EU

NIS2: Cybersecurity Risk Management

Cybersecurity Risk Management Measures [Art 21]

Rule: Essential and important entities must take appropriate and proportionate technical, operational, and organizational measures to manage risks to network and information security.

Core Requirement [Art 21(1)]

Member States shall ensure that essential and important entities take appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of network and information systems.

Measures must:

  • Be proportionate to entity size, exposure, and likelihood/severity of incidents
  • Consider state of the art and cost of implementation
  • Take into account standards and technical specifications
  • Ensure level of security appropriate to risks

10 Minimum Measures [Art 21(2)]

#MeasureDescription
(a)Risk analysis and policiesPolicies on risk analysis and information system security
(b)Incident handlingProcedures for incident prevention, detection, response
(c)Business continuityBackup management, disaster recovery, crisis management
(d)Supply chain securitySecurity relating to relationships with suppliers and service providers
(e)Secure developmentSecurity in acquisition, development, and maintenance of systems, including vulnerability handling and disclosure
(f)Effectiveness assessmentPolicies and procedures to assess effectiveness of risk management measures
(g)Cyber hygiene and trainingBasic cyber hygiene practices and cybersecurity training
(h)CryptographyPolicies and procedures regarding use of cryptography and, where appropriate, encryption
(i)Human resources and access controlHR security, access control policies, asset management
(j)AuthenticationUse of multi-factor authentication, continuous authentication solutions, secured communications

Risk-Based Approach [Art 21(1)]

Assessment must consider:

FactorConsideration
Exposure to risksHow vulnerable is the entity?
Size of entityProportionate to resources
Likelihood of incidentsHow probable is an attack?
Severity of incidentsWhat’s the potential impact?
Societal and economic impactEffects on others if compromised

All-Hazards Approach [Art 21(2)]

Measures must address all hazards, including:

  • Cyberattacks (malware, ransomware, DDoS)
  • Physical threats (fire, flood, theft)
  • Human error
  • System failures
  • Supply chain compromises

Proportionality

Measures scale with risk:

Entity TypeExpected InvestmentAudit Depth
Large essential entityComprehensive programFull external audit
Medium important entityAppropriate measuresRisk-based assessment
Small (if covered)Basic protectionsProportionate review

Minimum Standards and Specifications [Art 21(5)]

Commission can adopt implementing acts specifying:

  • Technical and methodological requirements
  • Sector-specific standards
  • When existing standards should be used

Current guidance references:

  • ISO/IEC 27001 (information security management)
  • NIST Cybersecurity Framework
  • ENISA guidance documents

Multi-Factor Authentication [Art 21(2)(j)]

Must use where appropriate:

  • MFA — Two or more authentication factors
  • Continuous authentication — Ongoing verification during sessions
  • Secured voice, video, text — Encrypted communications

Vulnerability Management [Art 21(2)(e)]

Must address:

  • Coordinated vulnerability disclosure
  • Patching and remediation processes
  • Secure development lifecycle

Documentation Requirements

DocumentPurpose
Risk assessmentDocument identified risks and mitigation
Security policiesWritten policies covering all 10 measures
Incident response planProcedures for detection, containment, recovery
Business continuity planBackup, DR, crisis management
Training recordsEvidence of staff training
Supplier assessmentsDue diligence on third parties

Implementation Priority

If starting from scratch, prioritize:

  1. Risk assessment — Understand your exposure
  2. Access control + MFA — Prevent unauthorized access
  3. Backup and recovery — Ensure business continuity
  4. Incident handling — Prepare for breaches
  5. Supply chain review — Assess vendor risks
  6. Training — Build staff awareness
  7. Full program — Implement all 10 measures

Citation

Art 21, Directive (EU) 2022/2555

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt