JustAppSec
Back to guides

NIS2 for development teams: a practical bridge from EU directive to your codebase

NIS2 (Directive (EU) 2022/2555) is the EU's updated network and information security directive. It replaces the original NIS Directive, widens the in-scope sectors, raises the baseline of mandatory controls, and adds real teeth: management-board accountability, mandatory supply-chain due diligence, and fines up to EUR 10 million or 2% of global turnover.

If you build software for EU regulated sectors - or for anyone who does - NIS2 already touches your roadmap. This guide translates the directive into developer-facing controls and shows how the work overlaps with the Cyber Essentials controls UK teams already know.

Who is in scope

NIS2 applies to essential and important entities operating in the EU above the medium-enterprise threshold (>= 50 staff or EUR 10m turnover). Sectors include:

  • Essential: energy, transport, banking, financial market infrastructure, health, drinking water, waste water, digital infrastructure (DNS, TLD, cloud, data centres, CDNs), ICT service management (B2B), public administration, space.
  • Important: postal/courier, waste management, chemicals, food, manufacturing of medical devices and electronics, digital providers (online marketplaces, search engines, social platforms), research.

Even if you sit outside the listed sectors, your customers in those sectors will push the requirements down to you contractually. Treat that as the practical scope.

The ten Article 21 measures, translated

Article 21 lists the risk-management measures every in-scope entity must implement. Most map cleanly to engineering work.

Article 21 measureWhat it means in your codebase and pipeline
Risk analysis and information system security policiesDocumented threat models per service; written AppSec policy; reviewed annually
Incident handlingDetection rules, on-call, runbooks, post-incident review process
Business continuity and crisis managementBackups, restore drills, RTO/RPO documented per service
Supply chain securitySBOMs, dependency scanning, vendor security questionnaires, action pinning
Security in acquisition, development and maintenanceSecure SDLC, code review with security focus, vulnerability handling SLA
Policies to assess effectivenessKPIs for AppSec, periodic control testing, audit trail
Basic cyber hygiene practices and trainingAnnual security training for engineers, secure-coding refreshers
Cryptography and encryptionTLS everywhere, modern algorithms, documented key-management
Human resources, access control, asset managementRBAC in apps, least-privilege service accounts, joiner/leaver process
Multi-factor authentication and secure communicationsMFA on all admin access, signed/encrypted internal comms where relevant

Most of these will already exist in mature engineering organisations under different names. NIS2 makes them mandatory and makes the board accountable for them.

Incident reporting timeline

NIS2 sets a tight clock for significant incidents:

StageDeadlineWhat you submit
Early warning24 hours from awarenessWhether the incident appears caused by malicious acts and could have cross-border impact
Incident notification72 hours from awarenessUpdate to the early warning, initial assessment of severity, indicators of compromise
Intermediate reportOn requestStatus update from the competent authority
Final report1 month after notificationDetailed description, threat type, mitigations, cross-border impact

For software teams that means:

  • Detection has to be reliable. If you only learn about incidents from customer tickets, you will miss the 24-hour clock.
  • Logging has to be queryable in minutes, not days. Pre-build the queries that answer "what data was accessed?" and "from which IPs?".
  • On-call has to know the regulatory clock. Add a NIS2 reporting step to incident runbooks for in-scope services.

Supply chain due diligence

This is the part that affects every software vendor in Europe, in scope or not.

In-scope entities must assess the security of their suppliers. In practice you will be asked for:

  • A current SBOM for each release of your product.
  • Evidence of dependency scanning in your CI pipeline (and SLAs for fixing High/Critical findings).
  • Action and image digest pinning (no @latest, no floating tags).
  • Documented patch SLAs - typically 14 days for critical vulnerabilities, mirroring Cyber Essentials.
  • A vulnerability disclosure process with a published security contact.
  • A track record of timely incident communications to customers.

Most of this is the same evidence Cyber Essentials Plus already asks for. The difference is that NIS2 makes it continuous and contractual, not annual and self-assessed.

How NIS2, Cyber Essentials, and DORA fit together

FrameworkGeographyStyleBest for
Cyber EssentialsUKFive baseline controls, annual self-assessment (or audited Plus)Floor for UK government supply chain
NIS2EUTen risk-management measures + incident reporting + supply chainEU essential/important entities and their suppliers
DORAEU financeOperational resilience, ICT risk, third-party registerBanks, insurers, payment firms and their critical ICT providers

If you already meet Cyber Essentials, you have a strong head start on NIS2 - but you still need to add incident-reporting workflows, supply-chain due diligence on your own dependencies, and board-level accountability. If you sell to EU finance, see also our companion guide on DORA secure SDLC for development teams.

A 90-day NIS2 readiness plan

Days 1-30:

  • Inventory the services you sell into EU essential or important entities.
  • Map each service to the Article 21 measures and identify gaps.
  • Assign a board-level owner.

Days 31-60:

  • Stand up an SBOM pipeline for every customer-facing release.
  • Add a NIS2 reporting step to every relevant incident runbook.
  • Run a tabletop incident exercise against the 24h / 72h clock.

Days 61-90:

  • Issue an updated supplier security questionnaire to your own critical vendors.
  • Publish an external vulnerability disclosure policy.
  • Capture a single-page evidence pack you can share with procurement.

Where to go next

NIS2 is not a one-off project. It is a continuous obligation, with an audit trail, that the board now answers for. Build the controls into the way your team ships software - not into a binder that lives on a shared drive.

Published 24 Apr 2026

Frequently asked questions

Does NIS2 apply to UK companies?
Not directly post-Brexit, but indirectly via supply chain. UK companies that supply software, SaaS, or managed services to EU essential or important entities will be asked to evidence equivalent controls in procurement.
What is the difference between essential and important entities?
Both must implement the same Article 21 controls. Essential entities (energy, transport, banking, health, digital infrastructure) face proactive supervision and higher fines (up to EUR 10m or 2% turnover). Important entities (postal, waste, food, manufacturing, digital providers) face reactive supervision and lower caps (EUR 7m or 1.4%).
What are the NIS2 incident reporting deadlines?
Early warning within 24 hours of becoming aware, incident notification within 72 hours, intermediate update on request, and final report within one month. Your detection, on-call, and comms processes must support that clock.
How does NIS2 compare to Cyber Essentials?
Cyber Essentials gives you five technical controls and an annual assessment. NIS2 demands ten broader risk-management measures, mandatory supply-chain due diligence, mandatory incident reporting, and management-board accountability. Cyber Essentials is a strong starting point but not a substitute.

Related


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.