The NIS-2 Directive (EU) 2022/2555 came into force on 16 January 2023 and defines measures for a high common level of cybersecurity in the Union - it will therefore replace the NIS Directive, which came into force in 2016.
The NIS 2 Directive had to be transposed into national law by the Member States by 17 October 2024 at the latest, but this is currently still pending for a total of 19 EU Member States. For this reason, the Commission issued a statement on 7 May 2025 calling on the countries concerned to fully implement the Directive.
The focus of the NIS 2 Directive for affected companies is on the implementation of risk management measures and the reporting obligations for recognised security incidents. In contrast to the NIS Directive, the sectors of critical facilities have been expanded and the main focus has been placed on dependency on partner companies (supply chains), among other things.
Who is affected?
Whether you are affected by the NIS-2 Directive depends on both the size of the company and the associated sector of the company. The NIS-2 Directive applies to public and private entities of the type listed in Annex I (High Criticality Sectors) and Annex II (Other Critical Sectors) that meet or exceed the thresholds for medium-sized enterprises set out in Article 2(1) of the Annex to Recommendation 2003/361/EC and provide their services or carry out their activities in the Union.
Annex I (High Criticality Sectors) | Annex II (Other Critical Sectors) ⇒ essential facilities |
Energy | Post and courier services (new in NIS-2) |
Transport | Waste management (new in NIS-2) |
Banking | Chemicals (production, manufacturing and trade) (new in NIS-2) |
Financial market infrastructures | Food (production, processing and distribution) (new in NIS-2) |
Healthcare | Manufacturing/production of goods (new in NIS- 2) |
Drinking water | Digital service provider |
Waste water (new in NIS-2) | Research (new in NIS-2) |
Digital infrastructure | |
Management of ICT* services (business-to-business) (new in NIS-2) | |
Public administration (new in NIS-2) | |
Space (new in NIS-2) |
* Information and communication technology
For mechanical engineering companies, the sub-sectors defined under the "Manufacturing/production of goods" sector are of particular importance:
- Manufacture of medical devices and in vitro diagnostic medical devices
- Manufacture of computer, electronic and optical products (described in division 26 NACE Rev. 2)
- Manufacture of electrical equipment (described in division 27 NACE Rev. 2)
- Machinery (described in division 28 NACE Rev. 2)
- Manufacture of motor vehicles, trailers and semi-trailers (described in division 29 NACE Rev. 2)
- Other transport equipment (described in division 30 NACE Rev. 2)
As already mentioned, the company concerned must meet or exceed the thresholds for medium-sized enterprises. The respective thresholds can be found here:
Size class | Employees | Annual turnover | Annual balance sheet total | |
Small business (KU) | < 50 AND | ≤ 10 million. Euro OR | ≤ 10 million euros | . Euro |
Medium enterprise (MU) | < 250 AND | ≤ 50 million. Euro OR | ≤ 43 million. Euro | |
Large company (JV) | ≥ 250 OR | > 50 million euros AND | > 43 million euros |
However, in accordance with Art. 2 and Art. 3 of the NIS 2 Directive, it is possible for companies to also fall under the scope of the NIS 2 Directive under certain conditions and regardless of their size - this is particularly conceivable in the case of dependencies through supply chains.
Tip: Link to the self-assessment (In German) according to NIS-2 from the Austrian Federal Economic Chamber (WKO): https://ratgeber.wko.at/nis2/
How is controlled / penalised?
