NIS2 Directive

NIS2 is in force.
Are you compliant?

The NIS2 directive mandates cybersecurity measures for critical infrastructure operators across Europe. In Belgium, the CCB enforces compliance with proactive audits, management liability, and fines up to EUR 10 million.

Enforcement Active

The NIS2 transposition deadline has passed

EU member states were required to transpose NIS2 into national law by October 17, 2024. Belgium's CCB is now authorized to conduct proactive audits of essential entities. Every day without auditable security evidence is a day of regulatory and legal exposure.

What is NIS2?

The Network and Information Security Directive 2 (EU 2022/2555) is the EU's comprehensive cybersecurity legislation for critical infrastructure. It replaces the original NIS Directive with significantly expanded scope, stronger enforcement, and personal management liability.

NIS2 classifies operators into "essential" and "important" entities. Essential entities face proactive supervision. Both face mandatory incident reporting within 24 hours and risk-management obligations under Article 21.

Who is in scope?

NIS2 covers 18 sectors across two annexes. Annex I (essential) sectors include:

  • Energy (electricity, oil, gas, hydrogen, district heating)
  • Transport (air, rail, water, road)
  • Banking and financial market infrastructure
  • Healthcare
  • Drinking water supply
  • Waste water management
  • Digital infrastructure
  • Public administration
  • Space

CCB Proactive Supervision (Belgium)

In Belgium, the Centre for Cybersecurity Belgium (CCB) is the competent authority for NIS2 enforcement. Essential entities are subject to proactive supervision — the CCB can request evidence of compliance at any time, not just after a breach or incident.

The Belgian NIS2 transposition law empowers CCB inspectors to conduct on-site audits, request documentation, and impose administrative fines up to EUR 10 million or 2% of global annual turnover for essential entities.
Article 21
Cybersecurity risk management measures
NIS2 Article 21 mandates specific security measures. Here is how RX-OS maps to each requirement.
Art. 21(2)(a)

Risk analysis and information system security

Comprehensive policies on risk analysis including identification and assessment of risks to network and information systems.

RX-OS: Automated OT asset inventory with risk scoring per device, firmware vulnerability mapping, and continuous risk reassessment based on behavioral changes.
Art. 21(2)(b)

Incident handling

Procedures for prevention, detection, and response to cyber incidents including notification obligations within 24 hours.

RX-OS: Real-time anomaly detection with timestamped, hash-chained event logs. Provides the evidence needed for mandatory incident reporting to the CCB.
Art. 21(2)(c)

Business continuity and crisis management

Measures including backup management, disaster recovery, and crisis management.

RX-OS: Continuous topology monitoring detects single points of failure, provides asset registers for disaster recovery planning, and monitors backup system availability.
Art. 21(2)(d)

Supply chain security

Security measures relating to the relationship with direct suppliers and service providers.

RX-OS: Detects third-party remote access sessions, VPN connections from vendor IPs, and unauthorized devices introduced during maintenance windows.
Art. 21(2)(e)

Network and information system security

Security in acquisition, development, and maintenance of network and information systems including vulnerability handling.

RX-OS: Firmware version tracking, configuration change detection, and protocol-level vulnerability identification across all discovered OT/IT assets.
Art. 21(2)(f)

Assessing effectiveness of measures

Policies and procedures to assess the effectiveness of cybersecurity risk management measures.

RX-OS: Continuous monitoring validates that security controls remain effective. Hash-chained evidence trail proves compliance posture over time, not just at audit checkpoints.
Art. 21(2)(i)

Asset management

Policies on information and asset management including classification of assets by criticality.

RX-OS: Continuous passive OT asset discovery and classification. Auto-maintained register with device type, manufacturer, firmware version, network behavior, and risk score.
Art. 21(2)(j)

Audit trail and accountability

Use of logging and monitoring solutions to detect and record security-relevant events.

RX-OS: Hash-chained evidence logs. Every observation is timestamped and cryptographically linked to prevent post-hoc modification. Verifiable by any third party.
Evidence
Hash-chained audit trail

Every observation RX-OS records — device discovery, anomaly detection, configuration change — is stored as a hash-chained evidence block. Each block includes a SHA-256 hash of the previous block, creating a tamper-evident chain.

If any block in the chain is modified after the fact, all subsequent hashes break. This provides cryptographic proof that evidence was not altered between observation and audit.

When the CCB requests proof of your security posture at a specific point in time, you can provide the chain and they can independently verify its integrity. This is your management liability defense.

Block #1042
  ts: 2025-03-15T08:41:02Z
  event: device_discovered
  device: PLC-S7-1200-03
  hash: a3f8c2...
  prev: 7b2e91...
|
Block #1043
  ts: 2025-03-15T08:41:14Z
  event: anomaly_detected
  type: new_modbus_function
  hash: e9d4f1...
  prev: a3f8c2...

Management Liability — Article 20

NIS2 Article 20 explicitly holds management bodies personally accountable for approving and supervising the implementation of cybersecurity risk management measures. Failure to ensure compliance can result in personal liability for board members and senior management — including temporary bans from exercising managerial functions.

This is not hypothetical. The directive mandates that management bodies undergo cybersecurity training and that they personally approve and oversee the measures required under Article 21.

Reference: NIS2 Directive (EU) 2022/2555, Article 20 — Governance
Essential Entities
EUR 10M / 2%

Up to EUR 10 million or 2% of global annual turnover, whichever is higher. Proactive supervision by CCB.

Important Entities
EUR 7M / 1.4%

Up to EUR 7 million or 1.4% of global annual turnover. Reactive supervision (post-incident).

Get Started
Build your NIS2 evidence trail today

The compliance deadline has passed. Every day without auditable OT visibility is a day of exposure. Start a two-week pilot and receive your first NIS2 gap report.

Request a Demo →
Includes NIS2 gap analysis and Article 21 mapping report