EU

NIS2: Incident Reporting

Incident Reporting [Art 23]

Rule: Entities must report significant incidents to their national CSIRT or competent authority within strict timelines: early warning (24h), incident notification (72h), final report (1 month).

Reporting Timeline [Art 23(4)]

StageDeadlineContent Required
Early warningWithin 24 hoursSuspected incident, suspected malicious or unlawful, cross-border impact?
Incident notificationWithin 72 hoursUpdate early warning, initial assessment of severity and impact, indicators of compromise (if available)
Intermediate reportOn requestStatus update requested by CSIRT/authority
Final reportWithin 1 monthDetailed description, root cause, mitigation taken, cross-border impact

What Is a Significant Incident? [Art 23(3)]

An incident is significant if it:

CriterionThreshold
Operational disruptionHas caused or is capable of causing severe operational disruption or financial loss
Other parties affectedHas affected or is capable of causing material damage to other natural or legal persons

To Whom to Report [Art 23(1)]

Report to:

  • CSIRT (Computer Security Incident Response Team), OR
  • Competent authority (if Member State so requires)

Plus in some cases:

  • Recipients of services — Must inform where incident affects service provision
  • Other affected Member States — Via Single Point of Contact for cross-border incidents

Early Warning Content (24 hours)

Must include:

  1. That a significant incident has occurred (or is suspected)
  2. Whether incident is suspected to be caused by unlawful or malicious act
  3. Whether incident could have cross-border impact

Can be brief — Full details not required at this stage.

Incident Notification Content (72 hours)

Must include:

  1. Update to early warning information
  2. Initial assessment of the incident:
    • Severity
    • Impact
  3. Indicators of compromise (IoCs) where available

Final Report Content (1 month)

Must include:

  1. Detailed description of the incident
  2. Severity and impact assessment
  3. Type of threat or root cause that likely triggered incident
  4. Mitigation measures applied and ongoing
  5. Cross-border impact if applicable

Extension: If incident ongoing at 1-month mark, submit progress report + final report within 1 month of handling completion.

Reporting to Service Recipients [Art 23(2)]

Where significant incident affects provision of services, entity must:

  • Inform recipients without undue delay
  • Communicate measures recipients can take
  • Include threat information where relevant

Cross-Border Incidents [Art 23(6)]

If incident has significant impact in other Member States:

  • CSIRT/authority notifies other affected Member States
  • Information shared via EU-CyCLONe network

Near-Miss Reporting [Art 30]

Entities may voluntarily report:

  • Near misses — Events that could have been incidents
  • Cyber threats — Potential threats observed
  • Vulnerabilities — Weaknesses discovered

No penalty for voluntary reporting; encourages threat intelligence sharing.

Information Security [Art 23(8)]

Competent authorities must:

  • Protect confidentiality of reported information
  • Not disclose commercially sensitive data
  • Share only with necessary parties

Comparison with Other Frameworks

FrameworkNotification DeadlineTo Whom
NIS224h (early warning), 72h (full)CSIRT/Competent authority
GDPR72 hours (personal data breach)Supervisory authority
DORA4 hours (major ICT incident)Competent authority

Practical Implementation

Prepare in advance:

  1. Identify your CSIRT — Know who to contact
  2. Prepare templates — Pre-draft notification forms
  3. Define escalation — Internal escalation paths
  4. Assign responsibility — Who sends notifications?
  5. Test the process — Run incident exercises

Failure to Report

Failure to report significant incidents is a violation subject to:

  • Administrative fines
  • Remedial orders
  • Potential personal liability for management

Citation

Art 23, Directive (EU) 2022/2555

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt