Skip to main content
NIS2 Directive

The NIS2 Directive: What European Businesses Need to Know

The NIS2 Directive requires EU businesses to implement documented vulnerability management or face fines up to €10 million. SeguriScan provides the automated scanning evidence your team needs for Article 21 requirements.

EU-Based Platform
Weekly Monitoring
Automated Reports
No Installation Required

What Is the NIS2 Directive?

The NIS2 Directive (Directive EU 2022/2555) is the EU's updated cybersecurity law, replacing the original NIS1 Directive from 2016. It came into force on 18 October 2024 and now applies to businesses in 18 critical sectors across all 27 EU member states. If your organisation handles essential services or operates digital infrastructure in Europe, NIS2 almost certainly applies to you. In plain terms, NIS2 requires you to take cybersecurity seriously — not just have a policy on paper, but actively manage your risks, report incidents quickly, and prove to regulators that you are doing so. The law sets 10 mandatory technical and organisational security measures under Article 21, covers your supply chain, and holds your CEO or board personally accountable if your organisation fails to comply. Enforcement is already active in Belgium, Croatia, Italy, and Lithuania, with Germany beginning enforcement in 2026 covering approximately 29,000 entities. If your country has not yet fully implemented NIS2, it will — and the European Commission has already issued formal warnings to 19 member states to complete transposition.

Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022
18 October 2024
European Union

Who Must Comply with NIS2

EnergyTransportHealthBankingDigital InfrastructurePublic AdministrationICT ServicesManufacturingFood ProductionChemical Industry

Key NIS2 Security Requirements

Article 21(2)(e)

Vulnerability handling and disclosure — you must continuously identify, assess, and remediate vulnerabilities in your network and information systems.

Article 21(2)(a) & 21(2)(i)

Risk analysis and asset management — you must maintain an accurate inventory of your systems and use it as the basis for your cybersecurity risk assessments.

Article 21(2)(j)

Multi-factor authentication and access control — you must identify all exposed authentication endpoints and ensure access to critical systems is adequately secured.

Article 21(2)(f) & Article 23

Effectiveness reporting and incident reporting — you must prove your security measures are working, and report significant incidents within 24 hours (early warning) and 72 hours (full notification).

How SeguriScan Supports NIS2 Technical Requirements

1

Discover Your Attack Surface

NIS2 Article 21 requires a complete asset inventory before you can perform any meaningful risk analysis. SeguriScan automatically maps every internet-facing asset your organisation owns — including forgotten subdomains, cloud services, and shadow IT — so your inventory is always current and complete.

2

Assess Vulnerabilities Weekly

Article 21(2)(e) explicitly requires continuous vulnerability handling procedures. SeguriScan automates the technical scanning component of this requirement — scanning your entire external attack surface weekly, tracking CVEs against your assets, and prioritising the issues that carry the highest regulatory and business risk.

3

Generate Technical Scanning Evidence

Regulators and auditors will ask for documented proof that your security measures are working. SeguriScan produces technical vulnerability reports with exposure scores, remediation timelines, and vulnerability histories — providing scanning evidence for the technical requirements of NIS2 audits and Article 23 incident reports.

The Cost of NIS2 Non-Compliance

Financial Penalties

Essential entities (large organisations in Annex I sectors) face fines up to €10,000,000 or 2% of total worldwide annual turnover — whichever is higher. Important entities (medium-sized businesses in Annex II sectors) face fines up to €7,000,000 or 1.4% of worldwide annual turnover. Member states including Belgium, Italy, Poland, and Spain have implemented tiered penalty structures that go beyond the NIS2 baseline.

Operational Disruption

Competent authorities can issue binding instructions requiring specific security changes, orders to cease non-compliant activities, and public disclosure orders that expose your breach to customers and partners. For essential entities, authorities can suspend operating licences and certifications for the relevant service — potentially shutting down operations entirely until compliance is demonstrated.

Management Liability

Article 20 makes personal liability explicit: your CEO or board members can be held personally accountable for cybersecurity failures, not just the company. Persistent non-compliance can result in a temporary ban from holding management functions — meaning executives can be legally prohibited from running the organisation until the issues are resolved.

Active enforcement since 18 October 2024

Check your security — free

No credit card · Results in 60 seconds

NIS2 Compliance FAQ

What is the NIS2 Directive and who does it apply to?

The NIS2 Directive (Directive EU 2022/2555) is the European Union's updated cybersecurity law, in force since 18 October 2024. It applies to medium and large organisations — those with 50 or more employees or €10 million or more in annual turnover — operating in 18 critical and important sectors, including energy, transport, health, banking, digital infrastructure, and manufacturing. If your business operates in the EU in one of these sectors, you almost certainly fall within scope. Micro and small businesses under 50 employees are generally excluded, but specific exceptions apply to DNS providers, trust services, and sole essential service providers regardless of size.

What are the penalties for NIS2 non-compliance?

The financial penalties depend on your entity classification. Essential entities — large organisations in the highest-criticality sectors — can be fined up to €10,000,000 or 2% of global annual turnover, whichever is higher. Important entities face fines up to €7,000,000 or 1.4% of global turnover. Beyond fines, authorities can issue binding remediation orders, publicise your non-compliance, suspend your operating licences, and — under Article 20 — hold senior executives personally liable, including temporary bans from management roles. Several member states, including Belgium and Italy, have introduced tiered penalty structures that exceed the NIS2 minimum.

How does attack surface management help with the technical requirements of NIS2?

NIS2 Article 21 requires 10 mandatory technical and organisational security measures. Several of these map directly to what attack surface management (ASM) delivers. Article 21(2)(a) requires risk analysis based on an accurate asset inventory — ASM provides that inventory automatically. Article 21(2)(e) explicitly mandates vulnerability handling and disclosure — ASM delivers weekly automated scanning and CVE tracking. Article 21(2)(f) requires you to prove your measures are effective — ASM generates quantifiable metrics and documented scanning evidence. Article 23 requires incident reporting within 24 and 72 hours — ASM provides the detection timestamps and asset data you need to meet those deadlines.

When is the deadline for NIS2 compliance?

The NIS2 Directive applied from 18 October 2024, and enforcement is already active in Belgium, Croatia, Italy, and Lithuania. As of early 2026, approximately 20 of 27 EU member states have completed or are completing transposition into national law. Germany's NIS2 implementation law entered into force on 6 December 2025, with enforcement beginning in 2026 for around 29,000 entities. If you operate in any EU member state, you should treat NIS2 compliance as required now — the European Commission has already issued formal warnings to 19 member states to complete transposition and has threatened referral to the Court of Justice.

Does NIS2 apply to small and medium businesses?

NIS2 uses a size-cap rule: you need 50 or more employees or at least €10 million in annual turnover to qualify as an 'important entity' — the lower threshold. Micro businesses (under 10 employees, under €2M turnover) are generally excluded. However, if your business is the sole provider of an essential service in a member state, operates a DNS service, or provides public electronic communications, you fall in scope regardless of size. Medium-sized businesses in sectors like manufacturing, food production, chemicals, digital services, and postal services should check whether they meet the thresholds — NIS2 was explicitly designed to bring mid-market organisations into scope that NIS1 missed.

How can I start my NIS2 compliance assessment?

The fastest way to understand your NIS2 exposure is to start with your attack surface — the assets and vulnerabilities that regulators will ask about first. SeguriScan's free security scan maps your internet-facing assets in under 60 seconds, identifies vulnerabilities that are relevant to Article 21 requirements, and produces a report you can use as the baseline for your compliance programme. No installation or credit card is required. If you want a guided walkthrough of how SeguriScan maps to your specific NIS2 obligations, book a demo and one of our security experts will walk you through it.

Start Your NIS2 Compliance Assessment Today

See your security gaps in minutes — no installation, no credit card, no risk.

Trusted by businesses across Europe · Free scan takes 60 seconds