Skip to content
Background Banner
(untitled)

NIS2 Compliance Checklist for SMEs: A Practitioner’s Implementation Guide

A comprehensive implementation guide for SMEs facing the NIS2 Directive. Learn the 7 core steps to achieving a defensible compliance posture.

Iulian Bozdoghina
Iulian BozdoghinaLead Auditor and Consultant

NIS2 Compliance Checklist for SMEs: A Practitioner’s Implementation Guide

The deadline for the NIS2 Directive (EU 2022/2555) has passed the point of mere theoretical discussion. For small and medium-sized enterprises (SMEs) across Europe, the network and information security landscape has shifted from a voluntary "best effort" model to a binding regulatory mandate. Decisions regarding cybersecurity are no longer confined to the server room; they have moved directly into the boardroom, carrying personal liability for senior management and significant operational consequences for those who delay.

What Are the NIS2 Compliance Requirements for SMEs?

NIS2 compliance for SMEs requires the implementation of a comprehensive risk management framework, encompassing governance policies, technical security controls, and strict incident reporting timelines. This includes board-level accountability, 24-hour initial incident notification, supply chain vetting, and the adoption of fundamental cyber hygiene such as multi-factor authentication and encryption.

In practice, achieving these requirements involves more than just selecting a set of tools. It requires a systematic alignment of organisational processes with the ten core security measures outlined in Article 21 of the Directive. For an SME, proportionality is key—the measures must be appropriate to the level of risk exposure and the size of the entity, but they remain mandatory. Under the updated directive, many SMEs that were previously "out of scope" are now classified as either Essential or Important entities based on their sector or their role as critical suppliers within a larger ecosystem.

Why NIS2 Compliance Matters for Your Organisation

The primary driver for NIS2 is not the avoidance of regulatory fines, although those are substantial (up to EUR 10 million or 2% of total worldwide turnover). The real urgency for SMEs lies in commercial resilience and social proof. In the current European market, cybersecurity has become a prerequisite for procurement.

A common pattern we observe in gap assessments is that SMEs are often forced into compliance by their larger customers before the national supervisory authorities even initiate an audit. If your organisation serves as a vendor to a "critical sector" entity—such as a large utility, healthcare provider, or financial institution—you are part of their supply chain risk. Without a defensible NIS2 posture, you risk exclusion from these lucrative contracts.

Furthermore, NIS2 introduces direct personal liability for management bodies. This means that senior executives can be held responsible for security failures if they have not approved the necessary measures or if they lack the required cybersecurity training. In practice, most organisations underestimate the legal threshold for "adequate oversight," making this a critical area for immediate attention.

The Core Requirements Under NIS2: A Step-by-Step Checklist

Achieving compliance is a journey of maturity. This checklist breaks down the technical and operational requirements into actionable streams.

1. Scoping and Applicability Assessment

The first step is determining whether your SME qualifies as an "Essential" or "Important" entity. While the general rule targets organisations with over 50 employees and EUR 10 million in revenue, there are significant exceptions for providers of public electronic communications, trust services, and entities designated as critical by Member States (such as those in Romania or other CEE nations with specific national transpositions). You must also evaluate your role as a supplier; if your service is critical to a larger firm’s operations, you may be contractually bound to NIS2 standards regardless of your size.

2. Governance and Board-Level Accountability

Compliance starts at the top. The board must formally approve the organisation's cybersecurity risk management measures and supervise their implementation.

  • Conduct mandatory cybersecurity training for all senior management.
  • Formally document roles and responsibilities for security decisions.
  • Establish a budget and resource allocation plan for NIS2 implementation.

3. Information Security Risk Management

NIS2 requires an "all-hazards" approach. This means moving beyond just "hacking" to consider physical security, power failures, and human error.

  • Perform a comprehensive risk assessment of all IT and OT assets.
  • Identify critical dependencies and single points of failure.
  • Implement a plan to mitigate identified risks based on business impact.

4. Incident Handling and Reporting (The 24h/72h Rule)

One of the most challenging aspects of NIS2 is the reporting timeline.

  • Identify internal and external communication paths for incident reporting.
  • Implement a process to submit an "early warning" to the CSIRT or supervisory authority within 24 hours of detecting a significant incident.
  • Ensure a full incident report is submitted within 72 hours.

5. Business Continuity and Crisis Management

Resilience is the ability to survive an attack.

  • Develop a Business Continuity Plan (BCP) that covers the loss of key systems.
  • Implement a backup strategy with an "air-gapped" or immutable offline copy.
  • Regularly test recovery time objectives (RTOs) to ensure they meet business needs.

