NIS2 Directive

NIS2 Directive

5 major components of NIS2 compliance

+

Covered Entities

NIS2 applies to organizations providing “essential or important services.” 

Essential entities are large organizations that operate across 11 critical sectors, including: 

  • Energy
  • Transport
  • Banking
  • Financial Market Infrastructure
  • Health
  • Drinking Water
  • Waste Water
  • Digital Infrastructure
  • ICT Service Management (B2B)
  • Public Administration
  • Space

Important entities are medium-sized organizations that operate in seven areas of high criticality, including: 

  • Postal and Courier Services
  • Waste Management
  • Manufacture, Production and Distribution of Chemicals
  • Production, Processing and Distribution of Food
  • Manufacturing
  • Digital Providers
  • Research

Large companies are those with at least 250 employees, an annual turnover of at least €50 million, or an annual balance sheet of at least €43 million, whereas medium companies are those with at least 50 employees, an annual turnover of at least €10 million, or a €10 million balance sheet.

+

Risk Management

Article 21 of the framework specifies cybersecurity risk management measures that Member States are expected to build on based on the criticality and size of covered entities. The 10 broad measures include:

  1. Risk Management: Policies on risk analysis and information system security.
  2. Incident Response: Procedures for handling and reporting cybersecurity incidents.
  3. Continuity Planning: Business continuity measures, including backup management, disaster recovery, and crisis management.
  4. Supply Chain: Security measures for relationships between entities and their direct suppliers or service providers.
  5. System Security: Practices for secure acquisition, development, and maintenance of network and information systems, including vulnerability handling and disclosure.
  6. Effectiveness Assessment: Policies and procedures to evaluate the impact of cybersecurity risk-management measures.
  7. Training: Implementation of basic cyber hygiene practices and cybersecurity training programs.
  8. Encryption: Policies and procedures regarding the use of cryptography and, where appropriate, encryption techniques.
  9. Access Control: Human resources security measures, access control policies, and asset management strategies.
  10. Authentication: Deployment of multifactor or continuous authentication solutions, secured communications systems, and emergency communication tools within the entity, as appropriate.
+

Leadership Responsibilities

Management bodies, including senior management and executive leadership, must participate in the development, implementation, and management of their organization’s cybersecurity initiatives and programs. They’re also required to undergo risk management and cybersecurity training, and it’s recommended that employees undergo the same training. Should a cybersecurity incident occur due to gross negligence of management, they can be held criminally liable.

+

Supply Chain Security

NIS2 broadly mandates organizations to strengthen supply chain security. Organizations should assess and understand the risks associated with suppliers and vendors, implement appropriate security measures based on those risks, and regularly monitor and respond to ongoing supplier risk. Organizations may be considered non-compliant should they conduct business with high-risk third parties in the supply chain, meaning that organizations who fall outside the original scope of NIS2 may still be required to comply.

+

Incident Reporting

Covered entities must report incidents with the potential to cause severe operational disruptions or financial loss to the covered entity or other entities. Three incident reports must be submitted to the national computer security response incident response team (CSIRT):

  • Initial report: Submitted within 24 hours of becoming aware of an incident and outlining the type of incident and its expected impact.
  • Follow-up report: Submitted within 72 hours of becoming aware of an incident and including an assessment of the incident as well as details of its severity and impact.
  • Comprehensive report: Submitted within one month of the incident and including details of remediation efforts and what initiatives have been implemented to mitigate risk in the future.
Leverage ConnectSecure to align with NIS2

turtle list icon

Vulnerability Assessment: Identify vulnerabilities and exposures across operating systems, networks, and applications by scanning for over 240,000 known risks from our in-depth database.

turtle list icon

Automated Scanning & Remediation: Proactively monitor ongoing risk and set up automated remediation tools to ensure gaps are identified and closed immediately.

turtle list icon

EPSS Scoring: Build an evidence-based risk management and remediation strategy with the Exploit Predication Scoring System (EPSS), that helps you categorize and prioritize vulnerabilities.

