NIS2 Article 21 Technical Measures: The Complete Security Requirements Breakdown for 2026

NIS2 Article 21 defines 10 mandatory security measures every essential and important entity must implement. Complete breakdown of each requirement with implementation guidance, audit evidence expectations, and compliance timeline.

NIS2 Article 21 defines 10 mandatory security measures every essential and important entity must implement. Complete breakdown of each requirement with implementation guidance, audit evidence expectations, and compliance timeline.

Article 21 of the NIS2 Directive is the technical backbone of EU cybersecurity compliance. While Article 20 addresses governance and board liability, Article 21 defines the specific security measures that essential and important entities must implement. Not “should consider.” Not “may adopt.” Must implement.

Yet most organizations we speak with cannot name all 10 measures, let alone demonstrate compliance with each one. This guide breaks down every Article 21 requirement, explains what auditors expect as evidence, and provides practical implementation guidance based on real enforcement actions already underway across the EU.

What Article 21 Requires

Article 21(1) states that essential and important entities shall take “appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of network and information systems.” These measures must be based on an “all-hazards” approach and aim to protect the confidentiality, integrity, availability, and authenticity of data.

Article 21(2) enumerates 10 specific areas these measures must cover. Each one is mandatory, not optional. The proportionality principle means the depth and sophistication of implementation varies by entity size and risk profile — but every entity must address every area.

Here is the complete breakdown.

The 10 Mandatory Security Measures

1. Risk Analysis and Information System Security Policies

Requirement: Entities must conduct and maintain a comprehensive risk analysis of their information systems and implement security policies addressing identified risks.

What this means in practice:

  • A documented risk assessment methodology (ISO 27005, NIST RMF, or equivalent)
  • Risk register covering all in-scope assets, threats, and vulnerabilities
  • Risk treatment decisions documented (accept, mitigate, transfer, avoid)
  • Information security policy approved by management body
  • Regular reassessment cycle (annually at minimum, or after significant changes)

Audit evidence expected:

  • Risk assessment report (dated, within 12 months)
  • Risk register with current status
  • Board-approved security policy with signature and date
  • Evidence of periodic review (meeting minutes, change logs)

Common gap: Organizations conduct risk assessments but fail to maintain them. An 18-month-old risk assessment is a finding. Auditors check the date first.

2. Incident Handling

Requirement: Procedures for detecting, analyzing, and responding to cybersecurity incidents, including the three-phase reporting obligations under Article 23.

What this means in practice:

  • Documented incident response plan with defined roles and escalation paths
  • Detection capabilities (SIEM, EDR, log monitoring, or equivalent)
  • Incident classification framework (severity levels)
  • Communication procedures for internal stakeholders and external reporting
  • Integration with national CSIRT reporting requirements (24h/72h/1 month timeline)

Audit evidence expected:

  • Incident response plan document (current version, recently reviewed)
  • Tabletop exercise results (within 24 months)
  • Incident log or register (including near-misses)
  • Evidence of CSIRT reporting capability (portal access configured, contact details confirmed)

For the complete reporting timeline and requirements, see our NIS2 Incident Reporting Requirements guide.

3. Business Continuity and Crisis Management

Requirement: Business continuity plans, backup management procedures, and disaster recovery capabilities.

What this means in practice:

  • Business continuity plan (BCP) covering critical operations
  • Disaster recovery plan (DRP) with defined RTOs and RPOs
  • Backup strategy (3-2-1 rule: 3 copies, 2 media types, 1 offsite)
  • Crisis communication plan
  • Regular testing of BCP/DRP (at least annually)

Audit evidence expected:

  • BCP and DRP documents (current, tested)
  • Backup logs showing successful completion
  • Recovery test results demonstrating RTO/RPO achievement
  • Crisis management team roster with contact details

Common gap: Having a BCP that exists on paper but has never been tested. Untested plans are worth less than no plan, because they create a false sense of readiness.

4. Supply Chain Security

Requirement: Security practices covering supply chain relationships, including supplier risk assessment and contractual security requirements.

What this means in practice:

  • Complete ICT supplier inventory
  • Critical supplier identification and classification
  • Supplier security assessment program (questionnaires, certifications, audits)
  • Contractual security clauses (data processing agreements, security SLAs)
  • Ongoing monitoring of supplier security posture

Audit evidence expected:

  • ICT supplier register (complete, current)
  • Critical supplier list with risk ratings
  • Security assessment records for critical suppliers
  • Contract templates with security clauses
  • Evidence of periodic supplier review

This is one of the highest-priority areas for auditors. France’s ANSSI and Germany’s BSI both focus heavily on supply chain documentation. See our NIS2 France ANSSI Compliance Guide and BSI NIS2 Enforcement Guide for country-specific expectations.

5. Security in Network and Information Systems Acquisition, Development, and Maintenance

Requirement: Security considerations integrated into the acquisition, development, and maintenance of systems.

