Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Fortinet 970x120px
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

Riccardo Nuti : 15 November 2025 15:22

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Union ( EU Directive 2022/2555 ) on 27 December 2022. The NIS2 Directive amends Regulation (EU) No. 910/2014 and Directive (EU) 2018/1972, and indicates its implementation by the EU Member States by 17 October 2024.

Going Beyond NIS1 (2016)

Like all documents relating to technology, but especially digital security, they must not be monolithic and definitive, but must take into account the technological, sociological (e.g., COVID pandemic), geopolitical (e.g., war in Ukraine) contexts and any potential improvements related to the “applicability” and “application” of the specific legislation in question.

The overall scenario, from the perspective of equipment and related technological infrastructure, presents a growing overall risk, unlike anything seen in previous years. Member states, and therefore the European Union, have felt the need to increase their capacity for resilience, response, and risk sharing. This means increasing interactions between states to respond to threats in a unified manner, sharing information and taking timely action to reduce the risk to individual stakeholders from cyber attacks or, more generally, from unintended situations of degradation or disruption of the operational functionality of equipment and systems, such as businesses and public administrations, which are the first to be exposed to cyber threats.

Why NIS2

The main elements that led to the re-issuance of the NIS2 were:

  • A new classification of entities operating within individual Member States, known as Essential Entities (EE) and Important Entities (IE), superseding the previous classification of OSEs (Essential Service Operators) and FSDs (Digital Service Providers). This requirement arises from a lack of differentiation between OSEs and FSDs ” which has proven to be obsolete, as it does not reflect the actual importance of sectors or services for social and economic activities in the internal market ” (recital 7). This distinction, in addition to eliminating uncertainties and providing uniformity in the identification of the type of services (Essential or Important), mainly affects the supervisory mechanisms applied and is not linked to notification obligations or the application of particular security measures.

The distinction between Essential and Important Entities depends on the service offered, its size in terms of employees and revenue, and its criticality. Regarding size, their identification is left to the Member States, but at the same time, in order to avoid uncertainty on the part of individual States and inconsistencies in the application of the Directive in question, the Directive refers to Commission Recommendation 2003/361/EC (Article 2, paragraph 1) for the objective and uniform identification of a threshold criterion with which companies are promptly identified as “medium-sized enterprises” or those that exceed the thresholds for medium-sized enterprises. In this regard, the EU also provides that individual Member States may include, regardless of their size, small and micro enterprises in the application of the said Directive if, due to their criticality, they fulfil key roles ” for society, the economy or for particular sectors or types of service ” (recital 7);

  • Introduction of additional entities performing important functions , in addition to the previous Directive, to ensure the operational continuity and resilience of services deemed essential to the proper functioning of a nation. Specifically, Annex 1 lists the newly introduced “Highly Critical Sectors” as: “Wastewater,” “Management of ICT (Information and Communication Technologies) Services,” and “Public Administration and Space.” Annex 2 lists the newly introduced “Other Critical Sectors” as: “Postal and Courier Services,” “Waste Management, Research, Manufacturing, Production, and Distribution of Chemicals,” and “Food Production, Processing, and Distribution.”

For the sake of completeness, additional services already present in the previous Directive are listed, again divided into “Highly Critical Sectors” and “Other Critical Sectors.” The first group includes the following services: “Energy,” “Transport,” “Banking,” “Financial Market Infrastructure,” “Healthcare,” “Drinking Water,” and “Digital Infrastructure.” The second group includes the services “Manufacturing” (of healthcare systems, computers, electronic equipment, means of transport, motor vehicles, etc.), “Digital Service Providers,” and “Research.”

The NIS2 Directive does not apply to public administration bodies whose entities operate predominantly “ in the areas of national security, public safety, defence or carry out law enforcement activities, including the prevention, investigation, detection and prosecution of criminal offences ”;

  • The Directive further specifies the supervisory regime for Essential Persons and Important Persons . In particular, the former are entitled to a ” comprehensive, ex-ante and ex-post supervisory regime ” (Article 32); while “Important Persons” should be subject to a ” light, ex-post only supervisory regime ” (Article 33), which intervenes in the event of findings or reports of non-compliance. The latter should, in practice, have a “reactive” supervisory regime, whose action can be triggered by evidence, indications, or information brought to the attention of the authorities, which evidence can identify possible violations of the Directive in question.

