Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Cloud misconfigurations
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Kubernetes Runtime
soon
Secure your container workloads
Cloud Search
Cloud sprawl, solved
Defend
Runtime Protection
In-app Firewall / WAF
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanner
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
CSPM
End-to-end cloud security
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Learn
Software Security Academy
Trust Center
Safe, private, compliant
Blog
The latest posts
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Customer Stories
Trusted by the best teams
Partner Program
Partner with us
Contact
Login
Start for Free
No CC required
Aikido
Menu
Aikido
EN
EN
FR
JP
DE
PT
Login
Start for Free
No CC required
Learn
/
Compliance Frameworks Hub
/
Chapter 1Chapter 2Chapter 3

NIS2 Directive

5minutes read110

Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter

TL;DR

NIS2 is the EU's new cyber law for critical sectors—broader scope, stricter rules. Requires baseline security (patching, supply chain, access control), fast incident reporting (24h), and exec-level accountability.

If you're an “essential” or “important” entity in the EU, compliance is non-negotiable by Oct 2024. Fines up to €10M or 2% of global turnover.

NIS2 Directive Scorecard Summary:

  • Developer Effort: Moderate (Requires implementing specific technical controls, secure SDLC practices focusing on vulnerability handling and supply chain security, and supporting rapid incident detection/reporting).
  • Tooling Cost: Moderate to High (Depends on baseline maturity; may require investment in risk management tools, improved monitoring/logging, vulnerability management, MFA, encryption, supply chain security tools).
  • Market Impact: Very High (Mandatory for a wide range of entities operating in the EU; significantly raises the bar for cybersecurity expectations and enforcement).
  • Flexibility: Moderate (Mandates minimum security measures but allows proportionality based on risk and entity size/criticality).
  • Audit Intensity: High (National authorities will supervise and enforce; involves potential audits, inspections, and proof of compliance, especially for essential entities).

What is the NIS2 Directive?

The NIS2 Directive (Directive (EU) 2022/2555) is an EU-wide law on cybersecurity that repeals and replaces the original 2016 Network and Information Security (NIS) Directive. Its goal is to achieve a higher common level of cybersecurity across the EU Member States. It addresses the shortcomings of the first NIS Directive by expanding its scope, clarifying requirements, strengthening security obligations, and introducing stricter supervision and enforcement measures.

Key aspects of the NIS2 Directive:

  • Expanded Scope: Covers more sectors critical to the economy and society. It distinguishes between:
    • Essential Entities (Annex I): Includes sectors like energy, transport, banking, financial market infrastructures, health, drinking water, wastewater, digital infrastructure (IXPs, DNS, TLD registries, cloud providers, data centers, CDNs, trust services), public administration, and space.
    • Important Entities (Annex II): Includes postal/courier services, waste management, chemicals, food production/processing/distribution, manufacturing (medical devices, computers, electronics, machinery, vehicles), digital providers (online marketplaces, search engines, social networking platforms), and research.
    • Generally applies to medium and large enterprises within these sectors, but Member States can include smaller entities with high-security risk profiles.
  • Stricter Security Requirements: Mandates entities implement "appropriate and proportionate technical, operational and organisational measures" to manage cybersecurity risks (Article 21). This includes a minimum baseline of 10 measures covering risk analysis, incident handling, business continuity, supply chain security, vulnerability handling/disclosure, testing, cryptography/encryption, HR security/access control/asset management, and use of MFA/secure communications.
  • Management Accountability: Explicitly makes management bodies responsible for approving, overseeing, and being trained on cybersecurity risk management measures. Non-compliance can lead to personal liability for management.
  • Incident Reporting Obligations: Introduces multi-stage reporting for significant incidents:
    • 24-hour early warning to the relevant CSIRT (Computer Security Incident Response Team) or competent authority.
    • 72-hour incident notification with an initial assessment.
    • Final report within one month.
  • Supply Chain Security: Requires entities to address cybersecurity risks in their supply chains and relationships with direct suppliers/providers.
  • Harmonization & Enforcement: Aims for more consistent application across Member States, strengthens supervisory powers of national authorities, and introduces significant administrative fines for non-compliance.

