DIGITALEUROPE Position On NIS2 Directive
DIGITALEUROPE Position On NIS2 Directive
Executive summary
The review of the Directive on Security of Network and Information
Systems (NIS2)1 is an essential step towards a more resilient Europe,
ensuring state-of-the-art risk management of current and emerging cyber
threats to vital sectors of the EU economy and society.
One of the goals of the 2016 NIS Directive was to harmonise Member States’
cybersecurity protection initiatives and to boost the EU’s overall level of
cybersecurity.2 Despite attempts to achieve this goal, there remain variances and
fragmentation standing in the way of a single European approach. This is
compounded by increased complexity in the interplay between the NIS and other
EU laws. These are among the areas for improvement that should be addressed
as primary objectives of the review.
1
COM(2020) 823 final.
2
Directive (EU) 2016/1148.
DIGITALEUROPE
Rue de la Science, 14A, B-1040 Brussels
T.+32 (0) 2 609 53 10 / www.digitaleurope.org / @DIGITALEUROPE
EU Transparency Register: 64270747023-20
2
Table of contents
• Executive summary........................................................................... 1
• Table of contents............................................................................... 3
• Scope ................................................................................................. 4
Essential entities ..................................................................................................... 4
Cloud computing and data centre services ................................................................. 5
Important entities .................................................................................................... 5
Manufacturing ............................................................................................................. 6
Exclusion of micro and small entities .................................................................. 6
Supply chain ............................................................................................................ 7
Territoriality ............................................................................................................. 7
• Enforcement .................................................................................... 16
Jurisdiction ............................................................................................................ 17
Supervision ............................................................................................................ 17
Penalties ................................................................................................................. 17
Cooperation ........................................................................................................... 18
4
Scope
DIGITALEUROPE has been supportive of the division between operators of
essential services (OESs) and digital service providers (DSPs) under the current
NIS. However, it is apparent that demarcations between an OES and a DSP may
require more clarity and that other entities could be considered as essential or
important to Member States’ economies and societies.
Essential entities
One of the most significant evolutions in the NIS2 proposal is the introduction of
essential entities (EEs), a definition which replaces and expands upon the
entities previously defined as OES.
All the entities and subsectors that would now fall in scope as EEs should have
clear and concise definitions, ensuring that entities only receive one single
designation. Referring to broad types of entities could generate unnecessary
uncertainty and burdensome compliance efforts for entities potentially falling
under several categories.
The definitions should also make it clear that where a company carries out
operations in furtherance of providing its own services, such operations are
outside the scope of the NIS2. Notably, operations should not fall within scope of
the NIS2 as a ‘data centre service,’ ‘cloud computing service’ or ‘content delivery
3
See Annex I of the NIS2 proposal.
4
See Section 8 of Annex I, ibid.
5
network’ where they are not provided as services to external entities or third
parties.
The current definition of ‘cloud service provider’ (CSP) is broad and extends to
almost all ‘as a service’ (aaS) providers. However, it should be borne in mind that
cloud services are not critical as such, but only where they enable EEs’ critical
functions.
The proposal does not take into account the different modes of CSP deployment.
Notably, in contrast to public cloud services, a private cloud offers a dedicated
infrastructure to enterprise users that is fundamentally different in terms of
security controls. As such, private cloud services should be excluded from the
proposal’s scope.
With respect to ‘data centre services,’ it should be considered that the sale and
actual provision of such services may not be carried out by the same entity. In
such a reselling scenario, the NIS2 should only apply to the entity that directly
provides the service to the customer and not to the reseller of the service.
Important entities
The NIS2 expands the list of entities that were previously classified as DSPs5
under the new category of ‘important entities’6 (IEs) subject to ex post
supervision.7
The inclusion of these sectors would benefit from a more in-depth assessment.
For example, the rationale of including social networking services is unclear
insofar as no systematic risk exists to Member States’ economies or societies.
5
See Annex III of Directive (EU) 2016/1148.
6
See Annex II of the NIS2 proposal.
7
See Art. 30(1), ibid.
6
Manufacturing
The manufacturing section would bring into scope almost every manufacturing
company in Europe.
8
See Territoriality section at p. 7 below.
9
See Art. 18(2)(d) of the NIS2 proposal.
10
See Arts 18 and 20, ibid.
11
https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/2018-Internet-connected-
radio-equipment-and-wearable-radio-equipment.
12
JOIN(2020) 18 final.
13
See Annex II, Sections 5.B-C of the NIS2 proposal.
14
See Art. 2(1), ibid.
7
should also not shy away from including incentives through funding or education
for SMEs to uptake cybersecurity measures.
However, the proposal also provides Member States with the opportunity to
define what SMEs would be critical or important to the respective Member State
economy or society.15 This dual approach will likely cause fragmentation and
legal uncertainty for SMEs operating in multiple Member States, as they may be
within scope in one Member State but not another.
Supply chain
Since the cyber resilience and improved security of networks is broad and
encompasses many moving parts and entities, the NIS2 proposal introduces a
number of requirements to conduct supply chain security assessments for
particular products and services.16
Territoriality
The NIS2 proposal should be clearer in relation to its territorial reach. It should
apply to entities that operate in the EU as opposed to non-EU entities in the
same group of companies.
15
See ‘irrespective of their size’ in Art. 2(2), ibid.
16
See Recitals 43, 46 and 47 and Arts 5(2)(a), 18(2)(d) and 19, ibid.
8
While the NIS2 proposal acknowledges this shortcoming,18 it maintains the NIS
as a Directive and not a Regulation, allowing for some leniency with transposition
but with the key difference of removing the obligation for Member States to
produce a national OES list.19
Regulatory consistency
Ensuring regulatory consistency should be a key objective of the NIS2, given the
envisaged scope expansion and concurrent legislative proposals. Horizontal and
sectoral legal instruments should be sufficiently aligned, and regulatory overlaps
should be avoided.
17
See Recital 19 and Art. 5 of Directive (EU) 2016/1148.
18
See Recital 4 of the NIS2 proposal.
19
See Recital 5, ibid.
20
See Art. 8(1) ibid.
21
Regulation (EU) 2016/679.
22
Directive (EU) 2015/2366.
23
Regulation (EU) No 910/2014.
24
Directive (EU) 2018/1972.
25
COM/2020/595 final.
9
The NIS2 also proposes that sector-specific legislation shall have precedence
over the NIS framework.26 While this provision aims to create legal certainty, it
may not succeed in practice.
To this end, sufficient alignment between the relevant NIS2 provisions and
sector-specific legislation should be promoted. Firstly, it should be ensured that
the NIS2 is finalised before other sector-specific legislation can be put forward,
as the NIS2 should provide the baseline for other legislation to build upon. In
addition, an EU-level procedure could be introduced under the NIS2 to assess
whether sector-specific legislation takes precedence.
EECC
The Commission’s proposal correctly identifies that the reporting and material
resilience obligations under the EECC should be repealed and replaced by those in
the NIS2.28 This will enhance consistency, avoid overlaps and thereby improve legal
certainty.
However, it is equally important to promote coherence of enforcement by subjecting
electronic communications services to the supervision of the competent authority of
their main establishment.29 This is particularly important given the expanded scope of
interpersonal communications services under the EECC, many of which are
inherently cloud-based and cross-border in nature.
Finally, further clarification should be provided that ENISA will continue to be tasked
with ensuring greater harmonisation regarding the application of cybersecurity
obligations by the relevant competent authorities.30
26
See Art. 2(6) of the NIS2 proposal.
27
DORA, where cloud computing or data centre activities are affected only when used in the
financial sector, is a case in point.
28
See Art. 40 of the NIS2 proposal.
29
See Jurisdiction section at pp. 16-17 below.
30
As currently provided by Art. 40 EECC.
10
DORA
Whilst the DORA proposal foresees a clear hierarchy between DORA and the
NIS2 for financial entities, it does not do the same for critical ICT third-party
service providers.31 This creates redundancy between the two frameworks.
A structural, workable solution must be found in order to avoid that two sets of
authorities conduct overlapping supervision over the same services, and to
ensure consistent resilience and security requirements for digital services in the
EU.
