Technical

NIS2 Compliance: What EU Businesses Must Know

NIS2 enforcement is here. Learn what it means for your software projects and how to build compliant, secure systems from day one.

Notix Team
Notix Team Software Development Experts
| · 10 min read
NIS2 Compliance: What EU Businesses Must Know

NIS2 Compliance for Software Development: What European Businesses Must Know in 2026

The EU’s NIS2 Directive is no longer a future concern. National transposition deadlines have passed, enforcement mechanisms are active across member states, and the penalties for non-compliance are substantial — up to 10 million euros or 2% of global annual turnover for essential entities.

If you’re building or operating software for European businesses, NIS2 changes the baseline security expectations for your development practices, your infrastructure, and your supply chain. This isn’t a niche regulation affecting a handful of critical infrastructure operators. NIS2 dramatically expanded the scope of the original NIS Directive, pulling in thousands of organizations that previously had no cybersecurity compliance obligations.

This guide explains what NIS2 requires, how it impacts software development specifically, and what practical steps you need to take to build compliant systems.

What Is NIS2 and Who Does It Affect?

The Network and Information Security Directive 2 (NIS2) is the EU’s updated framework for cybersecurity across essential and important sectors. It replaced the original NIS Directive (2016) to address gaps in implementation and coverage.

Scope: It’s Broader Than You Think

NIS2 categorizes affected organizations into two tiers:

Essential entities (subject to stricter requirements and proactive supervision):

  • Energy (electricity, oil, gas, hydrogen, district heating).
  • Transport (air, rail, water, road).
  • Banking and financial market infrastructure.
  • Health (hospitals, labs, pharmaceutical manufacturers, medical device manufacturers).
  • Drinking water and wastewater.
  • Digital infrastructure (DNS providers, TLD registries, cloud service providers, data centers, CDN providers, trust service providers).
  • ICT service management (managed service providers, managed security service providers).
  • Public administration.
  • Space.

Important entities (subject to lighter-touch supervision but still mandatory requirements):

  • Postal and courier services.
  • Waste management.
  • Chemical manufacturing and distribution.
  • Food production, processing, and distribution.
  • Manufacturing (medical devices, computers, electronics, machinery, motor vehicles).
  • Digital providers (online marketplaces, search engines, social networking platforms).
  • Research organizations.

The threshold for inclusion is generally medium-sized enterprises and above (50+ employees or 10M+ euros annual turnover) in these sectors. But here’s the critical detail for software companies: if you provide services to organizations in these sectors, you’re part of their supply chain, and NIS2’s supply chain security requirements apply to you.

A software development company building systems for a hospital, a utility company, or a logistics firm is directly affected — not as a regulated entity itself (unless it meets the size thresholds in a covered sector), but as a supplier that must meet the security standards its clients are now required to enforce.

Key Requirements Under NIS2

NIS2 mandates a comprehensive set of cybersecurity measures. Understanding these requirements is essential for anyone building software that will operate in regulated European environments.

Risk Management Measures (Article 21)

Organizations must implement “appropriate and proportionate technical, operational and institutional measures” to manage cybersecurity risks. The directive specifies minimum requirements:

1. Risk analysis and information system security policies. Organizations need documented policies covering risk assessment methodology, security architecture, and acceptable use. For software development teams, this translates to threat modeling as a standard practice.

2. Incident handling. Detection, analysis, containment, and recovery procedures. Systems must be designed to support incident investigation — meaning comprehensive logging, correlation capabilities, and forensic readiness.

3. Business continuity and crisis management. Backup management, disaster recovery, and crisis management plans. Software systems must be architected for resilience — failover mechanisms, data replication, and tested recovery procedures.

4. Supply chain security. This is the requirement with the broadest ripple effect. Regulated organizations must assess and manage cybersecurity risks from their suppliers, including software vendors. This means your security practices, your development processes, and your infrastructure security are subject to your clients’ scrutiny.

5. Security in network and information systems acquisition, development, and maintenance. This explicitly covers the software development lifecycle. Vulnerability handling and disclosure practices must be in place.

6. Cybersecurity risk-management measures assessment. Regular evaluation of whether your security measures are effective — not just whether they exist on paper.

