NIS2 Directive: A Strategic Blueprint for Cyber Security and the Importance of Pentesting

by | Aug 29, 2024 | Articles, Information Security

Reading Time: 8 Minutes

Introduction

In the era of rapid digital transformation and increasing interconnectedness, network and information systems have become integral to daily life, impacting all sectors, including cross-border interactions. This evolution has significantly expanded the cyber threat landscape, introducing new challenges that demand adaptive, coordinated, and innovative responses across all Member States. The escalation in the number, scale, sophistication, frequency, and impact of cyber incidents poses a serious threat to the functionality of these systems. Such incidents can disrupt economic activities within the internal market, result in financial losses, erode user trust, and inflict substantial harm on the Union’s economy and society. Therefore, cybersecurity preparedness and effectiveness are crucial for maintaining the internal market’s proper functioning. Also is essential for enabling critical sectors to successfully navigate the digital transformation and fully realize the economic, social, and sustainable benefits of digitalization.

Cybersecurity has become a cornerstone of policy-making within the European Union, driven by the increasing frequency and sophistication of cyber threats. The EU’s response, aimed at strengthening resilience and response capabilities across its member states, is embodied in the NIS2 Directive.

The NIS2 Directive is designed to replace the original Network and Information Systems (NIS) Directive. It extends the scope of regulatory requirements to cover more sectors and digital services, reflecting the evolving technological landscape. A significant addition in this iteration is the explicit emphasis on penetration testing, which underscores the proactive measures entities must undertake to ensure their systems’ integrity and resilience.

From NIS directive to NIS 2 different and how is Strengthening its Cybersecurity Measures

‘NIS’ The full title of the old NIS directive was: “Directive (EU) 2016/1148 concerning measures for a high common level of security of network and information systems across the Union.” Therefore, “NIS” is an abbreviation of “Network and Information Systems.”

The EU’s motivation for revising the NIS Directive includes insufficient cyber resilience, lack of joint crisis response, inconsistent threat understanding, and inconsistent resilience among Member States.

The new NIS2 introduces a wider array of industries (sectors) that must be compliant, better cooperation between the Member States, new timelines for reporting incidents, more focus on supply chains, the responsibility on the top management of entities, stricter penalties, etc.

Why is NIS 2 important?

NIS 2 is important because it sets very strict cybersecurity requirements for a large number of companies in the European Union – by some estimates, more than 100,000 companies in the European Union will have to become NIS 2 compliant.

Who Does NIS2 Apply To?

The NIS2 Directive applies to a broad range of entities across various sectors, significantly expanding its scope compared to the original NIS Directive. The directive categorizes these entities into two main groups: ‘essential’ and ‘important’ entities, each with specific obligations.

Essential Entities

These are entities that play a critical role in maintaining vital societal and economic activities. The disruption of their services could have significant adverse impacts on public safety, security, and economic stability. Essential entities include:

 

SectorDescription
Energy SectorElectricity, oil, gas, district heating, and essential electricity-related services
Transport SectorAir, rail, water, and road transport, including infrastructure and services essential
for these transport modes
Banking SectorFinancial institutions and banks that provide critical banking services
Financial Market InfrastructuresEntities involved in trading venues, central counterparties, and central securities depositories
Health SectorHospitals, private clinics, and other healthcare providers
Drinking Water Supply and DistributionProviders of potable water
Digital InfrastructureInternet exchange points, domain name system (DNS) service providers,
and cloud computing services
Public AdministrationCentral and regional government entities providing essential public services

 

Important Entities

These entities, while not as critical as essential entities, still play significant roles in maintaining economic and societal functions. Their disruption could lead to substantial adverse impacts. Important entities include:

SectorDescription
Digital ProvidersOnline marketplaces, online search engines, and social networking services
ManufacturingManufacturers of critical products and services
Food SectorProduction and distribution of essential food supplies
Chemical IndustryEntities involved in the production and supply of chemicals
Waste ManagementProviders of waste management and recycling services
Postal and Courier ServicesEntities involved in the delivery of mail and packages
Research and DevelopmentOrganizations involved in critical R&D activities, particularly those related to
high-tech industries and national security

 

What are the main cybersecurity requirements of NIS 2?

