The EU Network and Information Security (NIS) Directive was adopted by the European Commission in 2016 and focused on establishing comprehensive cybersecurity regulations across the European Union. The NIS Directive is a robust piece of legislation enforced by local laws within each member state, working alongside other EU-wide regulations like the GDPR and the Digital Operational Resilience Act (DORA).
The NIS Directive applies to Digital Service Providers (DSPs) and Operators of Essential Services (OES). Relevant digital service providers include services like online search engines, cloud computing services, and online marketplaces. On the other hand, OES provide critical infrastructure services that, if disrupted, could significantly impact individuals and the community.
Many member states provide individual NIS Compliance Guidelines for OES in their respective states. In this blog, we’ll explore general NIS Compliance Guidelines for OES and how they work towards enhancing cybersecurity for critical infrastructure for the European Union as a whole.
While the NIS Directive provides cybersecurity standards across the European Union, each member state must transpose them into local legislation. During the implementation process, many states drafted compliance guidelines to help organizations that must be NIS-compliant understand the new requirements.
A member state’s National Cyber Security Centre (NCSC) typically publishes NIS Compliance Guidelines for OES that outline all of the new requirements and provide practical guidance regarding compliance. The guidelines allow organizations of any size or level of cybersecurity risk to implement good practices and improve their security and cyber resilience.
NIS Regulations outline network and information security obligations for OES. The NIS Compliance Guidelines for OES explain these in detail, including that operators of essential services must:
Since OES can include organizations with little to no cybersecurity experience, the NIS Compliance Guidelines for OES also outline general principles for the security of network and information systems.
When implementing cybersecurity measures, OES should take the following principles into account, ensuring measures should be:
The NIS Compliance Guidelines for OES includes a section on general guidelines for security requirements. The following five phases are the core themes of the NIST Cybersecurity Framework and internationally accepted standards relevant to network and information systems security.
The NIS Regulations require all OES to notify the computer security incident response team (CSIRT) of any cybersecurity incidents that may significantly impact essential services.
NIS Guidelines for OES are specific to operators of essential services but can be broadly applied to organizations across various infrastructure sectors. However, OES must adhere to the regulations outlined in the NIS Directive, and implementing a cyber resilience program that aligns with international standards is a comprehensive way for OES to meet NIS regulatory compliance.
Organizations crucial to the functioning of important societal or economic activities are called Operators of Essential Services (OES). These operators are responsible for managing infrastructure, services, or facilities that, if disrupted, could have a significant impact on citizens' health, safety, security, economic well-being, or the efficient functioning of governments or the economy.
The NIS Directive identified several sectors as Operators of Essential Services, as these organizations are particularly susceptible to network and information system failures or cyber-attacks. The following are some of the sectors that are commonly classified as essential services under the NIS Directive:
Outside these categories, other OES can include civil administration, food production and distribution services, and telecommunication networks.
The NIS Compliance Guidelines do not specify any penalties for non-compliance with their guideline framework. Still, OES that do not comply with the NIS Directive face penalties often outlined individually by each member state.
Different types of infringements result in various penalties, including not reporting security incidents within the designated timeframe and failing to implement proper security measures. Penalties can range from fines to business restrictions, and the infringement's severity determines the punishment level.
Member states define their individual penalties, which include fines up to the greater of €10,000,000 or 2% of the global yearly revenue. Under the updated NIS2, fines can reach up to €7,000,000 or 1.4% of the annual global revenue, with the higher amount being applicable.
The NIS Directive allows member states to designate two National Competent Authorities that act as points of contact to review the application of regulations and ensure compliance with the directive.
National Competent Authorities can seek information from OES and carry out audits for compliance, including the Cyber Assessment Framework (CAF). NCAs also appoint officers to ensure compliance with OESs and issue compliance notices when an OES does not comply with NIS regulations.
If your organization operates an essential service or is just looking to upgrade your cybersecurity standards, UpGuard is here to help. Our all-in-one attack surface management tool, Breach Risk, keeps your assets monitored and protected.
UpGuard Breach Risk keeps you one step ahead with continuous monitoring, protects your digital assets with comprehensive data leak detection, and allows you to address potential cyber threats quickly. With additional features like attack surface reduction, shared security profiles, insight reporting, and more—Breach Risk is a valuable tool that measures and manages the overall external security of your company.