NIS2 Directive (EU 2022/2555)
Best for: Entities the EU classifies as 'essential' or 'important' in 18 sectors, including energy, transport, banking, health, digital infrastructure, ICT service management, public administration, and critical manufacturing. The size threshold is generally 50+ employees or EUR 10M+ turnover. Sole providers of critical services may be caught regardless of size. Non-EU entities providing DNS, cloud, CDN, or managed security within the EU are also in scope.
🏛 European Parliament and Council of the European Union. National competent authorities (e.g., BSI in Germany, ANSSI in France, ACN in Italy) enforce at the member state level. ENISA coordinates cross-border cooperation. · NIS2 Directive (EU 2022/2555, Oct 2024) Official source →
Get Started
module "..." {
source = "nis2.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}
What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Encryption at Rest: Checks encryption configuration on Athena workgroups, backup recovery points, API Gateway stage caches, and Bedrock invocation logs in S3 and CloudWatch. Validates that KMS keys are in use where required.
- Encryption in Transit: Validates ACM certificate key lengths (minimum 2048-bit RSA), certificate transparency logging, and SSL certificate attachment on API Gateway stages.
- Logging and Monitoring: Verifies logging is enabled on API Gateway stages, AppSync GraphQL APIs, Athena workgroups, and Bedrock model invocations. Flags services where logging is disabled or misconfigured.
- Backup and Business Continuity: Confirms backup plans, vaults, and report plans exist in each configured region, and that recovery points are encrypted.
- Access Control and Session Management: Enforces AppStream fleet timeout thresholds (idle disconnect at 600s, session disconnect at 300s, max duration at 36000s) and the IMDSv2 requirement on Auto Scaling launch configurations.
- Incident Reporting Readiness: Validates that AWS accounts have a security alternate contact registered and that primary contact details are current.
What you handle
- Encryption at Rest: Defining and documenting your encryption policy per Article 21(2)(e). Key rotation schedules, key access reviews, and mapping encryption coverage to all in-scope systems beyond AWS.
- Encryption in Transit: TLS policy decisions (minimum version enforcement), certificate lifecycle management for non-ACM certificates, and documenting approved cipher suites.
- Logging and Monitoring: Centralized log aggregation, SIEM integration, alert tuning, and building the incident detection workflows needed to meet Article 23 reporting timelines. Retention period configuration and log integrity verification.
- Backup and Business Continuity: Disaster recovery testing, recovery time objective (RTO) and recovery point objective (RPO) documentation, and the broader business continuity plan required by Article 21(2)(c).
- Access Control and Session Management: MFA enforcement policies, identity governance, privileged access management, and access review processes per Article 21(2)(i) and (j). Role-based access control documentation across all environments.
- Incident Reporting Readiness: The full incident response plan, CSIRT notification procedures, the 24-hour early warning and 72-hour notification workflows required by Article 23, and staff training on reporting obligations.
Controls by Category
Access Control and Session Management (Article 21(2)(i)(j)) (3 controls)
IMDSv1 on EC2 instances and overly permissive session durations are the most common access control findings here, and both are straightforward to catch in automated scans. Article 21(2)(i) and (j) require documented access control policies and MFA enforcement, so assessors will also ask for evidence of access reviews and authentication configuration that no scan can verify on its own.
Cryptography and Encryption (Article 21(2)(e)) (5 controls)
Backup data stored without encryption is one of the most consistent findings in this category and directly contradicts Article 21(2)(e). Beyond backups, assessors examine certificate configurations for weak key lengths or expiry issues and verify that data stores are encrypted both at rest and in transit.
Logging, Monitoring, and Incident Detection (Article 21(2)(b)) (3 controls)
Article 23's 24-hour early warning window means detection gaps are not just a hygiene issue, they are a compliance failure. Assessors will want to see logging enabled across all relevant services and confirm that logs feed into a SIEM or equivalent capability. Gaps at the API and application layer show up repeatedly.
Additional Controls (91)
AWS CloudTrail (4)
AWS CodeBuild (3)
AWS Database Migration Service (2)
AWS IAM (9)
AWS KMS (1)
AWS Step Functions (1)
AWS WAF (1)
Amazon CloudFront (2)
Amazon CloudWatch (1)
Amazon DocumentDB (1)
Amazon DynamoDB Accelerator (2)
Amazon EC2 (7)
Amazon EFS (2)
Amazon EKS (1)
Amazon ElastiCache (2)
Amazon Kinesis (1)
Amazon MQ (1)
Amazon MSK (1)
Amazon Neptune (4)
Amazon OpenSearch Service (3)
Amazon RDS (14)
Amazon Redshift (3)
Amazon Route 53 (1)
Amazon S3 (6)
Amazon SageMaker (1)
Amazon VPC (1)
Elastic Load Balancing (2)
Other (14)
Related Frameworks
Frequently Asked Questions
Does NIS2 apply to my organization if we are based outside the EU?
Yes, if you provide services listed in Annexes I or II within the EU. Article 26 specifically requires non-EU entities providing DNS services, TLD name registries, domain name registration, cloud computing, data centre services, CDN, managed services, managed security services, or online marketplaces/search engines/social platforms within the EU to designate an EU representative. If you serve EU customers in these categories, you are in scope regardless of where you are incorporated.
What are the penalties for non-compliance?
Essential entities face fines up to EUR 10 million or 2% of global annual turnover, whichever is higher. Important entities face fines up to EUR 7 million or 1.4% of global annual turnover. Article 32 also allows member states to impose temporary bans on management body members of essential entities for repeated non-compliance. Individual member states may set additional penalties in their transposition laws.
How does NIS2 differ from the original NIS Directive?
NIS2 expands scope from roughly 7 sectors to 18, covering an estimated 160,000+ entities across the EU compared to a few thousand under NIS1. It replaces the 'operators of essential services' and 'digital service providers' categories with 'essential' and 'important' entities, determined by sector and size thresholds rather than member state designation. It introduces personal accountability for management bodies (Article 20), mandatory supply chain risk management (Article 21(2)(d)), and harmonized incident reporting timelines (24h/72h/1 month) under Article 23. The enforcement regime is significantly stricter.
Is there a formal NIS2 certification process?
No single certification audit demonstrates compliance. Article 24 allows the European Commission to require essential and important entities to use certified ICT products or services under the EU Cybersecurity Act (Regulation 2019/881), but this is not yet broadly mandated. Member states may accept existing certifications (ISO 27001, SOC 2) as supporting evidence during supervision. Compliance is ultimately assessed by national competent authorities through their own supervisory processes.
What does the 24-hour incident reporting requirement actually entail?
Article 23(4)(a) requires an 'early warning' to the national CSIRT or competent authority within 24 hours of becoming aware of a significant incident. This early warning must indicate whether the incident is suspected to involve unlawful or malicious acts and whether it could have cross- border impact. It does not need to be a complete root cause analysis. Within 72 hours, a full incident notification with severity assessment and indicators of compromise is required. A final report is due within one month. 'Significant incident' is defined in Article 23(3) as causing substantial operational disruption or financial loss, or affecting other persons by causing considerable material or non-material damage.