General Counsel

Apr 28, 2025

6 min. read

NIS2 directive regulations and implementation in Switzerland

Share:

NIS2 directive regulations and implementation in Switzerland

A few months ago, someone asked me whether Switzerland was “safe” from European digital regulation creep. The question was lighthearted, but it opened the door to a weighty conversation—because when it comes to cybersecurity, isolation is illusion. The European Union’s updated Network and Information Security Directive (NIS2) may not formally bind Switzerland, but that doesn’t mean it won’t shape the Swiss cybersecurity landscape. In fact, it already is.

Without further ado, let’s unravel what the NIS2 directive means for Switzerland, how the Swiss government is adopting its core principles, and what that means for organizations operating in this alpine nation.

Understanding Switzerland’s alignment with NIS2

Although Switzerland is not an EU member state and therefore not legally bound by NIS2, its government has chosen a proactive path. In December 2022, the Federal Council adopted a strategic report titled Schutz Kritischer Infrastrukturen (Protection of Critical Infrastructure), outlining a legislative agenda that mirrors the EU directive’s framework. This domestic implementation, known as KRITIS-Schutz, includes a new Federal Act—KRITIS-G—and significant amendments to the existing Information Security Act (ISG).

By following this path, Switzerland’s NIS2 implementation aims to create legal harmonization and ensure cross-border operational security. This regulatory initiative doesn’t just aim for bureaucratic alignment; it’s a calculated move to modernize national cyber defense and close critical infrastructure gaps.

Let’s explore where things currently stand.

Current legal and regulatory roadmap

To get a clearer view of the legal trajectory and major milestones, here’s a breakdown of Switzerland’s NIS2 transposition timeline.

Timeline of NIS2 Switzerland transposition

DateMilestone
2 Dec 2022Federal Council adopts KRITIS strategy report
1 Dec 2023 – 29 Mar 2024Public consultation of KRITIS-G and ISG revisions
24 Sep 2024Summary of consultation results published with minor amendments
Q4 2024Final draft submitted to Parliament (Botschaft)
2025Parliamentary debates and legislative review
Mid 2026Optional referendum period (seen as unlikely)
1 Jan 2027KRITIS-G & revised ISG expected to enter into force with grace periods

This approach—gradual, participatory, and staged—positions Switzerland as a serious actor in cybersecurity without overreaching.

How the NIS2 directive is being implemented in Switzerland

The Swiss government isn’t cutting corners. In fact, its model mirrors NIS2’s architecture down to the details, with some distinctly Swiss additions. At the core are three legal instruments: the KRITIS-G law, revisions to the ISG, and a new ordinance known as KRITIS-V.

KRITIS-G establishes sectoral coverage, risk management duties, and incident reporting obligations. It grants the National Cyber Security Centre (NCSC) audit powers and the ability to enforce compliance via binding orders and fines. The revised ISG aligns public administration cybersecurity responsibilities with EU standards, while the KRITIS-V ordinance defines compliance thresholds and sector-specific rules.

One unique twist? Switzerland includes Alpine cableways and pharmaceutical logistics as critical infrastructure—clear signs of how economic realities influence cybersecurity strategy.

What entities are in scope—and how they are classified

A fundamental aspect of Switzerland’s NIS2 directive alignment is the classification of regulated entities. Borrowing directly from the EU directive, Swiss law distinguishes between two tiers: “besonders kritische Betreiber” (essential operators) and “kritische Betreiber” (important operators).

Automatic inclusion applies to telecom providers, domain registries, and trust-service providers, regardless of size. For others, inclusion depends on workforce and revenue thresholds.

Swiss entity classification thresholds under KRITIS-V

ClassificationCriteria (Employees / Turnover)Penalties (Max)
Essential operator≥250 employees OR ≥CHF 50 million revenueCHF 10 million or 2% of global turnover
Important operator≥50 employees OR ≥CHF 10 million revenueCHF 7 million or 1.4% of global turnover

This clarity allows organizations to quickly assess their obligations and prepare for compliance—something increasingly critical given the sanctions landscape.

