The NIS2 Directive: Complete Guide to Directive (EU) 2022/2555
Published Mar 16, 2026
Updated Apr 13, 2026
By Orbiq Team

The NIS2 Directive: Complete Guide to Directive (EU) 2022/2555

The NIS2 Directive (EU 2022/2555) is the EU's primary cybersecurity legislation. This guide covers the directive's structure, key articles, national transposition status, competent authorities, and how it differs from other EU cybersecurity laws.

NIS2
EU Directive
Cybersecurity Legislation
Compliance

The NIS2 Directive: Complete Guide to Directive (EU) 2022/2555

The NIS2 Directive — formally Directive (EU) 2022/2555 — is the European Union's central cybersecurity legislation. Adopted on 14 December 2022 and published in the Official Journal of the European Union on 27 December 2022 (OJ L 333), it replaced the original NIS Directive and established mandatory cybersecurity obligations across 18 critical and important sectors.

This guide covers the directive as a legal instrument: its structure, key articles, transposition status, and its relationship to other EU cybersecurity legislation.

Quick Answers

QuestionShort answer
What is the legal text?Directive (EU) 2022/2555, CELEX 32022L2555
When did it enter into force?16 January 2023
What was the transposition deadline?17 October 2024
What changed after the deadline?The Commission started infringement action because many Member States had not fully transposed NIS2
What should companies do now?Confirm scope, identify the national authority, build Article 21 controls, and prepare Article 23 reporting workflows

Official Reference and Legal Basis

AttributeDetail
Official titleDirective (EU) 2022/2555 of the European Parliament and of the Council
Short titleNIS2 Directive
Adoption date14 December 2022
Publication date27 December 2022
OJ referenceOJ L 333, 27.12.2022, p. 80–152
Entry into force16 January 2023
Transposition deadline17 October 2024
Legal basisArticle 114 TFEU (internal market)
EUR-Lex reference32022L2555

The directive replaces and repeals Directive (EU) 2016/1148 (the original NIS Directive). It is a directive — not a regulation — which means it required transposition into each Member State's national law. This contrasts with the approach taken for DORA (a regulation, directly applicable) and has led to variation in implementation timing and national specifics.


Why the NIS2 Directive Was Created

The original NIS Directive (2016/1148) was the EU's first sector-wide cybersecurity legislation. By 2020, its shortcomings were clear:

  • Fragmented implementation: Each Member State transposed it differently, creating 27 different compliance regimes
  • Too narrow: Only 7 sectors covered, with significant gaps in critical infrastructure
  • Inconsistent enforcement: No minimum penalty thresholds meant nominal fines in some countries
  • No supply chain requirements: The SolarWinds and Kaseya incidents exposed the risk of focusing only on direct network security
  • No management accountability: Cybersecurity was treated as an IT issue, not a board-level responsibility

The European Commission initiated a review in 2020. The proposed directive was published in December 2020, negotiated through the EU legislative process throughout 2021–2022, and adopted in December 2022.


Structure of the Directive

The NIS2 Directive contains 46 articles across 7 chapters and 2 annexes, preceded by 144 recitals that provide legislative intent and context.

ChapterTitleKey Articles
IGeneral provisions1–6 (subject matter, scope, definitions)
IICybersecurity risk-management measures and reporting obligations20–26 (the core requirements)
IIIJurisdiction and registration26–27
IVEuropean cybersecurity crisis management15–16, 19
VInformation sharing29–30
VISupervision and enforcement31–36
VIIFinal provisions37–46 (transposition, entry into force, repeal of NIS1)

Annex I — Essential Entities (Highly Critical Sectors)

Energy, transport, banking, financial market infrastructures, health, drinking water, wastewater, digital infrastructure, ICT service management (B2B), public administration, space.

Annex II — Important Entities (Other Critical Sectors)

Postal and courier services, waste management, manufacture, production and distribution of chemicals, production, processing and distribution of food, manufacturing (medical devices, electronics, machinery, motor vehicles), digital providers, research organisations.


Key Articles for Organisations

Article 20 — Governance

Management bodies of essential and important entities must:

  • Approve cybersecurity risk management measures
  • Oversee their implementation
  • Undergo cybersecurity training
  • Bear personal liability for infringements

This article makes NIS2 compliance a board-level obligation, not just an IT function.

