15 implementation steps for NIS 2 cybersecurity risk management measures

Complying with complex regulations like the NIS 2 Directive is never easy, but if you have a clear plan for how to do it, this whole project will become more straightforward. This article presents best practice on which steps to follow to achieve full compliance with NIS2 Chapter IV called “Cybersecurity risk-management measures and reporting obligations” — the article focuses on this chapter because it presents key NIS 2 requirements that companies (i.e., essential and important entities) need to be compliant with.

To become compliant with NIS 2 Chapter IV called “Cybersecurity risk-management measures and reporting obligations,” companies need to follow 15 steps that start with obtaining management support, and end with periodic internal audit, management review, and corrective actions.

From my experience, the quickest way to become NIS 2 compliant is to follow these 15 steps:

15 implementation steps for NIS 2 cybersecurity risk management measures - Advisera

1) Obtain senior management support

You might think that, since NIS2 is mandatory, complying with this regulation will go smoothly with or without senior management commitment. Unfortunately, the reality is different — if the top management does not actively support such a project, it will be slow, underfunded, and blocked at every possible step.

So, even though NIS 2 is mandatory, you still have to convince your executives that this is something worth focusing on.

2) Set up project management

NIS 2 is too complex to just give it to your, e.g., IT administrator, hoping that everything will turn out fine. First of all, you cannot expect someone without formal authority to succeed with such a big project, and second – you need to have a clear idea of the implementation steps, milestones, main outcomes, responsibilities, etc.

In other words, a project approach is necessary if you want to succeed.

3) Perform initial training

NIS 2 places a big emphasis on performing security training, and it makes sense to perform initial training very early in the project.

This way, everyone involved will have a much better picture of what NIS 2 is, what needs to be done, why it is needed, etc. — and you will launch your project much more easily.

See this article to get some ideas for training topics: How to perform training and awareness according to NIS 2.
15 implementation steps for NIS2 cybersecurity risk management measures

 

4) Write a top-level Policy on Information System Security

Even though NIS2 does not specifically require a top-level document that would define the direction for cybersecurity, such a document is a best practice according to international standards because of the following fact: if you don’t know where you are going, you will likely get lost.

This is why such a top-level document is needed – it clearly shows what needs to be achieved with cybersecurity, what the main roles and responsibilities are, and how the success will be measured.

5) Define the Risk Management Methodology

Risk management is usually the most complex step in the compliance process, and, on top of this, NIS 2 has some specific requirements for how this risk management needs to be done.

To make sure that your company is compliant with NIS 2, and to make sure everyone in the company understands how risks need to be managed, you have to create a document that specifies clear rules – this is done through the Risk Management Methodology document.

6) Perform risk assessment and treatment

During the risk assessment, you have to find out what could jeopardize your information systems – this is usually done by listing assets and related threats and vulnerabilities; further, you have to find out how big those risks are by assessing likelihood and severity (impact).

After you have the list of risks, you have to figure out how to treat (i.e., mitigate) the highest risks – for most of them, you will implement the cybersecurity measures defined in Article 21. In this way, you have cybersecurity that is based on a thorough analysis, rather than implementing various measures without knowing why.

7) Write and approve the Risk Treatment Plan

Once you have a complete idea of which risks you have and how to treat them, you will need to create a concrete plan for how to implement cybersecurity measures – and, even more importantly, to get the approval of senior management for such a plan.

The Risk Treatment Plan is in fact an implementation plan, and it typically includes a list of all cybersecurity measures (i.e., activities, processes, and technologies) that need to be implemented, together with information on who is in charge, what the deadlines are, etc.

8) Implement cybersecurity measures

Of course, the key NIS 2 requirement is to implement various cybersecurity measures. In practice, this means that you will have to introduce new security processes, activities, and, in some cases, new technology, all based on the results of the risk assessment.

In any case, you will have to write various cybersecurity policies and procedures to set clear rules for those new processes, activities, and technologies.

See here which cybersecurity measures are needed, and which documents to use: List of required documents according to NIS 2.

9) Set up supply chain security

NIS 2 has recognized that an increasing number of security incidents are related to breaches with suppliers – it requires paying close attention to relationships with suppliers and service providers, which includes assessment of their vulnerabilities, and studying their software development procedures.

This is done through a formal risk assessment of suppliers, selecting only reliable suppliers to work with, including security clauses in agreements with them, and monitoring their security posture.

10) Set up the assessment of cybersecurity effectiveness

NIS 2 requires the senior management to oversee the implementation of cybersecurity measures – the best practice is to do this in three ways: (1) by continuously measuring and monitoring cybersecurity to be able to spot any deviations, (2) by introducing periodic internal audits to discover nonconformities, and (3) by introducing periodic management review to have a formal session for reviewing all facts related to cybersecurity.

To set up those activities, you have to write a few key documents: Measurement Methodology, Internal Audit Procedure, and Management Review Procedure.

11) Set up incident reporting

One of the key NIS 2 requirements is to notify the CSIRT (or competent authority), and the recipients of services, about significant incidents.

Entities need to submit several types of reports to the CSIRT: an early warning, an incident notification, an intermediate report, a final report, and a progress report.

Learn more here: What are reporting obligations according to NIS 2?

12) Set up continual cybersecurity training

NIS 2 is very specific about setting up cybersecurity for all employees, including the senior management. The challenge here is how to select the right topics, and what form of training to choose in order to get the right knowledge transfer without spending too much time or money.

See some potential approaches here: How to perform training and awareness according to NIS 2.

13) Periodic internal audit

It is true that the internal audit is not mentioned in NIS 2; however, ISO 27001 and other international standards suggest the internal audit as the best practice for senior management to be able to oversee the implementation of cybersecurity measures.

Without identifying nonconformities during the internal audit, the senior management would never have a complete picture of the state of cybersecurity, which could lead to incidents and liability.

14) Periodic management review

A management review is a formal meeting at which the senior management needs to receive all relevant information about cybersecurity (e.g., Measurement Report, Internal Audit Report, etc.) in order to make key decisions about cybersecurity.

During the management review, the senior management could raise corrective actions, change key roles and responsibilities, set new security objectives, define the security budget, etc.

15) Execute corrective actions

Corrective actions are a systematic way to resolve nonconformities – during their implementation, the cause of a nonconformity is formally analyzed, and the activities to eliminate this cause are defined and executed.

In other words, the purpose of corrective actions is to make sure that similar nonconformities do not happen again.

For more information about NIS2, download this free white paper: Comprehensive guide to the NIS 2 Directive.

Advisera Dejan Kosutic

Dejan Kosutic

Leading expert on cybersecurity & information security and the author of several books, articles, webinars, and courses. As a premier expert, Dejan founded Advisera to help small and medium businesses obtain the resources they need to become compliant with EU regulations and ISO standards. He believes that making complex frameworks easy to understand and simple to use creates a competitive advantage for Advisera's clients, and that AI technology is crucial for achieving this.

As an ISO 27001 and NIS 2 expert, Dejan helps companies find the best path to compliance by eliminating overhead and adapting the implementation to their size and industry specifics.
Read more articles by Dejan Kosutic