Skip to content
TECHNOMATON | Docs SAI Certified Trainers

NIS2 Checklist

Deadline: 11.11.2026


Part B: NIS2 Compliance

#ActivityReferencePhaseDescription
B1NIS2 Scope DeterminationArt. 2, 3, Annex I/IIPreparationDo we fall under NIS2? Which regime? (Essential/Important)
B1.1— Service categorisationArt. 3, Annex I/IIPreparationCloud computing, ICT service, DNS, email, or other?
B1.2— Size threshold analysisArt. 2(1)PreparationNumber of employees, turnover (medium/large enterprise)
B1.3— Registration with national authorityArt. 3(4)PreparationRegister with the competent authority (if applicable)
B2GAP AnalysisArt. 21AnalysisAssessment of current state vs. NIS2 requirements
B2.1— Current state assessmentArt. 21AnalysisAudit of current security measures
B2.2— Gap identificationArt. 21(2)AnalysisIdentify gaps vs. the 10 baseline measures
B2.3— Remediation roadmapArt. 21AnalysisRemediation plan with priorities
B3Governance & ManagementArt. 20GovernanceManagement accountability for cybersecurity
B3.1— Management accountabilityArt. 20(1)GovernanceBoard approval of the security policy
B3.2— Management trainingArt. 20(2)GovernanceCybersecurity training for management
B3.3— Security committeeArt. 20GovernanceSecurity committee with regular reporting
B4ISMS SetupArt. 21ImplementationEstablish security management per NIS2 + ISO 27001
B4.1— Security policyArt. 21(2)(a)ImplementationInformation security policy
B4.2— Asset InventoryArt. 21(2)(a)ImplementationInventory: HW, SW, data, networks --- what is critical?
B4.3— Risk AssessmentArt. 21(2)(a)ImplementationRisk assessment per NIS2 methodology
B4.4— Risk Treatment PlanArt. 21(2)(a)ImplementationMitigate/Avoid/Accept/Transfer + timeline
B5Technical Controls (10 measures)Art. 21(2)ImplementationImplement the 10 baseline security measures
B5.1— Risk management policiesArt. 21(2)(a)ImplementationPolicies and procedures for risk management
B5.2— Incident handlingArt. 21(2)(b)ImplementationIncident resolution processes
B5.3— Business continuityArt. 21(2)(c)ImplementationBCP, DRP, crisis management
B5.4— Supply chain securityArt. 21(2)(d)ImplementationSupply chain security
B5.5— Network securityArt. 21(2)(e)ImplementationNetwork and information system security
B5.6— Vulnerability handlingArt. 21(2)(e)ImplementationVulnerability management, disclosure
B5.7— Security effectivenessArt. 21(2)(f)ImplementationMeasuring security measure effectiveness
B5.8— Cyber hygiene & trainingArt. 21(2)(g)ImplementationBasic cyber hygiene, training
B5.9— CryptographyArt. 21(2)(h)ImplementationCryptography and encryption policies
B5.10— HR securityArt. 21(2)(i)ImplementationHuman resources security, access control
B5.11— MFA & secure authArt. 21(2)(j)ImplementationMulti-factor authentication, secure communications
B6Technical Controls DetailArt. 21(2)ImplementationSpecific technical controls
B6.1— Encryption at restArt. 21(2)(h)ImplementationAES-256 for data at rest
B6.2— Encryption in transitArt. 21(2)(h)ImplementationTLS 1.3 for data in transit
B6.3— Access Control (MFA + RBAC)Art. 21(2)(i,j)ImplementationMFA for all admin accounts, RBAC
B6.4— Patch ManagementArt. 21(2)(e)ImplementationPatch SLA <30 days for critical
B6.5— Monitoring & Logging (SIEM)Art. 21(2)(b)ImplementationSIEM, 1-year retention
B6.6— Backup & RecoveryArt. 21(2)(c)Implementation3-2-1 backup, tested quarterly
B6.7— Firewall & IDS/IPSArt. 21(2)(e)ImplementationPerimeter and internal firewall, IDS/IPS
B6.8— Endpoint protectionArt. 21(2)(e)ImplementationEDR/XDR on all endpoints
B6.9— Network segmentationArt. 21(2)(e)ImplementationNetwork segmentation, microsegmentation
B7Incident ResponseArt. 21(2)(b), 23ImplementationIncident Response Plan and processes
B7.1— Incident Response PlanArt. 21(2)(b)ImplementationDocumented IRP
B7.2— Incident Response TeamArt. 21(2)(b)ImplementationDefined IRT with roles
B7.3— On-call rotationArt. 21(2)(b)Implementation24/7 availability for critical incidents
B7.4— Incident classificationArt. 23(3)ImplementationIncident severity classification
