Skip to content

What is the NIS 2 directive?


What is the NIS 2 directive?

The NIS 2 Directive, also known as the Directive on security of network and information systems, is a European Union legislation aimed at ensuring a high level of cybersecurity across essential services and digital service providers. It focuses on the security of critical infrastructure and systems that are essential for the functioning of our society. The directive covers a wide range of sectors, including energy, transport, health, water, and digital services like online marketplaces and search engines. Its main goal is to improve the security and resilience of networks and information systems by establishing security requirements, reporting obligations, and enforcement measures. The NIS 2 Directive encourages collaboration between national authorities, competent authorities, and businesses to address cybersecurity risks, prevent cyber attacks, and respond effectively to incidents. It aims to protect the security of supply chains, enhance crisis management capabilities, and promote the adoption of cybersecurity risk management measures. Compliance with the NIS 2 Directive is essential in safeguarding digital infrastructure and ensuring the continuity of essential services in today's digital age.

History of the NIS directive

The NIS (Network and Information Security) Directive was first introduced by the European Union in 2016. Its purpose was to establish a common level of cybersecurity across all member states and ensure the protection of essential services and digital infrastructures. However, since its implementation, it became evident that certain shortcomings needed to be addressed. This led to the proposal of the NIS2 directive.

The NIS2 directive aims to strengthen security measures by expanding the scope of essential services, including digital service providers, online marketplaces, and search engines. It also focuses on addressing supply chain security, recognizing that vulnerabilities within the supply chain can lead to significant cyber threats. The directive emphasizes the importance of risk assessment and the implementation of appropriate security measures to ensure the security of supply chains.

Additionally, the NIS2 directive seeks to streamline reporting obligations by introducing a single reporting mechanism for security incidents. This promotes efficient information-sharing between competent authorities and enables a coordinated response to cyber threats. The directive also enhances enforcement measures by empowering competent authorities to impose effective, proportionate, and dissuasive penalties for non-compliance.

Overview of key provisions in NIS 2

The NIS 2 directive introduces several key provisions aimed at strengthening cybersecurity measures and promoting a coordinated response to cyber threats. One major aspect of the directive is the expansion of the scope of essential services. Along with sectors such as energy, healthcare, and finance, the directive now includes digital service providers, online marketplaces, and search engines as essential entities. This recognition highlights the increasing importance of digital services and the need to secure their operations.

The directive also introduces a unified reporting mechanism for security incidents. This streamlines reporting obligations and ensures efficient information-sharing between competent authorities. Organizations are required to report security incidents within specific deadlines set by national authorities. These deadlines aim to ensure prompt response and timely coordination to mitigate the impact of cyber attacks.

To effectively manage cybersecurity risks, organizations must implement various risk-management measures. This includes conducting thorough risk analysis to identify vulnerabilities and potential threats. Incident handling protocols should be established to respond to security incidents promptly and minimize their impact. Business continuity plans should be in place to ensure the continuous provision of essential services. Supply chain security is also emphasized, recognizing the potential vulnerabilities within supply chains that can be exploited by cyber attackers.

Furthermore, the NIS 2 directive highlights the importance of cybersecurity training for employees and stakeholders. The use of cryptography to protect sensitive information is encouraged, and human resources security is addressed to ensure the responsible handling of cybersecurity measures. By incorporating these provisions, the NIS 2 directive aims to enhance cybersecurity defenses and improve the overall resilience of critical sectors.

Essential services and digital service providers

Essential services and digital service providers play a crucial role in today's interconnected world. These entities provide services that are vital for the functioning of society and the economy. Essential services encompass a wide range of sectors, including healthcare providers, critical infrastructure operators, credit institutions, and public administration. They are entrusted with the responsibility of ensuring the smooth operation of vital services, and any disruption or breach in their systems can have far-reaching consequences. Digital service providers, on the other hand, play a pivotal role in the digital economy, offering a wide range of online services such as search engines, online marketplaces, and digital infrastructure. With the increasing reliance on digital services for various economic activities, the security and resilience of these services have become paramount. The NIS 2 Directive recognizes the significance of these essential services and digital service providers by imposing specific cybersecurity obligations and requirements aimed at safeguarding their operations and protecting them from cyber threats.

