Chapter 6 of 10
Module 6: The EU NIS2 Directive – Sectoral Cybersecurity and Incident Reporting
Explore NIS2’s expanded scope, risk management requirements, incident reporting regime, and the role of management and national authorities.
Module 6 Overview – Why NIS2 Matters Now
Where NIS2 Fits in This Course
You have already seen:
- Module 4: U.S. state privacy/security laws (patchwork, state-by-state).
- Module 5: GDPR security & accountability (data protection for personal data).
NIS2 is different but related:
- It is about cybersecurity of networks and information systems, not just personal data.
- It targets critical sectors and key digital services in the EU.
- It sets security, risk management, and incident reporting obligations.
Key Facts (as of early 2026)
- Instrument: Directive (EU) 2022/2555 – known as NIS2.
- Adopted: 2022.
- Entered into force: 2023.
- Transposition deadline for Member States: 17 October 2024.
- By early 2026, EU countries are expected to have implemented NIS2 in national laws, though details (e.g., lists of entities, penalties) vary by country.
Learning Objectives
By the end of this 15‑minute module, you should be able to:
- Describe which sectors and entities fall within NIS2 and how scope is determined (essential vs important entities).
- Outline NIS2’s core risk management and technical control expectations, including supply chain and vulnerability management.
- Explain NIS2’s incident reporting deadlines, enforcement powers, and management accountability.
> Tip for exams and practice: Always distinguish GDPR security (personal data) from NIS2 cybersecurity (continuity and security of essential services). In real organizations, they overlap but are legally distinct.
From NIS1 to NIS2 – What Changed?
Historical Context
- NIS1 (Directive (EU) 2016/1148) was the EU’s first cybersecurity law for critical sectors.
- It had limited scope and uneven implementation across Member States.
Why NIS2 Was Introduced
NIS2 (Directive (EU) 2022/2555) was adopted to:
- Expand sectoral coverage (more sectors and more types of entities).
- Harmonize security and reporting requirements across the EU.
- Increase enforcement powers and management accountability.
Key Upgrades in NIS2
Compared with NIS1, NIS2:
- Broadens sectors (e.g., includes wastewater, food, postal, public administration, space, many digital services).
- Uses size-based criteria (medium and large companies in covered sectors are usually in scope).
- Introduces two categories of in-scope entities:
- Essential entities (EE) – higher criticality, stricter supervision.
- Important entities (IE) – still significant, but often supervised more ex post.
- Sets detailed risk management measures (e.g., supply chain security, MFA, backup & recovery).
- Establishes clear incident reporting timelines.
- Requires management bodies to be trained and can hold them personally liable under national law.
> Remember: NIS2 is a Directive, not a Regulation like GDPR. That means each Member State implements it via national law, so details (e.g., exact fines, supervisory authorities) differ country by country.
NIS2 Scope – Sectors, Essential vs Important Entities
1. Sectors Covered
NIS2 divides sectors into highly critical and other critical. Examples (non‑exhaustive):
Highly critical sectors (Annex I – typically "essential entities"):
- Energy – electricity, gas, oil, hydrogen.
- Transport – air, rail, water, road.
- Banking and financial market infrastructures.
- Health – hospitals, private clinics, e‑health providers, medical device manufacturers (if critical).
- Drinking water and wastewater.
- Digital infrastructure – IXPs, DNS, TLD name registries, cloud computing, data centers, CDNs.
- ICT service management – managed service providers (MSPs), managed security service providers (MSSPs).
- Public administration – central and some regional/local authorities (depending on Member State).
- Space – certain ground‑based infrastructure.
Other critical sectors (Annex II – typically "important entities"):
- Postal and courier services.
- Waste management.
- Manufacturing of critical products – e.g., pharma, medical devices, chemicals, electronics, machinery.
- Food production, processing, and distribution (large operators).
- Digital providers – online marketplaces, online search engines, social networking platforms.
2. Size and Type Criteria
In general (with some exceptions):
- Medium and large entities in these sectors are in scope by default.
- Micro and small entities can still be in scope if they are highly critical (e.g., sole operator of a critical infrastructure in a region).
Typical EU size thresholds:
- Medium enterprise: < 250 employees, ≤ €50M turnover or ≤ €43M balance sheet total.
- Large enterprise: ≥ 250 employees or above those financial thresholds.