Individual Member States must ensure that the supervisory or enforcement measures imposed on Essential and Important Persons, in relation to the obligations set forth in the NIS2 Directive (with particular reference to Articles 21 and 23), ” are effective, proportionate, and dissuasive, taking into account the circumstances of each individual case ” (Article 32, paragraph 1). Specifically, Member States, through their competent national authorities (for Italy, the National Cybersecurity Agency), may decide to subject Essential Persons to: on-site inspections, security audits, ad hoc audits, security scans, and requests for information necessary to evaluate the cybersecurity risk management measures adopted.

If, after the investigations, the measures adopted prove ineffective, the Member State shall ensure that its competent authority (i.e., the ACN) has the power to set a deadline by which an Essential Person is required to implement binding actions and report on their implementation. Even for Important Persons, if they fail to comply with the NIS2 Directive, the competent authorities must act promptly through ex-post supervisory measures, taking into account, as already mentioned, the application of controls that are “effective, proportionate, and dissuasive.”

  • The “Notification Obligations” are time-bound (Article 23). In particular, Essential and Important Persons must promptly notify the CSIRT (Computer Security Incident Response Team) or the competent authority of any incident that significantly impacts the provision of their services. Specifically:
    • within 24 hours of becoming aware of the significant incident with an early warning assessment which may indicate whether it is the result of an illegitimate or malicious act and whether the initial steps can determine a possible cross-border impact;
    • within 72 hours in order to update and add information to that already sent upon detection of the significant incident, including its severity and its impact at the time detected, as well as, equally important for the IoC (Indicator of Compromise) community;
    • Within one month of the transmission of the incident notification, the submission of a final report containing: i) a detailed description of the incident; ii) the severity and impact; iii) the type of threat or cause that likely triggered the incident; iv) any transboundary impact.

If the incident is not concluded by the time of the final report, the interested parties must provide a report on the situation and progress achieved up to that point, submitting ” the final report within one month of managing the incident .” Finally, between the notification “within 72 hours” and the “final report,” the CSIRT or, alternatively, the competent authority, may request intermediate status reports on the status of incident management.

  • With NIS2, the EU intended to establish a minimum and objective form of administrative sanctions in the event that Essential and Important Persons are subject to violations of the Directive, with particular reference to Articles 21 and 23 (respectively, “Cybersecurity risk management measures” and “Incident reporting obligations”). This form of sanctions must ensure that ” they are effective, proportionate and dissuasive, taking into account the circumstances of each individual case ” (Article 34, paragraph 1). Essential Persons, if they infringe the requirements of the said Directive, may be subject to administrative pecuniary sanctions ” up to a maximum of at least 10,000,000 euros or up to a maximum of at least 2% of the total worldwide annual turnover for the preceding financial year of the undertaking to which the essential person belongs, whichever is higher ” (Article 34, paragraph 4). Similarly, Important Persons may be subject to administrative pecuniary sanctions ” up to a maximum of at least 7,000,000 euros or up to a maximum of at least 1.4% of the total worldwide annual turnover of the undertaking to which the important person belongs for the preceding financial year, whichever is higher ” (Article 34, paragraph 5). Member States shall lay down internal ” rules on penalties applicable to infringements of the national measures adopted pursuant to this Directive and shall take all measures necessary to ensure that they are implemented “. These rules and measures shall be communicated to the Commission by 17 January 2025 (Article 36);
  • Emphasize and strongly encourage information sharing within each Member State. This sharing must also be implemented among the 27 EU Member States and with any potential third countries whose objectives and capabilities may be reflected in this Directive. For example, the reporting of incidents without undue delay to the CSIRT or to a “common recognized access point ” is emphasized. As a further step, and similarly at the national level, the Directive calls, also with the support of ENISA (European Union Agency for Cybersecurity), for the creation of an automatic and direct communication mechanism between Member States for the transversal and timely sharing of information on risks, threats, and incidents, with the aim of effectively and promptly countering any unwanted security event. In relation to this latter aspect, to facilitate greater transversal discussion and networking among Member States, the ” European Network of Cyber Crisis Liaison Organizations (EU-CyCLONe )” was created. The network was launched in 2020 and formalized on January 16, 2023, with the entry into force of NIS2 (Article 16). Finally, the Directive, while encouraging the disclosure of information to effectively and promptly counter cyber threats at the European level, also considers the opportunity for individual states to prohibit, or potentially limit, the disclosure of information that is harmful to the national interests of the individual Member State (e.g., ” classified information, non-disclosure agreements “).

