Skip to content
TECHNOMATON | Docs SAI Certified Trainers

NIS2 | ISMS Requirements

Overview of Information Security Management System requirements under NIS2.


What is ISMS?

ISMS (Information Security Management System) is a systematic approach to managing an organisation’s information security. NIS2 requires the implementation of an ISMS for all Essential and Important entities.


ISMS Structure


NIS2 Specific Requirements (Article 21)

Mandatory Security Measures

#MeasureDescriptionPriority
1Risk analysis & policiesPolicies for risk analysis and information securityCritical
2Incident handlingPrevention, detection and response to incidentsCritical
3Business continuityBCM, backup, disaster recovery, crisis managementCritical
4Supply chain securitySupply chain securityHigh
5Network securitySecurity in acquisition and developmentHigh
6Vulnerability handlingVulnerabilities and their disclosureHigh
7Cybersecurity assessmentEvaluation of the effectiveness of measuresHigh
8Cybersecurity hygieneBasic practices and trainingHigh
9CryptographyUse of cryptography and encryptionHigh
10HR securityHuman resources securityMedium
11Access controlAccess managementCritical
12Asset managementAsset managementMedium
13MFA/Continuous authMulti-factor authenticationCritical

Technical Controls

Mandatory Technical Controls

ControlRequirementStandardStatus
Encryption at restAES-256 for dataFIPS 140-2/3Required
Encryption in transitTLS 1.3 for all APIsRFC 8446Required
Access ControlRBAC + MFANIST 800-63Required
Logging & MonitoringSIEM, 1-year retentionRequired
BackupRegular, encrypted, tested3-2-1 ruleRequired
Patch ManagementCritical <7d, High <30dRequired
FirewallNetwork perimeter + internalRequired
Endpoint ProtectionAntimalware, EDRRequired
IDS/IPSNetwork intrusion detectionRecommended
DLPData Loss PreventionRecommended

Encryption Standards


Organisational Controls

HR Security

PhaseControlDescription
Pre-employmentBackground checkAccording to position and access level
OnboardingNDANon-disclosure agreement
Security trainingBasic security training
Policy acknowledgementConfirmation of reading policies
Access provisioningLeast privilege
During employmentRegular trainingAt least annually
Phishing simulationAt least quarterly
Access reviewsAt least quarterly
OffboardingAccess revocationWithin 24h of termination
Asset returnDevices, keys, badges
Exit interviewSecurity debrief

Training Requirements

RoleTrainingFrequency
All employeesSecurity awarenessAnnually
All employeesPhishing awarenessQuarterly
IT staffTechnical securityBi-annually
DevelopersSecure codingBi-annually
ManagementSecurity governanceAnnually
CISO/Security teamAdvanced certificationsOngoing

Risk Management

Risk Assessment Process

Risk Matrix

Likelihood / ImpactLowMediumHighCritical
HighMediumHighCriticalCritical
MediumLowMediumHighCritical
LowLowLowMediumHigh
Very LowLowLowLowMedium

Business Continuity

BCM Components

ComponentDescriptionRequirement
BIABusiness Impact AnalysisIdentify critical processes
BCPBusiness Continuity PlanContinuity plan
DRPDisaster Recovery PlanTechnical recovery
IRPIncident Response PlanIncident response
CMPCrisis Management PlanCrisis management

Recovery Objectives

SystemRTORPO
Critical production<4h<1h
Web services<2h<1h
Email<8h<4h
Internal apps<24h<8h
Development<48h<24h

Testing Schedule

TestFrequencyScope
Backup restorationMonthlySample restore
Failover testQuarterlyDR site activation
Tabletop exerciseBi-annuallyScenario walkthrough
Full DR drillAnnuallyComplete failover

Vendor Security

Due Diligence Checklist

  • Security questionnaire
  • Certifications (ISO 27001, SOC 2)
  • Penetration test results
  • DPA (Data Processing Agreement)
  • NDA
  • Insurance certificate
  • Sub-processor list

Ongoing Monitoring

ActivityFrequency
Security reviewAnnually
Access auditQuarterly
Incident reviewOn incident
Contract reviewOn renewal

ISO 27001 Alignment

NIS2 requirements are closely aligned with ISO 27001:

NIS2 RequirementISO 27001 Control
Risk analysisA.6.1 Risk assessment
Incident handlingA.5.24-27
Business continuityA.5.29-30
Supply chainA.5.21-22
Vulnerability handlingA.8.8
Access controlA.5.15-18, A.8.2-5
CryptographyA.8.24
HR securityA.6.1-6

Recommendation: ISO 27001 certification significantly facilitates NIS2 compliance.


Implementation Roadmap


Next Steps

  1. ISMS requirements understood
  2. Compliance checklist
  3. Implement according to roadmap
  4. ISO 27001 certification (recommended)