Back to Guides
EnterpriseEU RegulationNEW

NIS2 & Certificate Management

Mapping the EU's Network and Information Security Directive to Certificate Lifecycle Management. What essential and important entities need to know about cryptography requirements.

20 min readJanuary 2026EU Directive
NIS2 and Certificate Management - EU Directive Cryptography Requirements

Quick Answer

This guide is for security, IT, and compliance professionals at essential and important entities who need to demonstrate NIS2-aligned control over cryptographic assets.

NIS2 (Directive (EU) 2022/2555) is the EU's updated cybersecurity directive requiring organizations operating critical infrastructure to implement comprehensive security measures. Article 21(2)(h) specifically mandates "policies and procedures regarding the use of cryptography and, where appropriate, encryption"—making certificate management directly relevant.

Why this matters: Unlike its predecessor NIS1, NIS2 explicitly calls out cryptography as a required security measure. Certificate outages, weak algorithms, or CA compromises can now trigger regulatory scrutiny—not just IT incidents.

💡 Key Difference from DORA: NIS2 has broader scope (not just financial services) and covers any organization providing essential or important services. If you're a digital infrastructure provider, healthcare entity, or energy company—this applies to you.

Note: This guide provides general educational information, not legal advice. NIS2 is a directive requiring transposition into Member State national law—specific requirements may vary by jurisdiction. Consult with your legal/compliance team and align with your national competent authority's guidance.

What is NIS2?

The Network and Information Security Directive 2 (NIS2) is an EU directive that establishes cybersecurity requirements for entities operating in critical sectors. It replaces the original NIS Directive (2016) with significantly expanded scope and stricter requirements.

Effective Date

October 17, 2024 - Member States were required to transpose NIS2 into national law. Enforcement began October 18, 2024.

Key Difference from NIS1

NIS2 explicitly requires cryptography policies and introduces personal liability for management. Penalties are significantly higher.

Key Deadlines

Oct 17, 2024
NIS2 Transposition Deadline
Member States must transpose NIS2 into national law
Oct 18, 2024
NIS2 Enforcement Begins
Directive becomes enforceable across EU
Apr 17, 2025
Entity Registration
Essential and Important entities must register
Ongoing
Incident Reporting
24hr/72hr/1month reporting timeline

Who Must Comply?

Essential Entities

Large enterprises (250+ employees or €50M+ turnover)

EnergyTransportBankingHealthDigital InfrastructurePublic Administration

Max Penalty: €10M or 2% of global turnover

Important Entities

Medium enterprises (50+ employees or €10M+ turnover)

Postal ServicesWaste ManagementManufacturingFoodDigital ProvidersResearch

Max Penalty: €7M or 1.4% of global turnover

Article 21: Cryptography Requirements

Article 21(2)(h) - The Cryptography Mandate

"The measures referred to in paragraph 1 shall be based on an all-hazards approach and shall include at least the following: ... (h) policies and procedures regarding the use of cryptography and, where appropriate, encryption."

— Directive (EU) 2022/2555, Article 21(2)(h)

What This Means for Certificate Management

Algorithm Standards

You must document which cryptographic algorithms are approved for use. RSA-2048 minimum, ECC P-256+, SHA-256+ for signing. Weak algorithms (SHA-1, RSA-1024) must be identified and retired.

Key Management

Private keys must be protected throughout their lifecycle. Document key generation, storage (HSM for critical keys), rotation, and destruction procedures.

Certificate Lifecycle

Demonstrate control over certificate issuance, renewal, and revocation. Maintain a centralized inventory including third-party SaaS and shadow IT endpoints—regulators are increasingly sensitive to external dependencies. Automated discovery, expiry monitoring, and ownership assignment are now expected controls to evidence NIS2 Article 21(2)(h) compliance.

Encryption in Transit

TLS configuration matters. Document minimum TLS versions (TLS 1.2+), cipher suite policies, and certificate pinning where appropriate.

NIS2 Security Measures Mapped to CLM

Article 21(2) lists ten minimum security measures. Here's how each maps to certificate lifecycle management capabilities:

Article 21(2)RequirementCLM Implementation
(a)Risk analysis and security policiesCertificate risk assessment, cryptography policy documentation
(b)Incident handlingCertificate-related incident response, compromise procedures
(c)Business continuityCertificate failover, CA redundancy, backup procedures
(d)Supply chain securityCA vendor assessment, third-party certificate validation
(e)Acquisition, development, maintenanceSecure certificate deployment in CI/CD pipelines
(f)Vulnerability handlingWeak key detection, algorithm vulnerability scanning
(g)Security measure effectivenessCertificate expiry metrics, incident frequency tracking
(h)Cryptography policiesCertificate management policy, algorithm standards, key lifecycle
(i)HR security and access controlCertificate-based authentication (mTLS), client certificates
(j)MFA and secure authenticationCertificate-based MFA, smart card certificates, FIDO2

Cryptography Policy Requirements

Your cryptography policy must address three key areas. Here's what auditors expect to see:

1Algorithm Standards

Use CaseMinimum StandardRecommended
Asymmetric KeysRSA-2048, ECC P-256RSA-3072+, ECC P-384+
Hash FunctionsSHA-256SHA-384, SHA-512
TLS VersionTLS 1.2TLS 1.3
Key ExchangeECDHEX25519

These recommendations align with ENISA NIS2 guidance. Review and version these baselines at least annually or upon disclosure of significant cryptographic vulnerabilities.

2Key Management Lifecycle

Generation:Secure random generation, HSM for critical keys, documented procedures
Storage:HSM or secure key vault, access controls, encryption at rest
Distribution:Secure channels only, key wrapping, audit trails
Usage:Purpose limitation, algorithm constraints, logging
Rotation:Scheduled rotation, automated where possible, rollback capability
Destruction:Cryptographic erasure, certificate revocation, audit evidence

3Certificate Management Controls

  • Complete certificate inventory with ownership assignment
  • Automated expiry monitoring with escalation procedures
  • Documented renewal procedures with SLAs
  • Revocation procedures and CRL/OCSP verification
  • CA trust store management and root store policies
  • Certificate Transparency log monitoring

Incident Reporting & Certificates

NIS2 introduces strict incident reporting timelines. Certificate-related incidents may trigger these requirements depending on their impact on service continuity, data confidentiality/integrity, and whether they meet your national CSIRT/supervisory authority thresholds—not every minor certificate misconfiguration is automatically reportable.

TimelineRequirementCertificate Context
24 hoursEarly warning notificationInitial alert that a certificate incident is causing service disruption
72 hoursIncident notificationRoot cause (expired cert, revocation, compromise), affected systems, initial remediation
1 monthFinal reportComplete analysis, preventive measures, process improvements

Certificate-Related Incidents to Report

  • Certificate expiry causing service outage affecting users or critical operations
  • Private key compromise or suspected unauthorized access
  • CA compromise affecting your certificates (e.g., DigiNotar-style events)
  • Mis-issuance of certificates for your domains by unauthorized parties
  • Chain validation failures causing widespread authentication failures
  • Revocation infrastructure failures preventing proper certificate checking

Important: Member State transposition laws may define different thresholds for what constitutes a reportable cryptographic incident. Confirm your local CSIRT requirements—some jurisdictions may narrow or broaden these categories.

Supply Chain Security (Article 21(2)(d))

NIS2 requires entities to address security in supplier relationships. For certificate management, this means scrutinizing your CA vendors and third-party certificate dependencies. Both public CAs (used for internet-facing services) and private/internal CAs fall in scope where they support NIS2-relevant services.

CA Trust Decisions

  • Document CA selection criteria and approval process
  • Assess CA security practices (WebTrust, ETSI audits)
  • Review CA incident history and response capabilities
  • Maintain CA exit strategy and migration plans

Vendor Certificate Requirements

  • Require TLS 1.2+ for all vendor integrations
  • Validate vendor certificate chains before trusting
  • Monitor Certificate Transparency for vendor domains
  • Include certificate security in vendor contracts

Concentration Risk (Article 21(2)(d) & Article 23): Avoid relying on a single CA for all certificates. Auditors reviewing supply-chain security under NIS2 will look for documented CA diversification and exit strategies. If that CA is distrusted (as happened with Symantec and Entrust), you need the ability to rapidly migrate to alternatives. See our CA Migration Runbook.

Implementation Checklist

Use this checklist to assess your NIS2 readiness for certificate management:

Documentation Requirements

Cryptography policy covering algorithm standards and usage
Certificate management procedures and workflows
Key management lifecycle documentation
CA selection and approval criteria
Incident response procedures for certificate events
Business continuity plans for CA failures

Technical Controls

Certificate discovery deployed across all environments
Automated expiry monitoring with alerting
Weak key and algorithm detection scanning
Certificate Transparency log monitoring
HSM or secure key storage for critical keys
Revocation checking (OCSP/CRL) enabled

Process Controls

Certificate ownership assigned for all certificates
Renewal SLAs defined and tracked
Regular certificate inventory reviews
CA vendor security assessments
Incident response drills including certificate scenarios
Management reporting on certificate posture

How to Evidence This to Auditors

When auditors ask "show me where NIS2 cryptography requirements live in your controls," be ready to produce:

  • Cryptography Policy — Approved, versioned, with management sign-off
  • CLM Dashboard — Certificate inventory with ownership, expiry status, algorithm breakdown
  • CA Due Diligence Records — Selection criteria, audit reports (WebTrust/ETSI), risk assessments
  • Incident Post-Mortems — Certificate-related incidents with root cause, timeline, and improvements
  • Management Reports — Periodic certificate posture briefings to demonstrate Article 32 oversight

Benchmark Your Readiness

Take our comprehensive assessment to score your PKI governance maturity and get prioritized recommendations.

Take the Maturity Assessment

Penalties & Enforcement

NIS2 introduces significant penalties and, notably, personal liability for management.

NIS2 Maximum Administrative Fines (Article 34) for Cybersecurity Failures Including Cryptography

Entity TypeMaximum FineManagement Liability
Essential Entities€10,000,000 or 2% of global turnover (whichever is higher)Personal liability for senior management; possible temporary bans
Important Entities€7,000,000 or 1.4% of global turnover (whichever is higher)Management accountability required; supervisory measures possible

Management Liability (Article 32)

NIS2 explicitly holds management bodies personally accountable for cybersecurity. This means the board and C-suite can face personal consequences for inadequate security measures, including those related to cryptography and certificate management. Management must approve and oversee cybersecurity risk management measures.

For PKI: Article 32 obligations are exercised through documented approval of the cryptography policy and regular reporting on certificate posture. Ensure management formally signs off on algorithm standards, CA selection decisions, and receives periodic briefings on certificate risk metrics.

Cross-References

Related FixMyCert Resources

Official EU Resources

Integration with Existing Frameworks

Don't treat NIS2 as greenfield—reuse existing PKI controls from other frameworks:

FrameworkRelevant ControlsNIS2 Mapping
ISO 27001A.10 Cryptography, A.12 OperationsArt. 21(2)(h), 21(2)(b)
NIST 800-53SC-12, SC-13, SC-17Art. 21(2)(h)
SOC 2CC6.1, CC6.7 (Encryption)Art. 21(2)(h)
PCI DSS 4.0Req 3 (Crypto), Req 4 (Transmission)Art. 21(2)(h)

If you already maintain ISO 27001 or SOC 2 attestations, you likely have most cryptography documentation in place. Map existing controls to NIS2 requirements rather than duplicating effort.

If You Only Do Three Things...

Short on time? Focus on these three priorities to make immediate NIS2 progress:

1

Document

Write your cryptography policy. Cover algorithms, keys, and certificates.

2

Inventory

Know every certificate. Deploy discovery and assign owners.

3

Plan

Create incident response procedures for certificate events.

Related Resources