The fundamental pillars of NIS2

Beyond the considerations that have led to a greater redefinition and direction of the NIS2 Directive to avoid uncertainty and inconsistency, as well as to provide a minimum basis for common treatment among Member States on cybersecurity issues, it is also necessary, and above all, to highlight and recognize the presence of six fundamental pillars that significantly characterize the essence of the Directive in question.

Corporate Governance

With the NIS2 Directive, Member States become promoters of pursuing increased capacity to prevent and manage cyber incidents among individual Essential and Important Entities (Article 20). Corporate management bodies can no longer delegate to information systems and/or network managers the objectives, priorities, and measures to be implemented to ensure corporate security. In this regard, the Directive requires that the same managers, who compose and contribute to the definition and direction of the governance of Essential and Important Entities, be specifically trained to support their awareness of cybersecurity process management, i.e., the governance of risk approval activities, decisions supporting measures, and their supervision.

Similarly, training must be provided periodically to their employees to develop the knowledge and skills needed to recognize and identify risks. They must be aware of risk management practices and the associated impacts on the services provided should they occur. In practice, it is necessary to foster cross-sectoral and vertical growth in cyber risk management among all stakeholders involved in that service, starting with management bodies and including those responsible for implementing and monitoring the approved and applied measures.

Multi-risk management

The risks affecting companies or public administrations that qualify as Essential or Important Persons can be endogenous or exogenous. For example, the former may include human error by an operator or a dissatisfied employee, as well as technical issues (software malfunctions and updates, imperfect/lack of maintenance). The latter may include natural phenomena (e.g., earthquakes, floods), malicious events (hackers or activists), and geopolitical situations (e.g., hybrid warfare). Examples have been provided, and this is not an exhaustive list of the risks affecting Essential or Important Persons. However, it is important to highlight the multiple risks that must be identified, analyzed, and assessed. To this end, the NIS2 Directive, which goes beyond a purely technical risk assessment, addresses the management of the service offered as an ecosystem that can be subject to a “multi-risk” analysis approach (Article 21).

The safety requirements

Security requirements are of particular importance since the Directive seeks to provide two important guidelines. The first is that Member States ensure that the technical, operational, and organizational security measures adopted by Essential and Important Entities are adequate and proportionate to the management of risks related to the security of the information and network systems that effectively support the services provided by those entities. These measures must not only prevent activities and events that could result in partial or total service interruptions, but also minimize the impact on the efficiency and performance of their services and any other related services.

The Directive does not address technical security measures in absolute terms, but focuses on their implementation and enforcement in relation to ” the entity’s degree of exposure to risk ,” the size of the entity implementing them, the probability of an abnormal event occurring, and also identifies its severity in terms of social and economic impact. The second indication is that the Directive requires Member States to adopt, as part of so-called multi-risk management, a set of minimum measures on specific aspects to be analyzed and applied in order to effectively and promptly counter potential unwanted events; In particular, the specific aspects indicated by the directive in question are: “ a) risk analysis and information systems security policies; b) incident management; c) business continuity, such as backup management and disaster recovery, and crisis management; d) supply chain security, including security aspects of the relationship between each entity and its direct suppliers or service providers; e) security of the acquisition, development, and maintenance of information technology and network systems, including vulnerability management and disclosure; f) strategies and procedures for evaluating the effectiveness of cybersecurity risk management measures; g) basic cyber hygiene practices and cybersecurity training; h) policies and procedures regarding the use of encryption and, where appropriate, encryption; i) human resources security, access control strategies, and asset management; j) use of multi-factor or continuous authentication solutions, secure voice, video, and text communications, and secure emergency communication systems by the entity internally, where applicable.”