To this end, cooperation between the Lead Overseer under DORA and the NIS2
national competent authorities should be formalised, and the substantive scope
of their respective powers explicitly articulated.32
RCE Directive
To this end, further clarification could be provided in the final RCE Directive that
the definition of ‘resilience’ targets physical, or non-cyber, aspects in order to
avoid overlaps with the NIS2.34
Entity obligations
Encryption
Recital 54 of the NIS2 proposal appears to oblige electronic communications
providers to adopt end-to-end encryption to improve the cybersecurity resilience
of electronic communications.
31
See Art. 29(5) of the DORA proposal.
32
For further background, see DIGITALEUROPE’s response to the Commission’s public
consultation on the Digital Operational Resilience of Financial Services (DORA) legislative
proposal, available at https://www.digitaleurope.org/wp/wp-
content/uploads/2021/02/DIGITALEUROPE%E2%80%99s-response-for-the-
Commission%E2%80%99s-public-consultation-on-the-Digital-Operational-Resilience-of-Financial-
Services-DORA-legislative-proposal.pdf.
33
See Recital 8 and Art. 1(2), COM(2020) 829 final.
34
For example, by clarifying that the definition of ‘resilience’ under RCE targets physical, or non-
cyber, aspects.
11
Entities should be allowed to adopt security safeguards and measures that they
deem best suited for the security of their service and consumer needs, while
ensuring security-by-design principles, and the continuous development and
application of new cryptographic standards and techniques should be allowed.
In addition, and more broadly, entities should not be undermined in their ability to
offer end-to-end encryption – any obligations to the contrary, such as lawful
intercept, would inherently undermine security.
Risk management
Consistent with the 2016 Directive’s goal of creating a culture of risk
management, and as further emphasised in the Cybersecurity Act,35 the NIS2
should underscore the EU’s continued role to facilitate the establishment and
uptake of European and international standards for risk management.
In the absence of full harmonisation, the NIS2 should specify that, when laying
down specific risk management measures, Member States should follow, to the
greatest extent possible, international and European standards, as well as
relevant technical specifications.36 Such existing international standards should
form the basis of the Commission’s implementing acts to lay down technical and
methodological specifications for the risk management measures that entities
must undertake.37 In this context, the NIS2 could also formally task ENISA with
developing technical guidelines on security measures, mapped against relevant
standards and certifications, as a means to demonstrate compliance for both EEs
and IEs.38
35
See Recital 49, Regulation (EU) 2019/881.
36
For example, ISO/IEC 27001.
37
See Art. 18(5) of the NIS2 proposal.
38
See ENISA’s current Technical Guidelines for the implementation of minimum security measures
for Digital Service Providers, available at https://www.enisa.europa.eu/publications/minimum-
security-measures-for-digital-service-providers.
12
Certification
The NIS2 proposes that Member States may oblige EEs and IEs to certify certain
products, processes and services pursuant to the Cybersecurity Act, and
empowers the Commission to adopt delegated acts specifying which categories
of EEs are required to obtain a certificate and under which scheme.39 In addition,
the NIS2 proposal is unclear as to whether the supply chain of identified EEs
must also adhere to mandatory certification.
This would create de facto mandatory requirements that conflict with the
voluntary nature of certification under the Cybersecurity Act, which sets out strict
conditions for the Commission in assessing whether adopted European
cybersecurity certification schemes can be mandated.40
While certification can play a pivotal role in ensuring compliance and trust, there
are also important cost considerations that companies must take into account
before deciding whether to certify.
Reporting requirements
The 2016 Directive ensured baseline reporting requirements and resilience
amongst OESs and DSPs, and therefore had a very positive impact on the EU’s
cyber resilience as a whole.
The request for reporting potential threats and near misses could lead to
unmanageable amounts of data without clear context or analysis – in most
cases, too much for Computer Security Incident Response Teams (CSIRTs) to
39
See Art. 21, ibid.
40
See Art. 56(3) of the Cybersecurity Act.
41
See Art. 20(11) of the NIS2 proposal.
13
even analyse. In addition, the concept of ‘near miss’ is not well defined and
potentially misleading.42 Sharing general cyber threats or near misses is not
useful and would create unnecessary burden for organisations that would need
to process and try to operationalise the information shared.