Penalties and enforcement: a stick to match the carrot

Regulatory alignment only works when it’s enforceable. Switzerland’s version of NIS2 features significant financial penalties paired with operational accountability. The NCSC becomes the national supervisory authority, while sector-specific regulators like ElCom, OFCOM, and FINMA maintain their technical oversight.

Violations can lead to daily fines up to CHF 100,000, with additional liability falling on company boards—especially where willful negligence is proven. Importantly, fines are administrative, not criminal, but reputational risk is just as real. Public bodies, including large municipalities, face binding remediation orders instead of fines, with non-compliance made public.

Sector-specific impacts across the Swiss economy

Each industry feels the weight of these changes differently. For sectors like healthcare and digital infrastructure, already under scrutiny due to their critical nature, the shift is toward operational maturity. For others—like manufacturing and Alpine tourism—this is a seismic regulatory shift.

Sector-specific impact of Switzerland’s NIS2 implementation

SectorChangesKey new duties
ManufacturingNewly regulated (if ≥50 FTE)OT/IT segregation, supplier vetting, annual pen-tests
HealthcareHospitals become “essential”Quarterly backups, ISO 27001, executive KPIs
Energy & UtilitiesExpanded to include hydrogen, heating24h NCSC reports, SBOM registry
Digital InfrastructureAll firms classified as essentialSOC 24/7, zero-trust plans, EU-based infrastructure
FinanceEnhanced FINMA supervisionPenetration testing, third-party ICT risk registers
Public SectorLarger municipalities includedAppoint CISOs, NCSC baseline adoption, no fines

The inclusion of tourism-relevant infrastructure like cableways is a distinctly Swiss adaptation, underscoring how local context shapes regulatory design.

What companies should be doing right now

With a 2027 enforcement date, it may feel like there’s time—but smart organizations aren’t waiting. Preparation requires action, and readiness starts with understanding your classification and responsibilities.

First, determine your likely classification under the draft KRITIS-V thresholds. Next, align your systems with NIS2 Article 21—this includes multi-factor authentication (MFA), offsite backups, and robust third-party risk management. Prepare to register with the GovCERT-SI platform and begin crafting an incident-response playbook in line with Swiss templates. And most importantly, engage your executive board: under the new rules, cyber risk is no longer just IT’s problem.

For those considering ISO 27001 certification, now is the time. Not only will it ease your audit burden, but it also signals readiness in an environment where trust is everything.

Are you ready for Switzerland’s cybersecurity evolution?

Switzerland’s path toward NIS2 alignment is deliberate, strategic, and irreversible. With Switzerland’s NIS2 transposition set to take effect in 2027, organizations have a unique window to get ahead—not just to comply, but to thrive in an increasingly complex threat environment.

Whether you’re a digital infrastructure provider now classified as essential, or a mid-sized manufacturer newly drawn into the regulatory fold, your ability to adapt will shape your long-term resilience.

To explore more about NIS2 and Switzerland’s evolving cybersecurity laws, consider reading ENISA’s NIS2 Directive overview or consult the official Swiss Federal Council page for updates.

One thing is clear: NIS2 Switzerland is more than a regulatory adjustment—it’s a shift toward systemic cyber resilience. Is your organization ready to take the leap?

Automate Your Cybersecurity and Compliance

It's like an in-house cybersecurity & compliance team for a monthly subscription! No prior cybersecurity or compliance experience needed.

Share this article

Post on Linkedin
Post on Facebook
Post on X

How useful was this post?

0 / 5. 0

General Counsel

He is regulatory compliance strategist with over a decade of experience guiding fintech and financial services firms through complex EU legislation. He specializes in operational resilience, cybersecurity frameworks, and third-party risk management. Nojus writes about emerging compliance trends and helps companies turn regulatory challenges into strategic advantages.
  • DORA compliance
  • EU regulations
  • Cybersecurity risk management
  • Non-compliance penalties
  • Third-party risk oversight
  • Incident reporting requirements
  • Financial services compliance

Explore further

  • Compliance & Regulations
  • Checklists
  • HIPAA
  • Questionnaire
  • Templates