Another area of concern introduced by the Directive under consideration concerns the potential vulnerabilities that may arise in the provision of a service or the production of a product through the supply chain. In this regard, it is necessary to evaluate and identify the risks associated with the relationship between the parties and the suppliers of products and services, with regard to the quality of the products produced by suppliers, as well as with the methodological practices adopted by suppliers in the secure code development processes (Article 21, paragraph 3).

Managing vulnerability disclosure

Effective and timely measures to prevent and respond to anomalous events also depend on coordinated practices implemented in each Member State for disclosing vulnerabilities. Each Member State designates a CSIRT that ” acts as a trusted intermediary ,” facilitating interaction between the person (natural or legal) who detects the vulnerability and the manufacturer or provider of ICT services/products for which vulnerabilities may exist.

In this regard, NIS2 promotes and facilitates, through the contact details of each member state’s national CSIRTs, the anonymous reporting of vulnerabilities, while safeguarding the anonymity of the individual (natural or legal) who reported the issue. It is entirely unnecessary that if the vulnerability is confirmed and its impact affects other entities in other member states, the CSIRT first involved cooperates, if necessary, with the CSIRTs of the member states whose entities may be affected by the same vulnerability (Article 12).

Continuity of service

In multi-risk management, Essential and Important Persons absolutely cannot ignore operational continuity. This means that companies or public administrations have regulatory obligations following a cybersecurity incident to mitigate its effects, ensuring adequate levels of services offered and the procurement of ICT (Information and Communication Technology) products and services.

In business operations, although not explicitly stated in the Directive under consideration, we cannot ignore OT (Operation Technology) tools, which support industrial monitoring and automation, in addition to traditional IT (Information Technology) tools. These systems were once characterized by reliability and continuity because they enjoyed physical isolation (air-gapped networks). Today, however, OT systems are increasingly becoming advanced computing systems, converging and integrating with IT systems with clear processing and computing advantages. On the one hand, these facilitate management and operations, but on the other, because they are more technologically advanced and, above all, increasingly connected to public networks, they can be subject to cyber attacks.

The concept of business continuity in NIS2 is expressed in a few lines and in a relatively generic manner, in terms of ” backup management, disaster recovery, and crisis management ” (Article 21, paragraph 2). To better contextualize the aspect of business continuity, stakeholders must consider and apply the Business Impact Analysis (BIA) methodology. This analysis methodology allows, based on the company’s business, to determine the potential impacts and unintended influences on the business itself caused by anomalous or unwanted events (such as the provision of services or the interruption of ICT products and resources).

Defining and identifying the economic, regulatory, and reputational impacts will certainly be crucial. A general analysis that must certainly be considered is that of not viewing a system, process, or service as a monolithic and independent element. Given the strong interconnections, both direct and indirect, between infrastructures/systems, it is necessary to evaluate interactions that could negatively impact the service or product being created. In particular, alongside the BIA methodology, it is necessary to introduce practices for “modeling multiple and complex structures to identify cascading effects,” as these would allow for the adoption of resilient solutions that would ensure the effectiveness and timely response to unintended events.

How does the NIS2 Directive fit into the EU regulatory context?

As previously mentioned, the NIS2 Directive plays an important role in the European context in increasing the fight against and resilience to cybersecurity attacks. This role does not stand alone, but relates to and creates a critical mass with other existing European regulations that strengthen the fight against, perception of, and Europe’s commitment to raising and consolidating the level of countering cyberattacks. The other regulations just mentioned are the GDPR (EU Regulation 2016/769), the Cybersecurity Act (EU Regulation 2019/881), the DORA Regulation (EU Regulation 2022/2554), and the CER Directive (EU Directive 2022/2557). The following are the distinguishing features of the various regulations and their points of contact with the NIS2 Directive:

GDPR Regulation (General Data Protection Regulation)

The GDPR addresses the protection of natural persons with regard to the processing of their personal data and the free movement of such data. The NIS2 Directive does not overlap with or replace the GDPR, but integrates it. The Directive explicitly references the GDPR at various points (Articles 2, 31, and 35), stating that if network and IT systems have been affected by cyberattacks and analysis of such attacks has revealed a data breach, the NIS2 requires the national authorities responsible for enforcing the directive (the ACN for Italy) to inform and work closely with the national supervisory authorities on the application of the GDPR (the Italian Data Protection Authority).

