NIS-2 Guidelines for Law Firms – Everything Lawyers Need to Know Now
The NIS-2 Directive fundamentally changes cybersecurity compliance for EU law firms, introducing personal liability for management, mandatory security measures, and steep fines up to €10 million. With 22 EU member states now enforcing the directive and active enforcement beginning in 2026, legal professionals must act immediately to ensure compliance.
The Cybersecurity Directive That Changes Everything for Law Firms
The European Union's Network and Information Security Directive 2 (NIS-2), which came into force in January 2023 and required member state transposition by 17 October 2024, has fundamentally transformed the cybersecurity landscape for businesses across the EU. For law firms, this directive represents more than just another regulatory hurdle—it introduces personal liability for executives, mandatory cybersecurity training for management, and potential temporary bans from exercising management functions.
As of March 2026, 21 out of 27 EU Member States have now transposed NIS-2 into national law, with active enforcement underway in Germany, France, and the Netherlands—regulators are auditing, and fines are being applied. The era of voluntary cybersecurity compliance is over. NIS-2 penalties for noncompliance will become a reality across the EU, and the window for preparation is closing quickly.
Do Law Firms Fall Under NIS-2 Scope?
The question of whether law firms are directly covered by NIS-2 is complex and depends on several factors. Italy's implementation law captures legal services for large grocery retailers, while most member states have not explicitly included traditional legal services in their scope definitions. However, law firms may still be affected through several pathways:
Direct Coverage Scenarios
Law firms could fall under NIS-2 if they provide services classified as:
Managed Service Providers (MSPs): Entities providing services related to the installation, management, operation or maintenance of ICT products, networks, infrastructure, applications or any other network and information systems
ICT Service Management: NIS-2 adds 10 new sectors into scope, including a new 'ICT service management (B2B)' category
Digital Services: If offering cloud-based legal platforms or data management services to other businesses
Size and Classification Thresholds
Business size is measured as: (1) large (more than 250 employees and more than €50 million annual revenue) (2) medium (50-250 employees and €10-50 million annual revenue) or (3) small/micro (less than 50 employees and less than €10 million annual revenue). The size classification has practical implications as 'essential' entities are subject to enhanced supervision and stricter enforcement than 'important'.
Indirect Impact Through Supply Chain Requirements
Even if not directly covered, law firms serving NIS-2 entities face indirect compliance pressure. Article 21 requires entities to address supply chain security, including security-related aspects concerning relationships between each entity and its direct suppliers or service providers, taking into account vulnerabilities specific to each direct supplier and service provider.
Entity Classification | Size Criteria | Maximum Fines | Supervision Level |
|---|---|---|---|
Essential | >250 employees + >€50M revenue | €10M or 2% global turnover | Enhanced supervision, regular audits |
Important | 50-250 employees + €10-50M revenue | €7M or 1.4% global turnover | Risk-based supervision |
Out of Scope | <50 employees + <€10M revenue | N/A | Supply chain requirements may apply |
Sources: European Commission NIS-2 Directive; Kemp IT Law Analysis
The Revolutionary Change: Management Personal Liability
NIS-2's most significant innovation is Article 20, which marks NIS-2 as a landmark in global cyber regulation by requiring Member States to ensure that management bodies of essential and important entities approve the cybersecurity risk management measures, oversee their implementation, and can be held liable for infringements.
