Cybersecurity risk in supply chains continues to be a global issue that can greatly impact an organization’s operational resilience. As a result, many countries have established legislation and directives to standardize cybersecurity practices across various industries. The EU has released two notable pieces of legislation: the Digital Operational Resilience Act (DORA) and the updated Network and Information Security (NIS) Directive. While DORA is intended for financial institutions, NIS 2 is much broader in scope and applies to “essential and important entities.” NIS 2 is intended to strengthen cybersecurity efforts across industries such as energy, healthcare, transportation, and digital services.
This blog will cover some of the basic cybersecurity measures of the EU’s NIS 2 Directive. We’ll take a closer look at the incident management guidelines that NIS 2 establishes, although the Directive covers a wide range of topics that may be applicable to your organization. You’ll also learn some practical tips on aligning your third-party risk management program (TPRM) to the Directive’s supply chain cybersecurity goals.
Note: Excerpts from the NIS 2 Directive are noted in italics.
According to the Directive, Member States of the EU must have adopted and published compliance measures by October 17, 2024, in areas including supply chain security, incident handling, and business continuity, although there are currently delays as Member States interpret and apply the directive. Unlike DORA, which gives specific requirements for organizations to follow, NIS 2 sets guidelines and directions for how an organization can meet certain goals. Each Member State must determine for itself how to achieve those goals through its own laws and regulations.
For instance, the Directive requires organizations to implement basic cyber hygiene practices and cybersecurity training. This is a clear goal, yet it doesn’t describe what these practices must include or how the training must be carried out in terms of frequency, testing requirements, and certification. Under Article 21, NIS 2 outlines the following minimum requirements for cybersecurity risk management measures:
(a) policies on risk analysis and information system security;
(b) incident handling;
(c) business continuity, such as backup management and disaster recovery, and crisis management;
(d) supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers;
(e) security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure;
(f) policies and procedures to assess the effectiveness of cybersecurity risk-management measures;
(g) basic cyber hygiene practices and cybersecurity training;
(h) policies and procedures regarding the use of cryptography and, where appropriate, encryption;
(i) human resources security, access control policies and asset management;
(j) the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.
While many of these NIS 2 measures are general cybersecurity practices that Member States will likely expand on, others are supplemented with more detailed articles, particularly on incident management requirements. Organizations will have to report significant incidents, which can include any severe third-party incidents, particularly if the third-party stores, transmits, accesses, or processes your organization’s data.
NIS 2 defines incident handling as procedures that incorporate methods of prevention, detection, analysis, containment and/or response, and recovery. Article 10 requires each Member State to establish one or more computer security incident response teams (CSIRTs), while Article 23 outlines specific reporting obligations to take after an incident.
As each Member State develops its own laws and regulations for NIS 2 compliance, organizations will need to re-assess their TPRM programs to identify any gaps within their supply chain management. Fortunately, there are several best practices you can implement now to help prepare for compliance.
NIS 2 compliance may look slightly different depending on your jurisdiction and how each Member State interprets the objectives and expectations. Following TPRM best practices and staying informed of applicable laws and regulations is an effective strategy that will prepare your organization for NIS 2 compliance.