Cyber Resilience

How to Prepare for NIS2: What You Need to Know

The EU's NIS2 directive requires cyber resilience for member states
Image from InCyber

Much has been written about NIS2 recently as we head towards a key milestone in its implementation. By the 18th of October 2024, member states must adopt and publish the measures necessary to comply with the NIS2 directive.

While that date may instill panic among many, it’s just the date when the individual countries need to adopt NIS2 into law and repeal NIS1 (EU 2016/1148). The timeline for compliance of individual organizations will be defined in the laws enacted by individual states. For some, this could be up to four years beyond this date.

No matter when NIS2 will enter into force, it’s time for organizations to begin preparing to comply with NIS2’s mandates for cyber resilience.  

What is the difference between NIS1 and NIS2?

Many have asked why there’s a need for a version two or even a future version three of the NIS directive.  

The simple answer is that things change.  

The new NIS2 directive better reflects the current cybersecurity landscape. It also makes updates based on learnings from NIS1.

Since NIS1 entered into force in 2016:

  • The types of organizations that are viewed as critical have changed.
  • Technology has changed with an increase in automation and smart devices.
  • Cybersecurity has changed where the old focus on protecting static networks has been replaced by a more agile approach.
  • The adoption of Zero Trust has simplified how cybersecurity is deployed, resulting in a more secure approach at lower cost.
  • The types of cyberattacks have changed with an increase in disruptive attacks and the appearance of AI-generated attacks.

The other main reason for an update to NIS1 is to improve governance. The idea in 2016 was that each state would develop its own set of regulations and the national regulator would enforce them. Unfortunately, there has been a wide disparity in how each country has implemented NIS1, and so NIS2 sets out some minimum standards for certain focus areas and provided the European Commission with greater oversight.  

The final change is a reclassification of organizations and an expansion in the number and size of organizations included in the directive:

  • The distinction between essential services and digital service providers is replaced by classifying organizations on their importance to the country and dividing into essential and important categories.
  • Organizations with more than 50 employees and an annual turnover of more than €50m are now categorized as important.
The EU is considering more organizations as critical in the NIS2 directive
Image from Ernst & Young

How will NIS2 affect my organization?

NIS2 seeks to harmonize requirements across member states by setting specific rules for the frameworks members put in place. This focuses on certain cybersecurity measures, including:

  • Risk analysis and information system security policies
  • Incident handling
  • Business continuity and crisis management
  • Supply chain security
  • Secure network and systems acquisition, development and maintenance, including vulnerability handling and disclosure
  • Policies and procedures to assess effectiveness of measures
  • Basic computer hygiene practices and cybersecurity training
  • Policies and procedures regarding use of cryptography / encryption
  • The use of MFA, secured comms and secured emergency comms

Member states where these measures aren’t already incorporated in national regulations will need to add these features. And organizations in these countries that don’t already implement these controls will need to adopt them.

Likely the biggest impact of NIS2 is on organizations that haven’t been previously covered by NIS1. While this sounds concerning, research by ENISA shows that the average budget for NIS implementations is for projects that last 14 to 18 months.

What can my organization do now to prepare for NIS2?

In 2016, organizations were limited in the security tools and approaches available, trapped by static technologies like traditional AV, NAC and firewalls, and limited visibility.  

Even though Zero Trust was being discussed at that time, the focus was still on trying to prevent every attack by trying to detect all malware. Today, the combined threat of ransomware and AI poses new problems which the NIS2 directive will try to address.  

While specific NIS2 technical requirements aren’t yet available for each member state, organizations can get started on their journey toward compliance by adopting a breach containment approach using technologies like Zero Trust Segmentation, also called microsegmentation. This modern approach assumes breaches are inevitable and, in response, ensures proactive security measures are in place.

Eras of cybersecurity from the 2000s to 2020s

A Zero Trust breach containment strategy includes these key pillars:

  1. Assume breach and plan for it
  1. Identify all assets and resources and map interdependencies
  1. Protect against all vulnerabilities and exposed ports
  1. Respond quickly and with agility
  1. Restore safely without reinfection

The purpose of the NIS directive is to improve the resilience of critical infrastructure across the European Union. This means making sure that services can be maintained while under attack.  

To achieve this, the focus must shift from trying to stop an attack to making sure that an attack is contained and cannot reach an organization’s business-critical resources.  

NIS2: A simpler framework for securing essential services

Compared to traditional prevention and detection strategies, a breach containment approach is much simpler because organizations only need to define the few things that are allowed in the network as opposed to the thousands of things that need to be stopped. The ability of AI to find vulnerabilities and open connections makes us more susceptible to a breach but a shift in approach can help.  

By focusing on protecting the resource regardless of whether it is on a server, in the cloud or an OT device saves the complexity of trying to design policy for static network-based security technologies.

Get more information about how Illumio protects essential services organizations.  

Contact us today for a free demo and consultation.  

Related topics

No items found.

Related articles

RSA Conference Highlights: New Approaches for Today's Cyber Threats
Cyber Resilience

RSA Conference Highlights: New Approaches for Today's Cyber Threats

During the last two years, organizations have shifted to increasingly hybrid, distributed IT infrastructure models, which have opened up all-new cybersecurity vulnerabilities and risks. Meanwhile, we have seen one devastating cyberattack after another reach news headlines.

Malware Payloads & Beacons: Types of Malicious Payloads
Cyber Resilience

Malware Payloads & Beacons: Types of Malicious Payloads

Understanding distinct types of payloads and reviewing an example of malicious code they may employ.

Resilient Critical Infrastructure Starts with Zero Trust
Cyber Resilience

Resilient Critical Infrastructure Starts with Zero Trust

From the Colonial Pipeline breach to the JBS ransomware attack, the past year has shown us that cyberattacks on U.S. critical infrastructure are more relentless, sophisticated, and impactful than ever before – and all too often threaten the economic stability and wellbeing of U.S. citizens.

The EU's NIS2 and DORA Security Directives: What You Need to Know
Cyber Resilience

The EU's NIS2 and DORA Security Directives: What You Need to Know

Learn the 3 ways Illumio Zero Trust Segmentation can help achieve NIS2 and DORA compliance.

S&P Global: Top 3 Ways to Address Critical Infrastructure's Ransomware Threat
Ransomware Containment

S&P Global: Top 3 Ways to Address Critical Infrastructure's Ransomware Threat

Trevor Dearing, Illumio solutions marketing director, and Eric Hanselman, Global Market Intelligence chief analyst of S&P Global address ransomware concerns.

10 Reasons to Choose Illumio for Zero Trust Segmentation
Zero Trust Segmentation

10 Reasons to Choose Illumio for Zero Trust Segmentation

More and more organizations are interested in microsegmentation, especially Zero Trust Segmentation.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?