Article 20: Four Non-Negotiable Management Obligations
Article 20 of the NIS-2 Directive establishes three non-negotiable obligations for the management bodies of essential and important entities, creating four distinct obligations for management bodies:
Formal Approval: Management bodies must formally approve the cybersecurity risk-management measures adopted by the entity under Article 21. Security policies and procedures cannot be adopted by IT teams alone—Board or executive committee approval must be documented
Active Oversight: Management bodies must not only approve but also oversee the implementation of cybersecurity risk management measures
Mandatory Training: Management bodies must ensure they possess sufficient knowledge and skills to identify and assess cybersecurity risks, with Member States ensuring that members of management bodies are required to follow training on a regular basis
Personal Accountability: Personal liability under NIS-2 is not limited to cases of gross negligence or intentional misconduct. The directive enables liability for infringements—meaning a failure to comply with Article 21 measures, even if the failure was not deliberate
Enforcement Powers and Penalties
The consequences for management non-compliance are severe and personal:
Temporary Management Bans: Under Article 32(5)(b), supervisory authorities can request that competent bodies or courts order a temporary ban of a natural person from exercising managerial functions at chief executive or legal representative level in essential entities
Public Disclosure: Public disclosure and explicit naming of directors in enforcement actions
Financial Liability: Civil liability and personal fines in some EU states, with organisational fines up to €10 million or 2% of global turnover for essential entities
Insurance Exclusions: Directors & Officers insurance usually excludes compensation where there is clear negligence or breach—so personal assets are at stake
The 10 Mandatory Cybersecurity Measures (Article 21)
Article 21 is where "we take security seriously" becomes "prove it," setting the minimum cybersecurity risk-management measures that in-scope organisations must implement and be able to evidence in practice. It covers 10 mandatory areas requiring appropriate and proportionate cybersecurity risk-management measures.
Complete List of Required Measures
The measures must be based on an all-hazards approach that aims to protect network and information systems and the physical environment of those systems from incidents, and shall include at least the following:
Risk Analysis and Information System Security Policies: Organizations must establish policies and procedures for conducting regular risk assessments, identifying vulnerabilities, and implementing appropriate security controls to manage identified risks
Incident Handling: Entities must have robust incident detection, analysis, and response capabilities, including defined roles and responsibilities, as well as processes for timely incident reporting to relevant authorities
Business Continuity and Disaster Recovery: Including crisis management plans and backup processes
Supply Chain Security: Entities must address supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers
Security in Acquisition, Development and Maintenance: Including vulnerability handling and disclosure processes
Policies and Procedures for Assessing Effectiveness: Entities must establish policies and procedures to assess the effectiveness of cybersecurity risk-management measures
Basic Cyber Hygiene and Training: Staff receive guidance on basic cyber risks and expected behaviour, with training delivered and completed, including dates and participants recorded
Cryptography and Encryption Policies: Organizations must ensure data confidentiality, integrity and availability by leveraging encryption and other data protection techniques
Human Resources Security and Access Control: Access rights are granted, changed, and revoked consistently throughout the employee lifecycle
Multi-Factor Authentication: Multi-factor authentication (MFA) is a pivotal cybersecurity risk-management measure that adds an additional protective layer on user accounts, making it mandatory for users to provide additional forms of verification to eliminate the chances of account compromise
Evidence Requirements for Law Firms
For SMEs, NIS-2 Article 21 compliance is about being able to demonstrate control in a credible, proportionate way. A Minimum Viable Evidence Pack is a focused set of policies, records, and technical proof that collectively show regulators you have implemented, operated, and reviewed the required cybersecurity risk-management measures.
Measure | Evidence Required | Frequency |
|---|---|---|
Risk Assessment | Risk register, impact/likelihood scoring, mitigation plans | Annual or after major changes |
Incident Response | Incident response plan, contact lists, drill records | Plan review: Annual; Drills: Quarterly |
Access Control | User access matrix, joiner/leaver procedures, MFA configs | Monthly access reviews |
Training | Training content, completion records, participant lists | Annual mandatory training |
Supply Chain | Vendor risk assessments, security clauses in contracts | Annual vendor reviews |
Source: Sunbytes NIS-2 Article 21 Analysis
Incident Reporting: The 24-72-30 Timeline
NIS-2 introduces drastically tightened incident reporting timelines, requiring organizations to submit an "Early Warning" to the competent authority within 24 hours of becoming aware of a significant incident, rather than the previous 72-hour standard.