7. Basic cyber hygiene practices and cybersecurity training. All staff must receive cybersecurity awareness training. Development teams need training specific to secure coding practices.

8. Cryptography and encryption policies. Documented policies for when and how encryption is used.

9. Human resources security. Background checks, access management tied to employment status, and role-based access controls.

10. Multi-factor authentication and continuous authentication. MFA is explicitly required where appropriate. For software systems, this means MFA support isn’t optional.

Incident Reporting (Article 23)

NIS2 introduces strict incident reporting timelines:

  • Early warning within 24 hours of becoming aware of a significant incident. This initial notification must indicate whether the incident is suspected to be caused by malicious action and whether it has cross-border impact.
  • Incident notification within 72 hours with an initial assessment of severity and impact.
  • Final report within one month with detailed description, root cause analysis, mitigation measures applied, and cross-border impact if any.

For software systems, this means you need:

  • Automated incident detection capabilities.
  • Clear escalation procedures.
  • Sufficient logging and monitoring to produce the required reports within the mandated timelines.
  • Pre-built report templates aligned with the reporting format required by relevant national authorities (CSIRTs).

Penalties

NIS2 introduced meaningful enforcement:

  • Essential entities: Fines up to 10 million euros or 2% of total worldwide annual turnover, whichever is higher.
  • Important entities: Fines up to 7 million euros or 1.4% of total worldwide annual turnover.
  • Personal liability: Management bodies can be held personally liable and may be temporarily prohibited from exercising managerial functions.

The personal liability provision is significant. It means cybersecurity is no longer delegable — C-level executives and board members have direct accountability.

How NIS2 Impacts Software Development Practices

NIS2 doesn’t prescribe specific technologies, but it mandates security outcomes that directly shape how software should be built.

Secure Development Lifecycle (SDL)

NIS2’s requirement for “security in acquisition, development and maintenance of network and information systems” means SDL is no longer a best practice — it’s a compliance requirement for systems operating in covered sectors.

A compliant SDL includes:

Threat Modeling Before writing code, identify what could go wrong. For every feature and integration, ask:

  • What data does this handle?
  • Who might want to attack it, and how?
  • What happens if this component is compromised?
  • What are the trust boundaries?

Use structured methodologies (STRIDE, PASTA, or attack trees) rather than ad-hoc assessments. Document the findings. Threat models should be living documents updated as the system evolves.

Secure Coding Standards Adopt and enforce language-specific secure coding guidelines:

  • Input validation for all external data.
  • Parameterized queries to prevent SQL injection.
  • Output encoding to prevent XSS.
  • Proper error handling that doesn’t leak sensitive information.
  • Secure session management.
  • Protection against CSRF, SSRF, and deserialization attacks.

Use automated tools (SAST — Static Application Security Testing) integrated into the CI/CD pipeline to catch violations before code reaches production.

Dependency Management Your software’s security is only as strong as its weakest dependency. NIS2’s supply chain requirements extend to software components:

  • Maintain a Software Bill of Materials (SBOM) — a complete inventory of all third-party libraries, frameworks, and components.
  • Automate vulnerability scanning of dependencies (tools like Dependabot, Snyk, or Trivy).
  • Establish policies for acceptable vulnerability age — how quickly must a critical vulnerability in a dependency be patched?
  • Evaluate the security posture of open-source projects you depend on.

Security Testing Multiple layers of testing are required:

  • SAST in the CI/CD pipeline for every commit.
  • DAST (Dynamic Application Security Testing) against running environments.
  • Penetration testing by qualified testers at least annually and after significant changes.
  • Fuzz testing for input parsing and protocol handling.
  • Infrastructure security scanning for misconfigured cloud resources, open ports, and exposed services.

Vulnerability Management NIS2 explicitly requires vulnerability handling and disclosure processes:

  • Track all identified vulnerabilities from discovery through remediation.
  • Define SLAs for remediation based on severity (e.g., critical vulnerabilities patched within 24-48 hours, high within 7 days).
  • Implement a coordinated vulnerability disclosure policy.
  • Monitor for newly disclosed vulnerabilities in your dependencies and infrastructure.