Definition of essential services

The NIS 2 Directive encompasses essential services, which are crucial for the functioning of society and the economy. These services include sectors such as healthcare providers, critical infrastructure operators, digital service providers, and public administration bodies.

The classification of an organization as an essential service is based on specific criteria. These criteria include the level of dependency on the service, the impact of a disruption on economic and societal activities, and the necessity to ensure the security of supply chains.

Essential entities within these sectors are required to comply with the same security measures as important entities. These security measures aim to address cybersecurity risks and ensure the resilience of the digital infrastructure. However, essential entities are subject to proactive supervision by competent authorities, which means that they must meet additional reporting obligations and undergo regular security audits.

Compliance with these security measures is essential to protect against cyber threats and security incidents. It helps to mitigate risks, ensure business continuity, and maintain the functioning of critical services. By enforcing strong cybersecurity requirements, the NIS 2 Directive aims to enhance the overall level of cybersecurity across various sectors and safeguard essential services.

Definition of digital service providers

Digital service providers (DSPs) are an integral part of the NIS 2 directive, which aims to enhance the security and resilience of essential services and digital infrastructure. DSPs play a crucial role in ensuring the security and availability of online platforms and services. Here are three types of DSPs included in the NIS 2 directive:

  1. Online Marketplaces: These are platforms that facilitate the buying and selling of goods and services between multiple third-party sellers and buyers. Examples of online marketplaces include Amazon, eBay, and Alibaba. They provide a digital platform for various businesses to connect, making it essential to ensure the security and integrity of the transactions and data involved.
  2. Online Search Engines: These platforms enable users to search and retrieve information from the vast expanse of the internet. Search engines like Google, Bing, and Yahoo are examples of online search engines. With the abundance of information available online, the security and reliability of search engine results are critical to protect users from malicious content and ensure relevant, trustworthy outcomes.
  3. Social Networking Services Platforms: These platforms enable users to connect and interact with others, sharing content, ideas, and experiences. Examples of social networking services platforms include Facebook, Instagram, and Twitter. Given the vast amount of personal information shared on these platforms, it is essential to ensure the privacy, security, and availability of user data and protect against cyber threats.

These digital service providers have a significant impact on economic and societal activities. Therefore, the NIS 2 directive imposes specific cybersecurity obligations, reporting requirements, and enforcement measures on them to enhance their resilience and mitigate cybersecurity risks. By holding DSPs accountable for their cybersecurity measures, the NIS 2 directive aims to safeguard essential services and protect users in an increasingly digitalized world.

Obligations on essential entities and competent authorities

The NIS 2 directive places specific obligations on essential entities and competent authorities to ensure the cybersecurity of critical infrastructure and digital services. Essential entities, which include sectors such as energy, transport, banking, and healthcare providers, are required to implement appropriate cybersecurity measures to protect their systems and data from cyber threats.

Competent authorities, on the other hand, are responsible for approving and supervising these cybersecurity measures. They must assess the level of cybersecurity in essential entities, conduct security audits, and ensure compliance with the NIS 2 directive's requirements. These authorities also play a crucial role in coordinating the response to security incidents and providing guidance on cybersecurity risk management measures.

Additionally, the NIS 2 directive emphasizes the importance of cybersecurity training and awareness. Members of management bodies in essential entities are required to attend cybersecurity training and gain an understanding of the cybersecurity risks and obligations. They are then responsible for passing on this knowledge to their employees, ensuring a culture of cybersecurity awareness throughout the organization.

By imposing these obligations on essential entities and competent authorities, the NIS 2 directive aims to strengthen the overall cybersecurity of critical infrastructure, digital services, and the supply chain, reducing the risk of cyberattacks and enhancing the resilience of essential sectors.