Three-Stage Reporting Process
Under NIS-2 there will be a three stage process for reporting security incidents to the relevant authorities. An "early warning report" must be submitted within 24 hours. Next, a fuller "incident notification" should be submitted within 72 hours.
Early Warning (24 hours): Entities must notify their Member State's competent authority (including the CSIRT) with an early warning no later than 24 hours after learning of the cyber incident
Incident Report (72 hours): They must also complete a full report no later than 72 hours after and a final report one month after submitting the initial document
Final Report (30 days): Comprehensive analysis including lessons learned and remediation measures
What Constitutes a "Significant" Incident
NIS-2 classifies a "significant" security incident as one that: Has caused or can lead to serious operational disruption to a critical sector; Has affected or can affect other natural or legal persons by causing considerable damage.
Current Implementation Status Across EU Member States
The implementation landscape has evolved rapidly throughout 2025 and into 2026. On 7 May 2025 the European Commission sent a reasoned opinion to 19 Member States for failing to notify full transposition of the NIS-2 Directive. The 19 Member States have two months to respond and take the necessary measures. Otherwise, the Commission may decide to refer the cases to the Court of Justice of the European Union.
Implementation Status by Country
Implementation Status | Countries | Key Dates |
|---|---|---|
Fully Implemented | Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Germany, Greece, Hungary, Italy, Latvia, Lithuania, Malta, Poland, Portugal, Romania, Slovakia, Slovenia, Sweden | Most implemented during 2025 |
Legislative Process Ongoing | France, Ireland, Luxembourg, Netherlands, Spain | Expected completion: 2026 |
Early Enforcement Active | Belgium, Germany, Netherlands | Belgium deadline: April 18, 2026 |
Schluss mit #FOMO – lassen Sie uns sprechen
Sie haben bis hierher gelesen – das zeigt echtes Interesse an der Zukunft Ihrer Kanzlei. Lassen Sie uns herausfinden, wie clever.legal Ihnen konkret weiterhilft.
Strategie-Gespräch vereinbarenExklusiv: Nur ein Partner pro Rechtsgebiet und Region.
Sources: ECSO Transposition Tracker; Passwork NIS-2 Status Update
Key National Variations
Reporting obligations under NIS-2 also vary significantly between countries, creating a fragmented compliance landscape. For example, entities in Germany must immediately inform individuals of an incident if instructed to do so by regulators. This divergence in national rules increases administrative and compliance burdens for organizations operating across multiple EU jurisdictions.
Germany: Germany completed its NIS-2 implementation law in December 2025, with annual compliance costs estimated at roughly EUR 2.3 billion and one-time implementation costs of roughly EUR 2.2 billion
Belgium: Belgium set the first NIS-2 enforcement deadline on April 18, 2026. Essential entities were required to submit verified documentation confirming that cybersecurity controls are in place, assessed by an accredited body or the Centre for Cybersecurity Belgium directly. Self-declarations were not accepted
Italy: Italy's implementation law took effect in October 2024 and includes legal services for large grocery retailers and the cultural sector, capturing a large number of additional companies operating in Italy
Compliance Costs and Business Impact
Financial Impact Assessment
The financial burden of NIS-2 compliance extends far beyond initial technology investments. Early estimates for NIS-2 compliance costs significantly underestimated the true financial impact. Organizations are discovering that technical infrastructure upgrades represent only a fraction of total implementation expenses.
The EU impact assessment on NIS-2 suggested that in-scope companies "would need an increase of maximum 22% of their current ICT security spending for the first years following the introduction of the new NIS framework (this would be 12% for companies already under the scope of the current NIS Directive)".
