- Primary source for Article 21(d) supply chain security as part of cybersecurity risk management measures.
References and citations
- Context and related resources; validate supply chain expectations via national transposition and sector guidance.
Operationalise Article 21(d) with vendor tiering, assurance, and incident communications.
Output: a repeatable third-party security program with audit-ready evidence.
Structured answer sets in this page tree.
Cited legal and guidance references.
NIS2 explicitly requires supply chain security as part of Article 21 risk management measures. The fastest way to fail is to treat suppliers as "outside the perimeter". This page gives you a practical program structure you can implement and maintain.
Article 21 includes supply chain security, including security-related aspects of relationships between each entity and its direct suppliers or service providers.
A defensible supply chain program is simple but strict: tiering, controls, contracts, and evidence.
Supervisory authorities can request evidence of cybersecurity policies and implementation. Supply chain evidence should be indexed and easy to retrieve.
Start with the suppliers that can cause the biggest operational impact, then expand.
Assessment Autopilot can take EU NIS2 Directive (EU) 2022/2555 Supply Chain Security Program from turning this guidance into an operational assessment workflow to a reusable workflow inside Sorena. Teams working on EU NIS2 Directive (EU) 2022/2555 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.
Start from EU NIS2 Directive (EU) 2022/2555 Supply Chain Security Program and turn the guidance into owned tasks, evidence requests, and review checkpoints.
Review your current process, evidence gaps, and next steps for EU NIS2 Directive (EU) 2022/2555 Supply Chain Security Program.