Member States must transpose NIS2 into their national laws by October 17, 2024.

Why is it Important?

NIS2 represents a major step-up in EU cybersecurity regulation:

  • Broader Impact: Affects a much wider range of sectors and companies operating in the EU compared to the original NIS Directive. Many tech companies (cloud providers, data centers, digital providers) fall directly within scope.
  • Higher Security Baseline: Mandates a more concrete set of minimum security measures, raising the cybersecurity standard across covered sectors.
  • Increased Accountability: Places direct responsibility (and potential liability) on management for cybersecurity oversight.
  • Faster Incident Response: Strict reporting deadlines push organizations towards faster detection and response capabilities.
  • Supply Chain Focus: Recognizes and addresses the significant risks originating from the supply chain, forcing companies to look beyond their own perimeter.
  • Stronger Enforcement: Significant fines and supervisory powers mean non-compliance has serious teeth.
  • Cross-Border Consistency: Aims to reduce fragmentation in cybersecurity requirements and supervision across the EU.

For essential and important entities, NIS2 compliance is not optional; it's a legal requirement for operating within the EU market.

What and How to Implement (Technical & Policy)

Implementing NIS2 requires a structured approach focusing on risk management and the mandated minimum security measures (Article 21):

  1. Scope Confirmation: Determine if your organization falls under the scope of "essential" or "important" entities based on sector and size criteria defined in the Directive and national transpositions.
  2. Risk Assessment & Policies (Art. 21(2a)): Conduct thorough risk assessments identifying threats to network and information systems. Develop and implement corresponding information system security policies.
  3. Incident Handling (Art. 21(2b)): Establish procedures for detecting, analyzing, reporting (meeting the 24h/72h/1mo deadlines), and responding to cybersecurity incidents. Requires robust monitoring and logging.
  4. Business Continuity & Crisis Management (Art. 21(2c)): Develop plans for business continuity (backup management, disaster recovery) and crisis management to ensure operational resilience during/after major incidents.
  5. Supply Chain Security (Art. 21(2d)): Assess and address risks related to direct suppliers and service providers (including CSPs). Implement security requirements in supplier contracts. Perform due diligence.
  6. System Security & Vulnerability Handling (Art. 21(2e)): Implement security in network/information system acquisition, development, and maintenance. Establish processes for vulnerability handling and disclosure (e.g., using vulnerability scanners, patch management). This overlaps heavily with secure SDLC practices (like NIST SSDF).
  7. Effectiveness Testing (Art. 21(2f)): Develop policies and procedures to regularly assess the effectiveness of implemented cybersecurity risk management measures (e.g., via internal/external audits, penetration testing).
  8. Cyber Hygiene & Training (Art. 21(2g)): Implement basic cyber hygiene practices (strong passwords, patching) and provide regular cybersecurity awareness training for all staff.
  9. Cryptography & Encryption (Art. 21(2h)): Define and implement policies regarding the use of cryptography and encryption where appropriate (e.g., for data at rest and in transit).
  10. HR Security, Access Control, Asset Management (Art. 21(2i)): Implement security procedures for personnel (background checks if needed), strong access control policies (least privilege, RBAC), and maintain an inventory/manage assets securely.
  11. Multi-Factor Authentication (MFA) & Secure Communications (Art. 21(2j)): Use MFA or continuous authentication solutions, secure voice/video/text communications, and secure emergency communication systems where appropriate.

Implementation requires a combination of robust technical controls (firewalls, IDS/IPS, EDR, SIEM, MFA, encryption, vulnerability scanners, patch management tools) and well-documented policies, procedures, and training programs.

