The European Union’s Network and Information Security Directive (NIS) is a legislative act that aims to achieve a high common level of cybersecurity for organizations across the European Union. Originally adopted in 2016, NIS relied heavily on the discretion of individual member states and lacked accountability.
On January 16, 2023, in response to growing threats posed by increasing digitalization and the surge in cyber-attacks, the EU adopted NIS2 to strengthen security requirements and cyber resilience. The EU’s 27 Member States have until October 17, 2024 to transpose the NIS2 Directive into applicable, national law.
NIS2 expands the original NIS Directive to cover more industry sectors, with additional risk-management measures and incident reporting obligations. It also provides for stronger enforcement. NIS2 adds to NIS in 4 key areas:
NIS2 has expanded the directive's scope from 7 sectors to 18. The previous version of NIS identified healthcare, transport, digital infrastructure, water supply, banking, financial market infrastructure, and energy as essential sectors. NIS2 adds digital service providers, waste management, pharmaceutical and labs, space, and public administration to the ‘Essential’ sectors category. NIS2 also adds an ‘Important’ sector category, including public communications providers, chemicals, food producers and distributors, critical device manufacturers, social network and online marketplaces, and courier services.
Essential entities must comply with supervision requirements, while important entities will only be subject to ex-post supervision. Ex-post supervision means that supervision action will be taken only if authorities receive evidence of non-compliance.
Article 21 of NIS2 states, “Member States shall ensure that essential and important entities take appropriate and proportionate technical, operational, and organizational measures to manage the risks posed to the security of network and information systems which those entities use for their operations or the provision of their services and to prevent or minimize the impact of incidents on recipients of their services and on other services.” The goal of Article 21 is to protect network and information systems and the physical environment of those systems from incidents and shall include at least the following:
(a) policies on risk analysis and information system security;
(b) incident handling;
(c) business continuity, such as backup management, disaster recovery, and crisis management;
(d) supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers;
(e) security in the network and information systems acquisition, development, and maintenance, including vulnerability handling and disclosure;
(f) policies and procedures to assess the effectiveness of cybersecurity risk-management measures;
(g) basic cyber hygiene practices and cybersecurity training;
(h) policies and procedures regarding the use of cryptography and, where appropriate, encryption;
(i) human resources security, access control policies, and asset management;
(j) the use of multi-factor authentication or continuous authentication solutions, secured voice, video, and text communications, and secured emergency communication systems within the entity, where appropriate.
Article 23 of NIS2 requires that every significant cybersecurity incident “…that has a significant impact on the provision of their services…” be reported, whether or not the attack actually affected the entity’s operations. The most significant change around incident reporting is how the NIS2 Directive details the mandatory multi-stage incident reporting process and the content that must be included.
Within 24 hours. An initial report must be submitted to the competent authority or the nationally relevant CSIRT within 24 hours of a cybersecurity incident. The initial report should provide an early warning where there may be cross-border impact or maliciousness involved. This first notification is intended to limit the potential spread of a cyber threat.
Within 72 Hours. A more detailed notification report must be communicated within 72 hours. It should contain an assessment of the incident, including its severity, impact, and indicators of compromise. The impacted entity should also report the incident to law enforcement authorities if it was criminal.
A final report must be submitted within one month after the initial notification or first report. This final report must include:
Additionally, under the NIS2 Directive, entities must report any major cyber threat they identify that could result in a significant incident. A threat is considered significant if it results in:
Failure to comply with the NIS2 Directive comes with stricter penalties than NIS. Under the NIS2 Directive, penalties for non-compliance differ for essential entities and important entities.
Discover how organizations comply with the NIS2 Directive through our comprehensive cybersecurity solutions and learn more about NIS2 requirements.
Thales and Imperva, a Thales company, deliver a broad portfolio of complementary application security, data security, and identity & access management products to provide a comprehensive solution that helps address NIS2 requirements. We can help Essential and Important entities in complying with NIS2 by addressing essential cybersecurity risk-management requirements under article 21 and helping organizations produce complete, accurate and timely reports to meet article 23 requirements.
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, a secure Content Delivery Network (CDN), and Runtime Application Self-Protection (RASP).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies, Multi-Factor Authentication and phishing-resistant PKI/ FIDO hardware devices that help ensure that the right user is granted access to the right resource at the right time.
Data Security
Identity & Access Management
Identity & Access Management