NIS2’s 10 Core Requirements – And Where to Begin

NIS2’s 10 Core Requirements – And Where to Begin

BifrostConnect Blog

BifrostConnect's Blog

NIS2’s 10 Core Requirements – And Where to Begin

NIS2’s 10 Core Requirements – And Where to Begin

The NIS2 Directive raises the bar for cybersecurity across the EU, replacing NIS1 with stricter, more comprehensive rules. But these aren’t just “legal chores” – they’re proven best practices that reduce downtime, build trust and harden your supply-chain. Before diving into detailed compliance, it pays to ask: Why start where you do? Because a well-chosen first step creates momentum, shows quick wins and buys credibility for the harder work ahead.
 
Why Your Starting Point Matters

 

  • Quick Wins = Stakeholder Buy-In
    Demonstrable improvements (faster incident response, tighter access controls) convince management that security pays off.

 

  • Risk-Driven Effort
    Focus on areas with the highest threat or impact first (e.g. your customer-facing APIs).

 

  • Scalable Foundations
    Laying basic governance and tooling early makes it far easier to tackle the remaining requirements.

 
 
Where to find help:

 

  • ENISA’s NIS2 Hub
    ENISA maintains a dedicated NIS2 page with:

    • Explanatory materials (infographics, video)

    • A public “Implementation Guidance” PDF that in its Annex I maps out each Member State’s transposition status and frameworks enisa.europa.eu

 

The 10 Core NIS2 Requirements

1 . Risk Management & Information Security Policies
Define processes and ownership for identifying, assessing and mitigating your top IT risks.

2.  Incident Handling & Reporting
Establish clear detection, escalation and reporting procedures – initial notification within 24 hours, full report within 72 hours.

3 . Business Continuity & Crisis Management
Maintain plans to keep critical services running or recover them rapidly after major incidents.

4 . Supply-Chain Security & Due Diligence
Evaluate and monitor your vendors’ security posture to ensure they meet your standards.

5 . Secure Development & Vulnerability Handling
Integrate security into procurement, development and operations – including regular vulnerability scanning and coordinated disclosure.

6. Evaluation of Controls
Regularly test and verify that your policies and technical measures actually work (pentests, tabletop exercises).

7. Cyber Hygiene & Training
Ongoing staff awareness programs covering phishing, password best practices and your internal security policies.

8. Cryptography & Encryption
Enforce strong encryption for data at rest and in transit; manage keys and certificates through defined lifecycles.

9. Asset Management & Access Control
Keep an up-to-date inventory of hardware and software; implement Role-Based Access Control (RBAC) so everyone has only the rights they need.

10. Multi-Factor Authentication (MFA)
Require at least two independent factors (e.g. password + mobile push or token) to access critical systems.

 

WHERE TO START? A 3 step kick-start guide ->

1. Governance & Accountability
  • Who? Appoint a CSO/CISO or equivalent.

  • Do? Schedule monthly or quarterly security reviews with senior leadership.

2. Risk-Based Quick Check
  • Identify your “crown-jewel” systems and data flows.

  • Assess their threat exposure and impact in a 1-page risk matrix (High/Low).

3. Light-Touch Core Controls
Implement these five foundational measures first:
  • RBAC + MFA for all critical accounts.
  • Incident SLA: 24 h initial notification, 72 h full report.
  • Encryption: data at rest & in transit.
  • Logging: central log collection, basic SIEM alerts.
  • Annual Risk Review including top-tier vendor due diligence.
 
Once these are in place, you’ll have both the momentum and the little “proof points” you need to tackle the remaining controls systematically.
 
NIS2 compliance isn’t a paperwork marathon – it’s a structured path to stronger resilience, clearer governance and a competitive edge.

Discover How You Can Establish Zero Trust Access to Your Equipment

Get in touch with one of our experts today.