Common Mistakes to Avoid

Organizations preparing for NIS2 should avoid these pitfalls:

  1. Underestimating Scope: Incorrectly assuming NIS2 doesn't apply due to sector or size, or failing to identify all relevant business units/systems within scope.
  2. Ignoring Supply Chain Risk: Focusing only on internal security and neglecting the requirement to assess and manage risks from direct suppliers.
  3. Insufficient Incident Reporting Capability: Lacking the monitoring, detection, analysis, and internal processes to meet the strict 24/72-hour reporting deadlines.
  4. Lack of Management Buy-in/Oversight: Treating NIS2 purely as an IT/security issue without involving management in approving policies, overseeing implementation, and undergoing training as required.
  5. Focusing Only on Technology: Neglecting the crucial process, policy, training, and governance aspects required by the Directive.
  6. Inadequate Documentation: Failing to properly document risk assessments, policies, procedures, incident handling, and evidence of control implementation for potential supervision by national authorities.
  7. Waiting Too Long: Delaying preparation until the October 2024 deadline, underestimating the time needed for gap analysis, implementation, and process changes (often estimated at ~12 months).

What Auditors/Authorities Might Ask (Developer Focus)

While formal audits aren't defined yet like SOC 2, national supervisory authorities will have powers to check compliance. Questions potentially impacting development teams could relate to:

  • (Art. 21(2e)) Vulnerability Handling: "What is your process for identifying, assessing, and remediating vulnerabilities discovered in your software or its dependencies? Show evidence of recent patching."
  • (Art. 21(2e)) Secure Development: "How do you ensure security is considered during the software development lifecycle? Can you show evidence of secure coding practices or security testing (SAST/SCA)?"
  • (Art. 21(2d)) Supply Chain (Dependencies): "How do you assess the security of open-source libraries or third-party components used in your software?"
  • (Art. 21(2b)) Incident Handling Support: "How does your application logging support the detection and analysis of security incidents?"
  • (Art. 21(2h)) Cryptography: "Where is encryption used in your application (data in transit, data at rest)? How are keys managed?"
  • (Art. 21(2i)) Access Control: "How is access to development environments, source code, and deployment pipelines controlled?"
  • (Art. 21(2j)) Authentication: "Is MFA used for developer access to critical systems or code repositories?"

Authorities will look for evidence of established processes, technical controls, and documentation demonstrating adherence to the mandated security measures.

Quick Wins for Development Teams

Dev teams can contribute to NIS2 readiness by focusing on fundamentals:

  1. Prioritize Vulnerability Management: Implement robust SCA and SAST scanning in CI/CD pipelines and establish clear SLAs for fixing critical/high severity vulnerabilities. (Aligns with Art. 21(2e))
  2. Strengthen CI/CD Security: Secure access to the pipeline, use secrets management, and scan build artifacts. (Supports multiple Art. 21 measures)
  3. Improve Logging: Ensure applications generate meaningful security event logs and forward them centrally to support incident detection. (Aligns with Art. 21(2b))
  4. Enforce MFA: Secure developer access to code repositories, cloud consoles, and CI/CD systems with MFA. (Aligns with Art. 21(2j))
  5. Review Dependencies: Actively review and manage third-party library security posture. (Aligns with Art. 21(2d), 21(2e))
  6. Basic Secure Coding Training: Refresh team knowledge on common vulnerabilities (OWASP Top 10) and secure coding practices. (Aligns with Art. 21(2g))

Ignore This And... (Consequences of Non-Compliance)

NIS2 non-compliance carries significant penalties enforced by national authorities:

  • Heavy Fines:
    • Essential Entities: Up to €10 million or 2% of the total worldwide annual turnover of the preceding financial year, whichever is higher.
    • Important Entities: Up to €7 million or 1.4% of the total worldwide annual turnover of the preceding financial year, whichever is higher.
  • Corrective Orders: Authorities can issue binding instructions to remedy deficiencies.
  • Audits & Inspections: Non-compliant organizations face increased scrutiny and mandatory security audits.
  • Suspension of Certifications/Authorizations: In some cases, relevant certifications or authorizations to operate could be suspended.
  • Public Disclosure: Authorities can publicly name non-compliant organizations.
  • Management Liability: Management body members can be held personally liable and potentially face temporary bans from management functions for serious negligence.
  • Reputational Damage: Fines and public disclosure severely damage customer trust and brand reputation.

FAQ

Who needs to comply with the NIS2 Directive?

