NIS2 represents one of the most significant regulatory advances in cybersecurity within the European Union. As cyber threats become more frequent and sophisticated, EU legislators have recognized that voluntary adherence to best practices is no longer enough—security must be mandated at a continental level. Many organizations, whether large enterprises or small to medium-sized businesses, still treat cybersecurity as an afterthought or optional expense; NIS2 aims to correct this perception. By establishing uniform requirements and strict compliance deadlines, it reinforces that protecting data, systems, and digital processes is essential for both business continuity and societal resilience.

At roughly two-thirds of the way through the first quarter of the 21st century, the EU seeks to position itself as a global leader in safeguarding digital infrastructure, ensuring that critical sectors are prepared to withstand the ever-growing number of cyberattacks. Consequently, NIS2 requires organizations in specific industries—ranging from energy and transportation to healthcare and banking—to adopt solid defensive measures and continuously monitor for vulnerabilities. While each Member State transposes the directive into its own legal framework, the overarching message remains clear: cybersecurity is not a mere box-ticking activity but a core responsibility. Outside the EU, other countries may have similar or entirely different requirements, reinforcing that NIS2’s scope is primarily European in nature, yet it sets a robust example for the rest of the world.

What is NIS2, in Practical Terms

Imagine NIS2 as a “mandatory cybersecurity update” for European organizations, aimed at better protecting them from cyber attacks. It’s a European Union directive—“NIS” stands for “Network and Information Security”. NIS2 is simply the second version, more extensive and stringent than the previous 2016 NIS directive, and it entered into force on January 17, 2023. Importantly, it applies to businesses and entities operating within EU Member States, reflecting the EU’s decision to enforce cybersecurity obligations rather than leave them to chance. Companies outside the EU must follow their local or international regulations, which can vary significantly, but NIS2 is strictly about strengthening cyber resilience across the Union.

Why It Matters for Your Organization

Today, the dependence on digital technologies is total. If an organization’s IT systems fail because of an attack, the consequences can be severe: data loss, production shutdown, reputational damage, and huge costs. NIS2’s goal is to raise cybersecurity levels across Europe, making organizations more resilient and protecting the economy and society as a whole. This directive underscores that in the EU, cybersecurity is no longer optional—it’s a fundamental requirement. If your organization operates within any EU Member State or serves EU-based sectors covered by the directive, you may have legal obligations to adopt specific security measures. Even if you are not directly subject to EU law, understanding NIS2’s principles can help you align with emerging best practices, given the Union’s leadership in setting strong cybersecurity standards worldwide.

Who Does NIS2 Apply To? Who Should Be Concerned?

First of all, NIS2 only applies to organizations within the European Union. If your business operates outside the EU, you should follow your local regulations, which may have similar or entirely different requirements. In any case, NIS2 is a valuable reference for understanding the direction of global cybersecurity standards, and shall be considered as a best-practice whitepaper for any organization that wants to improve its security posture.

NIS2 delimits technical and organizational security measures for organizations in sectors deemed critical for society and the economy.

The directive’s scope is broad, covering a wide range of industries, from energy and transport to healthcare and digital services. NIS2 doesn’t cover every organization, but it applies to a much larger number than in the past. The directive identifies two main categories: "Essential Entities" and "Important Entities".

  • Essential Entities: Organizations considered critical for the country’s infrastructure and the functioning of the economy, such as:
    • Energy: Power grids, gas, energy generation plants (including nuclear).
    • Transport: Airports, ports, railways, large road operators.
    • Healthcare: Hospitals, clinics, labs.
    • Banking and Finance: Major banking institutions, stock exchanges.
    • Drinking Water: Operators managing water treatment and distribution.
    • Digital Infrastructure: Cloud providers, data centers, DNS operators.

Practical examples of “Essential Entities” include large energy companies, major airports, large hospital networks, important banking institutions, and cloud service providers (e.g., AWS, Microsoft Azure, Digital Ocean, OVH, etc.).

Whoever falls within “Essential Entities” must comply with NIS2, regardless of size, if operating in these critical sectors. As a rule of thumb, organizations with more than 250 employees or over 50 million euros in annual turnover are considered large, hence typically classified as “Essential.”

