Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Book a CREST penetration test today. Get a quote.

Overview

Securing essential services

With an increasing number of cyber threats targeting critical infrastructure, the importance of protecting operators of essential services, such as transportation, health, water and energy, has never been greater.

EU Directive 2016/1148, the Directive on the Security of Networks and Information Systems (the NIS Directive or Cyber Security Directive), came into force in July 2016 and was transposed into UK law as The Network and Information Systems Regulations 2018 (NIS Regulations) on 10 May 2018.

The NIS Directive is designed to improve security and resilience across the European Union by ensuring that operators of essential services and digital services providers have the necessary controls in place to minimise security risk.

NIS Directive Summary

What is the NIS Directive?

The NIS Directive is an EU-wide cyber security directive designed specifically to enhance the resilience of network and information systems. It requires member states to ensure that providers of critical infrastructure and services have appropriate security measures in place to manage cyber risk and maintain continuity. Member states are also required to designate one or more NIS competent authorities (CAs) to help oversee implementation of the Directive.

In the UK, the CAs responsible for enforcing the NIS Regulations include the Secretaries of State for Energy, Transport, Health and the Environment, and various devolved authorities such as the Department of Finance for Northern Ireland and the Welsh and Scottish Ministers.

NIS Application

Who does the NIS Directive apply to?

The UK NIS Regulations apply to:

Operators of Essential Services (OES)

Operators of Essential Services are public or private sector organisations that are dependent upon network and information systems to provide an essential service to society that could be significantly disrupted by a cyber incident. Sectors that fall under this definition include energy, transportation, water and healthcare. Most banking and financial services organisations are exempt from most of the NIS Regulation, as high standards in finance are already enforced by the Bank of England and Financial Conduct Authority.

Relevant Digital Service Providers (RDSP)

Three types of Digital Service Provider are also included in the scope of the NIS Regulations – online marketplaces, online search agencies and cloud computing services (including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) providers. RDSPs that employ fewer than 50 people, have an HQ outside the UK, and/or have an annual turnover of under €10 million are automatically excluded from the scope of the NIS Regulations.

Requirements

NIS Regulations requirements

Article 14 of the NIS Directive outlines fourteen key principles, split across four top-level objectives. In the UK, the National Cyber Security Centre has released a cyber assessment framework (CAF) to help organisations comply with these principles.

Objective A: Managing security risk

Ensuring that appropriate policies and procedures are in place to understand, assess and systematically manage risks to the networks and information systems that support essential services. Included within NISD Objective A:
- A.1 – Governance
- A.2 – Risk management
- A.3 – Asset management
- A.4 – Supply chain

Objective B: Protecting against cyber attack

Implementing proportionate security measures to protect essential services and systems from cyber-attack. Included within NIS Directive Objective B:
- B.1 – Service protection policies and processes
- B.2 – Identity and access control
- B.3 – Data security
- B.4 – System security
- B.5 – Resilient network and systems
- B.6 – Staff awareness and training

Objective C: Detecting cyber security events

Having capabilities to ensure security measures remain effective and to detect cyber incidents that could affect essential services. Included within NISD Objective C:
- C.1 – Security monitoring
- C.2 – Proactive security event discovery

Objective D: Minimising impact of cyber incidents

Ensuring the ability to minimise the impact of security incidents on essential services. Included within NIS Directive Objective D:
- D.1 – Response and recovery planning
- D.2 – Lessons learned/improvements

Audits & penalties

NIS security audits and penalties for non-compliance

Adherence to each NIS principle is judged on how well a total of 39 outcomes are met. Each outcome is assessed based upon Indicators of Good Practice (IGPs).

OESs will be regularly audited by their relevant competent authority to ensure they are fully compliant with the NIS Regulations, or at the very least, working towards compliance. RDSPs are not audited, but they are subject to investigation following any incident that could indicate non-compliance.

In the UK, non-compliant organisations may be fined up to £17 million. The largest fines will be imposed where an incident results in an immediate threat to life or significant adverse impact on the UK economy.

If an OES or RDSP also falls foul of the GDPR and/or DPA 2018, the organisation could be liable to receive separate sanctions. While the UK government has stated that OESs and DSPs should not be tried for the same offence twice, there may be reason for them to be penalised under different regimes if there are multiple, distinct instances of wrongdoing.

A team of security experts using the latest threat intelligence

Compliance

How to comply with the NIS Directive
& NIS Regulations

As an award-winning provider of managed security and assessment services, Redscan can help your organisation achieve NIS compliance. Our services enable you to:

NIS Directive FAQs

Frequently asked questions

What does NIS directive stand for?

The NIS Directive – EU Directive 2016/1148 – is the Directive on the Security of Networks and Information Systems. This is a piece of EU-wide legislation designed to enhance the general level of cyber security in place across the European Union’s critical infrastructure. Alongside cyber security measures, the NIS Directive also covers physical and environmental factors. In the UK, the Directive was transposed into domestic law as the NIS Regulations.

What are the NIS Directive objectives?

There are four key NIS Directive objectives; managing security risk, protecting against cyber-attack, detecting cyber events, and minimising the impact of cyber incidents. Under these objectives sit fourteen NIS Directive subcategories, called principles.

Who needs to comply with the NIS Directive?

The NIS Directive and Regulations apply to two main groups of organisations – Operators of Essential Services (OES) and Relevant Digital Service Providers (RDSP). OESs are organisations that provide an essential service to society that could be disrupted by a cyber incident, including energy, transport, water and healthcare. RDSPs are digital service providers over a certain size that provide online marketplace, search engine and cloud computing services.

What are the cyber security requirements of the NIS Directive?

The main security requirement of NIS is to “identify and take appropriate and proportionate measures to manage the risks posed to the security of network and information systems”. The measures in question should be appropriate to the overall risk posed, covering incident handling, business continuity management, monitoring, auditing and testing, as well as compliance with international standards.

What is the Cyber Assessment Framework?

The Cyber Assessment Framework, or CAF, is a set of guidance released by the UK’s National Cyber Security Centre (NCSC) to help OESs and RDSPs meet the requirements of the NIS Directive and NIS Regulations. Guidance includes a detailed description of each requirement, alongside suggested measures for organisations to take to achieve compliance.

What are the essential services in the UK?

Under the NIS Regulations, essential services in the UK include organisations that depend on network and information systems to provide services that are relied upon by society and could have significant detrimental impacts if they were interrupted. This includes organisations in the energy (oil, gas, electricity), transportation (aviation, rail, shipping, cargo), water and healthcare sectors.

What are the competent authorities in the NIS Directive?

Competent Authorities (CA) are the bodies appointed by member states to oversee the implementation of the NIS Directive. In the UK, the CAs responsible for enforcing the NIS Regulations are split by industry. These include the Secretaries of State for Energy, Transport, Health and the Environment, and various devolved authorities such as the Department of Finance for Northern Ireland and the Welsh and Scottish Ministers.

What is an NIS security audit?

An NIS security audit is the process where Operators of Essential Services (OES) are assessed by their designated CA to ensure they are compliant with the NIS Directive, or are at least putting measures in place to work towards it. Relevant Digital Service Providers (RDSPs) will not be audited but may be investigated if an cyber incident occurs that could indicate non-compliance.

What are the consequences of non-compliance with the NIS Directive?

Organisations that fall foul of the NIS Directive in the UK could be fined up to a maximum of £17 million. The largest fines are reserved for incidents that result in an immediate threat to life or significant adverse impact on the UK economy.

What is the difference between the NIS Directive and GDPR?

Many of the requirements of the NIS Directive and Regulations are aligned to those found in the General Data Protection regulation (GDPR). The main difference between NIS and GDPR is that while the NIS Directive and Regulations only apply to OESs and RDSPs, the GDPR applies to organisations that process personal data. Many organisations will already have implemented measures to support GDPR compliance, and those efforts can help to comply with both standards simultaneously.

About us

Why choose Redscan?

  • A leading UK-based MDR company
  • Red and blue team CREST CSOC expertise
  • High-quality intelligence and actionable outcomes
  • Quick and hassle-free service deployment
  • An agnostic approach to technology selection
  • Avg. >9/10 customer satisfaction, 95% retention rate

Get in touch

Complete the form for a prompt response from our team.

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
28th September 2020
Redscan services now available via G-Cloud 12
To help public sector organisations reduce cyber security risk, Redscan's MDR and penetration testing services are now available on G-Cloud 12, the latest iteration of the UK government's digital marketplace, which went live today.  Read more
25th September 2020
Zerologon now being exploited in the wild
Microsoft has warned that attackers are now actively exploiting ‘Zerologon’, a critical vulnerability in the Windows Server Netlogon authentication process. Read Redscan’s Security Advisory to learn how to protect your organisation.
22nd September 2020
Educational institutions warned of spike in ransomware attacks
The National Cyber Security Centre has warned of a recent rise in ransomware attacks on educational institutions. In some cases, hackers have demanded a large Bitcoin ransom as well as threatening to expose the stolen data of students if this isn’t paid.
15th September 2020
Significant number of remote workers use own devices to access company data
A global survey of over 13,000 remote workers has found that 39% of them use their own devices to access data belonging to their employer, often via services and applications hosted in the cloud. Many of the personal devices used to do this were identified as being less secure than corporate devices.