Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
The NIS2 Implementing Regulation specifies the technical and methodological requirements for compliance with the NIS2 Directive.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
1. The relevant entities shall take the appropriate measures to establish, document, implement, and monitor configurations, including security configurations of hardware, software, services and networks.
2. For the purpose of point 6.3.1, the relevant entities shall:
3. The relevant entities shall review and, where appropriate, update configurations at planned intervals or when significant incidents or significant changes to operations or risks occur.




















1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: not use systems used for administration of the security policy implementation for other purposes.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.
1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, where appropriate, the relevant entities shall: where appropriate, exclusively allow access to their network and information systems by devices authorised by those entities.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.
























1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: determine and apply controls for remote access to network and information systems, including access by service providers.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.
















1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: allow connections of service providers only after an authorisation request and for a set time period, such as the duration of a maintenance operation.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.








1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: adopt an implementation plan for the full transition towards latest generation network layer communication protocols in a secure, appropriate and gradual way and establish measures to accelerate such transition.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.




1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: adopt an implementation plan for the deployment of internationally agreed and interoperable modern e-mail communications standards to secure e-mail communications to mitigate vulnerabilities linked to e-mail-related threats and establish measures to accelerate such deployment.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.
















1. The relevant entities shall protect their network and information systems against malicious and unauthorised software.
2. For that purpose, the relevant entities shall in particular implement measures that detect or prevent the use of malicious or unauthorised software. The relevant entities shall, where appropriate, ensure that their network and information systems are equipped with detection and response software, which is updated regularly in accordance with the risk assessment carried out pursuant to point 2.1 and the contractual agreements with the providers.




















1. The relevant entities shall specify and apply procedures, coherent with the change management procedures referred to in point 6.4.1 as well as with vulnerability management, risk management and other relevant management procedures, for ensuring that:
2. By way of derogation from point 6.6.1(a), the relevant entities may choose not to apply security patches when the disadvantages of applying the security patches outweigh the cybersecurity benefits. The relevant entities shall duly document and substantiate the reasons for any such decision.
























For the purpose of point 6.10.1, the relevant entities shall:




























1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: explicitly forbid or deactivate unneeded connections and services.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.












1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: apply best practices for the security of the DNS, and for Internet routing security and routing hygiene of traffic originating from and destined to the network.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.












1. For the purpose of Article 21(2)(c) of Directive (EU) 2022/2555, the relevant entities shall prevent loss, damage or compromise of network and information systems or interruption to their operations due to the failure and disruption of supporting utilities.
2. For that purpose, the relevant entities shall, where appropriate:
3. The relevant entities shall test, review and, where appropriate, update the protection measures on a regular basis or following significant incidents or significant changes to operations or risks.
































1. For the purpose of Article 21(2)(e) of Directive (EU) 2022/2555, the relevant entities shall prevent or reduce the consequences of events originating from physical and environmental threats, such as natural disasters and other intentional or unintentional threats, based on the results of the risk assessment carried out pursuant to point 2.1.
2. For that purpose, the relevant entities shall, where appropriate:
3. The relevant entities shall test, review and, where appropriate, update the protection measures against physical and environmental threats on a regular basis or following significant incidents or significant changes to operations or risks.
























1. For the purpose of Article 21(2)(i) of Directive (EU) 2022/2555, the relevant entities shall prevent and monitor unauthorised physical access, damage and interference to their network and information systems.
2. For that purpose, the relevant entities shall:
3. The relevant entities shall test, review and, where appropriate, update the physical access control measures on a regular basis or following significant incidents or significant changes to operations or risks.
























1. The relevant entities shall develop and maintain a complete, accurate, up-to-date and consistent inventory of their assets. They shall record changes to the entries in the inventory in a traceable manner.
2. The granularity of the inventory of the assets shall be at a level appropriate for the needs of the relevant entities. The inventory shall include the following:
3. The relevant entities shall regularly review and update the inventory and their assets and document the history of changes.
































Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.
