NIS2 Gap Analysis [Free Tool]

Find out your level of compliance with NIS 2

Instructions: The questions below cover all relevant NIS2 requirements - by filling out the answers, this tool will automatically calculate your company's level of compliance with this EU directive.

When answering questions, the following scale needs to be used: 
  • 1 — Not implemented: No process or activity implemented, or little/no evidence of any systematic achievement
  • 2 — Planned: Activity or process is planned but is not implemented, or the implementation just started
  • 3 — In progress: Activity or process is partially implemented, so that its full effects cannot be expected
  • 4 — Mostly implemented: Activity or process is fully or mostly implemented, documented, and relevant people are trained, but monitoring, measurement, and improvement are not systematic
  • 5 — Optimized: Activity or process is fully implemented, documented, and is continuously supervised, measured, and improved; relevant people are trained

Tip
Use the following document to comply with this requirement: Risk Treatment Plan.   See Preview

Tip
Use the following documents to comply with this requirement: Measurement Report + Internal Audit Report + Management Review Minutes.   See Preview

Tip
Use the following documents to comply with this requirement: Training and Awareness Plan.   See Preview

Tip
Use the following documents to comply with this requirement: Risk Treatment Table + Risk Treatment Plan + various policies and procedures mentioned below.   See Preview

Tip
Use the following documents to comply with this requirement: Risk Assessment Methodology + Risk Assessment Table.   See Preview

Tip
Use the following documents to comply with this requirement: Risk Assessment Methodology.   See Preview

Tip
Use the following documents to comply with this requirement: Policy on Information System Security.   See Preview

Tip
Use the following documents to comply with this requirement: Incident Management Procedure + Incident Log.   See Preview

Tip
Use the following documents to comply with this requirement: Business Continuity Plan.   See Preview

Tip
Use the following documents to comply with this requirement: Backup Policy.   See Preview

Tip
Use the following documents to comply with this requirement: Disaster Recovery Plan.   See Preview

Tip
Use the following documents to comply with this requirement: Crisis Management Plan.   See Preview

Tip
Use the following documents to comply with this requirement: Supplier Security Policy + Security Clauses for Suppliers and Partners + Confidentiality Statement.   See Preview

Tip
Use the following documents to comply with this requirement: Secure Development Policy + Specification of Information System Requirements.   See Preview

Tip

Tip
Use the following documents to comply with this requirement: IT Security Policy.   See Preview

Tip
Use the following documents to comply with this requirement: Training and Awareness Plan.   See Preview

Tip
Use the following documents to comply with this requirement: Policy on the Use of Encryption.   See Preview

Tip
Use the following documents to comply with this requirement: Security Policy for Human Resources.   See Preview

Tip
Use the following documents to comply with this requirement: Access Control Policy.   See Preview

Tip
Use the following documents to comply with this requirement: Asset Management Procedure + Inventory of Assets.   See Preview

Tip
Use the following documents to comply with this requirement: Authentication Policy.   See Preview

Tip
Use the following documents to comply with this requirement: Information Transfer Policy + Secure Communication Policy.   See Preview

Tip
Use the following documents to comply with this requirement: Secure Communication Policy.   See Preview

Tip
Use the following documents to comply with this requirement: Supplier Security Policy + Risk Assessment and Treatment Report.   See Preview

Tip
Use the following documents to comply with this requirement: Procedure for Corrective Action + Corrective Action Form.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Notification for CSIRT/Competent Authority.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Notification for Recipients of Services.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Notification for Recipients of Services.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Early Warning.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Notification for CSIRT/Competent Authority.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Intermediate Report.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Final Report.   See Preview

Tip
Use the following documents to comply with this requirement: Significant Incident Progress Report.   See Preview
NIS2 Gap Analysis Result:
Here's the percentage of your compliance with NIS2:
%

[The results will be sent to entered e-mail address]


For more information on what personal data we collect, why we need it, what we do with it, how long we keep it, and what your rights are, see this Privacy Notice.