Compliance & Frameworks

EU NIS2 Directive: What Software Supply Chain Teams Need to Know

The NIS2 Directive imposes new cybersecurity obligations across the EU, with specific requirements for supply chain risk management that affect software vendors and their customers.

Alex
Product Security Architect
7 min read

The EU's NIS2 Directive (Network and Information Security Directive 2), which member states were required to transpose into national law by October 2024, significantly expands cybersecurity obligations across the European Union. For software supply chain teams, the directive introduces requirements that go beyond what most organizations have implemented.

NIS2 replaces the original NIS Directive from 2016 and dramatically expands both the scope of covered entities and the depth of required cybersecurity measures. Supply chain security is explicitly called out as a core requirement, not a suggested best practice.

Expanded Scope

NIS2 covers two categories of entities:

Essential entities include energy, transport, banking, financial market infrastructure, health, drinking water, wastewater, digital infrastructure, ICT service management (B2B), public administration, and space.

Important entities include postal and courier services, waste management, manufacture and distribution of chemicals, food production and distribution, manufacturing, digital providers, and research.

The scope expansion means that thousands of organizations across the EU that were previously unregulated for cybersecurity now have legal obligations. Many of these organizations are software consumers who will cascade requirements to their software suppliers.

Supply Chain Requirements

Article 21 of NIS2 requires covered entities to implement cybersecurity risk management measures that include "supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers."

This is not optional. It is a legal requirement with enforcement mechanisms.

In practice, this means:

Supplier risk assessment. Covered entities must assess the cybersecurity posture of their suppliers, including software vendors. This assessment should consider the supplier's development practices, vulnerability management processes, and incident response capabilities.

Contractual security requirements. Relationships with suppliers should include contractual provisions for cybersecurity, including vulnerability disclosure, incident notification, and security update delivery.

Continuous monitoring. Supply chain risk is not a point-in-time assessment. Covered entities must maintain ongoing visibility into the security posture of their supply chain.

Vulnerability management. Entities must have processes for vulnerability handling and disclosure, including for vulnerabilities in third-party software they use. This implies the ability to track what software components are in use and their vulnerability status.

Incident reporting. Entities must report significant security incidents to their national competent authority within 24 hours (early warning) and provide a full notification within 72 hours. Supply chain compromises that affect the entity are reportable incidents.

What This Means for Software Vendors

Software vendors selling into the EU market face indirect but powerful pressure from NIS2:

Customer security questionnaires. Expect significantly more detailed and frequent security assessments from EU customers. These will specifically ask about development security practices, vulnerability management processes, and supply chain security measures.

SBOM requirements. Customers subject to NIS2 need to track what software components they use. They will increasingly require SBOMs from their software suppliers to fulfill their own supply chain visibility obligations.

Vulnerability disclosure timelines. Customers will expect faster notification of vulnerabilities and more transparent communication about security issues. Contractual requirements for vulnerability disclosure timelines will become standard.

Security attestation. Customers may require evidence of security practices through certifications (ISO 27001, SOC 2), self-attestation forms (similar to CISA's Secure Software Development Attestation), or third-party audits.

Incident notification. If a security incident at the vendor could affect EU customers, those customers need to know quickly to meet their own 24-hour reporting obligation. Vendors should expect contractual requirements for rapid incident notification.

Intersection with the Cyber Resilience Act

NIS2 does not exist in isolation. The EU Cyber Resilience Act (CRA), expected to take effect in 2027, imposes security requirements directly on products with digital elements. While NIS2 focuses on organizational cybersecurity measures, the CRA focuses on product security.

Together, they create a regulatory framework where:

  • NIS2 requires organizations to manage supply chain security risk
  • CRA requires product manufacturers to build security into their products, provide SBOMs, and handle vulnerabilities throughout the product lifecycle

Software vendors selling into the EU will need to comply with CRA product requirements while their EU customers ensure NIS2 organizational requirements are met. The overlap is significant, and organizations addressing both will benefit from aligned approaches.

Enforcement and Penalties

NIS2 includes meaningful enforcement provisions:

  • Essential entities: Fines up to 10 million euros or 2% of total annual worldwide turnover, whichever is higher
  • Important entities: Fines up to 7 million euros or 1.4% of total annual worldwide turnover, whichever is higher
  • Management liability: Directors and officers can be held personally liable for compliance failures
  • Supervisory powers: National authorities can conduct audits, request evidence, and issue binding instructions

The penalty structure is designed to ensure cybersecurity investment is proportional to organizational size and risk. For large organizations, the percentages of turnover make these fines substantial.

Practical Implementation Steps

For organizations preparing for NIS2 supply chain requirements:

For Covered Entities (Buyers)

  1. Inventory your software supply chain. Know what software you use, who supplies it, and what dependencies it contains. SBOM collection from suppliers is the foundation.
  2. Assess supplier security posture. Develop a supplier security assessment framework that evaluates development practices, vulnerability management, and incident response capabilities.
  3. Update procurement contracts. Include cybersecurity requirements, SBOM delivery obligations, vulnerability notification timelines, and incident reporting clauses.
  4. Implement vulnerability tracking. Deploy tools that can ingest supplier SBOMs and continuously monitor for vulnerabilities in your software supply chain.
  5. Establish incident response procedures. Define processes for responding to supply chain security incidents, including communication chains and regulatory notification.

For Software Vendors (Suppliers)

  1. Prepare SBOM generation capabilities. Automate SBOM generation in your build process so you can provide accurate, current SBOMs to customers on request.
  2. Document your security practices. Create transparent documentation of your development security practices, vulnerability management processes, and incident response procedures.
  3. Establish vulnerability disclosure processes. Implement coordinated vulnerability disclosure with defined timelines for notification to affected customers.
  4. Obtain relevant certifications. ISO 27001, SOC 2, or equivalent certifications demonstrate security commitment and simplify customer assessments.
  5. Build incident notification capabilities. Ensure you can rapidly notify affected customers when security incidents occur that could impact their environments.

Timeline and Transposition

Member states were required to transpose NIS2 into national law by October 17, 2024. In practice, transposition is uneven:

  • Some member states met the deadline with national legislation
  • Others are still in the legislative process
  • Implementation details vary by country, creating a patchwork of national requirements

Organizations should prepare for the most stringent interpretation rather than waiting for their specific national transposition, as regulatory expectations will converge over time.

How Safeguard.sh Helps

Safeguard.sh directly addresses the supply chain visibility and vulnerability management requirements at the core of NIS2 compliance.

For covered entities, Safeguard.sh provides continuous monitoring of your software supply chain through SBOM ingestion and vulnerability tracking. When a new vulnerability affects any component in your supply chain, Safeguard.sh alerts you immediately, enabling the rapid response that NIS2 requires.

For software vendors, Safeguard.sh automates SBOM generation in CI/CD pipelines, providing the accurate, current software composition data that EU customers will increasingly require.

Policy gates in Safeguard.sh enforce organizational security standards, providing auditable evidence of supply chain security measures that satisfies both internal governance and regulatory scrutiny.

NIS2 compliance is not a one-time project. It is an ongoing operational requirement. Safeguard.sh provides the continuous supply chain visibility and automated monitoring that makes sustained compliance achievable.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.