NIS2: Exploring the new EU directive
James Thorpe
Share this content
Regulatory mandates. Whatever you may think of their intention, execution or implications, they’re a critical part of the landscape for security teams, reports Zimperium.
This is particularly true for organisations based in the EU and for entities that do business with EU-based organisations.
A new directive will be introduced within the next year that promises to have a huge impact.
Article Chapters
Toggle- The history of NIS2
- NIS2: Key takeaways
- There’s a strong justification for the implementation of NIS2
- NIS2 represents a non-negotiable baseline
- NIS2 applies to a broad range of entities
- NIS2 applies to any network connected device
- NIS2 holds management accountable
- NIS2 requirements are comprehensive
- NIS2 applies across the EU and beyond
- NIS2 penalties are significant
- How Zimperium can help
The history of NIS2
In 2016, the European Commission established the first set of EU-wide cybersecurity directives, known as the Network and Information Security (NIS) Directive.
While this represented a step forward in terms of helping to improve the resilience of agencies and businesses in the EU, it proved to be difficult to implement and both its application and enforcement proved to be fragmented.
To address these obstacles, the commission launched the development of the next standard, Directive (EU) 2022/2555, known as NIS2.
This directive took effect at the beginning of 2023 and by October 2024, all member states must apply this mandate to national law.
The NIS2 directive has generated many opinions and perspectives.
While much has been said and written about the standard, security leaders are encouraged to review the actual directive.
Management teams need to get acquainted with the details of the standard and determine how to best apply it within the context of their specific organisation.
NIS2: Key takeaways
The NIS2 standard will significantly impact several areas, including mobile security, an arena in which Zimperium specialises.
The sections below will highlight some of the most critical takeaways from the NIS2 directive.
There’s a strong justification for the implementation of NIS2
Whether you view this and other regulatory mandates as useful and well conceived or as a costly, time consuming annoyance, the fact is that there are some excellent reasons for the development and adoption of standards like NIS2.
The reality is that, in the EU and almost every region worldwide, cyber-attacks have continued to become more prevalent and costly for organisations.
To thwart these attacks, the EU Commission set out to strengthen the initial NIS directive.
Article 1 of NIS2 offers a distillation of what the EU Commission is looking to achieve.
The standard is intended to define “measures that aim to achieve a high common level of cybersecurity across the Union, with a view to improving the functioning of the internal market.”
NIS2 represents a non-negotiable baseline
When every entity handles cybersecurity differently, with widely diverging levels of security, it creates a situation in which attacks keep growing in number and severity.
The NIS2 directive is the EU Commission’s push to establish a common, sufficient and scalable level of security among all covered organisations.
Article 5, in part, reads the directive “shall not preclude Member States from adopting or maintaining provisions ensuring a higher level of security…”
While each organisation’s specifics may vary and organisations can opt to go above and beyond these security standards, the NIS2 directive should be viewed as the bare minimum and the absolute, non-negotiable, must have requirements for security.
NIS2 applies to a broad range of entities
Compared to the initial version, NIS2 significantly expands the entities that are covered.
Effectively, the new standard applies to pretty much every entity that contributes to day to day operations of the EU or of EU citizens.
This includes automobile manufacturers, food distributors, banks, retailers, transportation firms, waste disposal agencies and more.
- Article 2, paragraph 2
- Annex I (essential entities)
- Annex II (important entities)
NIS2 applies to any network connected device
Article 6 reads in part that the definitions apply to “any device or group of interconnected or related devices” as well as systems in which “digital data [is] stored, processed, retrieved or transmitted.”
In addressing NIS2, security teams must account for desktop and laptop computers, internet of things (IoT) devices, printers and mobile phones and tablets.
Corporate databases, enterprise applications and mobile applications will also need to be addressed.
Devices and applications must be able to resist any cyber-attack.
This includes unknown or zero day attacks that target mobile devices.
NIS2 holds management accountable
Article 20 outlines who’s liable for non-compliance: “The management bodies of essential and important entities.”
Ultimately, management teams are responsible for approving cybersecurity measures and liable for infringements of the directive.
The intent is to create some urgency around addressing the directive and establishing clear accountability for failure to do so.
NIS2 requirements are comprehensive
Article 21 provides some of the details around how to establish effective safeguards.
The article features requirements for establishing risk analysis and information system security approaches, including handling incidents, securing supply chains, ensuring business continuity and employing cryptography.
Across these areas and more, teams will need to establish strong, thorough and auditable workflows and technologies.
NIS2 applies across the EU and beyond
Any entity governed by NIS2 must take responsibility for “supply chain security, including security related aspects concerning the relationships between each entity and its direct suppliers or service providers.”
For organisations that work with or seek to work with, EU businesses, it will be vital to address NIS2 standards and to be able to attest to the defences implemented.
NIS2 penalties are significant
Article 33 spells out the consequences of failure to comply with the directive.
Organisations may face the very real danger of having EU Commission officials instituting supervisory measures, which can be costly and labour intensive.
For example, a team may be required to implement a specific solution, forcing them to scramble to negotiate pricing and contracts and then embark on testing, implementing and deploying a solution, training staff and more.
While it remains to be seen how these enforcements may be handled, it is clear that having to respond to these supervisory requirements will be far less efficient and productive (not to mention less pleasant) than getting ahead of the curve and establishing security measures as part of a well designed, planned initiative.
As systems grow more complex, it is crucial for customers to find solutions that do not require a complete rework/reorg of their existing workflows.
Further, these compliance failures can result in steep penalties.
Article 34 specifies that, in the event of an essential entity’s infringement, member states shall apply administrative fines of up to €10m or 2% of an organisation’s prior year’s gross income, whichever is higher.
In some ways, you can see these fines as another way to justify security investments.
Previously, organisations that failed to implement robust cybersecurity measures would be susceptible to the risk of costly cyber-attacks and ransomware attacks, which can cost millions.
With NIS2, these organisations will also be exposed to potential fines, which can be equally steep.
How Zimperium can help
Complying with the NIS2 directive will represent a significant, broad-based effort for security teams and strengthening the security of mobile devices and mobile apps will be a key part of those efforts.
The good news is that Zimperium can help.
Zimperium is a mobile first company. All the solutions and services are focused on securing mobile devices and mobile applications.
Zimperium has secured millions of devices around the world, including both corporate and employee owned devices for some of the world’s largest businesses and government agencies.
Our on device threat detection offers protection around risky user behaviour and against malware and even zero day threats.
Our mobile application security solutions safeguard applications throughout their lifecycle, from development to runtime.