NIS2 Directive

NIS2 Directive

5 major components of NIS2 compliance

+

Covered Entities

NIS2 applies to organizations providing “essential or important services.” 

Essential entities are large organizations that operate across 11 critical sectors, including: 

  • Energy
  • Transport
  • Banking
  • Financial Market Infrastructure
  • Health
  • Drinking Water
  • Waste Water
  • Digital Infrastructure
  • ICT Service Management (B2B)
  • Public Administration
  • Space

Important entities are medium-sized organizations that operate in seven areas of high criticality, including: 

  • Postal and Courier Services
  • Waste Management
  • Manufacture, Production and Distribution of Chemicals
  • Production, Processing and Distribution of Food
  • Manufacturing
  • Digital Providers
  • Research

Large companies are those with at least 250 employees, an annual turnover of at least €50 million, or an annual balance sheet of at least €43 million, whereas medium companies are those with at least 50 employees, an annual turnover of at least €10 million, or a €10 million balance sheet.

+

Risk Management

Article 21 of the framework specifies cybersecurity risk management measures that Member States are expected to build on based on the criticality and size of covered entities. The 10 broad measures include:

  1. Risk Management: Policies on risk analysis and information system security.
  2. Incident Response: Procedures for handling and reporting cybersecurity incidents.
  3. Continuity Planning: Business continuity measures, including backup management, disaster recovery, and crisis management.
  4. Supply Chain: Security measures for relationships between entities and their direct suppliers or service providers.
  5. System Security: Practices for secure acquisition, development, and maintenance of network and information systems, including vulnerability handling and disclosure.
  6. Effectiveness Assessment: Policies and procedures to evaluate the impact of cybersecurity risk-management measures.
  7. Training: Implementation of basic cyber hygiene practices and cybersecurity training programs.
  8. Encryption: Policies and procedures regarding the use of cryptography and, where appropriate, encryption techniques.
  9. Access Control: Human resources security measures, access control policies, and asset management strategies.
  10. Authentication: Deployment of multifactor or continuous authentication solutions, secured communications systems, and emergency communication tools within the entity, as appropriate.
+

Leadership Responsibilities

Management bodies, including senior management and executive leadership, must participate in the development, implementation, and management of their organization’s cybersecurity initiatives and programs. They’re also required to undergo risk management and cybersecurity training, and it’s recommended that employees undergo the same training. Should a cybersecurity incident occur due to gross negligence of management, they can be held criminally liable.

+

Supply Chain Security

NIS2 broadly mandates organizations to strengthen supply chain security. Organizations should assess and understand the risks associated with suppliers and vendors, implement appropriate security measures based on those risks, and regularly monitor and respond to ongoing supplier risk. Organizations may be considered non-compliant should they conduct business with high-risk third parties in the supply chain, meaning that organizations who fall outside the original scope of NIS2 may still be required to comply.

+

Incident Reporting

Covered entities must report incidents with the potential to cause severe operational disruptions or financial loss to the covered entity or other entities. Three incident reports must be submitted to the national computer security response incident response team (CSIRT):

  • Initial report: Submitted within 24 hours of becoming aware of an incident and outlining the type of incident and its expected impact.
  • Follow-up report: Submitted within 72 hours of becoming aware of an incident and including an assessment of the incident as well as details of its severity and impact.
  • Comprehensive report: Submitted within one month of the incident and including details of remediation efforts and what initiatives have been implemented to mitigate risk in the future.
Leverage ConnectSecure to align with NIS2

turtle list icon

Vulnerability Assessment: Identify vulnerabilities and exposures across operating systems, networks, and applications by scanning for over 240,000 known risks from our in-depth database.

turtle list icon

Automated Scanning & Remediation: Proactively monitor ongoing risk and set up automated remediation tools to ensure gaps are identified and closed immediately.

turtle list icon

EPSS Scoring: Build an evidence-based risk management and remediation strategy with the Exploit Predication Scoring System (EPSS), that helps you categorize and prioritize vulnerabilities.

turtle list icon

Policy Creation & Evaluation: Fulfill the policy requirements of Article 21 with GPO policy downloads and policy evaluation tools that measure your alignment.

turtle list icon

External Scanning: Get an external view of your client’s network perimeter with advanced Attack Surface Management and mapping tools.

turtle list icon

Access Control Management: Define user access controls for sensitive data and resources, enforce multi-factor authentication, and receive instant notifications of anomalies to prevent unauthorized access.

turtle list icon

Compliance Benchmarking: Use comparative analysis tools to measure and improve your NIS2 compliance performance against globally recognized standards.

turtle list icon

Audit-readiness: Prove compliance to NIS2 assessors with easy access to white labeled reports, multi-level reports, role-specific reports and customization options.

The business case for NIS2 compliance

NIS2 compliance is sure to be challenging for resource-constrained organizations, but MSPs are uniquely positioned to handle both the security components and the regulatory requirements of the framework. By guiding your clients through all aspects of the process, you help them achieve regulatory compliance, boost their revenue, and reduce financial risk.

Improve Security Posture

NIS2 mandates comprehensive risk management measures that significantly reduce the possibility and impact of data breaches and other cyberattacks.

Regulatory Compliance

NIS2 is a legal requirement for a broad range of organizations in the EU, as well as their vendors and suppliers. Non-compliance for covered entities may result in substantial fines and non-monetary penalties.

Reduce Financial Risk

While complying with NIS2 requires significant time and resources, non-compliance is far more costly. The financial risk of non-compliance goes well beyond monetary fines and includes the costs associated with cyber incidents, such as remediation, legal fees, and loss of investment.

Management Liability

To avoid gross negligence and potential criminal sanctions, senior management and executive leadership are expected to play a critical role in overseeing and implementing cybersecurity initiatives.

Generate Revenue

Supply chain security provisions demand that organizations assess the security posture of vendors and suppliers, and clients that proactively manage their cybersecurity open the doors to more contracts.

Start using ConnectSecure with a free trial!

Karl Bickmore, CEO, Snap Tech IT

Karl Bickmore

CEO | Snap Tech IT
“We're providing better reporting, better data, better planning, and it's helping us win more deals — like significantly more deals — and our sophistication has gone way up.”
Dennis Houseknecht, CTO, WatSec Cyber Risk Management

Dennis Houseknecht

CTO | WatSec Cyber Risk Management
“There's no all-in-one tool on the market — and I follow the market pretty closely — that has the depth and breadth of ConnectSecure's vulnerability scans, and that's presented in such an actionable way.”
McKaila Posey, Cybersecurity Services Manager, Entara

McKaila Posey

Cybersecurity Services Manager | Entara
“ConnectSecure has transformed our service delivery. Not only has ConnectSecure helped our clients really see the value we bring, but the metrics of our engineers also look fantastic.”
Paul Rouse, President and Owner, Rouse Consulting Group

Paul Rouse

President and Owner | Rouse Consulting Group
“ConnectSecure really has opened so many additional doors and capabilities to extend our cybersecurity suite of services. It’s made us more efficient in many ways”
Sandeep Kaushal, President, TeamLogic IT

Sandeep Kaushal

President | TeamLogic IT
“ConnectSecure is a very important tool for us to determine the health of our prospects during onboarding. There’s no impact on performance and we’re able to collect a lot of data. There’s twofold benefit to that — we know what’s going on with their infrastructure and clients know we can provide proof that we’re keeping an eye on things.”
NIS2-compliance-guide-with-padding

Learn how ConnectSecure can help you leverage NIS2 compliance to drive business

Flag cyber vulnerabilities—and know exactly how to remedy them

Want to see ConnectSecure in action? Sign up for a free trial!