NIS2 Compliant – From Analysis to 24/7 Operational Readiness

We strengthen cyber resilience and document compliance with the NIS2 Directive (EU 2022/2555) and EC Regulation 2024/2690. We provide audits, process/technology implementation, and a 24/7 SOC service to meet the requirements for risk management measures (Article 21) and incident reporting (Article 23).

Who is affected by NIS2?

Each company should conduct an individual analysis to determine whether it is subject to the provisions of NIS2. The Directive, in its annexes, indicates the sectors from which entities may be considered “essential and important” and, if other requirements are met, will be subject to NIS2. These are m.in:

energy, transport

health, food

water and wastewater, waste management

public administration, post office

chemicals, selected production industries

Digital infrastructure

Space sector

Courier services

Production

Scientific research

MSP/MSSP services

What needs to be implemented in accordance
with the requirements of NIS2?

Implementation and maintenance of the Security Policy and documentation in the area of risk management

Development and implementation of security policies (including procedures and operational instructions) aligned with market standards. ISO 27001, defining roles and responsibilities for areas related to information security, developing and regularly conducting risk analysis, and managing the risk mitigation process.

Developing and maintaining incident handling processes in accordance with the requirements and deadlines indicated in NIS2

Security incident and incident management processes and procedures. Depending on the needs and size of the organization, it may also include playbooks describing the processes of handling security events, and a SOC 24/7 service.

Procedures/Policies and Tests Business Continuity (BCP) and Disaster Recovery (DR)

Conducting BIA (Business Impact Analysis), determining the required RTOs/RPOs for key systems, BCP/DR test schedule, and BCP/DR test reports

Supply chain management

Cyclical assessment of service providers and verification of suppliers in terms of their compliance with contractual provisions and market standards of information security, and audits of key suppliers.

Secure development and maintenance of applications and IT environments

Development of effective SDLC (Secure Software Development Lifecycle) processes, taking into account static and dynamic code analysis and SCA (Software Composition Analysis) for software produced internally and externally, Attack Surface Management (ASM) scans, and vulnerability management throughout the IT environment.

Evaluation of the effectiveness of the implemented security measures

Periodic security audits, KPIs/KRIs for security management processes, management reviews, cybersecurity management strategy in the enterprise, monitoring the implementation of corrective actions, and mitigating identified risks.

Maintaining Cyber Hygiene and continuous improvement of competence and awareness among staff

Training program (including for management), in particular, initial and recurring training for the entire staff, verification of employees’ knowledge through internal phishing/deep fake actions

Cryptography Management

Cryptography policy, in particular procedures for permitted encryption mechanisms and cryptographic key management.

Asset security management

Human Resources Management Policies, Access and Asset Management Policies, Asset Registers.

Secure Login Accesses and Methods

Identification and implementation (where applicable) of multi-factor authentication mechanisms in systems and services (MFA), use of effective cryptographic means in data transfer, and, where applicable, use of IAM (Identity and Access Management)/PAM (Privileged Access Management) systems.

NIS2 RequirementDescription of security measures and evidence
Implementation and
maintenance of the Security
Policy and documentation in the
area of risk management
Development and implementation of security policies (including procedures and operational instructions) aligned with market standards. ISO 27001, defining roles and responsibilities for areas related to information security, developing and regularly conducting risk analysis, and managing the risk mitigation process.
Developing and maintaining
incident handling processes in
accordance with the
requirements and deadlines
indicated in NIS2
Security incident and incident management processes and procedures. Depending on the needs and size of the organization, it may also include playbooks describing the processes of handling security events, and a SOC 24/7 service.
Procedures/Policies and Tests
Business Continuity (BCP) and
Disaster Recovery (DR)
Conducting BIA (Business Impact Analysis), determining the required RTOs/RPOs for key systems, BCP/DR test schedule, and BCP/DR test reports
Supply chain managementCyclical assessment of service providers and verification of suppliers in terms of their compliance with contractual provisions and market standards of information security, and audits of key suppliers.
Secure development and
maintenance of applications and
IT environments
Development of effective SDLC (Secure Software Development Lifecycle) processes, taking into account static and dynamic code analysis and SCA (Software Composition Analysis) for software produced internally and externally, Attack Surface Management (ASM) scans, and vulnerability management throughout the IT environment.
Evaluation of the effectiveness of
the implemented security
measures
Periodic security audits, KPIs/KRIs for security management processes, management reviews, cybersecurity management strategy in the enterprise, monitoring the implementation of corrective actions, and mitigating identified risks.
Maintaining Cyber Hygiene and
continuous improvement of
competence and awareness
among staff
Training program (including for management), in particular, initial and recurring training for the entire staff, verification of employees’ knowledge through internal phishing/deep fake actions
Cryptography ManagementCryptography policy, in particular procedures for permitted encryption mechanisms and cryptographic key management.
Asset security managementHuman Resources Management Policies, Access and Asset Management Policies, Asset Registers.
Secure Login Accesses and
Methods
Identification and implementation (where applicable) of multi-factor authentication mechanisms in systems and services (MFA), use of effective cryptographic means in data transfer, and, where applicable, use of IAM (Identity and Access Management)/PAM (Privileged Access Management) systems.

What are the deadlines for reporting incidents?

24 hA
warning to the CSIRTs/authorities.

72 h
pre-rated and IOC submission (if available).

1 month
final report; for ongoing incidents, a progress report, then a final one.

Why Exorigo-Upos?

1

End-to-end

From NIS2 vulnerability audit, through process/technology implementation, to 24/7 SOC and tests (pentests, tabletop). Our cyber services also include EDR implementation and maintenance, Email Security, vulnerability scanners, threat monitoring, consulting, and training.

2

ISO-compliant process

We verify processes against ISO/IEC 27001 and 22301 (compliance with Article 21).

3

Integrator experience

For years, we have delivered complex IT projects for retail chains and large enterprises across Europe. It provides practical background and experience in implementing systems and tools to improve ICT security.