Security-by-Design Principles

NIS2 aligns with the broader EU push toward security-by-design, which will be further reinforced when the EU Cyber Resilience Act (CRA) takes full effect in September 2026.

Security-by-design means:

1. Least privilege. Every component, user, and service account operates with the minimum permissions required. Databases have read-only users where writes aren’t needed. API keys are scoped to specific functions. Container processes don’t run as root.

2. Defense in depth. No single security measure is treated as sufficient. Combine network segmentation, application-level access controls, encryption, monitoring, and incident response. If one layer fails, others contain the impact.

3. Fail secure. When a component fails, it should fail in a secure state. If an authentication service is unavailable, the default should be to deny access, not to allow it. If a logging service is down, the application should queue events rather than silently dropping them.

4. Secure defaults. The out-of-the-box configuration should be secure. No default passwords. No unnecessary ports open. No debug modes enabled. Admin interfaces not exposed to the internet by default.

5. Minimal attack surface. Every feature, endpoint, protocol, and interface that exists is a potential attack vector. Disable what you don’t need. Remove what you don’t use. Limit exposure to what’s strictly necessary.

6. Separation of duties. No single account or role should be able to compromise the entire system. Deployment requires separate approval from development. Database administration is separate from application administration. Encryption key management is separate from data access.

The EU Cyber Resilience Act: What’s Coming in September 2026

While NIS2 regulates organizations, the Cyber Resilience Act (CRA) regulates products — specifically, “products with digital elements.” If your software is sold or made available to EU customers, the CRA will apply.

Key requirements:

  • Products must be designed and developed with cybersecurity in mind.
  • Known vulnerabilities must be addressed before the product is placed on the market.
  • Security updates must be provided for the expected product lifetime (minimum 5 years).
  • Manufacturers must have a vulnerability handling process and report actively exploited vulnerabilities to ENISA within 24 hours.
  • Products must come with an SBOM.

The CRA effectively codifies secure development practices as a legal requirement for the EU market. Software companies that have already adopted SDL practices will find compliance straightforward. Those that haven’t face a significant adaptation effort.

GDPR and NIS2: Understanding the Overlap

NIS2 and GDPR are complementary but distinct:

  • GDPR protects personal data. Its security requirements (Article 32) focus on protecting data subjects’ privacy.
  • NIS2 protects network and information systems. Its security requirements focus on operational resilience and service continuity.

The overlap occurs because many systems process personal data AND provide essential or important services. For these systems, both regulations apply simultaneously.

Where they align:

  • Both require risk-based security measures.
  • Both require incident notification (72 hours for GDPR, 24/72 hours for NIS2).
  • Both require documented security policies and procedures.
  • Both impose significant penalties for non-compliance.

Where they differ:

  • GDPR focuses on data protection rights (consent, access, erasure, portability). NIS2 focuses on service resilience.
  • GDPR applies based on data processing activities. NIS2 applies based on the sector and size of the organization.
  • NIS2 has broader incident reporting requirements (not limited to personal data breaches).
  • NIS2 explicitly requires supply chain security measures, which GDPR addresses only indirectly through controller-processor obligations.

For software development, the practical implication is that you need a unified security approach that satisfies both frameworks. Building for NIS2 compliance will cover most of GDPR’s technical requirements, but you’ll still need GDPR-specific measures for consent management, data subject rights, and data protection impact assessments.

Practical Implementation Checklist

For organizations adapting their software development practices to NIS2 requirements:

Governance and Policy

  • Appoint a security officer with board-level reporting authority.
  • Document a comprehensive cybersecurity policy covering all Article 21 requirements.
  • Establish a risk management framework with regular assessment cycles.
  • Implement management training on cybersecurity responsibilities and personal liability.
  • Define and document your supply chain security policy.

Development Practices

  • Adopt a formal Secure Development Lifecycle (SDL).
  • Implement threat modeling as a standard practice for new features and systems.
  • Establish and enforce secure coding standards.
  • Integrate SAST into the CI/CD pipeline.
  • Conduct regular DAST and penetration testing.
  • Maintain SBOMs for all products and services.
  • Implement automated dependency vulnerability scanning.
  • Define vulnerability remediation SLAs and track compliance.