3. Essential vs Important Entities
- Essential entities (EE):
- Usually in Annex I sectors and/or large operators.
- Subject to proactive (ex ante) supervision – audits, inspections, requests for information.
- Important entities (IE):
- Often in Annex II sectors or medium‑sized operators.
- Usually supervised ex post – authorities act after incidents or evidence of non‑compliance.
> Key idea: NIS2 scope is sector + size + criticality driven. Always ask: What sector? What size? How critical is the service to society or the economy?
Scope Sorting Exercise
Thought Exercise: In or Out of NIS2?
For each example, decide:
- Is it likely in scope of NIS2?
- If yes, is it more likely essential or important?
Write down your answers, then compare with the model answers below.
#### Scenario A
A national electricity transmission system operator with 1,500 employees.
- Your guess:
- In scope? Why/why not?
- Essential or important?
#### Scenario B
A regional craft bakery with 30 employees supplying local cafés.
- Your guess:
- In scope? Why/why not?
- Essential or important?
#### Scenario C
A cloud computing provider serving many EU businesses, 300 employees.
- Your guess:
- In scope? Why/why not?
- Essential or important?
---
Model Answers (self‑check)
Scenario A:
- In scope: Yes – energy sector is highly critical.
- Likely category: Essential entity (Annex I, large operator, critical infrastructure).
Scenario B:
- Likely out of scope by default: Small, not a major food operator.
- Could be brought in only if a Member State designates it as critical (unlikely for a small craft bakery).
Scenario C:
- In scope: Yes – cloud computing services are explicitly covered.
- Likely category: Essential entity (digital infrastructure, medium/large size).
NIS2 Risk Management – Core Security Measures
NIS2 moves beyond vague "appropriate security" language and lists specific areas where entities must have measures. It is still risk‑based, but with clearer expectations.
1. Governance and Policies
Entities must implement policies on risk analysis and information system security. This includes:
- Documented risk assessment process.
- Identified critical assets and services.
- Clear roles and responsibilities for cybersecurity.
2. Technical and Organizational Measures
Key areas NIS2 explicitly mentions (simplified):
- Incident handling – detection, response, recovery procedures.
- Business continuity and crisis management – backup, disaster recovery, continuity plans.
- Supply chain security – assessing and managing risks from suppliers and service providers.
- Security in network and information systems acquisition, development, and maintenance – secure development lifecycle, patching.
- Policies and procedures to assess the effectiveness of cybersecurity risk management measures – audits, testing, metrics.
- Basic cyber hygiene and cybersecurity training – awareness training for staff.
- Cryptography and encryption where appropriate.
- Multi‑factor authentication (MFA), secured communication, and secured emergency communication.
3. Relationship to GDPR Security (Module 5)
- GDPR Art. 32 requires "appropriate technical and organisational measures" to protect personal data.
- NIS2 requires risk management measures to ensure continuity and security of essential services, which may or may not involve personal data.
In practice, organizations often:
- Use one integrated security program to satisfy both GDPR and NIS2.
- Map controls (e.g., MFA, backups, incident response) to both legal frameworks.
> Exam hint: When asked about NIS2 controls, always mention risk‑based approach, supply chain security, MFA, and backup & recovery – these are repeatedly emphasized in the Directive and guidance.
Practical Example – Applying NIS2 Controls in a Hospital
Imagine a large hospital in an EU Member State. Under NIS2, it is an essential entity in the health sector.
Step‑by‑Step: Implementing NIS2 Risk Measures
- Risk Analysis and Asset Mapping
- Identify critical services: emergency care, ICU, surgery, imaging, electronic health records (EHR).
- Map critical systems: EHR platform, lab systems, networked medical devices, telemedicine platform.
- Incident Handling
- Create an incident response plan for ransomware attacks on EHR.
- Define incident severity levels and escalation paths.
- Run tabletop exercises with IT, clinical staff, and management.
- Business Continuity & Backup
- Maintain offline and off‑site backups of EHR data.
- Test restore procedures every quarter.
- Ensure contingency plans to operate on paper workflows if systems are down.
- Supply Chain Security
- Assess vendors: EHR provider, cloud providers, medical device manufacturers.
- Include security clauses in contracts (patching SLAs, incident notification, audit rights).
- Require vendors to support timely vulnerability disclosure.
- Technical Controls
- MFA for remote access and admin accounts.
- Network segmentation between medical devices and office IT.