To combat against present and emerging cyber threats, the NIS2 Directive establishes comprehensive requirements and obligations that will ensure that organizations are better prepared to prevent, respond to, and recover from cyber incidents.

1) Responsibilities of senior management

According to Article 20, the top management of essential and important entities:

  • must approve cybersecurity measures that need to be implemented in the company,
  • must oversee their implementation, and
  • can be held liable if cybersecurity is not implemented properly.

Articles 32 and 33 further emphasizes the liability of the legal representatives of essential entities and important entities.

2) Importance of training

According to Article 20, members of top management must go through cybersecurity training, and they must enable their employees to attend such training on a regular basis.

NIS 2 requires such training to cover identification of risks, assessment of cybersecurity practices, and how these cybersecurity measures help the company provide its services.

3) Risk-based approach to cybersecurity

Member States must ensure that essential and important entities implement suitable measures to manage risks to the security of their network and information systems, aiming to prevent or minimize incident impacts on services. These measures should align with current technology, relevant standards, and cost considerations, ensuring security levels appropriate to the risks. Proportionality assessments should consider the entity’s risk exposure, size, incident likelihood, and potential severity, including societal and economic impacts.

The measures shall adopt an all-hazards approach aimed at protecting network and information systems, as well as their physical environments, from incidents. At a minimum, these measures shall include the following:

  • policies on risk analysis and information system security;
  • incident handling;
  • business continuity, such as backup management and disaster recovery, and crisis management;
  • supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers;
  • security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure;
  • policies and procedures to assess the effectiveness of cybersecurity risk-management measures;
  • basic cyber hygiene practices and cybersecurity training;
  • policies and procedures regarding the use of cryptography and, where appropriate, encryption;
  • human resources security, access control policies and asset management;
  • the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.

 

4) Cybersecurity as a mixture of technical, operational, and organizational measures

Article 21 mandates that companies implement suitable and proportional technical, operational, and organizational measures to address the risks to the security of network and information systems. It also requires them to prevent or minimize the impact of incidents on their service recipients and other related services.

Additionally, Article 21 stipulates an all-hazards approach, meaning companies must be ready to handle a variety of potential threats.

Also, it specifies a range of cybersecurity documents and measures, which are listed in this article: List of required documents according to NIS 2.

5) Supply chain security

Article 21 requires companies to pay special attention to risks related to direct suppliers and service providers, in particular:

  • Vulnerabilities specific to each direct supplier and service provider
  • The overall quality of products and cybersecurity practices of suppliers and service providers
  • Secure development procedures of suppliers and service providers

6) Reporting of significant incidents

Article 23 requires companies to report any significant incidents to computer security incident response teams (CSIRTs) in the following way:

  • An early warning — indicates whether the significant incident is suspected of being caused by unlawful or malicious acts or could have a cross-border impact.
  • An incident notification — provides an initial assessment of the significant incident, including its severity and impact, as well as, where available, the indicators of compromise.
  • An intermediate report — provides relevant status updates.
  • A final report — needs to be created, at the latest, one month after the submission of the incident notification.
  • A progress report — is created in the event of an ongoing incident at the time of the submission of the final report.

7) Supervision and fines

NIS2 requires a strict oversight over essential and important entities: on-site inspections, off-site supervision, cybersecurity audits, and security scans.

Similar to the EU GDPR, Article 34 introduces fines for companies that do not comply with NIS 2:

  • For essential entities: a maximum of 10 million EUR or a maximum of 2% of the total worldwide annual turnover.
  • For important entities: a maximum of 7 million EUR or a maximum of 1.4% of the total worldwide annual turnover.

 

Regulation and Supply Chain Security

Regulation should be viewed as a strategic foundation for enhancing organizational cybersecurity, not just a compliance checkbox. Many organizations aim only for minimum standards to achieve regulatory compliance, but it should be a step toward comprehensive cybersecurity and resilience. Effective regulation provides a structured framework that, when well-aligned and integrated, can greatly improve security posture.

Regulations like the NIS2 Directive emphasize the critical importance of supply chain security. Organizations must ensure their suppliers and partners comply with relevant regulations, as any non-compliance in the supply chain can pose significant risks. This approach mitigates risks, fosters trust, and shows a commitment to security and resilience. Regular assessments, due diligence, and continuous monitoring of supply chain partners are essential to maintaining compliance and protecting against emerging threats, supporting the stability and integrity of essential services.