Infrastructure and Operations

  • Implement network segmentation and zero-trust architecture principles.
  • Deploy comprehensive logging and monitoring with anomaly detection.
  • Implement multi-factor authentication for all privileged access and user-facing systems.
  • Establish backup and disaster recovery procedures with tested recovery time objectives.
  • Encrypt data at rest and in transit.
  • Implement access controls based on least privilege principles.

Incident Response

  • Develop and document an incident response plan aligned with NIS2 reporting timelines.
  • Establish relationships with relevant national CSIRTs.
  • Prepare reporting templates for early warning (24h), incident notification (72h), and final report (1 month).
  • Conduct incident response tabletop exercises at least annually.
  • Implement forensic readiness — ensure sufficient logging and evidence preservation capabilities.

Supply Chain

  • Inventory all suppliers and assess their cybersecurity posture.
  • Include cybersecurity requirements in vendor contracts.
  • Establish ongoing supplier monitoring processes.
  • Require suppliers to notify you of security incidents that may affect your systems.
  • Conduct periodic supplier security audits.

Choosing a Development Partner That Understands EU Compliance

If you’re outsourcing software development or augmenting your team with external partners, NIS2’s supply chain security requirements mean your partner’s security practices directly affect your compliance posture.

When evaluating development partners, assess:

Security certifications and practices. Does the partner hold ISO 27001 or SOC 2 certifications? Do they have a documented SDL? Can they demonstrate their secure coding practices?

EU regulatory awareness. Building software for the European market requires understanding not just NIS2 but the broader regulatory landscape — GDPR, the Cyber Resilience Act, sector-specific regulations. A partner that treats compliance as an afterthought will create technical debt that becomes a compliance liability.

Incident response capability. If a vulnerability is discovered in software they built, how quickly can they respond? Do they have a documented vulnerability management process? Can they support your 24-hour early warning obligation?

Contractual willingness. Are they willing to include cybersecurity requirements in the service agreement? Will they commit to notification timelines for security incidents? Will they participate in security audits?

Track record. Have they built compliant systems for regulated organizations? Experience building government and enterprise software in European regulatory environments is particularly relevant, as these projects typically require the security controls and documentation practices that NIS2 now mandates broadly.

At Notix, our experience building compliant software for government entities and regulated enterprises means we approach security and compliance as architectural foundations, not afterthoughts. When we build systems for clients in NIS2-covered sectors, threat modeling, secure coding practices, comprehensive logging, and incident response capabilities are part of the standard development process — because that’s what responsible software development in the European market requires.

The Timeline: What to Do Now

If you haven’t started NIS2 compliance work, the time for preparation is over — the time for action is now. But a structured approach still matters.

Immediate (this month):

  • Determine whether your organization falls within NIS2 scope (essential or important entity).
  • Assess whether your software products serve clients in covered sectors.
  • Brief management on NIS2 requirements and personal liability implications.

Short-term (next 90 days):

  • Conduct a gap assessment against NIS2 Article 21 requirements.
  • Prioritize remediation of critical gaps — especially incident reporting capability, access controls, and logging.
  • Begin implementing SDL practices if not already in place.
  • Review and update supplier contracts.

Medium-term (next 6 months):

  • Complete implementation of all required cybersecurity measures.
  • Conduct penetration testing and vulnerability assessments.
  • Test incident response procedures including reporting timelines.
  • Generate SBOMs for all products and implement continuous monitoring.
  • Establish ongoing compliance monitoring processes.

NIS2 represents a fundamental shift in European cybersecurity expectations. It raises the baseline from voluntary best practice to legal obligation. For software development organizations, this means security can no longer be treated as a feature to be prioritized against other features. It’s a requirement, and it applies to every system you build for the European market.

The organizations that treat NIS2 as an opportunity to build genuinely secure software — rather than a compliance burden to minimize — will find themselves with a significant competitive advantage. Security built into the foundation is always cheaper, more effective, and more trustworthy than security bolted on after the fact.

Share

Ready to Build Your Next Project?

From custom software to AI automation, our team delivers solutions that drive measurable results. Let's discuss your project.

Notix Team

Notix Team

Software Development Experts

The Notix team combines youthful ambition with seasoned expertise to deliver custom software, web, mobile, and AI solutions from Belgrade, Serbia.