turtle list icon

Policy Creation & Evaluation: Fulfill the policy requirements of Article 21 with GPO policy downloads and policy evaluation tools that measure your alignment.

turtle list icon

External Scanning: Get an external view of your client’s network perimeter with advanced Attack Surface Management and mapping tools.

turtle list icon

Access Control Management: Define user access controls for sensitive data and resources, enforce multi-factor authentication, and receive instant notifications of anomalies to prevent unauthorized access.

turtle list icon

Compliance Benchmarking: Use comparative analysis tools to measure and improve your NIS2 compliance performance against globally recognized standards.

turtle list icon

Audit-readiness: Prove compliance to NIS2 assessors with easy access to white labeled reports, multi-level reports, role-specific reports and customization options.

The business case for NIS2 compliance

NIS2 compliance is sure to be challenging for resource-constrained organizations, but MSPs are uniquely positioned to handle both the security components and the regulatory requirements of the framework. By guiding your clients through all aspects of the process, you help them achieve regulatory compliance, boost their revenue, and reduce financial risk.

Improve Security Posture

NIS2 mandates comprehensive risk management measures that significantly reduce the possibility and impact of data breaches and other cyberattacks.

Regulatory Compliance

NIS2 is a legal requirement for a broad range of organizations in the EU, as well as their vendors and suppliers. Non-compliance for covered entities may result in substantial fines and non-monetary penalties.

Reduce Financial Risk

While complying with NIS2 requires significant time and resources, non-compliance is far more costly. The financial risk of non-compliance goes well beyond monetary fines and includes the costs associated with cyber incidents, such as remediation, legal fees, and loss of investment.

Management Liability

To avoid gross negligence and potential criminal sanctions, senior management and executive leadership are expected to play a critical role in overseeing and implementing cybersecurity initiatives.

Generate Revenue

Supply chain security provisions demand that organizations assess the security posture of vendors and suppliers, and clients that proactively manage their cybersecurity open the doors to more contracts.

Start using ConnectSecure with a free trial!

Real results straight from our MSP community

Mitchell-Matter-lock-it

Mitchell Matter

Co-founder | LockIT Technologies
“Implementing ConnectSecure has significantly improved our approach to cybersecurity. The efficiency gained from agent-based scanning and the cost savings have allowed us to offer top-tier protection to our clients without breaking the bank.”
Trent-Gasser-palitto

Trent Gasser

IT Consultant | Palitto Consulting Services
“The platform is intuitive and user-friendly, and our team readily adopted it. It’s become a talking point in most new client conversations and strategy meetings with existing customers.”
Luis-Alvarez-Alvarez-Tech

Luis Alvarez

CEO | Alvarez Technology Group
“ConnectSecure allows us to run regular, in-depth vulnerability scans, ensuring our patching strategies are effective and any new security weaknesses are quickly identified and addressed.”
Simon-Hopkin-itps

Simon Hopkin

Head of Cyber Security | ITPS
“ConnectSecure has been an excellent 
tool for us to drive engagement. It’s very quick and easy to deploy and you get almost immediate results.”
no-one

Christophe Gagnon

Director | CyberVision 24/7
“We use everything—external scanning, reports, PII detection, firewall integration… The value for the price is really good.”
karl-bickmore

Karl Bickmore

CEO | Tech IT
“We’re providing better reporting, better data, better planning, and it’s helping us win more deals—like significantly more deals—and our sophistication has gone way up.”
dennis-houseknecht

Dennis Houseknecht

CTO | WatSec Cyber Risk Management
“There’s no all-in-one tool on the market—and I follow the market pretty closely—that has the depth and breadth of ConnectSecure’s vulnerability scans, and that’s presented in such an actionable way.”
tim-fournet

Tim Fournet

CISO | Rader
“The fact this platform is built with service providers in mind means we can use it across our client base hassle-free at a cost that makes it a no-brainer to bundle with our other services.
NIS2-compliance-guide-with-padding

Learn how ConnectSecure can help you leverage NIS2 compliance to drive business

Flag cyber vulnerabilities—and know exactly how to remedy them

Want to see ConnectSecure in action? Sign up for a free trial!