 

Representation of Supply Chain

 

Prioritizing NIS2 Compliance in Your Organization

The adoption of new cybersecurity legislation should be a priority for your organization, both in terms of budget and strategy. With the NIS2 Directive taking effect soon, it should be top of mind for the COO. Importantly, C-level executives are personally liable in cases of non-compliance, which can result in fines, prosecution, and disqualification from serving on additional boards. The CISO must be informed of the challenges posed by NIS2, and a designated individual or team should be responsible for the integration of IT and OT systems to ensure compliance.

 

IT and OT Interconnection and the Risks on Cyber Security

As IT (Information Technology) and OT (Operational Technology) environments become more interconnected, organizations face heightened vulnerabilities. Cyber threats can now traverse both IT and OT systems more easily, expanding the attack surface and amplifying the potential impact of attacks or incidents on both operational domains. This interconnectedness can lead to severe consequences, including physical incidents that pose risks to human safety and environmental damage.

To understand the risks, sectors such as energy, transportation and industrial organizations first need to understand the vulnerabilities in their environment and what those represent in terms of criticality to the organization. This knowledge will surface gaps in defenses, enable prioritization, and help establish what countermeasures are needed to help protect IT and OT environments and improve NIS2 readiness.

The NIS2 Directive underscores the need to protect both the physical environment and individuals from cybersecurity threats, stressing the importance of securing OT systems. Achieving NIS2 compliance and improving cybersecurity posture requires securely converging IT and OT systems and processes. This involves a proactive approach to identifying and mitigating vulnerabilities, investing in suitable technologies and training, and fostering effective communication and collaboration between IT and OT teams.

 

Heres a closer look at Information Technology (IT) and OT (Operational Technology) and how they interconnect:

AspectDescription
PurposeIT focuses on the use of computers, storage, networking, and other physical devices, infrastructure,
and processes to create, process, store, secure, and exchange all forms of electronic data.
Key ComponentsComputing Devices: Desktops, laptops, servers, and data centers.
Networks: LANs, WANs, VPNs, and the internet.
Applications: Software programs, databases, and cloud services.
Data: Storage solutions, data analytics, and information systems.
Typical FunctionsBusiness Operations: Supports corporate functions like finance, HR, customer service, and logistics.
Data Management: Handles information storage, processing, and retrieval.
Cybersecurity: Protects data integrity, confidentiality, and availability from threats like malware, hacking,
and data breaches.

 

Operational Technology (OT)

AspectDescription
PurposeOT involves the hardware and software systems that detect or cause changes through direct monitoring and control of physical devices, processes, and events in industrial operations.
Key ComponentsIndustrial Control Systems (ICS): SCADA (Supervisory Control and Data Acquisition) systems,
Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC).
Field Devices: Sensors, actuators, robotics, and machinery.
Networks: Industrial Ethernet, fieldbus, and other control networks.
Typical FunctionsAutomation: Controls and automates physical processes and machinery.
Process Management: Monitors and manages production lines, utilities, and infrastructure.
Safety Systems: Ensures operational safety and reliability in environments like manufacturing plants, power grids, and transportation systems.

 

Cybersecurity Challenges between IT and OT:

Increased Attack Surface: Interconnected IT/OT systems can be more vulnerable because threats can migrate from IT systems (e.g., malware from a corporate email) to OT systems (e.g., affecting a production line).
Different Security Priorities: IT focuses on data security (confidentiality, integrity, availability), while OT prioritizes operational continuity and safety, leading to potential conflicts in security strategies.
Legacy Systems: Many OT systems were not designed with cybersecurity in mind, making them susceptible to attacks when connected to modern IT networks.
Skill Gaps: OT professionals may lack cybersecurity expertise, while IT security teams might not fully understand the complexities of OT environments.

How Can Your Organization Prepare?

Organizations are encouraged to adopt a proactive approach, conducting assessments to establish cybersecurity baselines and developing strategic plans to address vulnerabilities.

If your organization operates in an industry sector deemed critical for the resilience of the European economy, or if you are a supplier to such organizations, compliance with the NIS2 Directive is mandatory. This regulation aims to enhance cybersecurity practices across the EU and ensure that suppliers and service providers do not introduce cyber risks to their operations.