In contrast to the NIS Directive, the NIS 2 Directive does not require every company to undergo a regular audit. In the case of important facilities, an inspection is only carried out if there is reasonable suspicion, for example following a security incident. However, regular NIS 2 audits by external bodies are planned for essential facilities. In addition, on-site/off-site inspections or security scans are possible at any time. The sanctions in the event of non-compliance also vary, see the following table:
Essential facility | Important facility | |
Supervision | Ex-ante (in advance) and ex-post (after the fact) | Ex-post |
Regular safety checks | Only in case of reasonable suspicion | |
Sample checks | ||
Sanctions | Up to 10 Mio. euros or 2% of global turnover | Up to 7 million euros or 1.4% of global turnover |
What needs to be implemented
The risk management measures (Art. 21 para. 2) must be based on a cross-hazard approach aimed at protecting the systems from security incidents and cover at least the following topics. The sub-items serve as examples:
a) Concepts related to risk analysis and security for information systems;
- Risk-based approach - see also, for example, ISO 270001 and IEC 62443
b) Management of security incidents;
- Incident response plan
c) Maintenance of operations & crisis management;
- BCM - Business Continuity Management
- Backup & Recovery
d) Supply chain security;
- Interfaces to suppliers, service providers and partner companies
- Consider supply chain availability
- State-of-the-art security standards
e) Security measures for the acquisition/development/maintenance of ICT;
- Certification of components and manufacturers
- Vulnerability and patch management
- Security by design
- Security by default
f) Concepts and procedures for evaluating the effectiveness of risk management measures;
- Information Security Management System (ISMS - see ISO 27001)
g) Cyber hygiene and cyber security training;
- Recurring training and workshops
- Employee awareness of cyber security (e.g. phishing)
- Define processes and guidelines (e.g. passwords, authorisations, etc.)
h) Cryptography and encryption if necessary;
- Guarantee the integrity of the data, both in rest (during storage) and in transit (during transmission)
i) Security of personnel, concepts for access control;
- Physical security
- Defence-in-Depth approach (see IEC 62443)
j) Multi-factor authentication or continuous authentication.
- Additional factor to the password (dongle, biometrics, app solutions, etc.)
- Secured voice, video and text communication
- Note emergency communication
The measures must ensure a level of security appropriate to the existing risk, taking into account the state of the art and, where applicable, the relevant European and international standards and the costs of implementation. Factors for the proportionality of the measures are The extent of the facility's exposure to risk, the size of the facility and the likelihood of security incidents occurring and their severity, including their social and economic impact.
In addition, there are reporting obligations to be taken into account in the event of significant security incidents. The deadlines for this are as follows:
- Within 24 hours: Early warning to the authority.
- Within 72 hours: detailed notification/assessment.
- Within one month: detailed progress/final report.
Conclusion
If they have not already done so, companies should familiarise themselves with the NIS 2 Directive and define responsibilities (per department) as quickly as possible - even without the current regulation! With the help of initial workshops and surveys, which require the involvement of knowledge holders in the company, critical services and the necessary assets can be quickly identified. However, it should be noted that all services within a company must be subjected to a risk analysis - the remedial measures and the timing of implementation are then defined using the risk-based approach. In the event of difficulties in achieving the objectives (roadmap), it is recommended to seek help in the form of external consulting companies - the actual implementation should be carried out by internal resources in any case, as this keeps the expertise within the company.
It is important to note that there is no need to reinvent the wheel when implementing risk management measures. There are already existing frameworks and recognised standards, such as ISO 27001 (Information Security Management) and IEC 62443 (Industrial communication networks - IT security for networks and systems). The requirements from the NIS 2 directive coincide in many areas with the components of the two standards.
For companies, e.g. machine manufacturers, that are not affected by NIS-2, however, this does not mean that they have no obligations in terms of cyber security. Both the new Machinery Directive and the new Cyber Resilience Act define requirements for manufacturers. Last but not least, operators who are covered by NIS-2 will also place requirements on their suppliers in order to fulfil their NIS-2 obligations with regard to supply chain security.
Implementing rules for NIS-2
- The Implementing Regulation (EU) 2024/2690 lays down technical and methodological requirements for risk management measures in the area of cybersecurity. It also clarifies when an incident is considered significant and must be reported for various providers (DNS, cloud, online platforms, etc.).
Posted on: 2025-05-28 (last amendment)
Author
Martin Strommer
Dipl.-Ing. "Information Security" and Bachelor "Software Design". OT Security Engineer in the areas of critical infrastructures and manufacturing companies. Supports customers in the implementation of intrusion detection systems (IDS), in the handling of security alerts and in the realisation of security advisories. Previously worked for 7 years in the field of machine security, particularly in the areas of safety/security risk assessments and programming of programmable logic controllers. Trained as an internationally certified machine safety expert (CMSE® - TÜV Nord). Lecturer in the "Smart Engineering" bachelor's degree programme at St. Pölten UAS.
Email: martin.strommer@gmx.at
CE InfoService
Don't miss CE news and changes!
You are not yet registered? Register now for the free CE InfoService and receive information by e-mail when new technical papers, important standards publications or other news from the field of machinery and electrical equipment safety or product compliance are available.