The NIS2 proposal also changes the timeframe for reporting incidents, obliging
entities to report within 24 hours to their competent authorities or CSIRT,
followed by a detailed final report within one month of the initial alert.43
It is important to understand that entities may not have enough information within
this timeframe, which will likely lead to inaccurate reporting. The 24-hour
timeframe will also require EEs and IEs to temporarily shift away their duties from
solving and mitigating the incident – which should be the main priority within the
first 24-72 hours – towards reporting to the CSIRTs.
An obligation to report within 72 hours would be more reasonable and would also
be more closely aligned with the personal data breach notification regime in the
GDPR.44
In addition, incidents can be extremely complex and involve multiple actors. For
this reason, investigations are often not completed within 30 days. We therefore
recommend that the period for the final report should be extended to at least 60-
90 days.
Similarly, there should be greater clarity and a higher threshold for the notification
of threats. EEs and IEs are required not only to report ‘significant incidents’ but
also any incidents having the ‘potential’46 to cause operational disruption or
42
See Recital 39, ibid.
43
See Arts 20(4)(a) and (c), ibid.
44
See Art. 33 GDPR.
45
See Recital 56 of the NIS2 proposal.
46
See Art. 20(2), ibid.
14
The definition of ‘significant incident’ could be clarified considering entity type and
risk, including additional parameters such as the number of users affected,
duration and geographical spread, consistent with the current Directive.47 Such
definitions should be harmonised as much as possible at EU level.
In addition, any requirements to notify incidents that have not yet happened, for
example any threats, near misses or those with ‘potential’ effect, would translate
into unnecessary burden for both entities and supervisory authorities. There is
also a clear risk that these vague terms could be interpreted and applied
inconsistently across Member States.
However, the reference to top-level domain (TLD) registries is too narrow. There
are many other types of organisations that provide domain name registration
services such as proxy service providers, domain name resellers and brokers,
and those providing ‘second-level’ domain information.48
Finally, historical data and a permanent record of historical changes to the data
are essential for cybersecurity purposes. For example, domain names may
47
See Art. 6 of Directive (EU) 2016/1148.
48
In the domain name system (DNS) hierarchy, a second-level domain (SLD or 2LD) is a domain
that is directly below a TLD. The SLD is generally the portion of the URL that identifies the
website’s domain name.
15
change ownership over a period of time, and once sold to another user can be
repurposed for malicious purposes.
Vulnerability disclosure
DIGITALEUROPE is encouraged by the reference to well-established and
broadly adopted best practices and industry standards in the field of coordinated
vulnerability disclosure and vulnerability handling.49
Vulnerability sharing works best when both sides stand to gain from the
interaction and a trusted relationship can be fostered. As it currently stands,
private companies often do not always stand to gain new insights from engaging
with cyber authorities. The presumption of immediate disclosure is not always
helpful in minimising risk and impact of incidents and, in some cases, exploited
vulnerabilities.
In addition, ENISA could play a stronger and more central role in the CVE
registry by becoming a Root CVE Numbering Authority (CAN) and joining the
CVE Program’s Board.
With regard to CSIRTs, we recommend that they should not play the role of
coordinator in multiparty coordinated disclosure processes. The owner of the
technology is normally best positioned to lead the coordination effort, while in
other cases CSIRTs may serve an optional coordination role.51 While CSIRTs
can play an important role, it should be at the discretion of the vulnerability
reporter to decide whether to use a CSIRT to aid in the facilitation of the
disclosure, according to existing standards and best practices.
49
See Recital 29 of the NIS2 proposal. Relevant standards include ISO/IEC 29147 and 30111.
50
https://cve.mitre.org/. The existing CVE registry, while hosted by MITRE and funded by the US
Department of Homeland Security/Critical Infrastructure Security Agency (DHS/CISA), has an
international Board and is maintained by about 150 organisations from across the world. Its CVE
Numbering Authorities (CNAs) include organisations from Germany, the Netherlands, Romania,
Spain and other EU countries.
51
For example, in open-source protocol vulnerability situations.
16
Information sharing
Relevant stakeholders aside from NIS2-covered entities should be encouraged to
participate in voluntary cyber threat information sharing.
It is critical that entities not be obliged to share information until after the exposed
threat has been patched. Sharing threats before a patch may lead to further
exposure and ultimately make it more difficult to patch.
Enforcement
Although it is imperative that the NIS2 be updated to take into consideration the
realities of modern-day cybersecurity resilience and threats, it is equally
important that NIS2 enforcement be harmonised and consistent across Member
States.
17
Jurisdiction
The NIS2 should include clear jurisdiction rules for all entities that fall under its
scope. This is essential to avoid ambiguity as to which Member State is allowed
to enforce the obligations. To improve clarity and predictability, the criterion of
main establishment should be used whenever possible.
Supervision
Onsite inspections or audits should not be at random but set on a periodic basis
and limited in frequency, ideally no more than annually.53 Additionally,
compulsory security scans can be overly burdensome and may subject entities to
greater security vulnerabilities if the information is not appropriately protected.54
They should hence be removed.
In addition, potentially banning entities from doing business if they are found non-
compliant appears overly punitive.55 There are numerous factors that may result
in non-compliance. Similarly, personal criminal and civil liability against entity
representatives for non-compliance is troublesome and overreaching.56
Penalties, if any, should be at the entity level and not directed to a natural
person, and should not be criminal in nature.
Penalties
Another key development in the NIS2 is the inclusion of potential administrative
fines to EEs and IEs in the order of at least €10 million or up to 2% of total
worldwide turnover,57 reflective of the approach taken under the GDPR.58
52
See Art. 24(1) of the NIS 2 proposal.
53
See Art. 30(2)(a) of the NIS2 proposal.
54
See Art. 30(2)(c), ibid.
55
See Art. 29(5)(a), ibid.
56
See Recitals 74-75, ibid.
57
See Art. 31(4), ibid.
58
See Art. 83(4) GDPR.
18
Cooperation
We encourage the Cooperation Group to actively engage and cooperate with
EEs and IEs, improving and streamlining collaboration amongst various groups
and authorities that was not fully realised under the 2016 Directive. In addition,
the Cooperation Group should ensure greater harmonisation of standards and
consistency in approach across the EU.
Alberto Di Felice
Director for Infrastructure, Privacy and Security
alberto.difelice@digitaleurope.org / +32 471 99 34 25
Martin Bell
Privacy and Security Policy Officer
martin.bell@digitaleurope.org / +32 492 58 12 80
59
See Art. 14 of the NIS2 proposal.
19
About DIGITALEUROPE
DIGITALEUROPE represents the digital technology industry in Europe. Our members include
some of the world’s largest IT, telecoms and consumer electronics companies and national
associations from every part of Europe. DIGITALEUROPE wants European businesses and
citizens to benefit fully from digital technologies and for Europe to grow, attract and sustain the
world’s best digital technology companies. DIGITALEUROPE ensures industry participation in
the development and implementation of EU policies.
DIGITALEUROPE Membership
Corporate Members
Accenture, Airbus, Amazon, AMD, Apple, Arçelik, Atos, Autodesk, Bayer, Bidao, Bosch, Bose, Bristol-Myers
Squibb, Brother, Canon, Cisco, DATEV, Dell, Dropbox, Eli Lilly and Company, Epson, Ericsson, Facebook,
Fujitsu, GlaxoSmithKline, Google, Graphcore, Hewlett Packard Enterprise, Hitachi, HP Inc., HSBC, Huawei,
Intel, Johnson & Johnson, JVC Kenwood Group, Konica Minolta, Kyocera, Lenovo, Lexmark, LG Electronics,
Mastercard, Microsoft, Mitsubishi Electric Europe, Motorola Solutions, MSD Europe Inc., NEC, NetApp,
Nokia, Nvidia Ltd., Oki, OPPO, Oracle, Palo Alto Networks, Panasonic Europe, Philips, Pioneer, Qualcomm,
Red Hat, Ricoh, Roche, Rockwell Automation, Samsung, SAP, SAS, Schneider Electric, Sharp Electronics,
Siemens, Siemens Healthineers, Sony, Swatch Group, Technicolor, Texas Instruments, Toshiba, TP Vision,
UnitedHealth Group, Visa, VMware, Workday, Xerox.