Skip to main content

NIS 2 Directive

1. Why NIS 2 matters now

The NIS 2 Directive (EU) 2022/2555 is a major overhaul of the EU's cybersecurity rules, replacing the original NIS Directive. It aims to create a higher common level of cybersecurity across the Union by expanding its scope, introducing stricter security and reporting requirements, and strengthening enforcement powers.

Unlike the Cyber-Resilience Act (CRA), which focuses on the security of products, NIS 2 focuses on the cyber resilience of the organisations that provide critical services. These organisations—categorised as 'essential' or 'important'—must implement robust risk-management measures and report significant incidents to national authorities.

Official texts

The consolidated version is the primary reference for this directive.

Timeline of Key Dates

DateEventLegal Basis
2023-01-16Directive entered into force.NIS2 Art. 45
2024-10-17Member States must adopt and publish national laws (transposition deadline).NIS2 Art. 41
2024-10-18NIS 2 rules become applicable. Organisations must be compliant.NIS2 Art. 41

Relationship to other EU laws

LawHow it interacts with NIS 2
Cyber-Resilience Act (CRA)NIS 2 governs organisational cyber risk; the CRA governs product security. A NIS 2 "essential entity" must ensure its supply chain is secure (NIS2 Art. 21(2d)), which includes procuring CRA-compliant products. The reporting platform used by manufacturers under the CRA is established and operated under the NIS 2 framework, feeding vulnerability data directly into the EU's incident response system.
Radio Equipment Directive (RED)An organisation may be a NIS 2 entity and also manufacture products subject to the RED. The obligations are cumulative; organisational resilience under NIS 2 must be maintained, and products must meet RED requirements.
DORA (Digital Operational Resilience Act)DORA is a lex specialis (specific law) for the financial sector. Financial entities that fall under DORA are exempt from NIS 2's main provisions, as DORA's requirements are considered at least equivalent (NIS2 Art. 4).
CER DirectiveThe Critical Entities Resilience Directive (EU 2022/2557) covers the physical resilience of critical infrastructure (e.g., against natural disasters). NIS 2 covers their cyber resilience. The two directives are designed to work in parallel.

2. Scope – Which Organisations are In?

NIS 2 applies to public and private entities in specific sectors, categorising them as either Essential Entities (EE) or Important Entities (IE) based on their criticality to the EU's economy and society. The main obligations apply to entities that are medium-sized or larger, though some are in scope regardless of their size (NIS2 Art. 2).

2.1 Essential vs. Important Entities

CategoryAnnexKey CharacteristicsSupervision
Essential Entities (EE)Annex ISectors of high criticality, such as energy, transport, health, and digital infrastructure.Proactive supervision by national authorities, including regular audits and inspections.
Important Entities (IE)Annex IIOther critical sectors, such as postal services, waste management, manufacturing of critical products, and digital providers.Reactive (ex-post) supervision. Authorities act if provided with evidence of non-compliance.

2.2 Examples of In-Scope Entities

The table below provides a non-exhaustive list of examples to help organisations identify their likely status.

SectorExample EntityEssential (Annex I)Important (Annex II)
Digital Infrastructure
TLD Name Registries, DNS Providers
Cloud Computing Service Providers
Data Centre Service Providers
Content Delivery Networks
Providers of Public Electronic Comms Networks
Trust Service Providers (Qualified)
Trust Service Providers (Non-Qualified)
Online Marketplaces
Online Search Engines
Social Networking Platforms
Health
Hospitals & Healthcare Providers
EU Reference Laboratories
R&D of Medicinal Products
Manufacturers of Critical Medical Devices
Manufacturers of Pharmaceuticals
Energy
Electricity, Oil & Gas Suppliers
District Heating & Cooling Operators
Hydrogen Production & Transmission
Transport
Air, Rail, Water & Road Transport Operators
Manufacturing
Medical Devices (non-critical)
Computers & Electronics
Machinery & Equipment
Motor Vehicles
Other Transport Equipment
Other Sectors
Postal & Courier Services
Waste Management
Food Production & Processing
Research Organisations

3. How NIS 2 Impacts Product Manufacturers

While NIS 2 directly regulates service providers, it has significant indirect consequences for any company that manufactures products with digital elements. Regulated entities are legally required to secure their supply chains, which means they will pass down strict cybersecurity requirements to their suppliers.

3.1 Supply Chain Security Demands

Essential and Important Entities are explicitly required to manage risks in their supply chains. This includes assessing "the overall quality of products and cybersecurity practices of their suppliers and service providers, including their secure development procedures" (NIS2 Art. 21(3)).

This means product manufacturers selling to NIS 2-regulated customers should expect to be asked for:

  • Evidence of secure development practices.
  • Software Bills of Materials (SBOMs).
  • Information about their vulnerability management processes.
  • Contractual security commitments.

