Design for the exception, not the rule: NIS2 Implications for Application Design and Avoiding Penalties in High-Criticality Sectors
As I wrote recently, the NIS2 directive (and later, in two or three years, the DLP directive) will significantly influence the IT market, primarily in the European Union (EU). Organizations outside the EU with "substantial business" (what this means is not clear to me yet) in the region will also be affected. This will impact the application design/landscape of many new and existing enterprise architectures, particularly in terms of incident robustness.
It is advisable to avoid the GDPR mess, when a lot of companies have been, despite warnings, unprepared and paid millions in fines to the regulators. Act strategic and be prepared beforehand.
Why it is important to educate yourself now and to act (if you have not done so)
The most important reason to act now, if you haven’t already, lies in the shift in compliance checks compared to the original NIS directive. Previously, compliance checks were typically conducted only after a significant incident occurred within a company classified as part of the "Sectors of High Criticality" (see Annex I of the NIS Directive). In most cases, organizations were sufficiently robust to withstand common threats and could adopt an approach like:
As long as nothing happens we are safe from regulatory compliance checks.
This has now changed / will further change when NIS2 is implemented in the remaining countries, such as Germany, the Netherlands, and others, by early 2025 (as the deadline passed over a month ago), as it becomes binding national law there as well. Under the new directive, compliance checks will occur proactively, even if no incidents happened.
Compared to the previous directive, this represents a significant shift, as organizations can now be proactively audited and fined if violations are identified. In terms of penalties the European Comission seperates for "Essential" and "Important" entities (See number 15 of the introduction points made in the beginning of NIS2 directive).
Details are laid out in Article 3 "Essential and important entitites": Without repeating the whole article here we can outline some important factors (for a comprehensive overview read the article 3) that determine "Essential" entities:
In terms of "important" entities its basically an exclusion:
Just for sake of reference I will a list couple of examples from Annex I here - Be aware this is for illustration. For the full list check NIS2 directive.
Important companies have slightly lighter regulations than essential ones, but still will face fines if they violate NIS2 directives. Potential fines that, again, can also occur from an audit without incident are as follows, could be imposed (see Article 34 of NIS2):
领英推荐
So this sums up why acting now might be important if you are in one of those affected areas. No acting and hoping nothing happens does not work anymore and might cost your organization millions of Euros in penalties and potential reputational damage.
Prepare your lead team, as management could/will be personally held accountable
Now in the past, there have been massive discussions about accountability of the top management. There have been severe outcries when a company did something terrible wrong and the respective managers were "fired" and got a couple of millions of dollars "to go". Now, NIS2 will not prevent this of course but top management does face some personal liability under NIS2. This is written in Rectictal 137, Article 20 -01 and in Article 20 of NIS2. There we can read
"(...) ensure a high level of responsibility for the cybersecurity risk management measures (...) management bodies should approve the cybersecurity ris-management measures and oversee their implementation" Recital 137 NIS2
Article 20 - 1& Article 21 goes a bit further then in explaining this:
"Member States shall ensure that the management bodies of essential and important entities approve the cybersecurity risk-management measures taken by those entities in order to comply with Article 21, oversee its implementation and can be held liable for infringements by the entities of that Article." Article 20 -1 NIS2
All this is a bit cryptic, but what it means in the end (in plain English is): The CIO, as a/the responsible board member, signs off on internal guidelines and oversees their implementation. If something goes wrong, they might be personally ('as a natural person') held accountable. How this plays out in court in the respective countries is still open, but its for sure a big shift compared to past levels of responsibilities.
We are not yet at US standards, where top management of listed corporations is always with one leg in prison, but an increased liability for sure will add the needed attention of top management.
How to make your architecture more robust - concrete guidance
According to Article 21 of the NIS2 directive, you must design your systems with incidents in mind. This means 'design for the incident, not the rule.' This approach goes far beyond the typical areas like networks, physical infrastructure (if you still have any), and other components. It also applies to cloud services, including SaaS platforms like the Power Platform, PaaS solutions like Logic Apps and Functions, and IaaS—if you're still running VMs in the cloud. In all these cases, you need to design for the incident, not just for "normal operations"
But how do we actually do that you might ask? Of course there is no ultimate truth to this question but you can start with a couple of practical steps:
Those parts are only a couple of points but should get your thinking process started to make a step towards becoming NIS2 compliant.
Disclaimer: This is not legal advice. I am not a lawyer, and this article is intended as general guidance only. If you require professional advice, I recommend consulting one of the Big Four auditors or a law firm specializing in IT regulations.