Getting Started with NIS2
The NIS2 Directive (EU 2022/2555) expands EU cybersecurity obligations to a much wider range of sectors than the original NIS Directive. Member states were required to transpose NIS2 into national law by October 17, 2024. If you are an essential or important entity, you are now subject to enforceable cybersecurity requirements — including mandatory incident reporting and potential personal liability for management. Matproof maps NIS2 requirements to a set of controls, policies, and incident workflows so you can demonstrate compliance to your national competent authority (NCA).Activate NIS2 under Settings → Frameworks → NIS2. Your control set will be pre-populated and mapped to the 10 minimum security measures under Article 21.
Am I in Scope?
NIS2 distinguishes two tiers of entities:Essential Entities (EE)
Subject to proactive supervision and higher penalties (up to €10M or 2% of global annual turnover, whichever is higher):- Energy (electricity, oil, gas, hydrogen, district heating and cooling)
- Transport (air, rail, water, road)
- Banking (credit institutions)
- Financial market infrastructures
- Health (hospitals, laboratories, pharma manufacturers)
- Drinking water supply and distribution
- Wastewater collection, disposal, and treatment
- Digital infrastructure (DNS, TLDs, cloud computing services, data centres, CDNs, trust services, IXPs, electronic communications networks and services)
- ICT service management (MSPs, MSSPs)
- Public administration (central government)
- Space
Important Entities (IE)
Subject to reactive supervision (lower penalties — €7M or 1.4% of global annual turnover, whichever is higher):- Postal and courier services
- Waste management
- Chemicals manufacturing and distribution
- Food production and distribution
- Manufacturing (medical devices, computer/electronic products, electrical equipment, machinery, motor vehicles, other transport equipment)
- Digital providers (online marketplaces, search engines, social networks)
- Research
The 10 NIS2 Minimum Security Measures
Article 21 requires essential and important entities to implement these 10 measures:| # | Measure | Matproof Module |
|---|---|---|
| 1 | Policies on risk analysis and information system security | Policies, Risk Management |
| 2 | Incident handling | Incidents |
| 3 | Business continuity (BCP, DR, crisis management) | Policies, Controls |
| 4 | Supply chain security (ICT product/service security) | Vendor Risk |
| 5 | Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure | Controls |
| 6 | Policies to assess effectiveness of cybersecurity measures | Audit Programs |
| 7 | Basic cyber hygiene practices and cybersecurity training | People, Policies |
| 8 | Policies and procedures on cryptography and encryption | Policies, Controls |
| 9 | Human resources security, access control policies, asset management | People, Controls |
| 10 | Multi-factor authentication or continuous authentication, secured voice, video and text communications, and secured emergency communication systems | Controls, Evidence |
Management Accountability
NIS2 introduces management accountability with potential personal liability. Governing bodies:- Must approve cybersecurity risk management measures
- Are liable for infringements by the entity
- Must undergo cybersecurity training
- The scope of personal liability depends on national transposition of the Directive.
Recommended Implementation Plan
Identify whether you are an essential entity or important entity based on your sector and size. Register with your national competent authority (NCA) — most member states require self-registration. Check your national NIS2 transposition law for deadlines and registration requirements.
NIS2 Article 21(1) requires risk management measures proportionate to the risks. Start with a formal risk assessment:
Assign each policy to a member of the management body as owner — this documents management accountability.
If the incident is still ongoing when the final report is due, submit a progress report instead, then a final report within one month of handling the incident.
The 24-hour early warning obligation is stricter than most other frameworks. Do not wait for full investigation — the early warning only requires that you are aware of the incident and its basic nature.
NIS2 Article 21(2)(d) specifically requires supply chain security. This is one of the most operationally demanding requirements.
NIS2 requires cybersecurity awareness training for all staff and specialized training for management.
Incident Reporting Quick Reference
| Trigger | Timeline | Action |
|---|---|---|
| Significant incident detected | T+0 | Classify the incident, initiate internal escalation |
| Within 24 hours | T+24h | Send early warning to NCA/CSIRT (whether suspected unlawful/malicious cause, whether cross-border impact possible) |
| Within 72 hours | T+72h | Send incident notification (updated assessment, indicators of compromise) |
| Within 1 month | T+1 month | Send final report (root cause, remediation, lessons learned). If the incident is still ongoing when the final report is due, submit a progress report instead, then a final report within one month of handling the incident. |
Key Differences from NIS1
If you were already compliant with the original NIS Directive:| Area | NIS1 | NIS2 |
|---|---|---|
| Scope | 7 sectors | 18 sectors |
| Notification deadline | ”Without undue delay” | 24h early warning + 72h notification |
| Management liability | No | Yes — personal liability |
| Supply chain | Recommended | Mandatory measure |
| Penalty | National law | Up to €10M/2% global turnover |
| Enforcement | Reactive | Proactive for essential entities |
Next Steps
- Incidents — configuring NIS2-compliant incident classification and multi-stage reporting
- Vendor Risk — supply chain security assessments and monitoring
- People Module — employee training records and access management
- Risk Management — risk assessments proportionate to your sector