Security requirements for essential entities and competent authorities

Under the NIS 2 directive, essential entities and competent authorities are subject to a range of security requirements to ensure effective cybersecurity practices. These requirements cover various aspects of risk analysis, incident handling, and overall information system security.

Essential entities are obligated to establish policies on risk analysis and information system security. They must identify and assess potential cybersecurity risks to their systems, and implement appropriate measures to mitigate these risks. Incident handling is another critical requirement, mandating essential entities to establish processes for detecting, responding to, and recovering from cybersecurity incidents.

Furthermore, the NIS 2 directive emphasizes the need for business continuity and crisis management within essential entities. They must have procedures in place to ensure the continuous operation of their services during cyber incidents or disruptions. Supply chain security is also a key consideration, requiring essential entities to assess and manage the cybersecurity risks associated with their supplier relationships.

In addition to these requirements, essential entities must address security in network and information systems acquisition, development, and maintenance. They should implement measures to ensure the security and integrity of their systems throughout their lifecycle.

To enhance cybersecurity awareness and preparedness, the NIS 2 directive includes provisions for cybersecurity training. Essential entity management personnel should attend training programs to gain an understanding of cybersecurity risks and obligations. They are responsible for disseminating this knowledge to their employees, fostering a culture of cybersecurity awareness within the organization.

Security requirements for digital service providers

Digital service providers are subject to specific security requirements under the NIS 2 directive. These requirements aim to ensure the protection of crucial digital services and the maintenance of their security measures.

First, digital service providers are obligated to implement policies on risk analysis and information system security. This involves identifying and assessing potential cybersecurity risks to their systems and networks. By conducting risk analysis, these providers can determine the vulnerabilities and threats they face, allowing them to establish appropriate security measures.

Additionally, incident handling is a mandatory measure for digital service providers. They must establish processes for detecting, responding to, and recovering from cybersecurity incidents. This ensures that any security breaches or disruptions are promptly addressed, minimizing potential damage or disruptions to their services.

Furthermore, digital service providers must prioritize business continuity and crisis management. They must have procedures in place to ensure the continuous operation of their services during cyber incidents or disruptions. This includes having backup systems and redundancy measures to mitigate any potential service disruptions.

Supply chain security is also a crucial consideration for digital service providers. They must assess and manage the cybersecurity risks associated with their supplier relationships. This helps prevent potential vulnerabilities and threats from entering their networks through their supply chain.

Lastly, digital service providers are required to address security in the acquisition, development, and maintenance of their network and information systems. This involves implementing measures to maintain the security and integrity of their systems throughout their lifecycle, ensuring that they are protected against evolving cybersecurity risks.

National authority responsibilities under the NIS 2 directive

Under the NIS 2 directive, national authorities are tasked with several important responsibilities in ensuring the enforcement and implementation of cybersecurity measures. These authorities play a crucial role in safeguarding the digital infrastructure and ensuring the security of essential services.

Firstly, national authorities are responsible for identifying and designating competent authorities within their respective countries. These competent authorities are entrusted with overseeing the cybersecurity measures and requirements set forth in the NIS 2 directive.

National authorities also have the important role of conducting an initial assessment of essential entities within their jurisdiction. This assessment helps determine the level of cybersecurity and the readiness of these entities to comply with the NIS 2 directive's security requirements.

Furthermore, national authorities are responsible for establishing and maintaining a framework for the identification and designation of digital service providers. This framework ensures that all relevant entities are captured within the scope of the directive and are subject to its cybersecurity obligations.

Effective coordination and cooperation between national authorities and other entities is crucial for the successful implementation of the NIS 2 directive. National authorities must collaborate with organizational measures, critical infrastructure operators, and other stakeholders to address cybersecurity risks and ensure compliance with the directive's requirements.

Cybersecurity training, enforcement measures, and business continuity requirements

Cybersecurity Training: One important aspect of the NIS 2 directive is the emphasis on cybersecurity training. Companies and organizations that provide essential services or digital services are required to ensure that their employees receive adequate training to mitigate cybersecurity risks. This includes training on identifying and responding to cyber threats, implementing security measures, and promoting a culture of cybersecurity awareness within the organization. By investing in cybersecurity training, companies can enhance their ability to protect critical infrastructure and effectively respond to security incidents.

Enforcement Measures: The NIS 2 directive includes provisions for the enforcement of its cybersecurity requirements. National authorities are responsible for implementing enforcement measures to ensure compliance by essential service providers, digital service providers, and other entities within their jurisdiction. These measures may include conducting regular security audits, monitoring cybersecurity practices, and imposing penalties for non-compliance. By implementing robust enforcement measures, the directive aims to create a strong incentive for companies to prioritize cybersecurity and take necessary measures to protect their digital infrastructure and sensitive data.

Business Continuity Requirements: The NIS 2 directive recognizes the importance of maintaining business continuity in the face of cybersecurity risks and incidents. Companies providing essential services or digital services are required to establish and maintain appropriate policies and measures to ensure the continuous provision of their services in the event of a cybersecurity incident. This includes implementing incident response plans, backup systems, and recovery strategies to minimize the impact and downtime caused by security breaches. By emphasizing the importance of business continuity, the directive aims to mitigate the potential disruption to critical services and protect the overall security of supply chains.

Cybersecurity training requirements

Cybersecurity Training Requirements under the NIS 2 Directive

The NIS 2 directive places a significant emphasis on cybersecurity training as a crucial element in preventing security incidents and minimizing their impact. Companies and organizations providing essential services or digital services are obligated to ensure that their employees receive comprehensive training to mitigate cybersecurity risks effectively.

To address the importance of cybersecurity training, organizations must establish policies and procedures regarding basic cyber hygiene practices, such as regularly updating software, using strong passwords, and avoiding suspicious emails or downloads. These measures are essential for maintaining a strong defense against cyber threats.

Additionally, organizations must implement multi-factor authentication methods to enhance security. This ensures that users cannot access systems or data without providing multiple forms of authentication, such as a password and a unique code or biometric verification.

Human resources security is another critical aspect of cybersecurity training. Organizations must educate employees about the risks associated with social engineering, phishing attacks, and the proper handling of sensitive information. By training employees on these topics, organizations can reduce the likelihood of human error leading to security breaches.

By adhering to these cybersecurity training requirements, organizations can proactively enhance their cybersecurity posture, reduce vulnerabilities, properly handle security incidents, and protect essential services and digital infrastructure. Ultimately, investing in comprehensive cybersecurity training helps organizations stay resilient against evolving security threats and strengthens the overall security of critical sectors.

Enforcement measures

The NIS 2 directive enforces strict measures to ensure compliance with its cybersecurity requirements. Organizations failing to meet these requirements may face significant fines for non-compliance.

The directive states that fines for essential entities can reach up to 2% of their annual turnover or €10 million. These fines highlight the importance of adhering to the security measures outlined in the directive.

To oversee compliance and enforce the directive, competent national authorities are granted extensive powers. These authorities have the authority to conduct audits and inspections to assess an organization's level of cybersecurity. They can also issue orders and impose penalties for non-compliance.

Enforcement measures also include the requirement for organizations to report security incidents and breaches to the competent national authority. This ensures transparency and allows for effective monitoring of cybersecurity risks.

Business continuity requirements

The NIS 2 directive imposes strict business continuity requirements on organizations to ensure the security and resilience of their systems and operations. One key requirement is the need for organizations to have robust plans in place for system recovery in the event of a cyber incident or disruption. These plans should outline the steps to be taken to restore normal operations, including the identification of critical systems and data, backup and recovery procedures, and alternative arrangements.

Additionally, organizations must establish emergency procedures to respond effectively to cyber threats or incidents. This includes outlining the roles and responsibilities of key personnel, establishing communication protocols, and implementing measures to mitigate the impact of an incident.

Another crucial aspect of business continuity under the NIS 2 directive is the creation of a crisis response team. This team should consist of experts from different departments or disciplines, including IT, legal, communications, and management. Their role is to coordinate the organization's response during and after a cyber incident, ensuring a swift and effective resolution.

In terms of reporting obligations, organizations must adhere to specific timelines set out in the directive. For example, an initial assessment of a security incident must be conducted within 24 hours of its occurrence. This assessment should include an analysis of the impact of the incident, the potential risks to the organization, and the steps taken to mitigate those risks. A final update must then be provided to the competent national authority within a month, detailing the incident, its resolution, and any lessons learned.

Failure to comply with these business continuity requirements can have severe consequences for organizations. This includes the possibility of hefty fines, legal action, and reputational damage. To avoid these repercussions, organizations must prioritize the development and implementation of robust business continuity plans that align with the NIS 2 directive's requirements.

Initial assessment process & reporting obligations

Under the NIS 2 directive, organizations are required to conduct an initial assessment process and fulfill specific reporting obligations. This ensures prompt response and effective handling of security incidents.

The initial assessment process involves conducting a thorough analysis within 24 hours of a security incident occurring. This assessment entails evaluating the impact of the incident on the organization, identifying potential risks, and implementing measures to mitigate those risks.

Reporting obligations consist of three key components: early warning, incident notification, and a final report. Organizations must provide an early warning to the competent national authority as soon as they become aware of a significant cyber threat or incident that may impact essential services or digital infrastructure. This early warning assists in identifying and addressing potential risks promptly.

An incident notification must be submitted within a specified timeframe, which varies according to the severity of the incident. This notification provides detailed information about the incident, its impact, and the measures taken to tackle it.

Finally, organizations must submit a final report within a month, outlining the incident's resolution, any lessons learned, and the steps taken to prevent similar incidents in the future.

To enhance public awareness and strengthen the reporting process, the directive emphasizes the involvement of Computer Security Incident Response Teams (CSIRTs) and competent authorities. CSIRTs play a vital role in providing guidance and support to organizations during security incidents, while competent authorities oversee the reporting process and ensure compliance with the directive's requirements.

By adhering to these initial assessment and reporting obligations, organizations can effectively manage security incidents, mitigate risks, and improve the overall cybersecurity of essential services and digital infrastructure.

General thought leadership and news

Past, present, and future themes in cybersecurity: Are you keeping up?

Past, present, and future themes in cybersecurity: Are you keeping up?

In the ever-evolving landscape of cybersecurity, understanding where we've been, where we are, and where we're going is essential. By examining the...

Why 6clicks is outpacing legacy GRC platforms like Archer, ServiceNow and Diligent

Why 6clicks is outpacing legacy GRC platforms like Archer, ServiceNow and Diligent

For years, Archer, ServiceNow, and Diligent were the go-to names in GRC software. Archer’s rich functionality made it a leader, while ServiceNow’s IT...

ServiceNow GRC pricing: Is it worth it in 2025?

ServiceNow GRC pricing: Is it worth it in 2025?

Concerned about ServiceNow GRC’s pricing plans and total cost of ownership?

5 steps for effective risk management

5 steps for effective risk management

Whether you’re planning a new project or looking to enhance your organization’s security program, implementing risk management is crucial in ensuring...

How to become NIST certified in 6 steps

How to become NIST certified in 6 steps

Aligning your organization with in-demand cybersecurity frameworks safeguards your data, systems, and operations from diverse threats, helping you...

Hailey goes deeper: Automatic risk and issue generation for assessments

Hailey goes deeper: Automatic risk and issue generation for assessments

Hello everyone, we're excited to introduce a powerful new feature for Hailey AI: risk and issue generation from assessments. This update...