UnveilTech

UnveilScan Blog

← All articles

Try UnveilScan free

NIS 2: cybersecurity for organizations who didn't sign up

Posted 2026-04-29 · 6 min read · complianceEUNIS-2

The EU NIS 2 directive (Directive (EU) 2022/2555) replaced the original NIS directive in October 2024. Member states had to transpose into national law by 2024-10-17. France (LOI n° 2025-XXX), Germany (NIS2UmsuCG), Italy, Spain — most of the EU has now codified it. Enforcement powers are real, including up to €10M or 2% of global turnover for non-compliance with critical operators, €7M / 1.4% for important operators.

Most affected mid-market companies still don't realise they're in scope. If you operate in any of the 18 sectors below at medium-or-larger size (50+ headcount AND €10M+ turnover, OR any size for some sectors), NIS 2 applies to you.

Are you in scope?

Sector groupExamplesCritical/Important
EnergyPower, gas, oil, district heatingCritical
TransportAir, rail, water, roadCritical
Banking, financial marketsBanks, exchangesCritical
HealthHospitals, labs, devicesCritical
WaterDrinking + wasteCritical
Digital infrastructureDNS, TLD registries, cloud, CDN, data centers, B2B IXPsCritical
Public administrationGovernment bodiesCritical (often)
Postal/courierEU national post + DHL, UPS, etc.Important
Waste managementIndustrialImportant
ChemicalsProduction / distributionImportant
FoodProduction + distribution chainsImportant
ManufacturingMedical devices, computers, electrical equipment, vehiclesImportant
Digital providersOnline marketplaces, search engines, social platformsImportant
ResearchResearch orgs (incl. universities under some interpretations)Important

Notable: cloud providers, CDNs, B2B IT services, and SaaS that operate in any of the above sectors are pulled into scope as supply-chain dependencies.

What you must do

NIS 2 has 10 mandatory measures (Article 21). The web/email-relevant ones:

  1. Risk analysis + ISMS — formal documented process. Most orgs have an ad-hoc one; document it.
  2. Incident handling — written procedures + escalation chain. 24h initial notification, 72h details, 1 month final report to your national CSIRT.
  3. Business continuity + crisis management — backups, restoration tests, alternative comms.
  4. Supply chain security — assess third-party risks. SaaS vendors used internally now need to be vetted.
  5. Network and information system security — patching, monitoring, segmentation. THIS is where domain scanning fits.
  6. Vulnerability disclosure policy — must accept and handle external reports. security.txt + bug bounty.
  7. Cryptography policies — define what's strong, when to rotate.
  8. Personnel security — onboarding, offboarding, training.
  9. Access control — MFA mandatory for admin, least-privilege.
  10. Asset management — keep an inventory.

Reporting obligations (the part that scares people)

A "significant incident" — defined as one that "causes severe operational disruption or financial loss" — triggers reporting:

"Significant" is intentionally subjective; competent authorities adjudicate. In practice, a ransomware event, a customer data breach, or an extended outage of a critical service counts.

Where domain scanning fits

NIS 2 doesn't say "use a domain scanner". But it requires:

A regular external attack-surface assessment, with documentation showing the findings triaged and remediated, is the most direct evidence you can show an auditor under Art. 21.

Penalties

For "essential entities" (critical sector + medium-or-larger):

For "important entities":

Per-state implementations vary; check your transposition law.

How UnveilScan helps

Our Extended scan generates a JSON export with NIS 2 mappings on every finding. We map TLS, DMARC, CSP, leak findings against the relevant NIS 2 articles + national implementations (France, Germany so far; Italy and Spain in development). The CISO can drop the export into the audit deliverables.

Build your NIS 2 evidence trail

Extended scan + JSON export with NIS 2 mappings. Schedule monthly for continuous evidence.

See pricing