  • Important Entities: Organizations operating in sectors still considered relevant, though slightly less critical. Examples include:
    • Postal and courier services.
    • Waste management.
    • Production and distribution of certain critical chemicals.
    • Food manufacturing and processing (key for food security).
    • Pharmaceuticals and medical device companies.
    • Providers of ICT services (somewhat less critical than “Essential” digital infrastructure).
    • Public administration at regional/local levels.
    • Research and development in security.

Examples of “Important Entities” might be large logistics companies, major food manufacturers, pharmaceutical companies, large software houses, or regional administrations.

For “Important Entities,” NIS2 generally applies to organizations with over 50 employees or over 10 million euros in annual turnover.

NOTE: Even if your organization doesn’t neatly fit these categories, it’s critical to verify carefully. The full list and details can be found in the directive’s annexes. When in doubt, it’s best to get informed and prepared.

How Does an Organization Comply with NIS2?

NIS2 requires organizations to adopt concrete measures to protect their IT systems. These obligations primarily address:

  1. Risk Analysis and Management:
    You must identify your organization’s cyber risks (hacking, malware, data loss, etc.) and implement policies to minimize them. This includes:

    • Continuous risk assessment.
    • Backup and data recovery plans (business continuity).
    • Supply chain security (checking your vendors’ security).
    • Managing system vulnerabilities.
  2. Technical, Operational, and Organizational Security Measures:
    You must implement concrete actions, guided by best practices and cost considerations. Examples include:

    • Written and enforced cybersecurity policies.
    • Security incident management: procedures to detect, respond, and report attacks.
    • Physical security for servers and infrastructure.
    • Access control: who can access which IT systems.
    • Encryption: protecting sensitive data.
    • Employee training: making personnel aware of cyber risks and best practices.
    • Multi-factor authentication: preventing unauthorized logins.
    • Ongoing security updates: keeping software and systems patched.
  3. Incident Reporting:
    If a major cyber incident occurs, you must promptly notify the relevant national authority. Timing is strict:

    • Within 24 hours: an initial alert.
    • Further updates and a final report within one month.
  4. Liability of Top Management:
    NIS2 places direct responsibility on senior executives. They must ensure the organization implements proper security measures and be ready to respond to incidents. Essentially, managers have direct accountability for cybersecurity.

Deadlines and Possible Penalties

Each EU Member State is required to transpose NIS2 into its national legislation, setting out detailed deadlines and local processes. In general, once the directive’s rules fully apply:

  • Non-compliance can lead to substantial administrative fines. Up to:
    • For “Essential” entities: €10 million or 2% of worldwide annual turnover (whichever is higher).
    • For “Important” entities: €7 million or 1.4% of worldwide annual turnover (whichever is higher).

Besides financial penalties, there can be further consequences. Senior management may be held personally responsible if they fail to ensure compliance with the rules. Authorities can also impose binding corrective measures and, in extreme cases, temporarily suspend an organization’s operations.

Practical Tips for Executives

  1. Verify Immediately whether your company is covered by NIS2 (sector, size). Do not underestimate this step! Consult official documents or seek expert advice if unsure.
  2. If you do fall under the directive, start planning your compliance. Don’t wait. Assess your current security posture, identify gaps, and begin implementing the required measures.
  3. Engage top management. Cybersecurity must become a priority for the board and senior leadership.
  4. Train employees. Everyone should be cyber-aware. Cybersecurity is not just about tech staff but also about every worker who handles sensitive data or devices.
  5. Consider specialized consultants if cybersecurity is not your core business, to help with risk assessment and technical measures.

How to Embrace the Technological Switchover

NIS2 isn’t mere bureaucracy, but an investment in the security and resilience of your organization. Complying in time not only spares you from severe fines, it also protects your business and reputation in an ever more digital and threat-prone world.

Don’t view it as “just another regulatory requirement” but as an opportunity to strengthen your organization and make it more competitive. A key takeaway: cybersecurity is an investment, not a cost. In an interconnected and digital world, it’s an indispensable investment.