3.2 Mandatory Product Certification

NIS 2 empowers Member States to require regulated entities to use specific ICT products or services that are certified under a European cybersecurity certification scheme (established under the EU's Cybersecurity Act). The European Commission can also adopt acts to mandate this for certain categories of entity (NIS2 Art. 24).

For manufacturers, this can turn cybersecurity certification from a market advantage into a market access requirement. If a customer in a critical sector is legally obliged to use certified products, uncertified products will be locked out of that segment.


4. Key Obligations for Management

NIS 2 places direct responsibility on the management bodies of both essential and important entities.

ObligationDescriptionLegal Basis
Approve & OverseeManagement must approve and oversee the implementation of the cybersecurity risk-management measures required by Article 21.NIS2 Art. 20(1)
LiabilityManagement can be held personally liable for infringements of Article 21.NIS2 Art. 20(1)
TrainingManagement members are required to follow cybersecurity training to gain sufficient knowledge to identify and assess risks and management practices.NIS2 Art.20(2)

5. NIS 2 Requirements & How to Implement Them

5.1 Cybersecurity Risk-Management Measures

All essential and important entities must take "appropriate and proportionate technical, operational and organisational measures" to manage cybersecurity risks (NIS2 Art. 21(1)). These measures must be based on an all-hazards approach and cover at least the following areas:

Requirement AreaInterpretation & Engineering TasksImplementation Guides
Risk Analysis & Security Policies
Art. 21(2a)
Perform and document a risk assessment; establish and maintain clear information system security policies.Threat Modeling
Incident Handling
Art. 21(2b)
Define and implement a process for detecting, analysing, containing, and responding to security incidents.Security Logging & Monitoring
Business Continuity & Crisis Management
Art. 21(2c)
Establish plans for business continuity, backup management, and disaster recovery to ensure operational resilience.n/a
Supply Chain Security
Art. 21(2d)
Assess and manage security risks arising from suppliers and service providers, including requiring specific security measures in contracts.SBOM & VEX Workflows
Secure Development & Maintenance
Art. 21(2e)
Implement secure development practices for network and information systems, including a coordinated vulnerability disclosure process.Vulnerability Disclosure
CI/CD Hardening
Effectiveness Assessment
Art. 21(2f)
Implement policies and procedures to regularly assess the effectiveness of the cybersecurity risk-management measures.n/a
Cyber Hygiene & Training
Art. 21(2g)
Implement basic cyber hygiene practices (e.g., software updates, password policies) and provide regular cybersecurity training for all staff.User Documentation Guide
Cryptography & Encryption
Art. 21(2h)
Implement policies on the use of cryptography and, where appropriate, end-to-end encryption to protect data at rest and in transit.Key Provisioning & Storage
HR Security & Access Control
Art. 21(2i)
Define and enforce access control policies based on the principle of least privilege and "need to know". Manage assets and ensure personnel security.Unique Device Identity
Authentication & Secure Comms
Art. 21(2j)
Use multi-factor authentication (MFA) or continuous authentication solutions. Ensure voice, video, and text communications are secured.n/a

5.2 Incident Reporting Obligations

Entities must notify their national CSIRT or competent authority of any incident that has a significant impact on the provision of their services. A significant incident is one that causes severe operational disruption or financial loss, or affects others by causing considerable material or non-material damage (NIS2 Art. 23(3)).

The notification must follow a multi-stage process:

StageDeadlineContentLegal Basis
1. Early WarningWithin 24 hours of becoming aware.Initial alert. Must indicate if the incident is suspected of being caused by unlawful or malicious acts.Art. 23(4a)
2. Incident NotificationWithin 72 hours of becoming aware.An update to the early warning, with an initial assessment of the incident's severity, impact, and (if available) indicators of compromise.Art. 23(4b)
3. Intermediate ReportOn request from the CSIRT/authority.Status updates on the ongoing incident investigation and remediation.Art. 23(4c)
4. Final ReportWithin 1 month of submitting the incident notification.A detailed description including root cause, mitigation measures applied, and cross-border impact.Art. 23(4d)

6. How is NIS 2 Enforced?

NIS 2 grants national authorities strong powers to supervise and enforce the rules, with different regimes for Essential and Important entities.

6.1 Supervisory Powers

  • Essential Entities are subject to proactive supervision. This includes on-site inspections, regular and targeted security audits, and requests for information to verify compliance.
  • Important Entities are subject to reactive supervision. Authorities will act ex-post if they are provided with evidence or indication of non-compliance.

6.2 Penalties for Non-Compliance

Member States must ensure penalties are "effective, proportionate and dissuasive". The Directive sets maximum fines that can be imposed (NIS2 Art. 34):

  • Essential Entities: Fines of up to €10,000,000 or 2% of the total worldwide annual turnover of the preceding financial year, whichever is higher.
  • Important Entities: Fines of up to €7,000,000 or 1.4% of the total worldwide annual turnover of the preceding financial year, whichever is higher.