The NIS2 Directive is the basis of the new regulatory framework that the European Union has created and adopted on cybersecurity: these are legal measures that have the ambition of strengthening the overall level of cybersecurity in member countries in the coming years.
Published in the Official Journal of the European Union on Dec. 27, 2022, and entering into force on Jan. 16, 2023, the NIS2 Directive effectively replaces the previous one (which will be repealed on Oct. 18, 2024) with the specific aim of addressing a radical change in the threat landscape. The NIS2 Directive integrates and updates the rules introduced in 2016 with the first NIS, not only modernizing the legal framework with a view to keeping pace with the explosion of digitization processes and cyber risk scenarios, but also extending the scope of the framework to new sectors and entities.
The new corpus, in particular, emphasizes three aspects:
Thus, the concept of detection becomes central, which for companies and public entities also means developing business continuity plans that can be put in place to mitigate the damage of initiatives gone wrong.
The main changes introduced by the NIS2 Directive concern the nomenclature of companies covered by the directive and the broadening of the sectors included in the scope. First, the distinction between Essential Service Operators and Digital Service Providers gives way to that between Essential Entities and Important Entities:
The sectors included in the first NIS Directive were only the following:
With the NIS2 Directive, the following are added to the previous:
Under the new logic, all large enterprises in the sectors identified by the legislature that meet at least one of these conditions are required to respond to the NIS2 Directive:
Medium-sized enterprises also fall within the scope of the NIS2 Directive. In this case the requirements are different:
In general, the purpose of the NIS2 Directive is to prepare EU member states for the worst cybersecurity scenarios by requiring adequate equipment and ad hoc skill building.
Each country, for example, must establish a Computer Security Incident Response Team (CSIRT) and a national authority responsible for networks and information systems. Within 24 hours of discovery, Entities must then notify their stakeholders and relevant authorities (including the CSIRT) of any cyber threat that may cause a significant incident.
In case of events that actually occurred, within one month the Entities must produce and submit a report that clarifies:
The CSIRT provides response and support within 24 hours. If the threat involves more than one member state, the CSIRT must not only inform the states themselves and ENISA (European Network and Information Security Agency), but also cooperate with a specially established network for cyber crises, EU- CyCLONe, which is entrusted with a number of tasks:
ENISA, in parallel, is then responsible for key activities to foster greater cyber awareness:
The entire ecosystem thus designed aims to achieve two key outcomes:
The NIS2 Directive also addresses cyber resilience with even greater determination, acting on three strands: governance, risk management, and supply chain. In terms of governance, the NIS2 Directive requires the governing bodies of Essential and Important Entities to take action to:
Regarding risk management, the NIS2 Directive imposes an obligation to assess risks and take the necessary technical and organizational measures. This is where those risks related to the supply chain fall: organizations must ensure their security even at the supplier relationship level, taking into account specific vulnerabilities and the overall quality of products and cybersecurity practices.
By converging these three dimensions on a strategy that provides a unified view, all parties included in the framework will then need to consider the specific vulnerabilities of each partner, as well as the overall quality of vendors' cybersecurity products and practices. This is not just about providers of ICT services and products: the NIS2 Directive guidelines should be implemented with respect to all entities for whom a cybersecurity problem could cause an incident or disruption along the value chain.