In addition to this shared focus, the NIS2 Directive and the GDPR also share other elements: i) incident notification; ii) cooperation and information exchange between EU member states; iii) risk assessment and the adoption of appropriate security measures. Regarding this last aspect, the purpose of the two risk assessments is different: for NIS2, it is the risk associated with the security of networks and information systems, while for the GDPR, the risk is assessed on the rights and freedoms of individuals.

Cybersecurity Act

The Cybersecurity Act (EU Regulation 2019/881), which entered into force on June 27, 2019, is an integral part of the EU’s overall cybersecurity project. The Regulation is an important and complementary element to the NIS2 Directive, which aims to increase the level of resilience of information systems to attacks. The Cybersecurity Act Regulation comprises two key elements: i) the introduction of information security certification systems valid within the EU for internet-connected devices, IT products and services, and IT processes; ii) greater clarification of the role of ENISA through the definition of its organizational structure, objectives, and related tasks (the details of this European body and the strengthening of its role in Europe with the issuance of the NIS2 Directive will be discussed later).

DORA Regulation (Digital Operational Resilience Act)

The DORA Regulation (EU Regulation 2022/2554), effective January 17, 2023, has a deadline of January 17, 2025, for financial institutions to comply with its requirements. The DORA Regulation applies to banks, insurance companies, financial institutions, stock exchanges, cryptocurrency service providers, credit rating agencies, crowdfunding service providers, and ICT service providers. Economic and financial institutions that fall under the DORA Regulation are not required to apply the NIS2 Directive “pursuant to the specialty criteria” (Article 4, paragraphs 1 and 2), as the provisions of the aforementioned Regulation are considered to correspond to and therefore satisfy those of the NIS2 Directive.

The common aspect, albeit complementary, between the two regulations is that the supervisory authorities responsible for the application and supervision of the Directive in question cooperate with the corresponding supervisory authorities of the individual Member States responsible for monitoring and supervising the adoption of the Dora Regulation. In practice, when applying the NIS2 Directive to an entity designated as an Essential or Important Person and which in turn falls within the role of a critical third-party provider of ICT services, the various competent authorities communicate with each other the status of the interested party’s NIS2 implementation (Article 33, paragraph 6). The interrelationship is not only national but also international, as the DORA Regulation allows the European Supervisory Authorities and the competent authorities to participate in the activities of the various cooperation groups, including CSIRTs for the exchange of information (e.g., incident details, cyber threats) (Recital 28).

CER Directive (Critical Infrastructure Directive)

The CER Directive (EU Directive 2022/2557) is the European regulation that directs the identification of critical entities in order to implement actions to ensure the resilience of the infrastructures that support and contribute to the operation of services against unwanted events associated with natural hazards, terrorist attacks, and sabotage. The CER Directive requires each EU Member State to identify critical entities from the following sectors by July 17, 2026: energy, transportation, banking, financial market infrastructure, healthcare, drinking water, wastewater, digital infrastructure, public administration, space, and food production, processing, and distribution.

An important aspect that highlights the strong interdependence between the two directives is the fact that the NIS2 Directive applies to all entities, regardless of their size, identified as “Critical Entities” by the CER Directive (Article 2, paragraph 3). In summary, the common aspects of the two directives are: i) identification of critical entities; ii) adoption of appropriate technical and organizational measures to ensure and strengthen resilience and operational capacity; iii) identification of a competent authority with supervisory duties for the correct application of the CER Directive.