 

Cyber Security products are incomplete without testing them for weaknesses

While defensive security solutions such as firewalls, undoubtedly offer essential layers of security, they are not a universal cure. The reality is that a strong defense is only half the battle. Companies that do not embrace the offensive security aspect of Cybersecurity, such as Penetration testing, risk overlooking critical vulnerabilities in their systems. Incomplete solutions, often leave gaping holes in the security posture, waiting to be exploited by determined adversaries.

 

The Role of Offensive Security in Cyber Security and NIS2 Compliance

Offensive security plays a pivotal role in the cybersecurity landscape, especially within the framework of NIS2 compliance. Unlike traditional defensive strategies that focus on protecting systems from external threats, offensive security adopts a proactive approach by simulating attacks to identify vulnerabilities before malicious actors can exploit them. This method, often referred to as penetration testing, involves skilled professionals emulating cyber-attacks to uncover weaknesses in an organization’s defenses.

The NIS2 Directive elevates penetration testing from a best practice to a regulatory requirement, ensuring that all entities within its scope undertake regular and rigorous security assessments. Entities are required to perform these assessments at regular intervals, facilitating continuous monitoring and improvement of their security posture to identify new vulnerabilities as technology and threat landscapes evolve. The directive mandates a comprehensive scope for these tests, covering all critical aspects of an organization’s IT infrastructure, including networks, applications, and endpoints.

These assessments must be conducted by qualified and experienced cybersecurity professionals to ensure thorough and accurate evaluations. Following the tests, organizations are required to produce detailed reports outlining the vulnerabilities found, the methods used to exploit them, and recommended remediation steps. These reports guide security improvements and must be shared with relevant regulatory authorities if required.

Penetration testing is integrated into the broader risk management framework mandated by the NIS2 Directive. The findings from these tests inform risk assessments and mitigation strategies, ensuring a cohesive and proactive security approach. This proactive stance is crucial for maintaining effective security in an increasingly complex threat environment, helping to safeguard critical infrastructure and services essential for the resilience of the European economy. By embracing offensive security practices, organizations not only comply with regulatory requirements but also significantly enhance their overall cybersecurity posture.

 

Deadline for NIS2 Directive Implementation

By 17 October 2024:
Member States must adopt and publish measures to comply with the NIS2 Directive.
From 18 October 2024:
Member States must apply the adopted measures.

Conclusion

The goal of NIS2 Directive seeks to strengthen the cybersecurity resilience of organizations across the European Union and raise awareness of the threats from malicious actors. It requires the implementation of cyber risk management strategies, making adherence to cybersecurity standards essential for ensuring organizational resilience and continuity. Therefore, it is imperative to pinpoint vulnerabilities within an organization’s infrastructure and address them promptly.

The cyber threat landscape is constantly evolving, with new threats and attack vectors emerging regularly. As a result, businesses struggle to keep up with the latest developments and adjust their security measures accordingly.

New types of malwares, phishing schemes, and attack methodologies can quickly outdate existing security controls. This constant evolution makes it difficult to predict and prepare for the next threat.

Many organizations do not have effective processes for incident reporting, analysis, and feedback loops to continuously improve security measures.

Incidents may go unreported or underreported, leading to an incomplete understanding of vulnerabilities and control failures. Without thorough analysis, organizations miss opportunities to learn from incidents and improve their controls.
For example, if a phishing attack occurs and is not properly reported or analyzed, the organization may fail to identify underlying vulnerabilities in their email security or employee training programs.

Organizations frequently grapple with a shortage of skilled cybersecurity professionals, limiting their capacity to effectively assess and improve their cyber maturity. This talent deficit hinders their ability to identify, implement, and monitor effective security controls, creating gaps in their defenses against cyber threats. Additionally, many organizations lack comprehensive visibility over their endpoints and devices, complicating their ability to define a proper scope for security assessments. This lack of insight into the full inventory of their IT and operational assets makes it difficult to apply and enforce security measures consistently across the entire environment. Without adequate expertise and clear knowledge of their own digital landscape, organizations struggle to maintain effective security practices and respond to incidents promptly.

