Article 21Supply Chain

EU NIS2 Directive (EU) 2022/2555 Supply Chain Security Program

Operationalise Article 21(d) with vendor tiering, assurance, and incident communications.

Output: a repeatable third-party security program with audit-ready evidence.

Author
Sorena AI
Published
Feb 23, 2026
Updated
Feb 23, 2026
Sections
4

Structured answer sets in this page tree.

Primary sources
2

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Feb 23, 2026
Updated Feb 23, 2026
Overview

NIS2 explicitly requires supply chain security as part of Article 21 risk management measures. The fastest way to fail is to treat suppliers as "outside the perimeter". This page gives you a practical program structure you can implement and maintain.

Section 1

What Article 21(d) expects (and what it means operationally)

Article 21 includes supply chain security, including security-related aspects of relationships between each entity and its direct suppliers or service providers.

  • Create supplier tiering based on impact: managed services, critical infrastructure, data access, and operational dependency.
  • Define security requirements per tier: authentication, logging, vulnerability handling, incident notification, and resilience expectations.
  • Build continuous assurance: not only a procurement questionnaire - you need evidence and recurring reviews.
  • Include supplier incident communications in your Article 23 incident workflow (timelines, contacts, and data requirements).
Section 2

Program design (the minimum components that make it work)

A defensible supply chain program is simple but strict: tiering, controls, contracts, and evidence.

  • Inventory: maintain a live list of direct suppliers and service providers, with data access and criticality tagging.
  • Onboarding: due diligence + contract clauses + technical onboarding controls (SSO/MFA, network segmentation, least privilege).
  • Ongoing assurance: periodic reviews, evidence requests, and service-level security KPIs.
  • Offboarding: access removal, data return/destruction, and termination runbooks.
  • Incident communications: defined notification timelines, contact paths, and required incident payload fields.
Section 3

Evidence pack (what you should be able to show during audits)

Supervisory authorities can request evidence of cybersecurity policies and implementation. Supply chain evidence should be indexed and easy to retrieve.

  • Supplier register with tiering rationale and periodic review dates.
  • Standard security clauses / addenda per tier (incident notification, vulnerability handling, access control, audit rights where appropriate).
  • Due diligence records and decisions (including exceptions and compensating controls).
  • Supplier performance KPIs and review minutes.
  • Supplier incident communications log and lessons learned integrated into Article 21 improvements.
Section 4

A 60-day rollout plan (pragmatic sequencing)

Start with the suppliers that can cause the biggest operational impact, then expand.

  • Days 0-14: build tiering model + supplier inventory; identify "critical suppliers" list.
  • Days 15-30: implement contract addendum for critical tiers; define incident communications requirements.
  • Days 31-45: implement technical onboarding/offboarding controls; tighten privileged access and logging for supplier access.
  • Days 46-60: run first supplier reviews and document evidence pack; integrate into management reporting cadence.
Recommended next step

Turn EU NIS2 Directive (EU) 2022/2555 Supply Chain Security Program into an operational assessment

Assessment Autopilot can take EU NIS2 Directive (EU) 2022/2555 Supply Chain Security Program from turning this guidance into an operational assessment workflow to a reusable workflow inside Sorena. Teams working on EU NIS2 Directive (EU) 2022/2555 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

Related guides

Explore more topics

Applicability Test | EU NIS2 Directive (EU) 2022/2555 | In Scope? Essential vs Important?
A grounded NIS2 applicability test: map each legal entity to Annex I or Annex II, apply the NIS2 size-cap rule and regardless-of-size triggers.
Article 21 Control Baseline | EU NIS2 Directive (EU) 2022/2555 | Cybersecurity Risk Management Measures
A practical Article 21 control baseline for NIS2: translate Article 21(2)(a) to (j) into owned controls, KPIs, tests, and evidence.
Checklist | EU NIS2 Directive (EU) 2022/2555 | Audit-Ready Owners, Evidence, Acceptance Criteria
An audit-ready EU NIS2 compliance checklist: scope (Annex I/II + size-cap rules), essential vs important classification, Article 21 control baseline.
Compliance Guide | EU NIS2 Directive (EU) 2022/2555 | Build an Audit-Ready Program
A practical EU NIS2 compliance guide: how to run scope and classification, build Article 21 controls, implement Article 23 reporting workflows.
Deadlines and Compliance Calendar | EU NIS2 Directive (EU) 2022/2555 | 16 January 2023, 17 October 2024, 17 April 2025
A practical EU NIS2 deadlines and compliance calendar with the legal anchor dates that matter: entry into force on 16 January 2023.
FAQ | EU NIS2 Directive (EU) 2022/2555 | Scope, Essential vs Important, Article 21, Article 23 (24h/72h)
High-intent EU NIS2 FAQ: who is in scope, how essential vs important works, what Article 21 requires.
Incident Reporting Workflow | EU NIS2 Directive (EU) 2022/2555 | 24h Early Warning, 72h Notification, Final Report (1 Month)
A practical NIS2 incident reporting workflow grounded in Article 23 and Commission Implementing Regulation (EU) 2024/2690: define significant incidents.
Management Body Accountability | EU NIS2 Directive (EU) 2022/2555 | Article 20 Governance, Training, Liability
A practical Article 20 governance guide for EU NIS2: what the management body must approve and oversee, how liability and training work.
National Transposition Tracker | EU NIS2 Directive (EU) 2022/2555 | How to Track Local Laws, Authorities, Portals
A practical NIS2 national transposition tracker: monitor Member State implementation, find competent authority and CSIRT routes.
NIS2 vs ISO/IEC 27001 | How to Reuse Your ISMS for EU NIS2 Directive (EU) 2022/2555
A practical NIS2 vs ISO/IEC 27001 mapping: how to reuse an ISMS (risk assessment, policies, internal audits, management review.
NIS2 vs ISO/IEC 27017 | Cloud Security Mapping for EU NIS2 Directive (EU) 2022/2555
A practical mapping for cloud teams: how NIS2 Article 21 controls and Article 23 reporting apply to cloud service providers and cloud-dependent organisations.
NIS2 vs NIS1 | Directive (EU) 2022/2555 vs Directive (EU) 2016/1148 | Scope, Supervision, Reporting
A practical comparison of NIS2 vs NIS1: what changed in scope and sectors, how essential vs important works.
Penalties and Fines | EU NIS2 Directive (EU) 2022/2555 | Article 32-34 Enforcement + Fine Thresholds
A practical NIS2 enforcement guide: how supervision works for essential vs important entities (Articles 32-33), what enforcement measures authorities can use.
Requirements | EU NIS2 Directive (EU) 2022/2555 | Article 20 Governance, Article 21 Controls, Article 23 Reporting
A practical EU NIS2 requirements breakdown grounded in Articles 20 to 23, the Article 3 and Article 4 guidelines, and Implementing Regulation (EU) 2024/2690.
Scope: Essential vs Important | EU NIS2 Directive (EU) 2022/2555 | Article 3 Classification + What Changes
A practical guide to NIS2 scope classification: how essential vs important entities work (Article 3).