Article 21 — Cybersecurity Risk-Management Measures

The core operational requirement. Organisations must implement 10 specific measures:

  1. Risk analysis and information security policies
  2. Incident handling
  3. Business continuity and crisis management
  4. Supply chain security
  5. Security in network and information systems acquisition, development and maintenance
  6. Policies to assess effectiveness of cybersecurity risk management measures
  7. Basic cyber hygiene practices and cybersecurity training
  8. Cryptography and encryption policies
  9. Human resources security, access control, and asset management
  10. Use of multi-factor authentication and continuous authentication solutions

The directive specifies these measures must be proportionate to the risk, taking into account exposure to risks, organisation size, the likelihood and severity of incidents, and the societal and economic impact of potential incidents.

Article 23 — Reporting Obligations

When a significant incident occurs, the affected entity must report to its national CSIRT or competent authority:

TimelineReport typeContent
24 hoursEarly warningSuspected malicious cause; potential cross-border impact
72 hoursIncident notificationUpdated assessment, initial severity/impact, indicators of compromise
1 monthFinal reportDetailed description, root cause, mitigation measures, cross-border impact

A "significant incident" is defined as one that has caused or is capable of causing severe operational disruption or financial loss, or that has affected or could affect other persons by causing considerable damage.

Article 24 — Use of European Cybersecurity Certification Schemes

Member States may require organisations to use specific EU cybersecurity certification schemes (under the EU Cybersecurity Act) to demonstrate compliance with certain aspects of Article 21. This creates a bridge between NIS2 and the EU's cybersecurity certification framework.

Articles 32–36 — Supervision and Enforcement

Essential entities are subject to proactive supervision (regular audits, on-site inspections, security scans). Important entities are subject to reactive supervision (triggered by incidents or evidence of non-compliance).

Penalty thresholds are set in Article 34:

  • Essential entities: up to €10 million or 2% of global annual turnover
  • Important entities: up to €7 million or 1.4% of global annual turnover

National Transposition Status and 2026 Enforcement Reality

The transposition deadline was 17 October 2024. Many Member States missed this deadline. The most important update is not a single country table that goes stale. It is the enforcement pattern:

  • 28 November 2024: the European Commission opened infringement procedures against 23 Member States for failing to fully transpose NIS2.
  • 7 May 2025: the Commission sent reasoned opinions to 19 Member States that had still not notified full transposition.
  • 2026 operating reality: multi-country organisations need a country-by-country view of scope, registration, incident reporting channels, supervisory authority, and sector-specific guidance.

For planning, separate the EU-level directive from the national implementation layer:

Country or marketWhat to verify locally
GermanyBSI supervision, KRITIS and covered entity thresholds, registration process, and German-language evidence expectations
FranceANSSI guidance, sector allocation, national reporting process, and implementation timeline
NetherlandsNCSC-NL and sector authority responsibilities, registration and incident notification process
BelgiumCentre for Cybersecurity Belgium (CCB) guidance, scope confirmation, and reporting process
ItalyACN and CSIRT Italy reporting process, registration obligations, and sector guidance
Cross-border groupsWhich legal entity is in scope, which authority receives reports, and how evidence is shared between entities

The official European Commission transposition page should be treated as the starting point, not the only source. Your actual obligations depend on the national law and guidance applicable to the legal entity and sector.


National Competent Authorities

Each Member State designates one or more competent authorities responsible for NIS2 supervision. Key authorities:

CountryAuthorityRole
GermanyBSI (Bundesamt für Sicherheit in der Informationstechnik)Supervision + national CSIRT
FranceANSSI (Agence nationale de la sécurité des systèmes d'information)Supervision + national CSIRT
NetherlandsNCSC-NL + sector authoritiesSupervision; NCSC-NL = national CSIRT
BelgiumCCB (Centre for Cybersecurity Belgium)Supervision + national CSIRT
ItalyACN (Agenzia per la Cybersicurezza Nazionale)Supervision + national CSIRT

Organisations must report significant incidents to their national CSIRT and may need to register with their competent authority.