- Regular patching of operating systems and applications.
- Training and Governance
- Annual security awareness training for all staff (phishing, password hygiene, reporting incidents).
- Specialized training for IT and biomedical engineers.
- Regular reports to the management body on security posture and incidents.
> Connect to NIS2 language: This hospital is implementing measures in incident handling, business continuity, supply chain security, MFA, backup & recovery, training, and governance – all core NIS2 expectations.
Incident Reporting Under NIS2 – Timelines and Content
NIS2 sets strict, staged incident reporting deadlines to national Computer Security Incident Response Teams (CSIRTs) or competent authorities.
> Note: Exact procedures can vary by Member State, but the timeframes and stages below come from the Directive itself.
What Is a Reportable Incident?
Generally, incidents that:
- Significantly disrupt or have the potential to significantly disrupt the provision of the service.
- Have a significant impact on public safety, public security, or public health, or cause significant material or non‑material damage.
Member States and sector‑specific rules may define "significant" more precisely (e.g., duration, number of users affected).
Reporting Timelines (3 Stages)
- Early Warning – within 24 hours of becoming aware of a significant incident
- Purpose: alert authorities quickly.
- Content (high level):
- Indication of whether the incident is suspected to be caused by unlawful or malicious acts.
- Whether it might have a cross‑border impact.
- Incident Notification – within 72 hours of becoming aware
- More detailed report with:
- Initial assessment of the incident (type, root cause if known).
- Severity and impact (systems affected, users impacted, geographic spread).
- Indicators of compromise (if available).
- Mitigation measures taken or planned.
- Final Report – within 1 month of the notification
- Final or updated assessment including:
- Root cause analysis.
- Full impact and duration.
- Measures taken to prevent recurrence.
- Lessons learned.
Link to GDPR Breach Notification (Module 5)
- GDPR requires notification of personal data breaches to the Data Protection Authority within 72 hours, where feasible.
- NIS2 focuses on service continuity and network/information system security, not only personal data.
- A single incident (e.g., ransomware) can trigger both GDPR and NIS2 reporting.
> Practice takeaway: Organizations must have playbooks that specify who reports what, to which authority, and by when, considering both NIS2 and GDPR.
Quick Check – Incident Reporting Timelines
Test your understanding of NIS2 incident reporting stages and deadlines.
Under NIS2, when should an essential entity send the *early warning* about a significant incident to the competent authority or CSIRT?
- Within 24 hours of becoming aware of the incident
- Within 72 hours of becoming aware of the incident
- Within 1 month of becoming aware of the incident
Show Answer
Answer: A) Within 24 hours of becoming aware of the incident
NIS2 requires a staged approach: an *early warning* within 24 hours, a more detailed notification within 72 hours, and a final report within 1 month. The 72‑hour deadline refers to the more detailed incident notification, not the initial early warning.
Enforcement, Penalties, and Management Accountability
1. Enforcement Powers
Member States must give their NIS2 authorities strong powers, including:
- Supervision and audits (especially for essential entities).
- On‑site inspections and security scans.
- Requests for information and documentation (policies, logs, incident reports).
- Orders to implement specific security measures.
- Orders to inform service recipients about significant threats or incidents.
2. Penalties
NIS2 requires effective, proportionate, and dissuasive penalties. It sets maximum levels that national laws must meet or exceed. Common patterns (similar order of magnitude across Member States):
- For essential entities: administrative fines that can reach up to at least €10 million or 2% of total worldwide annual turnover, whichever is higher.
- For important entities: fines up to at least €7 million or 1.4% of worldwide turnover (exact values can vary by national implementation, but these are the Directive’s minimum ceilings).
> Always check the specific national law (e.g., Germany, France, Italy) for the precise fine structure.
3. Management Accountability
NIS2 explicitly targets the management bodies (e.g., board of directors, top executives):
- They must approve the cybersecurity risk management measures.
- They are responsible for overseeing implementation.
- They must receive regular training and can be required to ensure staff training.
- In case of serious breaches of obligations, Member States may:
- Hold members of the management body personally liable under national law.
- Temporarily ban them from exercising managerial functions in the entity.
4. Comparison to GDPR Accountability
- GDPR focuses on accountability for data protection (records of processing, DPIAs, DPOs, etc.).
- NIS2 focuses on accountability for cybersecurity and service continuity, with explicit reference to the management body’s duties and potential liability.