ENISA’s role with NIS2

The European Union’s ENISA (European Network and Information Security Agency) aims to improve the security and resilience of information systems and telecommunications networks. The EU entrusts ENISA with the role of hub for cybersecurity issues, providing the expertise to which member states and the European institutions themselves must turn.

The NIS2 Directive strengthens and clarifies ENISA’s tasks and role. For example, ENISA ensures:

  • the development and management of a European vulnerability register (Article 12(2)), including the possibility of collaboration with operators of the Common Vulnerabilities and Exposures (CVE) system (Recital 63);
  • the EU-CyCLONe Secretariat to support the secure exchange of information and provide the necessary tools to support cooperation between Member States (Article 16, paragraph 2);
  • the publication of a biennial report on the state of cybersecurity in the Union (Article 18, paragraph 1);
  • the creation of a cooperation group to define a “ methodology and organizational aspects of peer reviews ” with the aim of drawing useful information, through shared experiences, for raising the common level of cybersecurity (participation in peer reviews is on a voluntary basis) (art. 19, par. 1);
  • the creation and management of a registry for cross-border services and entities: in particular, “DNS service providers, top-level domain name registries, entities providing domain name registration services, cloud computing service providers, data center service providers, content delivery network providers, managed service providers, managed security service providers, as well as providers of online marketplaces” (Article 27, paragraph 1);
  • support Member States, if requested, in developing and defining a national cybersecurity strategy and key indicators for evaluating its performance in accordance with the NIS2 Directive (Article 7, paragraph 4);
  • assistance in the development of CSIRTs (Article 10, paragraph 10);
  • the secretariat of the CSIRT network and actively provides assistance to cooperation between CSIRTs (Art. 15, para. 2);
  • the development and maintenance of a methodology, in collaboration with the Commission, the Cooperation Group and the CSIRT network, and of qualitative and quantitative indicators for an aggregate assessment of the level of cybersecurity maturity in the Union and in the individual national strategies of the Member States (Article 18, paragraph 3).

Conclusions

Given the widespread use of digital technology and telecommunications networks, now indispensable for the well-being and quality of life of a community, and also given the general increase in unwanted situations, due to the deliberate actions of malicious actors (hackers, activists, hybrid warfare) or unintended actions originating from human error, the European Union has issued the NIS2 Directive.

This issuance is part of a coherent and contextualized European framework of other regulations, with the aim of improving the response and overall resilience of digital systems, networks, and ICT systems. This improvement should not be undertaken solely and monolithically by individual member states; it should be coordinated with all other member states, taking into account individual national needs and capabilities. The latter are encouraged to share the measures implemented through national reference centers and to promptly share the types of attacks, creating a common defense front. Is this a point of arrival?

Absolutely not. The set of regulations issued to date can represent an ecosystem where each regulation, with its own peculiarities and specificities, builds upon and complements the others. Whenever a new regulation is added or an existing one is modified, the entire framework must be evaluated to avoid creating operational, governance, and managerial accountability gaps that could introduce weaknesses and vulnerabilities in the services and products provided by Essential and Important Entities. In this regard, the NIS2 Directive, while providing very specific guidance, leaves its implementation to individual member states.

This implementation, referring to Italy, must also take into account the various decrees issued within the “National Cybersecurity Perimeter” and therefore create the integration and coherence necessary to guarantee the diverse objectives to which the various regulations relate. Specifically, the objective of the NIS2 Directive is the maintenance of social and/or economic activities on which citizens, businesses, and markets generally depend. Meanwhile, for the National Cybersecurity Perimeter, the primary objective is the security of the state and the essential services that contribute to its functions.

In conclusion, important and fundamental steps have been taken to secure technological systems and infrastructures. However, attention to the various technical and geopolitical dynamics, the ability to understand the diverse cultural and technological evolutions of the cyber world, and, above all, professionalism must always be a step ahead of malicious behaviors that can cause serious damage to systems and infrastructures. This requires timely and effective support and updating of European and national regulations as a fundamental and fundamental element.

Immagine del sitoRiccardo Nuti
Degree in Electronic Engineering. He has carried out important activities in the IT sector and in the field of telecommunications (mobile and fixed network). He has been working on digital security since 2007.

Lista degli articoli