NIS2: Detailed Summary for Further Study

  1. Introduction and Regulatory Context
  2. Summary of the Rules and Official Documents
  3. List of Relevant Sectors and Subsectors
  4. Essential, Important, and Out-of-Scope Entities
  5. Obligations and Compliance Timelines
  6. Cybersecurity Measures and Incident Notification
  7. Enforcement Powers and Sanctions
  8. Practical Recommendations
  9. References

1. Introduction and Regulatory Context

Cybersecurity is now essential for the continuity of any business: a cyber attack can lead to operational downtime, reputational damage, and legal liability. It’s not just a “technical matter” to hand off to a few experts; it’s a strategic concern involving everyone, from top management to front-line operators.

The new Directive (EU) 2022/2555 (NIS2), which updates Directive (EU) 2016/1148 (NIS), aims to create a common level of cybersecurity across the EU. Each Member State is responsible for implementing national laws or regulations reflecting the directive’s objectives, with strict deadlines, potential mandatory registrations, and increased accountability for critical or important service providers.

Anyone within the scope of this regulation should note:

  • Compliance deadlines can be fairly tight.
  • Penalties can be significant.
  • Ignoring or postponing minimal security measures exposes your organization to massive risks.

2. Summary of the Rules and Official Documents

  • Directive (EU) 2016/1148 (NIS): the EU’s first comprehensive cybersecurity framework for networks and information systems.
  • Directive (EU) 2022/2555 (NIS2): imposes broader and stricter obligations, covering new sectors and expanding inspection powers.

For organizations unfamiliar with these documents, it’s advisable to follow a path guided by legal and cybersecurity professionals, with immediate engagement of top management to define resources, budget, and priorities.

2.A EU Directive 2022/2555 (NIS2)

2.A.1 Purpose and General Principles

The NIS2 Directive aims to:

  • Update and strengthen the security measures introduced by the previous NIS Directive (2016/1148).
  • Extend the scope to new sectors and types of services deemed critical.
  • Ensure a high level of cybersecurity throughout the European Union, contributing to the stability of the digital economy.

Each Member State must:

  1. Adopt national cybersecurity strategies, aligning them with the EU framework.
  2. Guarantee cooperation processes (information sharing and mutual support) between national and EU authorities.
  3. Strengthen its national cybersecurity agency, equipping it with the necessary powers.

2.A.2 Scope and Entities Involved

NIS2 applies to both public and private entities in key sectors: energy, transport, banking, healthcare, water, digital services, digital infrastructure, ICT services (managed services), public administration, and other critical industrial fields.

  • Essential: organizations of primary relevance (e.g., healthcare, energy, financial market infrastructures).
  • Important: entities with potentially major impact, though slightly lower criticality compared to “essential.”

The directive lays out distinct criteria for classifying entities based on:

  • Size (number of employees, turnover, geographic footprint).
  • Sector (NACE codes, operational domain).
  • Criticality of services for society and the economy.

2.A.3 Main Obligations

  1. Implementation of Adequate Security Measures

    • Technical and organizational measures to prevent and mitigate cyber threats.
    • Continuous monitoring for swift detection of anomalies or intrusions.
    • Adoption of best practices, international standards (e.g., ISO 27001, ENISA guidelines).
  2. Incident Reporting

    • Mandatory notification to the competent authority of any significant cyber incident within defined timelines (e.g., 24 hours after detection).
    • A subsequent detailed report addressing causes, impact, and response measures.
  3. Cooperation and Information Sharing

    • Establishing rapid communication channels between entities and national/EU authorities.
    • Sharing threat intelligence, vulnerabilities, indicators of compromise (IOC), etc.
  4. Internal Governance

    • Board-level involvement: senior executives are accountable for compliance and can be sanctioned in cases of negligence.
    • Ongoing staff training and periodic review of security policies.

2.A.4 Role of National Cybersecurity Authorities

NIS2 requires each Member State to:

  • Appoint a National Competent Authority with powers of oversight, inspection, and enforcement.
  • Designate a Single Point of Contact to liaise with the authorities of other EU countries and ENISA (the EU Agency for Cybersecurity).