> Practical implication: For large organizations, NIS2 is pushing cybersecurity to the boardroom level, not just IT. This aligns with global trends (e.g., U.S. SEC cybersecurity disclosure rules, various national critical infrastructure regimes).
Boardroom Scenario – Advising Management Under NIS2
Scenario
You are a junior cybersecurity analyst at a managed service provider (MSP) that operates in multiple EU countries. Under NIS2, your company is classified as an essential entity (ICT service management).
The board of directors asks: “What do we, as management, actually need to do under NIS2?”
Your Task
Write 3–5 bullet points you would present to the board, focusing on their responsibilities, not technical details.
Pause and draft your bullets. Then compare with the model answer below.
---
Model Answer (Example Bullets)
As management, you should:
- Formally approve and regularly review our cybersecurity risk management policies and NIS2 compliance program.
- Ensure we have clear governance: defined roles, budget, and resources for cybersecurity and incident reporting.
- Require regular reporting on cyber risks, incidents, and NIS2 compliance status (e.g., quarterly board updates).
- Support training: both your own NIS2/cybersecurity training and organization‑wide awareness programs.
- Understand that in cases of serious non‑compliance, you may face personal consequences under national law (e.g., liability, temporary bans from management roles), so active oversight is essential.
> Reflection: How does this compare to management’s role under GDPR? Where are the overlaps (e.g., risk‑based approach, accountability) and differences (e.g., focus on service continuity vs data protection)?
Key NIS2 Terms – Flashcard Review
Flip through these terms to consolidate your understanding before moving on.
- NIS2 Directive (Directive (EU) 2022/2555)
- The EU’s updated cybersecurity law for essential and important entities in critical sectors, setting requirements for risk management, incident reporting, and supervision. It replaced and expanded the original NIS Directive (2016).
- Essential Entity (EE)
- An entity in a highly critical sector (often Annex I) or of high importance whose disruption would significantly affect society or the economy. Subject to stricter, often proactive supervision and higher maximum fines under NIS2.
- Important Entity (IE)
- An entity in other critical sectors (often Annex II) or of significant size/impact, but generally supervised ex post (after incidents or evidence of non‑compliance). Still must meet NIS2 risk management and reporting obligations.
- Incident Reporting Stages under NIS2
- 1) Early warning within 24 hours of awareness, 2) Detailed incident notification within 72 hours, 3) Final report within 1 month, all to the competent authority or CSIRT for significant incidents.
- Supply Chain Security (in NIS2)
- The requirement to assess and manage cybersecurity risks arising from suppliers and service providers, including contractual security clauses, vendor assessments, and monitoring of third‑party vulnerabilities.
- Management Body (NIS2)
- The top governing body of an entity (e.g., board of directors) that must approve and oversee cybersecurity risk management measures, receive training, and may be held personally liable for serious non‑compliance under national law.
Key Terms
- CSIRT
- Computer Security Incident Response Team – a national or sectoral team responsible for handling computer security incidents and supporting entities during cyber crises.
- NIS2 Directive
- Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union, replacing the original NIS Directive and expanding scope, requirements, and enforcement.
- Management Body
- The entity’s top decision‑making group (e.g., board of directors) responsible for approving and overseeing NIS2 cybersecurity risk management measures.
- Essential Entity
- An organization in a highly critical sector or of high importance under NIS2, subject to strict cybersecurity and incident reporting obligations and proactive supervision.
- Important Entity
- An organization in other critical sectors under NIS2, subject to similar obligations as essential entities but often supervised ex post.
- Business Continuity
- The capability of an organization to continue delivery of products or services at acceptable predefined levels following a disruptive incident, supported by planning and backup strategies.
- Risk-Based Approach
- A method where security measures are chosen and prioritized based on the likelihood and impact of threats, rather than a fixed checklist, central to both NIS2 and GDPR.
- Supply Chain Security
- Processes and controls to manage cybersecurity risks from external suppliers and service providers, including technical, contractual, and governance measures.
- Incident Reporting (NIS2)
- The legal obligation for in‑scope entities to notify significant cybersecurity incidents to competent authorities or CSIRTs within strict timelines (24h early warning, 72h notification, 1‑month final report).
- Multi-Factor Authentication (MFA)
- An access control method requiring two or more independent credentials (e.g., password + token or biometric), explicitly encouraged by NIS2 for securing systems and accounts.