6. Supply Chain and Third-Party Risk Management

You are only as secure as your weakest supplier.

  • Audit the security posture of your Tier-1 suppliers.
  • Update contracts to include specific security and reporting obligations.
  • Establish a process for monitoring the lifecycle of third-party access.

7. Technical Security Controls (MFA, Encryption, Patching)

Our TISAX® and ISO 27001 experts help European automotive suppliers achieve compliance with 95 days.

These are the fundamental building blocks of cyber hygiene.

  • Enforce Multi-Factor Authentication (MFA) for all remote access and administrative accounts.
  • Implement encryption for data at rest and in transit, particularly for sensitive personal or commercial data.
  • Establish a vulnerability management programme (patching) with defined timelines for "critical" updates.

Common Mistakes SMEs Make in NIS2 Implementation

Mistaking Compliance for a One-Time Project

A frequent error is treating NIS2 like a checkbox exercise that ends once a policy is signed. In practice, auditors look for "operational effectiveness." A policy that is not actively followed, monitored, and updated is evidence of non-compliance.

Underestimating Supply Chain 'Ripple Effects'

Many SMEs assume that because they have fewer than 50 employees, they are exempt. However, the "supply chain" clause in NIS2 is designed to close this gap. If you provide digital services to an essential entity, they will eventually demand proof of your NIS2 alignment to satisfy their own compliance requirements.

Lack of Documentation for Audits

In the regulatory world, if it isn't documented, it didn't happen. SMEs often have good security practices in place but fail to maintain the audit logs, meeting minutes, and version-controlled policies required to prove it to a supervisory authority.

Who Needs to Comply? Understanding the Size Thresholds

The Directive primarily applies to "medium-sized enterprises" (50+ employees or EUR 10M+ turnover) and larger. However, "small and micro" enterprises are included if they play a critical role in certain sectors, such as:

  • Providers of public electronic communications networks.
  • Trust service providers.
  • Top-level domain name registries and DNS service providers.
  • Any entity designated as critical by a national authority due to its potential impact on public safety or health.

How Much Does NIS2 Compliance Cost for an SME?

Costs vary significantly based on your current maturity level. For most SMEs, the initial investment is driven by:

1. Gap Assessment: Determining the delta between current state and NIS2 requirements.

2. Technical Debt: Upgrading legacy systems that cannot support modern security controls like MFA or encryption.

3. Internal Resource Time: The "soft cost" of management and IT staff focusing on compliance rather than core operations.

Typically, SMEs can expect an initial 10-20% increase in their annual ICT security budget during the implementation phase.

How ITIS-Secure Can Help With Your NIS2 Roadmap

Navigating the complexities of EU regulations requires a partner who understands the practical realities of SME operations. At ITIS-Secure, we move beyond generic advice to provide practitioner-led implementation. Our "Gap-to-Certified" methodology helps you identify your most critical risks, implement proportionate controls, and build a defensible compliance posture that satisfies both regulators and your most demanding customers.

Request a readiness review → Contact ITIS-Secure

Frequently Asked Questions

Q: Is NIS2 applicable to companies outside the EU?

Yes, if they provide services within the EU that fall under the covered sectors, they must designate a representative and comply with the security and reporting requirements.

Q: What is the difference between NIS2 and ISO 27001?

ISO 27001 is a voluntary international standard for information security management. NIS2 is a binding European law. While ISO 27001 provides a strong foundation, NIS2 includes specific reporting timelines and corporate liability provisions that exceed the standard's requirements.

Q: How often should an SME conduct NIS2 audits?

While the Directive does not mandate a specific frequency, best practice for SMEs is to conduct an internal review annually and a more formal assessment whenever significant changes occur in the IT infrastructure or the threat landscape.

Q: Does NIS2 replace GDPR?

No. GDPR focuses on personal data protection, while NIS2 focuses on the broader cybersecurity and resilience of the systems and networks themselves. They are complementary.

Q: What is a "Significant Incident" under NIS2?

An incident is significant if it causes a severe operational disruption of the services or has a high impact on other entities or users, particularly those related to financial loss or safety.

Iulian Bozdoghina

"Iulian Bozdogina is a veteran cybersecurity strategist with over 15 years of experience in securing automotive supply chains and critical infrastructure. He specializes in TISAX®, ISO 27001, and the emerging NIS2/DORA regulatory landscape."

CISSPCISMISO 27001 Lead AuditorTISAX® Specialist

Ready to get certified?

Book your free gap assessment today. Our experts will map your current posture against your target framework and give you a clear, honest roadmap to certification.

Book Free Gap Assessment

No commitment required • GDPR compliant • Strategy confirmed via secure link