ENISA provides technical and strategic support, promotes best practices, and coordinates EU-wide cybersecurity exercises.

2.A.5 Transposition Procedures

  • EU Member States must incorporate NIS2 into their domestic legal frameworks within 18 months of its official publication, defining:
    • Criteria for identifying essential vs. important entities.
    • Penalty regimes.
    • Incident-reporting procedures.

2.A.6 Coordination with Other Regulations

NIS2 aligns with:

  • The Cybersecurity Act (Regulation (EU) 2019/881), which defines a European cybersecurity certification framework.
  • The GDPR (Regulation (EU) 2016/679) on personal data protection.
  • Specific sector regulations (eIDAS, PSD2, etc.) that may add security or data-handling requirements.

2.A.7 Penalties

NIS2 demands effective, proportionate, and dissuasive sanctions, leaving specific penalty structures to each Member State. Larger companies can face turnover-based fines (similar to GDPR), while smaller ones may face fixed-sum penalties that can still be substantial.

2.A.8 Strategic Importance and Practical Implications

  • Safeguarding the economy and society: disruptions or attacks on critical services (energy, water, hospitals, transport) can have vast repercussions.
  • Executive responsibility: leaders can’t overlook cybersecurity as a purely technical domain; it’s part of overall risk management.
  • Market competitiveness: compliance with NIS2 proves reliability and security — factors increasingly valued by customers, investors, and partners.

2.A.9 Key Takeaways

  1. Broader scope: more sectors and more organizations face cybersecurity requirements.
  2. Stricter incident notifications: quicker, coordinated reporting of cyber incidents.
  3. Stronger enforcement: sanctions designed to be dissuasive and uniform across Member States.
  4. Collaboration: cross-border information sharing at national and EU levels.

Conclusion: NIS2 is a significant step toward bolstering EU-wide cyber resilience. Affected organizations should not underestimate its scope, as non-compliance entails financial, reputational, and legal risks.


2.C Differences Between EU Directive 2022/2555 (NIS2) and EU Directive 2016/1148 (NIS)

2.C.1 General Overview

Directive (EU) 2022/2555 (NIS2) updates and replaces Directive (EU) 2016/1148 (NIS). While both aim for a high level of cybersecurity across Member States, NIS2 introduces substantial changes in scope, stricter obligations, and increased enforcement.

2.C.2 Extended Scope

NIS (2016/1148):

  • Focused on operators of essential services (OES) and digital service providers (DSP) in sectors like energy, transport, banking, financial market infrastructures, healthcare, water, and digital services (cloud, search engines, online marketplaces).

NIS2 (2022/2555):

  • Covers a wider range of sectors and services, emphasizing digital infrastructure, managed security services, social networks, and industrial supply chains deemed critical.
  • Splits entities into essential and important, encompassing more organizations compared to the previous “operators of essential services” definition.

2.C.3 Newly Included Sectors

Moving from NIS to NIS2, additional sectors or previously peripheral ones are now explicitly covered:

  • Content Delivery Networks (CDNs)
  • Managed (Security) Service Providers
  • Social network platforms
  • Postal and courier services, waste management, public administration (central and local)
  • Manufacturing sectors such as medical devices or high-risk chemical production.

2.C.4 Stricter Security Requirements

NIS (2016/1148):

  • Required “appropriate technical and organizational measures” without spelling out detailed minimum standards or assessment benchmarks.

NIS2 (2022/2555):

  • More explicitly mandates risk management procedures (asset management, vulnerability disclosure, business continuity, continuous monitoring).
  • Emphasizes top-management engagement: board members and executives can be personally liable if security obligations are ignored.
  • Introduces “adequacy and proportionality” of measures, based on the critical nature of provided services.

2.C.5 New Incident Reporting Regime

NIS (2016/1148):

  • Mandated incident reporting for events significantly affecting service continuity, leaving Member States some leeway on thresholds and timing.

NIS2 (2022/2555):

  • Tighter deadlines: initial notification within 24 hours, followed by a detailed report within days.
  • Defines “significant incidents” more precisely, considering scale, severity, and impact.
  • Strengthens coordination between national authorities and ENISA for quicker threat information sharing.

