EU

NIS2: Common Scenarios

Common Scenarios

Practical guidance for applying NIS2 to real-world situations.

Scenario 1: Are We Covered?

Question: We’re a SaaS company with 80 employees, €15M revenue, serving businesses across the EU. Does NIS2 apply?

Answer: Possibly. Assess against:

  • Size threshold: 50+ employees + €10M+ turnover = Medium enterprise ✓
  • Sector: If you’re a “digital provider” (marketplace, search, social) → Important entity
  • Service type: If providing managed IT/security services (MSP/MSSP) → Could be essential

If covered: Implement Art 21 measures and prepare for incident reporting.

Citation: Art 2, 3, Annex I, Annex II


Scenario 2: Ransomware Attack

Question: We’ve discovered ransomware on our systems at 2pm Monday. What are our reporting obligations?

Answer: Report within 24 hours (early warning by 2pm Tuesday):

DeadlineAction
+24hEarly warning to CSIRT: “Suspected ransomware incident, potentially malicious, assessing cross-border impact”
+72hIncident notification: Initial assessment of severity, impact, IoCs if available
+1 monthFinal report: Root cause, full impact, mitigation measures

Also: Inform affected service recipients without undue delay if service impacted.

Citation: Art 23


Scenario 3: Cloud Provider Selection

Question: We’re choosing between two cloud providers. How should NIS2 influence our decision?

Answer: Supply chain security (Art 21(2)(d)) requires you to assess:

FactorAssessment
Security certificationsISO 27001? SOC 2? CSA STAR?
Incident historyPrevious breaches?
Incident notificationWill they notify you of incidents affecting your data?
Audit rightsCan you audit or request reports?
Data locationJurisdiction and data residency
Contractual termsSecurity SLAs, liability caps

Document your due diligence — it’s evidence of compliance.

Citation: Art 21(2)(d)


Scenario 4: Board Training

Question: Our board has no cybersecurity expertise. What training do they need?

Answer: Art 20 requires management body training covering:

TopicLevel
Cyber risksUnderstand threats relevant to your sector
Risk managementKnow what Art 21 measures you’ve implemented
Impact assessmentUnderstand how incidents could affect services
Governance roleKnow their approval and oversight duties

Format: Can be briefings, workshops, or formal training. Document completion.

Citation: Art 20(2)


Scenario 5: Discovered Vulnerability

Question: Our security team found a critical vulnerability in software we use. What now?

Answer: Coordinated vulnerability disclosure (Art 21(2)(e)):

  1. Assess impact — How critical? What’s exposed?
  2. Notify vendor — Report to software provider
  3. Apply mitigations — Temporary controls while awaiting patch
  4. Patch promptly — When fix available, prioritize deployment
  5. Verify remediation — Confirm vulnerability is addressed

If actively exploited: Consider reporting as incident if significant impact.

Citation: Art 21(2)(e)


Scenario 6: Near Miss

Question: Our SOC detected and blocked an intrusion attempt. No systems were compromised. Do we report?

Answer: Voluntary, not mandatory. Near misses may be reported under Art 30:

ConsiderationGuidance
Mandatory?No — only significant incidents with actual impact require reporting
Recommended?Yes — contributes to threat intelligence sharing
Benefits?Helps CSIRT community, no penalties for voluntary reporting

Consider reporting if: Sophisticated attack, novel technique, could help others defend.

Citation: Art 23 (mandatory), Art 30 (voluntary)


Scenario 7: Subsidiary Scope

Question: We’re a large group. Our manufacturing subsidiary has 40 employees. Is it covered?

Answer: Likely not covered on its own. Assessment is per entity:

ParentSubsidiaryCovered?
Large40 employees, under thresholdsSubsidiary NOT separately covered

But: If subsidiary is in critical sector and sole provider, or has critical impact, may still be covered regardless of size (Art 2(2)).

Also: Parent’s obligations don’t automatically extend to subsidiaries — but parent may require subsidiaries to meet standards as internal policy.

Citation: Art 2(1), Art 2(2)


Scenario 8: MFA Implementation

Question: Is MFA required for all systems under NIS2?

Answer: Where appropriate. Art 21(2)(j) requires:

use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications

Practically:

  • Required: Critical systems, privileged access, remote access
  • Recommended: All user accounts where feasible
  • Risk-based: Assess what’s “appropriate” for your risk profile

Not prescriptive — but lack of MFA on critical systems would be hard to justify.

Citation: Art 21(2)(j)


Scenario 9: Overlap with DORA

Question: We’re a bank. Do we comply with NIS2 or DORA?

Answer: DORA takes precedence for financial entities. Art 4 of NIS2:

PrincipleApplication
Lex specialisSector-specific rules (DORA) prevail over general rules (NIS2)
Financial entitiesBanks, insurers, investment firms primarily subject to DORA
Gap-fillingWhere DORA doesn’t address an issue, NIS2 may still apply

Practical: Comply with DORA as your primary framework; NIS2 generally won’t add obligations.

Citation: Art 4, Recital 28


Scenario 10: Documentation Requirements

Question: What documentation do we need to demonstrate NIS2 compliance?

Answer: No prescribed format, but must evidence compliance with Art 20-21:

DocumentPurpose
Risk assessmentEvidence of Art 21(2)(a)
Security policiesAll 10 measures documented
Incident response planArt 21(2)(b) and Art 23 readiness
BCP/DR plansArt 21(2)(c)
Supplier assessmentsArt 21(2)(d)
Training recordsArt 20(2) management training
Board minutesArt 20 approval and oversight
Audit reportsArt 21(2)(f) effectiveness assessment

Key: Be able to demonstrate each of the 10 measures is addressed.

Citation: Art 20, 21


Quick Reference Table

ScenarioKey RuleCitation
Coverage assessmentSize + sectorArt 2, 3
Incident reporting24h/72h/1moArt 23
Supplier selectionDue diligenceArt 21(2)(d)
Board trainingMandatoryArt 20(2)
Vulnerability handlingCoordinated disclosureArt 21(2)(e)
Near missVoluntaryArt 30
Group structurePer-entity assessmentArt 2(1)
MFAWhere appropriateArt 21(2)(j)
Financial sectorDORA prevailsArt 4
Max fine (essential)€10M or 2%Art 34

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt