BC Understanding Nis2 Directive A4 en 2303 Lo 3 FINAL
BC Understanding Nis2 Directive A4 en 2303 Lo 3 FINAL
BC Understanding Nis2 Directive A4 en 2303 Lo 3 FINAL
NIS 2 Directive
Handbook | Understanding the NIS 2 Directive
2
Handbook | Understanding the NIS 2 Directive
HANDBOOK CONTENTS
5. Conclusion 19
Handbook | Understanding the NIS 2 Directive
1
4
Handbook | Understanding the NIS 2 Directive
What is the
NIS 2 Directive?
The NIS Directive, also known as Directive (EU) 2016/1148, is an
EU directive that establishes cybersecurity requirements for the
operators of essential services and digital services providers in the
European Union. The NIS Directive aims to ensure a high level of
network and information security across the EU and to ensure that
operators of essential services and digital service providers take
appropriate measures to manage the risk posed to their networks
and information systems.
Handbook | Understanding the NIS 2 Directive
6
Handbook | Understanding the NIS 2 Directive
7
Handbook | What has changed?
2
8
Handbook | What has changed?
What has
changed?
The new proposal eliminates the distinction between OES (Operators of Essential
Services) and DSP (Digital Service Providers), instead clarifying entities as either
essential or important. What is also worth noting is that under the old NIS
Directive, member states were responsible for determining which entities would
meet the criteria to qualify as operators of essential services. The new NIS 2
Directive introduces a size-cap rule as a general rule for the identification of
regulated entities. This means that all medium-sized and large entities operating
within the sectors or providing services covered by the directive will fall within
its scope.
Handbook | What has changed?
Additional
changes
10
Handbook | What has changed?
1. The coverage of the NIS 2 Directive is expanded 6. The proposal introduces stricter supervisory
in order to cover new sectors (e.g., wastewater measures for national authorities, stricter
management, food, space and so on) based on their enforcement requirements and aims to harmonize
criticality for the economy and society, including, sanctioning regimes across member states.
for this purpose, all medium and large companies of
these sectors. At the same time, member states are 7. At European level, the proposal strengthens
guaranteed flexibility in identifying smaller entities cybersecurity for key information and
with a high-risk profile. communication technologies. Member States, in
cooperation with the Commission and ENISA, will
2. The creation through the European Union Agency have to carry out coordinated risk assessments
for Cybersecurity (ENISA) of a European Cyber of critical supply chains, building on the effective
Crises Liaison Organisation Network (EU-CyCLONe) approach taken in the context of the Commission
in order to support the coordinated management of Recommendation on the cybersecurity of 5G
cybersecurity on large-scale incidents and crises at networks.
EU level.
8. The new directive has been aligned with sector-
3. Greater coordination is established in the specific legislation, in particular the Digital
disclosure of new vulnerabilities discovered Operational Resilience Act (DORA), applicable to the
throughout the Union. financial sector, and the Critical Entities Resilience
Directive (CER), strengthening resilience of critical
4. A list of administrative sanctions (similar to entities that provide vital services on which the
those of the GDPR) is established, including fines livelihoods of EU citizens depend, such as energy,
for violating cybersecurity risk reporting and transport, health, and drinking water. This will
management obligations. ensure legal clarity and ensure coherence between
NIS 2 and these acts.
5. The proposal includes seven elements that
all companies must address or implement to
strengthen their security requirements:
11
Handbook | How will NIS 2 impact you?
3
12
Handbook | How will NIS 2 impact you?
Supporting Demonstrating
compliance cyber maturity
Securing a network, its devices, and the services
With a greater focus on supply chain security, it is
it supports requires active participation by the
expected that organisations that need to comply with
entire vendor supply chain, as well as the end-user
NIS 2 will have to carry out a greater lever of due
organisation. Axis provides tools, documentation and
diligence on their technology partners. As part of this
training to help mitigate risks and keep Axis products
evaluation process and a vendor risk assessment, it is
and services up-to-date and protected. Axis has an
expected that policies and processes will play a greater
extensive list of policies and processes in place as well as
role.
third-party certifications.