Medium and large organizations operating within the EU in specific sectors listed in Annex I ("Essential Entities") and Annex II ("Important Entities"). This includes areas like energy, transport, health, digital infrastructure (cloud providers, data centers, DNS, etc.), digital providers (marketplaces, search engines, social networks), manufacturing, postal services, and more. Check the directive and national transpositions for specifics.

What is the deadline for NIS2 compliance?

EU Member States must adopt and publish the measures necessary to comply with the NIS2 Directive by October 17, 2024. Organizations within scope need to be compliant by the time national laws take effect.

What's the main difference between NIS1 and NIS2?

NIS2 significantly expands the scope (more sectors, mandatory for medium/large entities), imposes stricter security and reporting requirements (including specific minimum measures and tight deadlines), strengthens supervision and enforcement (higher fines, management liability), and aims for better harmonization across Member States.

How does NIS2 relate to GDPR?

They are complementary. GDPR focuses on protecting personal data. NIS2 focuses on the cybersecurity of network and information systems used to provide essential/important services (which often process personal data). Complying with NIS2's security requirements helps protect the systems holding data covered by GDPR. NIS2 breach reporting focuses on service disruption, while GDPR focuses on risks to individuals from personal data breaches.

How does NIS2 relate to DORA or the Cyber Resilience Act (CRA)?

They are part of the EU's broader digital strategy, often overlapping but with different focuses:

  • NIS2: Broad cybersecurity baseline for essential/important sectors.
  • DORA: Specific digital operational resilience requirements for the financial sector. DORA is lex specialis, meaning financial entities follow DORA where it overlaps with NIS2.
  • CRA: Focuses on cybersecurity requirements for products with digital elements (hardware/software) placed on the EU market throughout their lifecycle. They aim to work together to create layers of security.

Is there a NIS2 certification?

The Directive encourages the use of European cybersecurity certification schemes (based on the EU Cybersecurity Act) to demonstrate compliance, but it doesn't mandate a specific "NIS2 certificate" itself. Compliance will be supervised and enforced by national competent authorities.

What constitutes a "significant incident" requiring reporting under NIS2?

An incident is considered significant if it:

a) causes or is capable of causing severe operational disruption or financial loss for the entity concerned;

b) affects or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.

National authorities will provide further guidance.

Jump to:
Text Link

Security done right.
Trusted by 25k+ orgs.

Start for Free
No CC required
Book a demo
Share:

www.aikido.dev/learn/software-security-tools/nis2

Table of contents

Chapter 1: Understanding Compliance Frameworks

What Are Compliance Frameworks and Why Do They Matter?
How Compliance Frameworks Affect DevSecOps Workflows
Common Elements Across Frameworks

Chapter 2: Major Compliance Frameworks Explained

SOC 2 Compliance
ISO 27001
ISO 27017 / 27018
NIST SP 800-53
NIST SSDF (SP 800-218)
OWASP ASVS
GDPR
NIS2 Directive
DORA
EU Cyber Resilience Act (CRA)
CMMC
PCI DSS
FedRAMP
HIPAA / HITECH
Essential Eight
Singapore CCoP (for CII)
Japan Cybersecurity Act & Related (APPI)

Chapter 3: Implementing Compliance in Development

Choosing the Right Frameworks for Your Organization
Building Compliant DevSecOps Pipelines
Training Development Teams for Compliance
Audit Preparation for Developers
Maintaining Compliance Long-Term
The End

Related blog posts

See all
See all
June 4, 2024
•
Compliance

SOC 2 certification: 5 things we learned

What we learned about SOC 2 during our audit. ISO 27001 vs. SOC 2, why Type 2 makes sense, and how SOC 2 certification is essential for US customers.

January 16, 2024
•
Compliance

NIS2: Who is affected?

Who does NIS2 apply to? Who does it affect? What are essential and important sectors and company size thresholds? Aikido's app has a NIS2 report feature.

December 5, 2023
•
Compliance

ISO 27001 certification: 8 things we learned

What we wished we'd known before starting the ISO 27001:2022 compliance process. Here are our tips for any SaaS company going for ISO 27001 certification.

Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for MicrosoftAikido for AWS
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group Companies
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant