Skip to main content
FORTISEU
Back to Blog
NIS218 January 20269 min readAttila Bognar

ENISA NIS360 in Practice: A Prioritization Playbook for Regulated EU Entities

ENISA's NIS360 methodology reveals uneven maturity across NIS2 sectors. A practical playbook for using NIS360 insights to prioritize controls, benchmark sector maturity, and build an executable compliance program.

ENISA NIS360 in Practice: A Prioritization Playbook for Regulated EU Entities featured visual
NIS2ENISA NIS360Risk prioritizationCompliance strategySector maturityControl frameworks

NIS2 compliance programs do not fail because teams ignore the regulation. They fail because everything gets labeled "priority" and nothing gets executed with the depth that actually reduces risk. ENISA's NIS360 methodology provides the sector-level benchmarking data that regulated entities need to break out of flat prioritization and focus their limited resources where they will have the greatest impact. The question is not whether you have a NIS2 program. The question is whether your program is structured to move the risks that matter most in your specific sector.

What NIS360 Actually Measures

ENISA's NIS360 initiative assesses the cybersecurity maturity and resilience posture of sectors covered by the NIS2 Directive across EU Member States. It evaluates sectors against multiple dimensions: policy and governance maturity, technical capability, incident response readiness, supply chain risk management, and cross-border cooperation. The assessment produces a sector-by-sector view of where the EU's critical infrastructure stands relative to the NIS2 baseline expectations.

The methodology does not produce a single score. Instead, it maps sectors along two axes: the level of cyber threats they face and their maturity in responding to those threats. This creates a four-quadrant view where sectors can be categorized as high-threat/high-maturity (e.g., financial services, energy), high-threat/low-maturity (e.g., healthcare, water management), low-threat/high-maturity, or low-threat/low-maturity.

For individual organizations, NIS360 provides three valuable inputs. First, it tells you where your sector stands relative to the EU baseline, allowing you to benchmark your own maturity against sector peers rather than against an abstract ideal. Second, it identifies the specific capability dimensions where your sector is weakest, directing investment toward the gaps that are most common and therefore most likely to attract supervisory attention. Third, it highlights cross-sector dependency patterns that individual entity risk assessments typically miss.

The Flat Prioritization Trap

The most common failure mode in NIS2 programs is what I call the flat prioritization trap. It works like this: a regulated entity maps NIS2 Article 21 requirements to its control framework, identifies gaps, and creates a remediation backlog. Because Article 21 covers ten broad measure categories, from risk analysis to supply chain security to incident handling, the backlog is large. Because the regulation does not explicitly rank these categories, everything receives similar priority.

The result is predictable. Teams work through the backlog, closing gaps based on ease of implementation, available resources, or project manager preference rather than risk consequence. Six months later, dashboard completion metrics look healthy: 60% of tasks complete, remediation velocity trending upward, control coverage expanding. But a closer examination reveals that the completed work is concentrated in areas like policy documentation, access control configuration, and basic monitoring deployment, while the hardest and most consequential areas (supply chain assessment, incident response testing, business continuity validation) remain largely untouched.

This is not a failure of effort. It is a failure of prioritization architecture. And NIS360 data provides the foundation to fix it.

Building a Consequence-Based Prioritization Model

NIS360 insights should be used to build a three-tier prioritization model that reflects actual consequence rather than checkbox completeness.

Tier 1: Operationally Critical Controls

These are the controls whose failure would directly enable or worsen a significant incident in your sector. NIS360 data identifies these by correlating sector threat profiles with the maturity dimensions where sectors score lowest.

For healthcare entities, NIS360 data consistently highlights incident response and business continuity as the lowest-maturity dimensions in a sector facing ransomware threats that directly impact patient safety. The operationally critical controls are therefore those that enable rapid incident detection, containment, and service recovery for clinical systems.

