Executive Summary
- What is new: On 26 June 2025, the EU Agency for Cybersecurity (ENISA) published guidance documents setting out security measures that regulated organisations should have in place to comply with the EU’s critical infrastructure cybersecurity law (NIS2).
- Why it matters: These expansive security standards will require significant investment for many newly regulated entities, and member states’ varying NIS2 implementations add a further layer of complexity.
- What to do next: As companies assess their 2026 security and compliance budgets, they should determine what expanded security efforts will be required —prioritizing the greatest enforcement risks — and plan implementation and funding for the coming months and years.
__________
The Guidance
The guidance, though not strictly binding, further clarifies ENISA’s expectations of NIS2-regulated entities, building upon both the text of NIS2 and the European Commission’s NIS2 Implementing Regulation 2024/2690 on cyber risk management.1 (For an overview of NIS2, see our previous client alert “Navigating the New Cybersecurity Landscape: Key Implications of the EU’s NIS 2 Directive.”) As an example:
- NIS2 requires companies to have security measures covering “the use of multi-factor authentication.”
- The NIS2 Implementing Regulation expands on this obligation, stating that companies’ multifactor authentication measures “shall ensure that users are authenticated by multiple authentication factors … in accordance with the [risk] classification of the asset to be accessed.”
- The guidance further expands on the Implementing Regulation, stating that companies should “enforce [multifactor authentication] on internet-facing systems, such as email, remote desktop and VPNs,” and document this compliance through configuration logs. The guidance also maps ENISA’s expectations to widely-used international standards such as ISO 27001.
The guidance, and in particular ENISA’s commitment to aligning regulatory obligations with existing international standards that many companies have already adopted, is welcome, and sets out a helpful blueprint for technical implementation of NIS2 compliance programs. However, the scale of ENISA’s guidance (stretching to nearly 200 pages of security measures) reinforces the extent of investment and documentation regulators expect for comprehensive NIS2 compliance. Companies should target their NIS2 compliance programs to focus on systems (e.g., operationally critical systems) and topics (e.g., incident response and vendor management) that present the greatest enforcement risk to avoid spreading limited compliance resources too thinly.
As part of the guidance, ENISA published a “roles and skills” summary, mapping the internal expertise and responsibilities required to meet NIS2 obligations and emphasizing that NIS2 compliance requires cross-functional teams, including IT, cybersecurity, legal and compliance specialists.
NIS2 Implementation Status
While ENISA continues to advance NIS2, EU member states’ implementation has lagged behind. Despite continued complaints from the European Commission, including a public rebuke, 13 out of 27 states have not yet implemented NIS2 into local law. This challenges companies to hit a moving compliance target.
While approximately half of member states have already transposed NIS2 into national law (some, like Latvia and Lithuania, even ahead of the October 2024 deadline), others are moving more slowly. Several countries, including Germany, Ireland, the Netherlands and Poland, have advanced draft legislation that outlines national frameworks, regulators and sector-specific requirements. Meanwhile, member states such as Spain, Estonia and Sweden remain at an earlier stage of the process.
Approaches to key implementation elements also vary.
- Many countries, including Belgium, Hungary and Italy, have aligned liability provisions for management bodies with national existing civil law regimes.
- Additionally, the “main establishment” principle has been adopted in countries such as Belgium, Croatia, Greece, Italy and Slovakia, meaning that NIS2 obligations primarily apply to entities headquartered in those jurisdictions. Hungary has departed from this model: Service providers operating in Hungary must register locally and comply with the Hungarian Cybersecurity Act, regardless of where their main establishment is located.
Reporting obligations under NIS2 also vary significantly across member states, creating a fragmented compliance landscape for cross-border entities. Definitions of “significant incidents,” reporting thresholds and timelines differ, with some countries imposing stricter requirements than NIS2 does. For example, entities in Cyprus must submit early warnings within six hours of detection — well ahead of NIS2’s 24-hour requirement. This divergence in national rules increases administrative and compliance burdens for organizations operating across multiple EU jurisdictions.
Given this uncertainty, companies should take a phased approach to compliance, focused on addressing core compliance obligations that are likely to be consistent across member states, while leaving flexibility to address jurisdiction-specific quirks once more member states complete their implementations.
What To Do Now
Given the breadth of NIS2’s obligations and the ongoing uncertainty surrounding its implementation, companies need to scope and target their NIS2 compliance efforts to make the most of limited compliance resources. In particular, companies should:
- Continue to progress NIS2 compliance programs, focusing on systems (e.g., operationally critical systems) and documentation (e.g., incident response plans) that present the greatest enforcement risk.
- Ensure that management bodies (e.g., boards) are updated on NIS2 compliance progress, as those management bodies can be held personally liable for NIS2 noncompliance.
- Take advantage of ENISA’s mapping to existing international standards to identify areas where existing information security documentation can be leveraged — for example, where policies prepared for ISO 27001 compliance can be reused with minimal changes for NIS2 compliance — and identify gaps in that documentation.
- Track NIS2 implementation status in the jurisdictions in which a company operates, and identify areas where compliance efforts can be advanced before local implementation is complete.
____________________
1 The Implementing Regulation and published guidance apply only to companies operating in digital sectors (such as cloud computing, data centres, managed services and online search engines) but are likely to influence regulators’ compliance expectations more broadly.
This memorandum is provided by Skadden, Arps, Slate, Meagher & Flom LLP and its affiliates for educational and informational purposes only and is not intended and should not be construed as legal advice. This memorandum is considered advertising under applicable state laws.