Cost Breakdown by Category
Cost Category | Estimated Range | Key Components |
|---|---|---|
Technology Infrastructure | €50,000 - €500,000 | MFA systems, monitoring tools, backup solutions |
Professional Services | €25,000 - €200,000 | Risk assessments, policy development, training |
Staff Training & Management | €10,000 - €100,000 | Board training, staff awareness, ongoing education |
Ongoing Compliance | €15,000 - €150,000/year | Monitoring, reporting, audits, updates |
Legal & Consulting | €20,000 - €100,000 | Compliance assessment, policy review, documentation |
Sources: Kiteworks Compliance Cost Analysis; Industry estimates from various compliance providers
Hidden Costs and Common Oversights
Beyond obvious technology investments, organizations face substantial ongoing costs for compliance monitoring, staff training, and regulatory reporting. Legal fees for interpreting complex requirements often exceed initial technology budgets, while specialized compliance personnel command premium salaries in a tight labor market. Small and medium enterprises face particular challenges, as they lack the economies of scale that larger organizations can leverage for compliance investments.
Practical Compliance Roadmap for Law Firms
Phase 1: Immediate Assessment (Weeks 1-4)
Scope Determination: Assess whether your firm falls under direct NIS-2 coverage or faces indirect requirements through client demands
Gap Analysis: Compare your current controls against the 10 minimum measures in Article 21 and identify gaps
Management Briefing: It is imperative that in-house counsel and compliance functions properly brief their management boards on the impending responsibilities and liabilities under NIS-2
Budget Planning: Develop initial cost estimates for compliance implementation
Phase 2: Foundation Building (Months 2-4)
Risk Assessment: Identify the most relevant cybersecurity risks to systems and services and prioritise them based on impact and likelihood, showing that security decisions are risk-based rather than generic
Policy Development: Create comprehensive cybersecurity policies covering all Article 21 requirements
Management Training: Training should be sufficient for management to identify and assess cybersecurity risks and evaluate their impact on the organization's operations. This could include board-level briefings, executive cybersecurity courses, sector-specific workshops, or guided exercises. The key is that training is regular, documented, and relevant
Incident Response Plan: Build or refine your incident detection, escalation, and reporting workflows to meet the 24-72-30 timeline
Phase 3: Implementation (Months 5-8)
Technical Controls: Implement MFA, encryption, monitoring, and backup systems
Supply Chain Security: Assess the security posture of your suppliers and service providers, and ensure contracts include cybersecurity clauses
Staff Training: Ensure your staff, management, and board understand their responsibilities under NIS-2
Documentation: Maintain evidence of your cybersecurity measures, risk assessments, incident logs, and training records. This documentation is critical for audits and regulatory inquiries
Phase 4: Ongoing Compliance (Months 9+)
Continuous Monitoring: Establish regular review cycles for all security measures
Management Oversight: NIS-2 does not specify a review frequency, but best practice suggests at least quarterly reviews of cybersecurity status and annual formal reviews of security policies and risk-management measures
Vendor Management: Implement ongoing supplier security assessments
Incident Preparedness: Regular testing of incident response procedures and reporting timelines
Leveraging Existing Frameworks
If you're already certified to ISO 27001 or have undergone a SOC 2 audit, you've got a head start. Organisations with an existing ISO 27001-certified ISMS already address a significant portion of Article 21, but gaps typically exist around supply chain security, management body accountability, incident reporting timelines, and explicit MFA requirements.