For energy entities, supply chain risk management and OT/IT boundary security emerge as the critical gap areas. The operationally critical controls center on third-party dependency management and segmentation between corporate and operational technology environments.

For financial services entities subject to both NIS2 and DORA, the critical controls overlap with DORA's ICT risk management framework requirements, particularly around ICT third-party risk and digital operational resilience testing.

Tier 1 controls should receive the highest evidence standards, the shortest remediation timelines, and executive-level oversight. They are the controls that supervisors will examine first, because NIS360 tells supervisors exactly where each sector is weakest.

Tier 2: Regulator-Sensitive Controls

These are controls that may not directly prevent the most likely incidents but are explicitly emphasized in the regulatory text and supervisory guidance, making them likely examination targets regardless of their operational criticality in your specific context.

NIS2 Article 21(2) lists ten measure categories. Supervisors will test against all of them, but practical examination experience shows that certain categories receive disproportionate attention. Incident handling (Article 21(2)(b)) is consistently examined because it produces measurable evidence. Supply chain security (Article 21(2)(d)) receives attention because it is the area where sector maturity is lowest across the board. Management body training (NIS2 Article 20(2)) is examined because it is easy to verify and because management accountability is a headline provision of NIS2.

Tier 2 controls should have clear evidence trails and documented rationale. They may not need the same operational intensity as Tier 1, but they need to be defensible during examination.

Tier 3: Maturity and Efficiency Controls

These are controls that improve the overall maturity of the security program and create operational efficiency but whose absence would not directly cause a significant incident or regulatory finding. They include automation of evidence collection, optimization of alert routing, refinement of risk scoring models, and enhancement of reporting dashboards.

Tier 3 work is valuable but should never displace Tier 1 and Tier 2 work. The flat prioritization trap occurs precisely when Tier 3 work (which is often easier and more satisfying to complete) crowds out Tier 1 work (which is harder, messier, and involves more stakeholder coordination).

Using NIS360 Data for Supplier Prioritization

NIS360's cross-sector dependency analysis has a second practical application: prioritizing supplier risk assessment.

Most supply chain risk programs suffer from the same flat prioritization problem as NIS2 compliance programs generally. Every critical supplier gets the same annual assessment questionnaire. Every supplier risk score feeds into the same aggregate dashboard. The result is compliance-grade supply chain oversight that looks comprehensive but fails to concentrate attention on the suppliers whose compromise would have the greatest consequence for your operations.

NIS360 data enables a smarter approach. By understanding which sectors your suppliers operate in and where those sectors score lowest on maturity, you can adjust the depth and frequency of your supplier assessments to match the actual risk.

A supplier operating in a sector that NIS360 identifies as high-threat/low-maturity warrants more scrutiny than a supplier in a high-maturity sector, all else being equal. A supplier providing services that intersect with the capability dimensions where your own sector is weakest deserves prioritized assessment because a failure in that supplier relationship directly affects your most critical gap area.

This approach transforms supplier assessment from a volume exercise (assess all critical suppliers annually) into a risk-driven exercise (assess high-consequence suppliers deeply and frequently, assess lower-consequence suppliers proportionally).

Evidence Standards Per Tier

A common mistake is applying uniform evidence standards across all controls. This creates two problems: Tier 1 controls lack sufficient evidence depth, and Tier 3 controls consume disproportionate documentation effort.

Tier 1 evidence should include:

  • Operational test results (not just configuration reviews but actual scenario-based testing)
  • Incident response exercise outputs with identified gaps and remediation plans
  • Quantitative metrics: mean time to detect, mean time to contain, recovery time objectives versus actuals
  • Business owner attestation that the control operates within acceptable tolerance
  • Third-party validation where feasible (penetration testing, red team exercises, TLPT for financial entities)

Tier 2 evidence should include:

  • Policy documentation mapped to specific regulatory articles
  • Implementation evidence (configuration screenshots, access logs, training completion records)
  • Periodic review records showing the control is maintained, not just deployed
  • Management body engagement evidence for Article 20 requirements

Tier 3 evidence should include:

  • Implementation confirmation
  • Periodic review schedule
  • Improvement metrics where available

This tiered evidence approach reduces the total documentation burden while concentrating depth where it matters most for regulatory defensibility.