14
Handbook | How will NIS 2 impact you?
• Axis’ Information Security Management System (ISMS) is • Critical production equipment and the underlying
ISO 27001-certified, which means it follows test system is developed, produced and provided by
internationally recognized processes and best practices in Axis, as is the system for testing the components,
managing the internal information infrastructure and modules, and products at the different levels during
systems that support the product’s journey through the production. This limits the risks associated with
supply chain. tampering. Axis provides a list of built-in enhanced
• It applies the concept of Zero Trust which is based on the security features.
principle of never trust and always verify, whether human • ARTPEC® is the Axis in-house developed system-
or machine, connecting to and within the networks and on-chip (SoC) chipsets which are compliant with
architectures. the National Defence Authorisation Act (NDAA).
• Components are always sourced from a supplier on the ARTPEC has built-in security features exclusively
Approved Vendor List, according to Axis bill of materials for Axis devices. These include signed firmware,
in the Axis specification. ensuring that only secure authorized firmware can
be installed, and secure boot, which prevents booting
• The supplier may not change critical production
of unauthorized firmware.
specifications without permission from Axis. Any
approved change must be documented and logged. • To further enhance security controls, all test data is
shared with Axis 24/7 from our production partners,
• A material handling process always ensures status of
so unauthorized modifications can be immediately
materials, revealing any deviations that could
identified.
compromise quality.
• Suppliers and manufacturing partners are required to
maintain a system which ensures traceability of produced
batches from incoming material to finished part. During
production, the part will undergo multiple tests, such
as Incoming Quality Control (IQC) and Automatic Optical
Inspection (AOI), which can check that no counterfeit
components are mounted.
15
Handbook | What product features can help mitigate threats and protect against attack?
4
16
Handbook | What product features can help mitigate threats and protect against attack?
What product
features can
help mitigate
threats and
protect against
attack?
This section describes some of the advanced security features available in
Axis products.
Handbook | What product features can help mitigate threats and protect against attack?
HTTPS Enabled
Axis device ID
HTTPS is enabled by default with a self-signed
Axis device ID works like a digital passport and certificate since AXIS OS 7.20. This enables setting the
is unique for each device unit. It is securely and device password in a secure way. In AXIS OS 10.10 and
permanently stored in Edge Vault as a certificate, higher, the self-signed certificate has been replaced by
signed by Axis root certificate. Axis device ID is the IEEE 802.1AR secure device ID certificate.
designed to prove the origin of the device, enabling a
new level of device trust through the life cycle of the
product.
18
Handbook | What product features can help mitigate threats and protect against attack?
Conclusion
While it is very unlikely that security systems will be classed as a critical
asset, it is important for OESs and DSPs to consider a holistic approach
during scoping. This means that physical security technologies need to be
thoroughly evaluated as part of a NIS 2 Directive assessment to highlight
any potential risks.
Axis takes a full 360 view in regard to its cybersecurity offering. Products
are designed with inbuilt features to address cybersecurity concerns,
while an extensive list of policies and processes, tools, documentation and
training will help mitigate risks to keep customers protected.
19
About Axis Communications
Axis enables a smarter and safer world by creating solutions for improving security
and business performance. As a network technology company and industry
leader, Axis offers solutions in video surveillance, access control, intercom, and
audio systems. They are enhanced by intelligent analytics applications and
supported by high-quality training.
Axis has around 4,000 dedicated employees in over 50 countries and collaborates
with technology and system integration partners worldwide to deliver customer
solutions. Axis was founded in 1984, and the headquarters are in Lund, Sweden.
©2023 Axis Communications AB. AXIS COMMUNICATIONS, AXIS, ARTPEC and VAPIX are registered trademarks of Axis
AB in various jurisdictions. All other trademarks are the property of their respective owners.