread across Global Systems...

Cyber incident response: A critical component of enterprise security planning

Cyber incident response: A critical component of enterprise security planning

While beneficial, digital transformation has opened the door to various modern cyber threats. These threats are becoming increasingly sophisticated,...

6clicks on Azure Private Cloud for GRC managed services

6clicks on Azure Private Cloud for GRC managed services

Managed service providers play a critical role in helping organizations navigate complex regulatory landscapes and implement robust cyber GRC...