What this means in practice:

  • Secure development lifecycle (SDL) practices
  • Security requirements in procurement specifications
  • Configuration management and hardening standards
  • Patch management procedures
  • Change management controls
  • Code review and security testing for custom development

Audit evidence expected:

  • SDL policy or secure coding standards
  • Procurement security requirements template
  • Patch management logs (current patch status)
  • Configuration baseline documentation
  • Change management records with security review

6. Security Assessment of Network and Information Systems

Requirement: Regular assessment of the effectiveness of security measures.

What this means in practice:

  • Vulnerability scanning program (at least quarterly)
  • Penetration testing (at least annually for essential entities)
  • Security audits against a defined standard (ISO 27001, SOC 2, or equivalent)
  • Internal security reviews and self-assessments

Audit evidence expected:

  • Vulnerability scan reports (recent, with remediation tracking)
  • Penetration test report (within 12 months)
  • Security audit report or certification
  • Remediation tracking showing issues resolved

7. Cryptography

Requirement: Use of cryptographic tools and procedures to protect data confidentiality, integrity, and authenticity.

What this means in practice:

  • Encryption at rest for sensitive data
  • Encryption in transit (TLS 1.2+ for all external communications)
  • Key management procedures (generation, storage, rotation, revocation)
  • Cryptographic algorithm selection aligned with current standards (AES-256, RSA-2048+, ECDSA)
  • Certificate management (issuance, renewal, revocation)

Audit evidence expected:

  • Cryptographic policy document
  • Key management procedures
  • Certificate inventory with expiry dates
  • Evidence of TLS configuration (no deprecated protocols)

Country-specific note: France’s ANSSI publishes its own cryptographic guidance (Guide d’utilisation des mécanismes cryptographiques) which French entities should align with. See our NIS2 France ANSSI Compliance Guide for details.

8. Human Resource Security

Requirement: Security practices related to personnel, including training, background screening, and access management.

What this means in practice:

  • Security awareness training program (all employees, annually)
  • Role-based security training (IT staff, developers, management)
  • Background screening for privileged access roles
  • Access management policies (least privilege, need-to-know)
  • Onboarding/offboarding procedures with security checkpoints
  • Disciplinary processes for security violations

Audit evidence expected:

  • Training records (attendance, completion rates, content)
  • Background screening policy and records (anonymized for audit)
  • Access management policy
  • Onboarding/offboarding checklists with security items
  • Evidence of access reviews (at least quarterly)

9. Hygiene Practices and Cybersecurity Training

Requirement: Basic cybersecurity hygiene practices and cybersecurity training for all staff.

What this means in practice:

  • Multi-factor authentication (MFA) on all critical systems
  • Password policy aligned with current guidance (NIST SP 800-63B or equivalent)
  • Endpoint protection (antivirus, EDR) on all managed devices
  • Email security controls (SPF, DKIM, DMARC)
  • Regular security awareness campaigns
  • Phishing simulation exercises
  • Clear desk and screen lock policies

Audit evidence expected:

  • MFA enrollment rates
  • Endpoint protection deployment coverage
  • Email authentication records (SPF/DKIM/DMARC)
  • Phishing simulation results and improvement trends
  • Training completion records

10. Use of Multi-Factor Authentication and Continuous Authentication Solutions

Requirement: Implementation of multi-factor authentication or continuous authentication solutions.

What this means in practice:

  • MFA deployed on:
    • Remote access (VPN, remote desktop)
    • Privileged accounts (admin, root, service accounts)
    • Cloud services and SaaS applications
    • Email systems
    • Critical business applications
  • Continuous authentication for high-risk sessions (behavioral analysis, session management)
  • MFA methods that meet minimum security standards (not SMS-only)

Audit evidence expected:

  • MFA deployment documentation (systems covered, method used)
  • Exception list for systems without MFA (with compensating controls)
  • MFA bypass procedure (with approval documentation)
  • Identity and access management architecture diagram

Common gap: Implementing MFA but allowing SMS as the only second factor. NIS2 enforcement authorities consider SMS-based MFA insufficient for critical systems. Hardware tokens or authenticator apps are expected.

How Article 21 Connects to Other NIS2 Requirements

Article 21 does not exist in isolation. It connects to several other NIS2 provisions:

  • Article 20 (Governance): Management bodies must approve and oversee Article 21 measures. Personal liability attaches to governance failures. See our NIS2 Board Liability guide.

  • Article 23 (Incident Reporting): The incident handling measures in Article 21(2)(b) must support the 24-hour early warning, 72-hour notification, and 1-month final report timeline. See our NIS2 Incident Reporting Requirements.

  • Article 22 (Registration): Entities must register with their national competent authority and demonstrate Article 21 compliance as part of the registration process.

  • Penalties (Article 35-36): Failure to implement Article 21 measures triggers the maximum penalty regime: €10M or 2% of global turnover for essential entities, €7M or 1.4% for important entities. See our NIS2 Penalties and Fines guide.

