NIS2 is now the cybersecurity baseline across the EU. Member States were required to transpose the directive by 17 October 2024, and the rules have applied since 18 October 2024. NIS1 was repealed the same day, so the expectations in NIS2: risk management, incident reporting, and verifiable evidence—are the ones that will be tested in audits going forward.  

A key shift is the classification of organisations as essential or important entities based on their sector (Annex I/II) and size (the “size‑cap” rule). In practical terms, if you operate in a listed sector and meet the size criteria, you’re likely in scope. Member States are also required to compile and keep updated lists of essential and important entities by 17 April 2025, which makes scoping decisions more concrete for businesses.  

Who’s in scope—and what that means day to day

NIS2 broadens coverage to sectors such as energy, transport, health, digital infrastructure and many more. “Essential” status brings stronger supervision, but both essential and important entities must implement proportionate cybersecurity measures and be able to prove those measures work. That proof is not just policies: regulators and auditors want to see the paper trail—the records, approvals, logs and reports that show controls are active, reviewed and effective.  

What NIS2 expects: the risk‑management measures, explained

The Commission adopted an Implementing Regulation in October 2024 that spells out technical and methodological requirements for certain digital infrastructure providers and clarifies when incidents are considered significant. ENISA followed up in June 2025 with practical implementation guidance that maps each measure to examples of acceptable evidence. Treat that guidance like a companion manual: it won’t replace the law, but it shows “what good looks like” in audits.  

Below is a plain‑English tour of the measures you’ll actually operate. For each area, keep the records that prove you do what your policy says.

Governance & policy

Management needs to sign off an overarching security policy and topic‑specific policies (risk, incident handling, supply chain, testing, access control and more). The point is accountability: auditors look for evidence that leadership understands cyber risk and drives remediation. Keep: signed policies with version history; board/management minutes showing approvals and reviews.  

Risk management

Run a documented risk process: identify assets and threats, assess risks, agree treatments, and review regularly (ENISA’s guidance points to at least annual reviews or after major changes). Keep: a current risk register with owners and status; treatment plans and review logs.  

Incident handling

Have playbooks, roles and a communication plan, and be ready to meet the multi‑stage reporting timeline (see below). Keep: incident tickets and timelines; regulator submissions; post‑incident reviews with actions and owners.  

Business continuity & crisis management

Document how you’ll operate through disruption, test your recovery, and record the results. Keep: BCP/DR plans; restore test evidence; improvement actions with sign‑offs.  

Supply‑chain security

You’re expected to know your ICT suppliers, assess them, and build security requirements (including exit plans) into contracts. Keep: a supplier register with service descriptions and data types; due‑diligence records; contracts with security clauses; renewal and exit checklists.  

Secure change & maintenance

Changes, patches and vulnerabilities should be tracked with approvals and time‑bound treatment. Keep: change tickets; patch windows; vulnerability findings and risk acceptances.  

Effectiveness measurement & audit

Don’t just run controls—measure them. Set KPIs/KRIs, run internal audits, and brief management. Keep: dashboards; internal audit reports; management review minutes and action logs.  

People, hygiene & training

NIS2 expects basic cyber hygiene and role‑appropriate training. Keep: training plans and attendance; outcomes of phishing exercises or awareness campaigns.  

Cryptography, HR, access control, asset & physical security

Define crypto standards and key management; align joiner‑mover‑leaver processes with access reviews; maintain asset and information classification; secure facilities and environmental controls. Keep: key inventories and rotation logs; access review sign‑offs; up‑to‑date asset lists; site access logs and site assessments.  

The incident‑reporting timeline (and what to include)

NIS2 formalises a multi‑stage process for significant incidents. You must send an early warning within 24 hours, an incident notification within 72 hours, and a final report within one month of the incident notification (with a progress report if it’s still ongoing). Trust service providers have a stricter 24‑hour window for the incident notification. These timelines and contents are set out in Article 23 and explained in the Commission’s 2023 guidance.  

Turning requirements into evidence: how a DMS helps you prove it

Policies and processes are necessary, but audits hinge on evidence—who did what, when, and with which approvals. A modern DMS lets you embed that evidence into daily work so it’s captured automatically.

Example workflows that stand up in audits

A realistic 30‑day plan

Week 1 – Scope & leadership: 
Confirm whether you’re an essential or important entity using sector/size criteria, brief management on duties, and approve a top‑level security policy.  

Week 2 – Evidence foundations: 
Create three core registers—riskincident, and supplier—as DMS templates with mandatory metadata and retention rules. This is where most audit sampling starts.  

Week 3 – Incident readiness: 
Dry‑run the 24h/72h/one‑month flow with a tabletop exercise. Capture drafts and submissions inside the incident record so the audit trail tells the full story.  

Week 4 – Access & assurance: 
Turn on SSO, run a first access review, and file the sign‑off. Close the month with a management review note that references the new registers, tabletop results and any follow‑up actions.  

FAQs

Does NIS2 really apply already?

Yes. The transposition deadline was 17 October 2024, and the rules have applied since 18 October 2024. NIS1 was repealed at the same time.  

How do I know if I’m “essential” or “important”?

Check your sector against Annex I/II and apply the size‑cap rule. Member States must also create and maintain national lists by 17 April 2025, which helps confirm status.  

What exactly must be in each incident report?

Article 23 sets out content, and the Commission’s 2023 guidance explains it clearly: early warning in 24h, notification in 72h, and a final report within one month (progress report if still ongoing). Trust service providers have a stricter 24‑hour notification.

Start a free Folderit trial and ask for the NIS2 evidence workspace: risk/incident/supplier registers, policy approvals and acknowledgements, audit trailsretention automation, and SSO (Microsoft Entra, Okta, Google) preconfigured for fast onboarding.