General Counsel

May 05, 2025

6 min. read

NIS2 compliance for the critical infrastructure sector: essential tips

Share:

NIS2 compliance for the critical infrastructure sector: essential tips

When a power outage paralyzed parts of Europe last year, the headlines focused on the immediate fallout — stranded trains, silent factories, and overwhelmed hospitals. But behind the scenes, what kept security leaders awake was not just the outage itself, but what it exposed: deep vulnerabilities in critical infrastructure and an urgent need to harden defenses.

This is the world that Directive (EU) 2022/2555, better known as NIS2, is stepping into. It’s no longer enough for critical infrastructure operators to install firewalls or patch systems on a schedule; they must now prove to regulators that they have robust, tested, and auditable cyber resilience programs in place. What’s at stake isn’t just uptime — it’s public trust, financial stability, and in some cases, national security.

Let’s break down the most essential steps to help you move beyond compliance checklists and build real operational resilience.

Confirm your legal status and board accountability

The first step in any NIS2 journey is understanding whether your organization falls under the scope of the directive. This isn’t a box-ticking exercise; it’s the foundation of your compliance strategy. Under Directive (EU) 2022/2555, essential entities — which typically include critical infrastructure like energy, transport, finance, and digital services — face proactive, on-site supervision and stiffer penalties.

Here’s a table summarizing how to verify your status:

StepActionReference
Check Annex I/IIReview Directive Annexes to see if you’re listed as an essential or important entityEUR-Lex Annex I/II
Assess criticalityEvaluate whether you operate critical infrastructure in energy, transport, finance, water, or digital sectorsSee above
Determine supervision levelUnderstand whether you are subject to proactive or reactive supervision and the associated finesSee above
Determining your legal status under NIS2

Once this is confirmed, Article 20 of the directive puts the board firmly in the driver’s seat. Senior management is personally responsible for approving cyber-risk programs and undergoing regular training. Every board decision must be recorded meticulously because negligence can result in fines or suspension.

Map baseline controls and align with operational realities

Mapping your current controls against NIS2’s requirements is where things get technical — but it’s also where you gain valuable insight into your gaps. Article 21(2) outlines 10 baseline cybersecurity measures, from risk analysis policies to incident handling and secure communication practices.

The table below captures these controls and their operational relevance:

Control areaFocus
Risk analysis policiesIdentify and evaluate internal and external risks
Incident handlingDefine clear protocols for responding to security events
Business continuity / disaster recovery (BC/DR)Ensure operations can continue during crises
Supply chain securityAssess and manage risks from third-party vendors
Secure development & vulnerability managementIntegrate security in development pipelines and patch vulnerabilities
Effectiveness testingRegularly test and validate security controls
Cyber hygiene & trainingPromote best practices and provide ongoing employee training
CryptographySecure sensitive data in storage and transit
HR/access & asset controlManage user privileges and protect critical assets
MFA & secure communicationsImplement multi-factor authentication and encrypted communication channels
Baseline cybersecurity controls under Article 21(2)

To dive deeper, the Implementing Regulation 2024/2690 acts as a practical checklist, detailing everything from asset inventories to role definitions. It’s worth familiarizing yourself with it to prepare for audits.

Expand risk analysis to cover OT and IT environments

One common pitfall I see is organizations focusing only on IT, neglecting operational technology (OT) environments like industrial control systems. This is risky because attackers increasingly target OT to disrupt critical services.

Here’s a table outlining the key steps in an integrated risk analysis:

ComponentDescription
Asset identificationMap critical IT and OT assets
Threat assessmentAnalyze both internal and external threat landscapes
PrioritizationRank assets and risks based on criticality
Security controls selectionChoose measures like segmentation, advanced monitoring, and intrusion detection
Components of a full-spectrum risk analysis

Stress-test incident response and tighten supply chain controls

When a breach happens, the clock starts ticking. NIS2 mandates three tight deadlines: early warning within 24 hours, notification within 72 hours, and a final report within one month. Legal, communications, and OT teams need to rehearse together, not in silos.

At the same time, your supply chain contracts must include NIS2-specific clauses, from the right to audit to joint participation in incident simulations. This is no longer optional.

Focus areaRequirements
Incident response deadlines24h early warning, 72h notification, 1-month final report (+progress reports)
Contractual safeguardsNIS2 clauses: right to audit, security by design, 24h notification window, joint tabletop exercises
Incident response and supply chain readiness

Build continuous monitoring and testing capabilities

Monitoring isn’t about collecting data for the sake of it — it’s about creating a resilient, evidence-backed security posture. Feeding OT telemetry into a SIEM/SOC system, deploying anomaly detection, and retaining logs for at least 12 months are essential.

You should also go beyond internal checks by running independent penetration tests and red-team exercises. Article 32 explicitly empowers regulators to order targeted audits, so it’s wise to stay ahead of the curve.

ActivityPurpose
SIEM/SOC integrationCentralize log collection and detect anomalies, especially in OT environments
Penetration testingIdentify vulnerabilities across IT and OT systems
Red-team exercisesSimulate real-world attacks to assess and improve detection and response capabilities
Continuous monitoring and independent testing

Create an audit-ready evidence library and track enforcement trends

Many organizations stumble at the documentation stage — but under NIS2, regulators can demand evidence at any time. Centralize policies, risk registers, supplier assessments, training records, and board minutes into an “audit-ready” library.

Moreover, understand the financial stakes: essential entities face fines up to €10 million or 2% of global turnover, while important entities face up to €7 million or 1.4%. To stay aligned and accelerate compliance, leverage frameworks like ISO/IEC 27001:2022, NIST CSF 2.0, or CIS Controls, which are referenced in the Implementing Regulation and ENISA guidance.

Preparation areaAction
Evidence centralizationMaintain a comprehensive, organized evidence repository
Framework alignmentMap controls to ISO, NIST, or CIS frameworks for faster documentation
Enforcement trackingMonitor fine trends and document compliance decisions to show diligence in case of incidents
Preparing for audits and minimizing enforcement risks

Finally, don’t overlook upcoming guidance: ENISA’s post-consultation technical guide, expected in 2025, will offer practical templates — subscribing to ENISA’s feed can help you stay one step ahead of auditors.

Are you ready to turn compliance into resilience?

NIS2 compliance isn’t just a legal requirement — it’s an opportunity to strengthen your organization’s resilience against cyber threats. By engaging your board, aligning OT and IT security, tightening supply chain oversight, and building a culture of continuous testing, you set the stage for operational excellence.

The question now is: will you treat compliance as a checkbox exercise, or as the foundation of a more secure future?

If you’d like, I can also draft a checklist version of this article — would you like me to prepare that?

Automate Your Cybersecurity and Compliance

It's like an in-house cybersecurity & compliance team for a monthly subscription! No prior cybersecurity or compliance experience needed.

Share this article

Post on Linkedin
Post on Facebook
Post on X

How useful was this post?

0 / 5. 0

General Counsel

He is regulatory compliance strategist with over a decade of experience guiding fintech and financial services firms through complex EU legislation. He specializes in operational resilience, cybersecurity frameworks, and third-party risk management. Nojus writes about emerging compliance trends and helps companies turn regulatory challenges into strategic advantages.
  • DORA compliance
  • EU regulations
  • Cybersecurity risk management
  • Non-compliance penalties
  • Third-party risk oversight
  • Incident reporting requirements
  • Financial services compliance

Explore further