2.C.6 Enhanced Inspection and Penalty Powers

NIS (2016/1148):

  • Member States had to introduce “effective, proportionate, and dissuasive” sanctions but had no unified model for calculating fines.

NIS2 (2022/2555):

  • Raises the upper limit of fines, taking cues from the GDPR model (global turnover-based).
  • Requires Member States to grant broad inspection and enforcement powers to national authorities.
  • Stresses personal liability for executives in cases of severe or repeated non-compliance.

2.C.7 Impact on SMEs and Micro-Enterprises

NIS (2016/1148):

  • Contained no explicit exemptions for micro or small enterprises, leaving leeway to each Member State.

NIS2 (2022/2555):

  • Retains a high level of scrutiny for organizations of any size that provide critical services.
  • Permits consideration of employee count and annual turnover to gauge the “proportionality” of measures and penalties, though this isn’t an automatic exemption.
  • Allows for some exceptions for micro/small firms if their activities do not critically affect essential sectors.

2.C.8 Governance and European Coordination

NIS (2016/1148):

  • Established the CSIRTs Network and the Cooperation Group among Member States, but with sometimes limited mandates.

NIS2 (2022/2555):

  • Strengthens ENISA as the central EU hub for technical expertise and coordination.
  • Streamlines cooperation procedures among Member States, promoting broader information exchange on threats, vulnerabilities, and incidents.

2.C.9 Practical Implications of NIS2 vs. NIS

The main changes underscore a clear move toward greater uniformity in cybersecurity management across Europe. Practically, this means:

  1. Inclusion of More Sectors and Entities
    Companies previously excluded now face obligations (e.g., social networks, CDNs, etc.).
  2. Stricter Enforcement
    NIS2 emphasizes truly “dissuasive” penalties, compelling Member States to adopt robust sanction regimes akin to the GDPR.
  3. Board-Level Accountability
    Governance is in the spotlight, with “cyber accountability” assigned to senior leadership.
  4. More Prescriptive Standards
    NIS2 offers clearer guidelines on security measures, incident reporting, and responsibilities, reducing discretionary interpretations.

In short, if the 2016 NIS Directive was the EU’s first major step into cybersecurity, the 2022 NIS2 Directive significantly broadens and deepens the obligation to protect critical infrastructure and essential services, adapting to the growing complexity of digital threats and recognizing the increasingly crucial role of IT services, online platforms, and tech supply chains.


3. List of Relevant Sectors and Subsectors

NIS2 applies to a wide range of sectors and subsectors. In many resources, organizations are grouped by size or nature:

  • NIS1 and CER-type operators
  • Large Enterprises
  • Medium Enterprises
  • Small and Micro Enterprises

Depending on the sector and organization size, they may be labeled:

  • Essential
  • Important (with the possibility that some mid-sized entities may be upgraded to “Essential” by national authorities)
  • Out of Scope (though smaller entities can still be placed under “Important” or “Essential” classification if governments deem them critical)

Below is an overview of the main sectors and related entity types (as commonly referenced in EU-level guidance):

3.1 Energy

  • Activities: electricity, district heating/cooling, oil, gas, hydrogen.
  • Classification (typical approach):
    • Large enterprises: Essential
    • Medium enterprises: Important (potentially “Essential” if critical)
    • Small/micro: Out of scope (except where crucial to the supply chain)

3.2 Transport

  • Activities: air, rail, waterway, major road transport; public transport.
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless identified as critical)

3.3 Banking

  • Activities: credit institutions.
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless otherwise determined)

3.4 Financial Market Infrastructures

  • Activities: trading venues, central counterparties.
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope

3.5 Healthcare

  • Activities:
    • Healthcare providers (hospitals, clinics, labs)
    • EU reference labs
    • R&D of pharmaceuticals
    • Manufacturers of basic pharmaceutical products and preparations
    • Critical medical devices in public health emergencies
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless designated otherwise)

3.6 Drinking Water and Wastewater

  • Activities:
    • Suppliers and distributors of water for human consumption (if deemed essential)
    • Organizations collecting, disposing of, or treating urban/domestic/industrial wastewater (if essential)
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless critical)

3.7 Postal and Courier Services

  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope

3.8 Waste Management

  • Activities: except where not deemed critical.
  • Classification:
    • Large and medium enterprises: Important (or “Essential” if recognized as highly critical)
    • Small/micro: Out of scope (with potential exceptions)

3.9 Chemicals

  • Activities: manufacturing, production, and distribution of chemicals, especially high-risk ones.
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope

3.10 Food Production, Processing, and Distribution

  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless identified as critical)

3.11 Manufacturing

  • Activities: medical/IVD devices, computer/electronics/optics, electrical equipment, automotive, aerospace, etc.
  • Classification:
    • Large/medium enterprises: Important (can be elevated to “Essential” if critical)
    • Small/micro: Out of scope (with exceptions)

3.12 Digital Service Providers

  • Activities:
    • Online marketplaces
    • Online search engines
    • Social network platforms
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless determined otherwise)

3.13 Research

  • Activities: scientific organizations, educational institutes with critical research.
  • Classification:
    • Large/medium entities: Important (can be “Essential” if designated)
    • Small/micro: Out of scope (unless reclassified)

3.14 Digital Infrastructures

  • Activities:
    • Top-level domain (TLD) name registries
    • Public electronic communications networks
    • Content delivery networks (CDNs)
    • Data center services
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless recognized as crucial)

3.15 ICT Service Management (B2B)

  • Activities: managed service providers (MSPs), managed security services (MSSPs).
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (with exceptions)

3.16 Public Administration

  • Activities: central and regional administrations, local governments.
  • Classification:
    • Often treated as Essential, given the institutional role, though small local offices might be classified differently.

3.17 Space Sector

  • Activities: ground-based infrastructure for satellites, mission support that impacts communications or security.
  • Classification:
    • Large enterprises: Essential
    • Medium enterprises: Important
    • Small/micro: Out of scope (unless otherwise designated)

4. Essential, Important, and Out-of-Scope Entities

A key criterion is strategic relevance:

  • Essential: of primary importance for society, the economy, health, or security — subject to the highest scrutiny and penalties.
  • Important: services or activities that can cause substantial impact but are slightly less critical than “essential.”
  • Out of scope: organizations not falling into the above categories. However, they may need to meet certain minimum security requirements if providing services to essential or important entities.

Practical note: The borderline between “out of scope” and “important” isn’t always clear. If you’re unsure, seek professional (legal or technical) advice to avoid risks.


5. Obligations and Compliance Timelines

Under NIS2, each Member State has its own specific timeline for enforcement and compliance, respecting the directive’s overall schedule. Typically:

  • Organizations falling within scope will need to comply with core security requirements and incident reporting obligations after the directive is transposed into national law.
  • Authorities will inspect and enforce compliance, imposing sanctions for breaches.

The best approach is to start early: the operational changes, security upgrades, staff training, and governance modifications often require substantial time to implement effectively.


6. Cybersecurity Measures and Incident Notification

NIS2 mandates that each organization adopt prevention, monitoring, and response measures against cyberattacks. Key focus areas:

  • Intrusion Detection (IDS/IPS) to spot malicious attempts.
  • Incident Response Plans to contain and manage breaches swiftly.
  • Secure Backups and disaster recovery to ensure business continuity.
  • Encryption of data in transit and at rest to protect confidential information.

Incident notification is also crucial: within 24 hours of identifying a serious incident, the organization must alert its designated national authority. Failing to report or delaying notification can lead to penalties (including large fines, and in some cases, personal liability if public safety or critical infrastructures are jeopardized).

6.1 The Role of the Technical Expert (Cloud, Cybersecurity, Backend)

In this regulatory framework, a technical specialist with skills in cloud computing, cybersecurity, and backend engineering is essential to achieve effective compliance and a swift response to incidents.