 

What we Suggest and how BHEH can help you

Security Assessment Plan

StepActionsDeliverables
Conduct Comprehensive Risk Assessments

Evaluate Organizational Aspects:
-Governance
-Risk management
-Policies and procedures

Evaluate Technical Security Risks:
-Network vulnerabilities
-System configurations
-Application security
-Endpoint protection

Assessment Reports
Develop a Risk Prioritization Matrix

Categorize risks by Likelihood and Impact.

Prioritize based on Risk Level:
-High: Immediate attention required.
-Medium: Planned action within the strategic plan.
-Low: Monitor and address as part of ongoing improvements.

Risk Prioritization Matrix, Baseline Documentation

 

Develop a Strategic Plan

StepActionsDeliverables
Short-Term Action Plan (Quick Wins)

Implement Immediate Security Enhancements:
-Patch critical vulnerabilities.
-Improve access controls and authentication mechanisms.
-Enhance security monitoring and incident response capabilities.

Raise Awareness:
-Conduct basic cybersecurity training for employees.
-Deploy phishing awareness campaigns.

Assessment Reports
Long-Term Action Plan (Comprehensive Measures)

Develop Security Policies:
-Create or update security policies and procedures.
-Define guiding principles for cybersecurity governance.

Implement Secure Reference Architecture:
-Design a secure architecture tailored to the industrial environment.
-Ensure architecture supports scalability and resilience.

Updated Security Policies, Secure Reference Architecture Design
Establish Continuous Improvement Mechanisms

Regular Security Audits:
-Schedule periodic reviews to assess the effectiveness
of implemented controls.

Update Risk Assessments:
-Continuously update risk assessments to reflect new threats
and changes in the environment.

Audit Schedules,
Updated Risk Assessments

 

Effective Remediation and Risk Management

StepActionsDeliverables
Execute Fix-It Programs

Implementation Support:
-Provide hands-on support for deploying secure reference architecture.
-Assist with configuring security tools
and technologies.

Organizational Changes:
-Adjust organizational structure to better support cybersecurity efforts.
-Define and assign cybersecurity roles
and responsibilities.

Fix-It Program Reports
Deploy Rapid Mitigation Measures

Incident Response Enhancement:
-Improve incident response protocols
and capabilities.
-Establish clear communication channels
for incident management.

Patch Management:
-Expedite the patching of identified vulnerabilities.

Updated Security Configurations
Monitor and Validate FixesPost-Implementation Review:
-Conduct reviews to ensure fixes are effective.
-Validate those improvements align with
risk mitigation goals.
Post-Implementation Review Documents

How Our Offensive Security Services can help you

Our company specializes in offensive security services, such as penetration testing, to help organizations enhance their cybersecurity posture. Here’s how we can assist:

Identifying Vulnerabilities:

  • Conduct thorough penetration tests to identify vulnerabilities in your network, applications, and endpoints.
  • Provide detailed reports on discovered weaknesses, exploit methods, and recommended remediation steps.

Strengthening Security Measures:

  • Work with your IT team to patch identified vulnerabilities and enhance security controls.
  • Develop and implement secure configurations for systems and applications to prevent exploitation.

Continuous Monitoring and Improvement:

  • Perform regular penetration testing to ensure ongoing monitoring of your security posture.
  • Help you stay ahead of evolving threats by continuously identifying and addressing new vulnerabilities.

Compliance with NIS2 Directive:

  • Ensure your organization meets the Pentesting requirements mandated by the NIS2 Directive.
  • Provide comprehensive documentation and reports to demonstrate compliance to regulatory authorities.

Enhancing Risk Management:

  • Integrate findings from our penetration tests into your risk management framework.
  • Assist in developing and updating your risk assessments and mitigation strategies based on real-world attack scenarios.

Expert Guidance and Support:

  • Offer expert guidance on cybersecurity best practices and strategic planning.
  • Provide training and awareness programs to enhance the cybersecurity knowledge of your staff.
Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Are you looking for a better way to secure your business? Whether you need a product audit, vendor security assessment, or overall security testing, we can help. Our team of experts will work with you to identify your specific security needs and provide tailored recommendations to improve your overall security posture.

To find out more about how Black Hat Ethical Hacking can help you, check out our Solutions

Recent Articles

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This