NIS2 Directive vs. Other EU Cybersecurity Legislation

The NIS2 Directive is one piece of the EU's evolving cybersecurity regulatory framework. Understanding how it interacts with other legislation is essential for compliance planning:

RegulationRelationship to NIS2
DORA vs NIS2 (Digital Operational Resilience Act)Lex specialis for financial sector. Financial entities subject to DORA are deemed compliant with equivalent NIS2 requirements. DORA is a regulation (directly applicable), not a directive.
Cyber Resilience Act (CRA)Applies to manufacturers of products with digital elements. Complements NIS2 by addressing supply chain risk at the product level. CRA compliance can contribute to NIS2 Article 21 supply chain requirements. The CRA's September 2026 vulnerability reporting deadline is the first hard enforcement date for product manufacturers.
GDPRNIS2 incident reporting (Article 23) and GDPR personal data breach reporting (Article 33 GDPR) may apply simultaneously for the same incident. Different timelines (NIS2: 24/72h; GDPR: 72h to supervisory authority).
EU Cybersecurity ActProvides the certification framework referenced in NIS2 Article 24. EUCC, EU5G, and other schemes may be used to demonstrate NIS2 compliance.
eIDAS 2 / EUDIWDigital identity regulation; overlaps with NIS2 for trust service providers and digital infrastructure operators.

Key Definitions in the Directive (Article 6)

Article 6 defines 41 terms. The most important for compliance purposes:

  • Essential entity: An entity listed in Annex I that meets the size threshold (or is in scope regardless of size)
  • Important entity: An entity listed in Annex II that meets the size threshold
  • Significant incident: An incident that has caused or is capable of causing severe disruption or financial loss, or that has caused or could cause considerable damage to others
  • Network and information system: Electronic communications networks, devices, or software within such systems
  • Cybersecurity: Activities to protect network and information systems against risks to their availability, authenticity, integrity, or confidentiality
  • Incident: An event compromising the availability, authenticity, integrity, or confidentiality of stored, transmitted, or processed data or of services

What the NIS2 Directive Means for Your Organisation

The NIS2 Directive is not a compliance checkbox exercise. Its recitals (especially Recitals 79–93) make clear that the EU legislature intended operational cybersecurity, not just documented policies:

  • Recital 79: Risk management measures must be proportionate and reflect actual risk exposure
  • Recital 89: Incident reporting timelines are designed to ensure rapid information sharing to contain cross-border threats
  • Recital 93: Management bodies must take direct ownership of cybersecurity risk, not delegate it entirely to technical teams

The directive's emphasis on management accountability (Article 20), continuous monitoring requirements, and supply chain security means compliance requires operational infrastructure — not just policy documents.

Organisations that want to demonstrate compliance credibly need:

  1. A functioning incident detection and reporting workflow capable of meeting 24/72-hour deadlines
  2. Supply chain monitoring that goes beyond annual questionnaires
  3. Evidence management that creates an auditable compliance trail
  4. Management training and governance showing board-level oversight

If you are deciding which tooling stack can support that operational layer, start with our compliance automation software comparison, compliance management software guide, and best ISMS software comparison, which separate EU-native operational workflows from generic framework mapping.


How Orbiq Helps With NIS2 Directive Compliance

Orbiq is built to address the operational gaps that make NIS2 directive compliance difficult in practice:

  • Continuous Monitoring: Automated evidence collection across all 10 Article 21 measures, with real-time dashboards showing your compliance status
  • Vendor Assurance: Centralised supplier assessments and continuous third-party monitoring to meet Article 21(2)(d) supply chain requirements
  • Trust Center: A public-facing compliance portal that demonstrates your NIS2 posture to customers, regulators, and auditors
  • Evidence Management: Automated collection and organisation of compliance evidence, creating the auditable trail that competent authorities expect under Articles 32–36

Unlike US-centric compliance platforms that treat NIS2 as an add-on, Orbiq is designed for European regulations from the ground up — with EU data residency and understanding of how competent authorities across DE, FR, NL, and BE approach NIS2 supervision.


Related NIS2 Articles


Sources

  1. EUR-Lex — Directive (EU) 2022/2555 — official NIS2 legal text.
  2. European Commission — NIS2 transposition in EU countries — state-of-play and infringement update.
  3. European Commission — 23 Member States called to fully transpose NIS2, 28 November 2024 — letters of formal notice.
  4. European Commission — 19 Member States sent reasoned opinions, 7 May 2025 — reasoned opinions.

Last updated 13 April 2026. Transposition status changes through national laws and Commission notifications; verify country-specific details before relying on deadlines.

The NIS2 Directive: Complete Guide to Directive (EU)...