The 60-Day Reset Protocol

For organizations that recognize their NIS2 program is caught in the flat prioritization trap, here is a 60-day reset protocol that uses NIS360 insights to restructure the program.

Days 1-15: Reclassify. Map your current remediation backlog to the three-tier model. Use your sector's NIS360 profile to identify Tier 1 controls. Be ruthless: Tier 1 should contain no more than 15-20 controls. If everything is Tier 1, nothing is.

Days 16-30: Re-sequence. Rebuild the remediation roadmap with Tier 1 controls scheduled first, resourced first, and tracked separately. This may mean pausing Tier 3 work that is in progress. That is the right trade-off.

Days 31-45: Re-tier suppliers. Use NIS360 cross-sector data to reclassify your critical suppliers by operational consequence rather than commercial value. Adjust assessment depth and frequency accordingly. Build this into your TPRM operating model.

Days 46-60: Establish the decision forum. Create or restructure a monthly prioritization forum with senior leadership participation and real decision authority. This forum's purpose is to make explicit trade-offs: when Tier 1 work is delayed, someone must decide what Tier 2 or Tier 3 work is displaced to accommodate it. Without this forum, the program will drift back to flat prioritization within a quarter.

Connecting NIS360 to Board Reporting

Boards and senior management frequently receive NIS2 compliance reporting in terms of completion percentages: "we are 65% through our NIS2 remediation plan." This metric is actively misleading if the 65% completed is concentrated in Tier 3 controls while Tier 1 gaps remain open.

NIS360-informed board reporting should communicate three things:

  1. Sector positioning. Where does your organization stand relative to the sector maturity profile that NIS360 identifies? Are you above or below your sector's average maturity in the dimensions that matter most?

  2. Tier 1 exposure. What is the current state of your operationally critical controls? This is the metric that predicts incident impact and supervisory risk, and it should be the lead indicator in every board report.

  3. Risk movement. Are the risks that NIS360 identifies as most significant for your sector actually shrinking? This is different from completion percentages. A program can be 80% "complete" while its most significant risks remain unchanged.

This reporting structure gives boards the context they need to make informed resource allocation decisions and fulfills the management body oversight obligation under NIS2 Article 20.

Key Takeaways

  • Use NIS360 sector profiles to build a three-tier prioritization model (operationally critical, regulator-sensitive, maturity/efficiency). Flat prioritization is the primary failure mode in NIS2 programs.
  • Concentrate Tier 1 controls to no more than 15-20 items. If everything is priority, nothing gets the depth of execution that actually reduces risk. Use your sector's threat and maturity profile to identify what belongs in Tier 1.
  • Apply NIS360 cross-sector data to supplier prioritization. Assess suppliers more deeply when they operate in low-maturity sectors or provide services that intersect with your own sector's weakest capability dimensions.
  • Tier evidence standards to match control importance. Tier 1 controls need operational test results and quantitative metrics. Tier 3 controls need implementation confirmation. Uniform evidence standards waste effort.
  • Report Tier 1 exposure to the board, not completion percentages. The metric that predicts incident impact and supervisory risk is the state of your operationally critical controls, not the percentage of your total backlog that is closed.

The organizations that will navigate NIS2 enforcement successfully are not the ones with the most comprehensive programs. They are the ones with the most focused programs, built on a clear understanding of where their sector's risks are concentrated and where their control maturity falls short of what those risks demand. NIS360 provides that understanding. The playbook above converts it into operational execution.

Next Step

Turn guidance into evidence.

If procurement is involved, start with the Trust Center. If you want to see the product, create an account or launch a live demo.