Framework Mapping
NIS-2 Requirement | ISO 27001 Equivalent | SOC 2 Equivalent | Gap Areas |
|---|---|---|---|
Risk Assessment | A.5.1, A.18.1 | CC1.2, CC3.1 | Supply chain risk assessment |
Incident Response | A.13.1 | CC7.1, CC7.4 | 24-hour reporting timeline |
Access Control | A.9.1, A.9.2 | CC6.1, CC6.2 | Explicit MFA requirements |
Management Oversight | A.5.1 | CC2.1 | Personal liability aspects |
Supply Chain | A.15.1, A.15.2 | CC9.1, CC9.2 | Direct supplier security assessment |
Source: Framework comparison based on Glocert International Analysis
Key Recommendations for Law Firms
Immediate Actions
Don't Wait for Clarity: Despite implementation variations, organizations operating in the EU shouldn't wait—they should proactively ensure their cybersecurity measures align with NIS-2. With enforcement expected to kick in as soon as national laws are passed, companies need to act now. Delaying compliance isn't an option
Focus on Article 21: Prioritize implementing the 10 mandatory cybersecurity measures, as these form the compliance foundation
Document Everything: Create a living, tamper-proof record: a digital "black box" for board activity on cyber-security with digital signatures, immutable training and participation logs, and incident and escalation registers
Board Engagement: Board-level cybersecurity governance is no longer optional—it is a legal obligation for all essential and important entities across the EU. Evidence of governance must be documented and available for regulators
Strategic Considerations
Successful budget approvals frame NIS-2 investments as operational resilience improvements, competitive advantages, and risk mitigation rather than pure regulatory overhead, demonstrating measurable business benefits beyond compliance requirements. Well-planned compliance programs often streamline security procedures, optimize vendor management, enhance data governance, and create operational improvements.
The Road Ahead: 2026 Reforms and Beyond
On 20 January 2026, as part of a new cybersecurity package, the Commission proposed targeted amendments to the NIS-2 directive to increase legal clarity. The amendments will simplify compliance with EU cybersecurity rules and risk-management requirements for companies operating in the EU. They will ease compliance for 28,700 companies, including 6,200 micro and small-sized enterprises.
Proposed Amendments Include
Ransomware Reporting: New ransomware reporting obligations
Representative Requirements: Expanding representative appointment requirements
Scope Clarifications: Addressing ambiguities in entity classification
Conclusion: The New Reality of Legal Practice
NIS-2 represents a fundamental shift in how the EU approaches cybersecurity governance. The NIS-2 Directive represents a step-change in how the EU approaches cybersecurity. It broadens the scope, tightens requirements, and enforces accountability at the board level. For SaaS and tech teams, compliance isn't optional—it's a legal obligation with serious financial and reputational consequences.
For law firms, the message is clear: cybersecurity is no longer a back-office technical issue. The Directive's intent is clear: cybersecurity is no longer a back-office technical issue—it is a board-level accountability matter and a core element of operational risk management. Whether directly covered by NIS-2 or facing indirect pressure through client requirements, legal professionals must treat cybersecurity as a strategic business imperative.
The enforcement landscape is rapidly maturing, with 22 of 27 member states having completed NIS-2 transposition, enforcement active in Germany, France, and the Netherlands, while 84% of organizations facing active enforcement are, by their own admission, not ready. The window for preparation is closing, but the opportunity to turn compliance into competitive advantage remains open for those who act decisively now.
As the cybersecurity landscape continues to evolve, law firms that proactively embrace NIS-2 compliance will not only meet their regulatory obligations but also strengthen their market position, enhance client trust, and build operational resilience that serves them well beyond any single directive.
Schluss mit #FOMO – lassen Sie uns sprechen
Sie haben bis hierher gelesen – das zeigt echtes Interesse an der Zukunft Ihrer Kanzlei. Lassen Sie uns herausfinden, wie clever.legal Ihnen konkret weiterhilft.
Strategie-Gespräch vereinbarenExklusiv: Nur ein Partner pro Rechtsgebiet und Region.
Author
Marc Ellerbrock
Attorney at Law
Marc is the legal backbone of clever.legal. Attorney-at-law, certified specialist in banking and capital markets law, partner, former head of the legal department at an issuer group, and trained bank clerk. His focus areas: litigation, capital markets law, insurance law, liability defense (for intermediaries, advisors, and brokers), rescission of insurance contracts, damages claims against insurance companies, and gambling law. While others view mass litigation as an organizational risk, he sees it as an algorithmic challenge. Drawing on his experience in complex liability cases, he translates the rigid logic of the law into the flexible logic of the AI engine.
