From NIS to NIS 2: How to navigate the updated directive

by SecureSlate Team in NIS 2
4.7(164 reviews)

Photo: Unsplash

The Network and Information Security 2 (NIS 2) directive is the successor to the original NIS directive. Its goal is to raise baseline cybersecurity and resilience across EU Member States, especially for organizations whose disruption would have outsized impact.

NIS 2 expands the original directive with a broader scope, clearer minimum security measures, more formal governance, faster incident reporting, and stronger enforcement. For many teams, the hardest part is turning “requirements” into an auditable operating model.

This guide covers what changed from NIS to NIS 2, the compliance challenges you’re likely to hit, and practical strategies to stay on track as national implementations come into force.

Related guides:

When a “simple” directive turns into a program

GIF via GIPHY


Key takeaways

  • NIS 2 expands scope and introduces essential vs important entities, changing who must comply and how supervision works.
  • NIS 2 clarifies minimum security measures (risk management, continuity, supply chain, secure development, training, encryption, access control, MFA, and more).
  • Incident reporting is faster and more structured, with key milestones at 24 hours, 72 hours, and a final report within 30 days.
  • Governance is tighter, including more explicit oversight expectations and accountability for leadership.
  • Compliance succeeds when you operationalize evidence: defined scope, mapped controls, assigned owners, tested processes, and continuous monitoring.

The original NIS directive at a glance

Adopted in 2016, the original NIS directive was the EU’s first wide-reaching cybersecurity legislation. It aimed to improve baseline security and cooperation across Member States.

NIS focused on two groups:

  • Operators of essential services (OES), such as energy, transport, banking, and healthcare
  • Digital service providers (DSPs), such as online marketplaces, search engines, and cloud computing services

In practice, NIS was a meaningful step forward, but it left room for uneven interpretation. Definitions and scope weren’t always applied consistently across Member States, which reduced the directive’s ability to deliver a uniform security baseline.


Why NIS 2 replaced NIS

As cyber threats became more frequent and complex, the limitations of “first-generation” NIS became clearer. Organizations needed tighter requirements, better cross-border coordination, and more consistent enforcement.

NIS 2 (introduced in 2022) was designed to close those gaps. It entered into force on January 16, 2023, and Member States were required to transpose it into national law by October 17, 2024.

National implementations vary, but the direction is consistent: stronger governance, broader scope, and higher expectations for risk management and reporting.


NIS vs NIS 2 — key changes and what they mean

NIS 2 is a more comprehensive directive intended to strengthen:

  • Cooperation and coordination across EU Member States
  • Supply chain and third-party security
  • Accountability at the top management level
  • Clarity on minimum security measures and reporting obligations

Below are the most important updates and what they imply operationally.

1) Clearer security requirements

Under NIS, Member States had significant latitude in interpreting “appropriate and proportionate” measures. That variability made it harder for organizations operating across borders to know what “good” looked like.

NIS 2 clarifies a set of minimum cybersecurity risk management measures. Practically, teams should be ready to evidence capabilities across:

  • Security policies and risk analysis
  • Incident handling
  • Business continuity (backups, crisis management, disaster recovery)
  • Supply chain security (including supplier relationships)
  • Secure acquisition, development, and maintenance, including vulnerability handling
  • Effectiveness testing for risk management measures
  • Training and cyber hygiene
  • Cryptography and encryption (where applicable)
  • Asset management, access control, and HR security
  • Strong authentication (e.g., MFA), secure communications, and emergency comms

Tip: turn each requirement into (1) a control, (2) an owner, (3) evidence, and (4) a test cadence. That’s how you avoid “policy-only” compliance.

2) Expanded scope (essential vs important entities)

NIS 2 expands the list of covered sectors and introduces two categories:

  • Essential entities: larger organizations in critical sectors (e.g., energy, water, healthcare, finance, public administration). They typically face more intensive supervision.
  • Important entities: organizations in sectors whose disruption is serious but generally less critical than essential entities (e.g., manufacturing, postal and courier, waste management, food, space, many digital services).

NIS 2 is largely size-driven, but it can also apply to smaller organizations based on criticality. Some small or micro entities can be in scope if they provide highly impactful services (for example, certain digital infrastructure services).

Your first task should be scoping: entity classification, services, systems, and supply chain boundaries. Everything else depends on it.

3) Stronger governance and oversight

NIS required Member States to establish core structures like:

  • CSIRTs (Computer Security Incident Response Teams)
  • A National Competent Authority (NCA)
  • A Single Point of Contact (SPOC)

NIS 2 further clarifies supervisory expectations and adds the EU-CyCLONe (European cyber crisis liaison network) to improve coordination during large-scale incidents.

