Obligations under NIS2 will apply to two groups of entities: key and important.
Key entities are those whose any activity (not just the main one), would be considered crucial to the state’s operations, including those in the energy industry, transportation, banking, health care, drinking water providers, digital service providers, public entities, among others.
Important players included companies in important sectors, such as those performing postal services, waste management, manufacturers and distributors, chemicals, food and industrial production (e.g., automotive).
Manufacturing companies must be covered by these requirements, because it is their operations that are crucial to the functioning of the state, both economically and in terms of their ability to produce certain vehicles, equipment or components.
Despite the distinction between key and important players, the scope of requirements and tasks for both groups will be essentially very similar (the minor simplifications for important players relate to proportionality issues or a lower version of security features).
The basic requirements are:
- Implementation of Information Security Management System – Which will cover all key aspects of security, such as:
- Inventory of resources (including in production environments),
- Analyze risks and decide how to deal with them,
- Ensure IT security (e.g., appointing cyber security officers, hardening infrastructure, threat detection, change control, vulnerability management, describing emergency and backup procedures),
- Provide a training and awareness program for employees,
- Analysis and implementation of physical security (e.g., access control, door reinforcement, turnstiles, entry and exit control, area fencing, etc.);
- Implementation of Business Continuity Management System – which will complement information security with operational business continuity aspects (e.g., transfer to an alternative location, detailed operating instructions for all company departments, testing of action plans and response training of personnel);
- Designation of contact persons within the national cyber security system;
- Training of top management at least once a year;
- Regular internal and external audits;
- Incident reporting to state authorities.
In practice, an organization should implement a well-functioning set of both organizational (policies, procedures, instructions), technical (cybersecurity, IT/OT threat detection and business continuity solutions) and competency (e.g., training) solutions.