
With NIS2, cybersecurity is changing sides. It is no longer solely the responsibility of the CISO or IT department. The European directive directly engages the responsibility of management bodies. But in concrete terms, what are the NIS2 obligations of managers? What is legally mandatory? What constitutes best practice? And where to start without drowning in endless checklists?
Key takeaway — The 4 NIS2 obligations of management
According to Directive (EU) 2022/2555, managers of critical and important entities must:
This is not a recommendation. It is the text of Article 20 of the directive.
The first misunderstanding to clear up is this: NIS2 does not prescribe specific technical tools, but imposes categories of measures to be covered, managed at the highest level of the organization.
Cybersecurity is becoming a governance issue, just like financial risk or operational risk. The logic is simple: NIS2 does not assess whether your infrastructure is perfect. It assesses whether your management understands the risks, makes decisions, and can report on them.
The structure of the directive is clear:
These three articles form the core of what your organization must be able to demonstrate.
"Member States shall ensure that the management bodies of essential and important entities approve the cybersecurity risk management measures taken by those entities, supervise their implementation, and can be held accountable for any failures."
— Directive (EU) 2022/2555, Article 20
In concrete terms, the NIS2 responsibility of management involves:
What is expected is not technical expertise from management. It is a managerial responsibility of NIS2 governance: assumed, trained, and traceable.
Evidence required in the event of an inspection:
"Essential and important entities shall take appropriate and proportionate technical, operational, and organizational measures to manage the risks posed to the security of network and information systems."
— Directive (EU) 2022/2555, Article 21
This is where the main nuance lies: NIS2 governance by management is not limited to validating a risk analysis. Article 21 imposes categories of concrete measures, all of which must be covered in an appropriate and proportionate manner:
Management
↓
Cyber governance (Art. 20)
↓
Cyber risk management
↓
Technical and organizational measures (Art. 21)
↙ ↓ ↓ ↓ ↓ ↘
Incidents Continuity Supply chain Access HR Cryptography
The categories of minimum measures explicitly listed in Article 21:
The operational consequence: An organization cannot settle for a "good risk analysis" without covering these areas. Risk analysis is the starting point forcalibrating measures—not the only deliverable expected.
NIS2 leaves real discretion regarding the level of measures, provided that they are proportionate to:
A mid-sized company with 200 employees in the energy sector and a large critical infrastructure group will not have the same expectations. What is non-negotiable is consistency between the risks identified and the measures deployed—and the ability to demonstrate this.
"Essential and important entities shall notify the competent authority or the CSIRT without undue delay of any incident having a significant impact on the provision of their services."
— Directive (EU) 2022/2555, Article 23
NIS2 incident management distinguishes between two levels: operational (detect, contain, restore) and regulatory (notify within the deadline). These are two separate obligations.
The notification process takes place in three specific stages:
What this means in practical terms: Your organization must have pre-qualified its criteria for significant incidents before an incident occurs. A 24-hour notification is only possible if the decision-making chain has already been clarified: who detects, who qualifies, who notifies, who decides.
Notifying is not an admission of fault. It is a procedural obligation. What is penalized is failure to notify—not the fact of having experienced an incident.
This is a point that is often misunderstood. Many elements are presented as "required by NIS2" when in fact they are best practices that are useful and valuable, but not mandatory as such:
Important nuance regarding documentation: it must remain demonstrable, not necessarily exhaustive. The directive refers to "appropriate and proportionate" measures — which means that 10 pages that are actually used are better than 200 pages that are never read.
France has not yet finalized its transposition of NIS2. This has a direct consequence: certain practical arrangements are still being finalized:
What remains unchanged: the substantive obligations arising from the European text apply immediately. The national transposition specifies the modalities; it does not create the obligations.
The right approach: align with the European framework (Articles 20, 21, 23) and explicitly document the assumptions made regarding French procedures, clearly distinguishing them from EU obligations.
The most common mistake is not implementing NIS2 incorrectly. It is leaving cybersecurity solely in the hands of the CISO, without any real involvement from senior management.
A NIS2 auditor does not seek technical perfection. They seek evidence that management understands the issues, arbitrates priorities, has undergone training, and takes responsibility for its choices. In the absence of evidence of cyber management at the executive level—and documented training—this is systematically considered a negative signal in the audit.
Good NIS2 governance means: a consistent, simple, used, and traceable system. Not just another committee.
These actions are simple. They are also very valuable in the event of an NIS2 audit.
👉 Want to build your NIS2 governance? Discover our NIS 2 operational guide, including practical fact sheets, expected deliverables, and a management checklist.