Shoosmiths LLP
  November 21, 2024 - Milton Keynes, England

NIS2 is here – What “digital providers” need to know about Europe’s new cybersecurity regime
  by Shoosmiths LLP

The new Network and Information Systems Directive (NIS2) came into effect on 18 October 2024 and with it comes an overhaul of the way in which cybersecurity risk management is regulated in Europe.

In this article we cover the applicability of NIS2 to digital infrastructure providers and digital services providers (collectively “digital providers”), an expansion in scope under NIS2 that represents a major shift for the EU’s digital sector.

Digital providers have, historically, fallen outside the scope of cybersecurity regulation which has traditionally focused on physical infrastructure (e.g., telecommunications networks, energy grids, transportation hubs and infrastructure) and/or services critical to the functioning of our economy (e.g., healthcare, banking). A lot has changed since NIS1 came into force in May 2018 and now digital providers are wholly embedded at the heart of economies and, consequently, a failure to compel a robust and resilient approach to cybersecurity within these sectors can now cause just as much harm as in traditional critical infrastructure.

It is the expansion to include a wide range of digital providers that has resulted in an exponential increase in the number of businesses which now fall under NIS2 auspices. For many digital providers, NIS2’s new enhanced cybersecurity obligations, incident reporting requirements, audit and oversight measures, and enforcement powers will represent a marked shift in how these sectors culturally approach cybersecurity compliance in Europe.

That, coupled with enhanced enforcement powers, underpinned by fining powers of up to €10m or 2% of worldwide turnover and (in some cases) sanctions against management and the C-suite, make NIS2 a key regulatory challenge for these sectors as we move into 2025 and beyond.

This article, part of our NIS2 series, provides a high-level overview of what you need to know for your sector and what steps you need to take now. For a more in-depth insight into NIS2 and its requirements, see our article here.

We anticipate that many legal, infosec and compliance professionals working in this sector may be learning about NIS2 for the first time and seeking to come to terms with what it means for their organisation and where to begin with operationalising NIS2. On that basis, we have included an info sheet roadmap of the initial steps organisations should take now to move towards NIS2 compliance.

Note on the UK: This article focuses on the EU's enhanced cybersecurity framework, which will not be applicable to the UK. For specific guidance on the steps the UK is undertaking in this space, please contact a member of the Resiliency team.

Just what constitutes a digital provider under NIS2?

When we refer to “digital providers” we are actually referring to a wide range of digital sectors under which the European Commission has retained competence to set the standards for aspects such as cybersecurity controls, incident reporting and vendor management – albeit Member States still retain the right to enforce those measures against digital providers.

In fact, ‘digital provider’ covers a broad range of sectors which include:

The sector also includes data centres and cloud-providers which we covered in a standalone article here.

Why the focus on digital providers?

Incidents that have impacted digital providers over the past few years emphasise their criticality to our economy and the impact such attacks and outages can have. Incidents such as Akamai’s CDN outage in 2021 which impacted multiple websites and online platforms, and Slack’s GitHub Repository Compromise in 2022 which resulted in security tokens being compromised.

In addition, as nearly all critical sectors rely on the use of digital tools to operate their critical infrastructure and services in some way, digital providers represent a key supply-chain for threat attackers to compromise our wider infrastructure. Incidents such as the ransomware attack on Kaseya’s VSA software (which affected over 1000 businesses), CCleaner’s incident in 2017 which allowed cybercriminals to infiltrate notable telecommunications providers, and the infamous SolarWinds Supply Chain attack in 2020 all emphasise the ability of digital providers to be used as a vector to compromise critical infrastructure.

Finally, it goes without saying that the CrowdStrike outage in July 2024 qualifies as the type of significant event that would trigger multiple incident notification requirements had it occurred when NIS2 was in force.

NIS2 imposes obligations on a broader range of entities, depending on whether they are identified as being ‘essential’ or ‘important’. 

Given their absolutely essential role in the European economy, nearly all digital sectors are categorised under NIS2 as ‘essential’ with the notable exception of digital service providers, which are regarded as ‘important’.

Incident management

NIS2 represents a significant cultural change in the way organisations approach incident management, and for the personnel who will need to be involved in that process.

One of the most significant aspects of NIS2 is the emphasis on breach reporting, which requires affected entities to promptly report any cybersecurity incidents to the relevant authority without undue delay and no later than 24 hours after detection of the incident, with more detailed reporting at additional intervals.

For digital providers, the European Commission has published the “NIS 2 Implementing Regulation” (“N2IR”), which clarifies the specific cybersecurity standards and incident reporting criteria that digital providers must follow.

You can read more about the details in our dedicated article here, but crucially key reporting thresholds differ across digital providers as follows:

For CDN providers

For managed service providers

For digital service providers

Finally, incident thresholds for core network-based digital infrastructure providers differ markedly across DNS providers, TLD name registries and cloud providers.

These above enhanced reporting criteria are in addition (and cumulative with) the general categories of incidents (many of which may also be novel to organisations) that apply to the broader category of digital providers.

For digital providers, this means that under NIS2:

Other requirements

NIS2 additionally mandates that digital providers undertake the following cybersecurity risk-management measures (amongst others):

Registration

With NIS2 comes a new mandatory registration requirement. A regulated entity will be required to register with its competent authority and provide key details about where the organisation provides its services, its IP ranges, and (where applicable) the identity and contact information of its designated representative.

Providers and suppliers located outside Europe and with no legal presence will need to appoint a local representative.

For digital providers, determining appropriate registration will be a challenge, particularly for large providers with a strong presence in multiple EU markets. That said, counsel should be sought on determining suitable candidacy for registration.

We have ISO27001 – do we need to do anything?

In short – yes. While it is true that both NIS2 and ISO27001 (and other information security management frameworks such as ISO22301) aim to enhance an organisation’s cybersecurity and resiliency, NIS2 is fundamentally different in its scope.

The mandatory controls required under NIS2 are more granular in nature and will apply to a wider part of an organisation (including entities that would typically be segregated under ISO27001). In addition, due to the stringent requirements around incident management, reporting and audit, it is highly unlikely an organisation will be able to simply rely on its ISO27001 certification to achieve NIS2 compliance.

In particular:

That said, those organisations with ISO27001 (particularly the 2022 version) will already have in place a strong governance framework and ISMS onto which NIS2 controls can be added.

Vendor Management

NIS2 places a strong emphasis on the role of vendor management in ensuring the overall cybersecurity posture of regulated entities. For digital providers, effective vendor management is not only a best practice but a regulatory necessity to ensure compliance. Key considerations include:

Customer-Facing Requirements

For many digital providers, compliance with NIS2 is not limited to internal systems and processes; it extends to their interactions with customers, many of whom will themselves be NIS2-regulated entities. To address these dynamics effectively, digital providers should:

 




Read full article at: https://www.shoosmiths.com/insights/articles/nis2-is-here-what-digital-providers-need-know-about-europes-cybersecurity-regime