6.1.A Technical Architecture Design

  • Server Selection and Configuration: a backend engineer knows how to segment networks (VPC, subnets), configure firewalls, and isolate services (on-prem, private, or public cloud).
  • DNS and Critical Infrastructures: DNS configuration must be secure and redundant (to avoid hijacking or downtime from DoS).
  • Scalable Architectures: from a cloud perspective, auto-scaling, load balancing, and multi-region deployments are vital to fulfill continuity requirements under NIS2.

6.1.B Application and Backend Security

  • Secure Coding: adopting best practices (e.g., OWASP Top 10) to prevent SQL injection, XSS, CSRF.
  • Access Control (IAM): setting granular roles and permissions with robust authentication and authorization, avoiding hard-coded credentials or weak password policies.
  • Logging and Tracing: every operation (API call, database query, remote access) should be logged to enable forensic analysis and meet potential inspection demands.

6.1.C Monitoring and Incident Response

  • Centralized Monitoring Systems: SIEM (Security Information and Event Management) solutions or similar log management to detect anomalies in real time.
  • Rapid Response Plan: in case of data breach or DDoS, a runbook describing how to isolate and contain the threat, restore systems, and file official incident reports within 24 hours.
  • Regular Security Testing: vulnerability assessments, penetration tests, and simulation drills help identify weaknesses and fix them proactively.

6.1.D Cloud Services Management

  • Choosing Compliant Providers: selecting certified cloud services (ISO 27001, SOC 2, etc.) eases alignment with NIS2 requirements and assures inbuilt security features (e.g., encryption, GDPR compliance).
  • Encrypt at Rest and in Transit: employing KMS (Key Management Service) for data-at-rest encryption and TLS/SSL for transport, reducing the risk of data interception or tampering.
  • Multi-Region Resilience: replicating data and services across different geographic zones for higher availability, mitigating natural disasters or large-scale attacks on a single region.

6.1.E Collaboration with the Designated Contact Point

  • Information Sharing: the technical expert supports the contact point by providing key details (public IP ranges, active domains, network architecture) and technical incident reports.
  • Notification and Escalation: if a threat or breach emerges, the IT professional coordinates technical teams and ensures timely escalation for official reporting.
  • Audits and Compliance: for inspections or verifications, the expert prepares technical documentation, security reports, and logs to prove compliance with the directive’s criteria.

6.2 Operational Checklist

In practice, successful Cybersecurity Measures implementation and Incident Notification under NIS2 hinge on synergy between management, the designated contact point, and skilled IT staff. The cloud/cybersecurity/backend specialist helps:

  1. Design and maintain robust, secure architectures.
  2. Integrate defensive measures throughout the software lifecycle.
  3. Monitor systems continuously and respond effectively to attacks.
  4. Ensure operational continuity, legal compliance, and protection of corporate and customer data.

Fulfilling these obligations is not just a regulatory necessity; it’s an investment in reliability and market credibility, reducing downtime and penalty risks, and boosting your organization’s overall digital resilience.


7. Enforcement Powers and Sanctions

National authorities (or other relevant bodies) can:

  • Verify the correct implementation of security measures.
  • Demand documentation and audits.
  • Impose administrative fines (often a percentage of annual revenue).
  • In severe violations, they may:
    • Suspend specific operations.
    • Hold senior executives personally responsible if they failed to oversee compliance.
    • Potentially refer cases for criminal investigation if public safety or critical infrastructure is endangered.

Remember: cybersecurity is no longer a “nice-to-have” but a legal requirement, and non-compliance can trigger grave economic and legal repercussions.


8. Practical Recommendations

  1. Start Now

    • Even if deadlines seem distant, the work is substantial (technical, legal, training).
  2. Educate Your Team

    • Everyone must grasp phishing, malware, and social engineering risks.
    • One careless user can undermine even the best security systems.
  3. Define Roles and Responsibilities

    • Formally appoint a contact point or security lead with clear authority.
    • Provide them with resources to act effectively.
  4. Incident Response Plan

    • Lay out procedures for handling attacks or data breaches.
    • Conduct regular drills to test your plan.
  5. Monitor and Update

    • Security is never static. Systems, procedures, and training must be continually refined.
    • Threats evolve, and so should your defenses.

9. References