Skip to main content
NIS2 Pitfalls - Article 21
December 2, 2025 at 11:00 PM
by Shanthi Karthikeyan MBA CISM CCISO PMP
nispitfalls.jpg

Let's talk about the elephant in the server room.

Article 21 looks straightforward on paper - ten measures, clear requirements, risk-based approach. So why are two-thirds of EU organizations still scrambling? Because between reading the directive and implementing it lies a minefield of misinterpretations that would make any compliance officer reach for the coffee (or something stronger).

Misinterpretation #1: "We Have ISO 27001, So We're Done, Right?"

Ah, the sweet sound of false confidence. While ISO 27001 provides a framework that closely matches Article 21's risk management measures, it's not a golden ticket. Organizations assume their ISO certification automatically checks every NIS2 box, then discover gaps during their first supervisory review.

The reality? ISO 27001 is an excellent foundation, but organizations must conduct gap analyses to ensure all aspects of Article 21 are covered, particularly supply chain security and state-of-the-art technology requirements.

Your ISO certification might be missing the supply chain depth NIS2 demands. Consider this your friendly reminder to actually do that gap analysis instead of assuming it's fine.

Misinterpretation #2: The Checkbox Compliance Trap

Here's where organizations get creative in all the wrong ways. They see the ten minimum measures and treat Article 21 like a shopping list: "Risk analysis policy? Check. Incident handling procedure? Check. Training slides from 2018? Check."

But Article 21 isn't asking "do you have these things?" It's asking "are these things actually managing your risks effectively?" The directive requires policies and procedures to assess the effectiveness of cybersecurity risk-management measures. That's not a box to tick, it's an ongoing obligation to prove your measures actually work.

The dead giveaway? If your compliance evidence lives exclusively in a dusty SharePoint folder nobody opens between audits, you're doing it wrong.

Misinterpretation #3: Proportionality as Procrastination

"Our organization is small, so we can be proportionate" has become the rallying cry of the underprepared. Yes, Article 21 explicitly considers entity size when assessing proportionality. No, this doesn't mean small organizations get a free pass.

Proportionality accounts for the entity's size, exposure to risks, and the likelihood and severity of incidents, including their societal and economic impact.

Translation: if you're a small water treatment facility, your size doesn't exempt you from robust measures your potential impact on public health does the opposite.

Proportionality is about matching security to risk, not matching effort to budget convenience.

Misinterpretation #4: Supply Chain Security Stops at Your Direct Suppliers

Organizations read "direct suppliers or service providers" and breathe a sigh of relief. "Just tier one! We can handle that!" Then they encounter Article 21(3), which requires considering vulnerabilities specific to each direct supplier and the overall quality of products and cybersecurity practices, including their secure development procedures.

This isn't a contractual checkbox. It's an actual security assessment of how your suppliers develop and secure their products. When your supplier uses third-party components, ignoring tier-two risks because they're not "direct" is regulatory gambling.

The question isn't "Can we legally stop at tier one?" It's "Can we afford the incident that originates three tiers down?"

Misinterpretation #5: Waiting for Perfect Clarity

"We're waiting for the implementing acts." "Our Member State hasn't finalized the national transposition." "The guidance isn't clear yet."

Meanwhile, the directive has been in force since January 2023, and enforcement is accelerating. Organizations treating NIS2 like a future problem are discovering it's a current crisis when two-thirds of organizations remain non-compliant despite official enforcement beginning.

The ten minimum measures in Article 21(2) are already defined. The risk-based approach is already required. Waiting for someone to tell you exactly how to secure your organization is like waiting for a fire safety inspector to tell you water is wet by the time you get that confirmation, you should have already installed the sprinklers.

Misinterpretation #6: "All-Hazards" Means "All Cyber Threats"

When technical teams see "all-hazards approach," they think ransomware, DDoS, and phishing. But the all-hazards approach protects systems and their physical environment from theft, fire, flood, power failures, and unauthorized physical access.

Yes, your backup strategy needs to address fire suppression systems. Your disaster recovery plan needs to consider that the data center floods. Your incident response procedures need to account for an HVAC failure cooking your servers, not just APT groups.

Cybersecurity directors who've never talked to facilities management are learning this lesson the expensive way.

The Bottom Line

Article 21 isn't complex because the requirements are vague—it's complex because it requires actual security thinking instead of compliance theater. The organizations succeeding aren't those with the most elaborate documentation; they're the ones who read "appropriate and proportionate" and asked "appropriate for what specific risks?" instead of "proportionate to how little can we spend?"

Your auditor will eventually ask to see not just your policies, but evidence they're effective. Entities that find they don't comply must take corrective measures without undue delay.

"We thought we were compliant" is not a corrective measure.

Start with an honest risk assessment. Build measures that actually address those risks. Document that they work. The directive gave you flexibility - don't confuse that with ambiguity.

#NIS2 #CyberCompliance #SavvyMinds #RiskManagement #RealityCheck #InfoSec