For organizations, the key change is governance maturity: defined decision-makers, documented escalation paths, tested incident processes, and leadership accountability.

4) Stricter incident reporting timelines

NIS required reporting of significant incidents, but “significant” was not always consistently interpreted. NIS 2 reduces ambiguity by tying significance to material impact and harm to affected parties.

NIS 2 also formalizes a reporting sequence. Your national implementation may refine details, but teams should plan for the following cadence:

Report type Timeframe What it includes
Early warning Within 24 hours of becoming aware Initial impact assessment and whether malicious actors are suspected
Incident notification Within 72 hours of becoming aware Updated assessment, severity evaluation, and likely indicators/points of compromise
Final report Within 30 days from incident notification Root cause, impact, measures taken/ongoing, and cross-border effects (if any)

Operationally, this requires more than a ticketing workflow. You need detection, triage, comms approvals, evidence capture, and a repeatable “reporting pack” process.

5) Higher and more consistent penalties

Under NIS, penalties varied significantly across Member States. NIS 2 pushes toward more consistent enforcement tools, typically including:

  • Non-monetary measures (binding instructions, compliance orders, audits, and customer notifications)
  • Administrative fines, often differentiated by essential vs important entities
  • Management accountability measures in cases of serious or repeated non-compliance

The most expensive outcome is rarely the fine itself. It’s the operational disruption from audits, remediation orders, and reputational impact after a public incident.


The hardest parts of shifting to NIS 2

NIS 2 is a strong step toward standardization, but it still leaves room for interpretation. Many organizations struggle with the gap between “requirements” and “implementation details.”

Common friction points include:

  • Scoping and classification across complex groups and services
  • Translating requirements into controls and evidence
  • Supply chain mapping beyond direct vendors
  • Integrating controls across fragmented systems and teams
  • Maintaining audit-ready proof continuously, not just at assessment time

If you already operate a mature framework (like ISO 27001), the transition can be smoother. You can often reuse governance, risk, and control structures, then close directive-specific gaps.


Practical strategies to simplify NIS 2 compliance

  1. Start with scope and ownership
    Define what’s in scope, who owns each requirement, and what “done” means in evidence terms. Avoid “everyone owns it,” which means nobody does.

  2. Map requirements to controls and systems
    Create a crosswalk from NIS 2 measures → your control set → the systems and processes that generate evidence. Don’t rely on narrative documents alone.

  3. Build an incident reporting playbook
    Pre-write templates, approval paths, and a “minimum viable reporting pack.” Run tabletop exercises to validate that you can hit the 24/72-hour milestones.

  4. Treat vendors like a program, not a spreadsheet
    Segment critical suppliers, define security expectations, and collect evidence on a cadence. Track remediation like you would internal findings.

  5. Shift from point-in-time to continuous
    Automate evidence where possible, define control testing frequency, and keep a single source of truth for policies, exceptions, and proof.


Streamline NIS 2 readiness with SecureSlate

NIS 2 compliance is easier when your program is structured around controls, owners, and continuously verifiable evidence—not scattered documents.

SecureSlate helps teams centralize and operationalize compliance work by:

  • Mapping NIS 2 measures to actionable controls and owners
  • Collecting and organizing audit evidence in one place
  • Supporting continuous monitoring and ongoing readiness workflows
  • Reducing duplicative work across aligned frameworks (like ISO 27001 and DORA)

If you’re preparing for NIS 2, SecureSlate can help you move faster with less rework. Request a demo to see how it fits your environment.


FAQ: NIS 2 transition

When does NIS 2 apply?
NIS 2 is an EU directive implemented through national law. Your obligations depend on your Member State’s transposition and your entity classification and services.

What’s the biggest difference vs NIS?
Scope and operational expectations. NIS 2 broadens coverage, clarifies minimum measures, tightens governance, and accelerates incident reporting.

Do smaller organizations need to comply?
Often NIS 2 targets medium and large organizations, but smaller entities may be in scope depending on sector and criticality of services.

What should we do first?
Confirm scope, classify the entity (essential vs important), inventory critical services and systems, and build a control-and-evidence plan tied to reporting timelines.


Disclaimer (legal note)

This article is for informational purposes only and does not constitute legal advice. NIS 2 obligations vary by Member State implementation and organizational context. Consult qualified legal counsel for guidance on your specific requirements.

Need compliance without the complexity?

SecureSlate automates ISO 27001, SOC 2, GDPR, HIPAA, and more. Built for growing teams. See it in action.

No credit card required

Filed under: NIS 2

Author: SecureSlate Team

Related blogs