Implementation Priority Matrix

Not all 10 measures carry equal audit risk. Based on enforcement actions observed across EU member states, here is the priority matrix:

PriorityMeasureAudit FocusTypical Gap
CriticalIncident HandlingReporting capability, test historyUntested IR plans
CriticalSupply Chain SecuritySupplier register, assessmentsNo register exists
CriticalGovernance (risk analysis + policies)Board approval, documentation currencyStale risk assessments
HighBusiness ContinuityBCP/DRP testing, backup verificationPaper-only BCP
HighHR Security / TrainingTraining records, access reviewsNo training records
HighCryptographyTLS config, key managementDeprecated protocols
MediumSecurity AssessmentVuln scanning, pentest reportsIrregular scanning
MediumHygiene / MFAMFA deployment, endpoint coverageSMS-only MFA
MediumSecure DevelopmentSDL practices, patch managementNo SDL policy
StandardSystem AcquisitionProcurement security requirementsNo procurement criteria

Recommendation: If your organization has limited time before a supervisory visit, focus on the three critical items first. An entity with documented risk analysis, tested incident response, and a complete supplier register is in a significantly stronger position than one with perfect cryptography but none of the three.

Cost of Implementation

For organizations budgeting Article 21 compliance, see our detailed NIS2 Compliance Cost guide. Quick summary:

Entity TypeTypical Total InvestmentTimeline
Essential (250+ employees)€150,000 – €2,000,000+6–18 months
Important (50-249 employees)€30,000 – €500,0003–12 months

Free Tools to Assess Your Article 21 Readiness

  • NIS2 Compliance Checker: Free tool that assesses your entity classification and identifies gaps across all 10 Article 21 measures in under 5 minutes.

  • NIS2 Compliance Checklist PDF: Downloadable 15-point checklist covering every Article 21 domain with actionable items.

  • Cyber Risk Calculator: Estimate your financial risk exposure from non-compliance and calculate the ROI of compliance investment.

The Bottom Line

Article 21 is the technical core of NIS2. Every measure is mandatory. Every measure requires documented evidence. Every measure will be examined during a supervisory visit.

The entities that will face the most difficulty are not those that lack sophisticated security tools — it is those that lack documentation and evidence of the measures they have already implemented. A well-documented, tested, and maintained set of basic controls consistently outperforms a sophisticated but undocumented security architecture in a NIS2 audit.

Start with the three critical measures. Document everything. Test what you can. And if you need a structured approach, download the free checklist and work through it systematically.


Sources:

  • European Parliament and Council (2022). Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union (NIS2 Directive). Official Journal of the European Union.
  • ENISA (2024). Technical guidance on the security measures of Article 21. Athens: ENISA.
  • ANSSI (2025). Guide d’utilisation des mécanismes cryptographiques. Paris: ANSSI.
  • NIST (2020). SP 800-63B: Digital Identity Guidelines — Authentication and Lifecycle Management. Gaithersburg: NIST.

Get the full picture with premium access

In-depth reports, assessment tools, and weekly risk intelligence for cyber professionals.

Single Report

€9 per report

24-48 page professional analysis

Browse Reports →
Best Value

Pro Membership

€49 €19 /month

Founding member price — lock it in forever

Unlimited reports + tools + alerts

Subscribe Now →
30-day money-back
Secure via Stripe
Cancel anytime

Free NIS2 Compliance Checklist

Get the free 15-point PDF checklist + NIS2 compliance tips in your inbox.

No spam. Unsubscribe anytime. Privacy Policy

Featured

NIS2 Penalties Explained: Essential vs Important Entities and What They Mean for Coverage

NIS 2 ·

8 min read

NIS2 Underwriting Questions: What Every Cyber Insurance Broker Should Ask

NIS 2 ·

14 min read

Agentic Security: What Underwriters Need to Know in 2026

Agentic AI ·

8 min read

The NIS2 Audit Crunch: What Underwriters Need to Know Before June 30, 2026

NIS 2 ·

10 min read

Premium Report

2026 Cyber Risk Landscape Report

24 pages of threat analysis, claims data, and underwriting implications for European cyber insurance.

View Reports →

Related posts

Agentic Security: What Underwriters Need to Know in 2026
Agentic AI · · 8 min read

Agentic Security: What Underwriters Need to Know in 2026

Autonomous AI agents are entering production at scale — and they bring a completely new attack surface that traditional cyber insurance questionnaires weren't designed to capture.

AI in Cyber Underwriting: Attacker, Defender, and Underwriter Perspectives
AI · · 7 min read

AI in Cyber Underwriting: Attacker, Defender, and Underwriter Perspectives

Exploring how AI transforms cyber risk from three angles: how threat actors weaponize it, how security teams deploy it, and how underwriters must adapt their approach.

BSI Opens NIS2 Enforcement: What German Entities Must Do Before the Audit
NIS 2 · · 5 min read

BSI Opens NIS2 Enforcement: What German Entities Must Do Before the Audit

BSI has begun NIS2 enforcement audits. Essential entities in Germany face up to €10M fines. Here is what your audit readiness checklist looks like for 2026.