B7.5— Evidence preservationArt. 21(2)(b)ImplementationForensics, chain of custody
B8Incident ReportingArt. 23ReportingIncident reporting per NIS2 timeline
B8.1— Early warning (24h)Art. 23(4)(a)ReportingPreliminary report within 24 hours
B8.2— Incident notification (72h)Art. 23(4)(b)ReportingIncident report within 72 hours
B8.3— Final report (1 month)Art. 23(4)(d)ReportingFinal report within 1 month
B8.4— Authority contact establishedArt. 23ReportingContact with national authority, portal registration
B9Business ContinuityArt. 21(2)(c)ImplementationBCM/DRP plans
B9.1— Business Impact AnalysisArt. 21(2)(c)ImplementationBIA for critical services
B9.2— Business Continuity PlanArt. 21(2)(c)ImplementationBCP documentation
B9.3— Disaster Recovery PlanArt. 21(2)(c)ImplementationDRP with RTO/RPO
B9.4— RTO/RPO definedArt. 21(2)(c)ImplementationRTO <4h, RPO <1h for critical
B9.5— DR testing (annual)Art. 21(2)(c)TestingAnnual DR plan testing
B10Supply Chain SecurityArt. 21(2)(d)ImplementationSupplier and third-party security
B10.1— Vendor risk assessmentArt. 21(2)(d)ImplementationRisk assessment for all critical vendors
B10.2— Security questionnaireArt. 21(2)(d)ImplementationStandardised security questionnaire
B10.3— Vendor certifications (ISO/SOC)Art. 21(2)(d)ImplementationRequirement for ISO 27001 / SOC 2
B10.4— Vendor access controlArt. 21(2)(d)ImplementationVendor access management, JIT access
B10.5— Vendor monitoringArt. 21(2)(d)ImplementationOngoing vendor monitoring
B11Vulnerability ManagementArt. 21(2)(e)TestingVulnerability management
B11.1— Vulnerability scanningArt. 21(2)(e)TestingMonthly vulnerability scanning
B11.2— Penetration testingArt. 21(2)(e)TestingAnnual penetration tests
B11.3— Patch SLA definedArt. 21(2)(e)ImplementationCritical <7d, High <30d, Medium <90d
B11.4— Vulnerability disclosureArt. 21(2)(e)GovernanceCoordinated vulnerability disclosure policy
B12Training & AwarenessArt. 21(2)(g)TrainingEmployee cybersecurity training
B12.1— Security awareness programmeArt. 21(2)(g)TrainingRegular awareness training
B12.2— Phishing simulationsArt. 21(2)(g)TrainingQuarterly phishing tests
B12.3— Role-specific trainingArt. 21(2)(g)TrainingSpecialised training for IT, developers
B12.4— Training recordsArt. 21(2)(g)TrainingRecords of completed training
B13Continuous Monitoring (SOC)Art. 21(2)(b,e)Monitoring24/7 security monitoring
B13.1— SOC capabilityArt. 21(2)(b)MonitoringInternal SOC or managed SOC
B13.2— Threat detectionArt. 21(2)(b)MonitoringThreat detection (SIEM, EDR, NDR)
B13.3— Security metricsArt. 21(2)(f)MonitoringSecurity KPIs
B13.4— Threat intelligenceArt. 21(2)(b)MonitoringThreat intelligence feed integration
B14Security AuditsArt. 21(2)(f)AuditInternal and external audits
B14.1— Internal auditsArt. 21(2)(f)AuditMonthly internal audits
B14.2— External auditsArt. 21(2)(f)AuditBi-annual external audits
B14.3— Audit findings trackingArt. 21(2)(f)AuditTracking findings and remediation
B15ISO 27001 CertificationRecommendedCertificationFormal certification (strongly recommended)
B15.1— ISO 27001 gap analysisISO 27001CertificationGAP analysis vs. ISO 27001
B15.2— ISO 27001 Stage 1 auditISO 27001CertificationDocumentation audit
B15.3— ISO 27001 Stage 2 auditISO 27001CertificationImplementation audit
B15.4— CertificationISO 27001CertificationObtain certificate

Technical Controls

ControlRequirementReference
Encryption at restAES-256Art. 21(2)(h)
Encryption in transitTLS 1.3Art. 21(2)(h)
Access ControlMFA + RBACArt. 21(2)(i,j)
Patch Management<30 daysArt. 21(2)(e)
Monitoring & LoggingSIEM, 1y retentionArt. 21(2)(b)
Incident ResponseIRP written, testedArt. 21(2)(b)
Backup & RecoveryWeekly, tested quarterlyArt. 21(2)(c)
Vendor SecurityDue diligenceArt. 21(2)(d)

Critical Path

  1. B1 NIS2 Scope -> complete by 31.1.2026
  2. B2 GAP Analysis -> complete by 28.2.2026
  3. B7 Incident Response Plan -> complete by 28.2.2026
  4. B4.3-B4.4 Risk Assessment + Treatment -> complete by 30.4.2026
  5. B9 Business Continuity -> complete by 30.4.2026
  6. B15 ISO 27001 -> certification by 30.9.2026

Implementation Phases


Resources