Reporting under the NIS2-Directive
Introduction
The EU has written the requirement for incident reporting into the directive as a direct obligation.
In the background for the Directive the EU writes that when it comes to incident reporting, it is crucial to find the right balance between the need for swift reporting in order to avoid the potential spread of incidents, and the need for in-depth reporting to draw valuable lessons learned from individual incidents.
The legislators of the directive foresee a multi-stage approach to reporting. Affected companies have 24 hours from when they first become aware of an incident to submit an early warning to the CSIRT (Computer Incident Response Team) or some other competent national authority.
This should allow companies to seek guidance and operational advice on the implementation of possible mitigation measures.
The early warning is, according to the directive, to be followed by an incident notification within the 72 hours of becoming aware of the incident.
Then lastly a final report should be submitted no later than one month after the incident.
Initial incident report (24 hours)
A security incident is any attempted or actual unauthorized access, use, disclosure, modification, or destruction of information. This includes interference with information technology operation and violation of laws or regulations.
Examples of security incidents include:
It is important that actual security incidents are reported as early as possible so that the company can limit the damage and cost of recovery, as well as limitation of damages to other companies.
The report should include specific details regarding the system breach, vulnerability, or compromise of the IT-system or network.
The EU entity for cyber security ENISA writes that the first notification is a preliminary one. It should be done as soon as possible, even when not enough information is available.
The purpose of this first reporting is to raise the authority’s awareness about the incident and the possible consequences. Due to the lack of sufficient data the operator can use forecasts, estimates and assumptions based on available data. Nevertheless, the certainty of data, statistics, and descriptions should be clearly mentioned in the notification.
A report to CSIRT has different requirements for different countries, and sometimes reporting to the CSIRT is not enough and the individual branch of government should also be reported to directly. Many countries have not yet ratified the NIS2 directive into law, and as such the requirements are not certain.
However a report should normally include:
Denial of service attack, malware distribution via email (including phishing), malware distribution via websites, malware infiltration via mobile devices and/or USB media, malware intrusion via network infiltration, malware distribution over other or unknown infection vector (if other specificaation is needed), ransomware infection, Trojans, Man-in-the-Middle attack, Identity theft via phishing, Identify theft via spoofing, Identify theft pharming, hacking injection attack, security misconfiguration, broken authentication, Exploitation of a known vulnerability or vulnerabilities in components, services and/or applications (here an appropriate reference, eg CVE number is needed), Cryptographic flaw, Software malfunction, Interference with hardware, Hardware malfunction, Physical damage, Loss or theft of equipment
To find your local CSIRT agency you can find it at the European Agency For CyberSecurity ENISA:
In the directive in preamble §102 it is stated that the early warning (24 hour reporting) should only include the information necessary to make the CSIRT, or where applicable the competent authority, aware of the significant incident and allow the entity concerned to seek assistance, if required.
However most governments have made reporting include all of the above areas, which then needs to be filled in as best possible.
It is also stated that the report should be submitted as soon as possible, i.e. faster than 24 hours.
Recommended by LinkedIn
The extensive report (72 hours)
Intermediate reports have to be sent periodically or when new information is available. At the latest 72 hours after the incident a report with more details should be submitted. This type of reporting has the purpose of updating the authority upon the status of the incident. So all the uncertain elements in the first incidence report should be clarified and quantified as much as possible.
Beyond the mere formal reporting for the authorities, this report should be laid out, so that any impacted party in the value chain can be notified with the report. I.e. it should be clear and self-explanatory, and preferable with an executive summary, so that the reader can clearly see the consequences. This is valid whether it is downstream to customers and in the end to end-customers, or whether it is upstream to the suppliers and down to the OEM components; it should be clear what the incidence entailed, and how it pertains to the value chain.
In addition it may also be necessary to communicate with other providers of the same service, or adjacent industries, which may be impacted by the incidence.
Having a professional and streamlined report in place will both help maintain the brand of the company, and also prevent further damages to relations up- or down-stream in the value chain.
The report should besides an executive summary be prepared in the same way as the 24 hour report.
In the directive in preamble §103 it is stated that it is a requirement that without undue delay, the company should report to their service recipients any measures or remedies that they can take to mitigate the resulting risks from a significant cyber threat.
So therefore the solution to the cyber incident and also preventive measures that could have been taken, but which were not in place, should have a more elaborate treatment in the 72 hour reporting.
In order to adhere to the Directive it is of importance that a company is capable of responding properly within the 72 hours. As many inputs are to be gathered from various entries in the organization it is of importance to have a procedure for this, and also to have a tool that can assign tasks to individual employees, and secure proper and fast follow-up on these tasks as well as gathering the information in a format that makes reporting easy and straightforward.
Reporting on corrective measures (1 month)
The closure of an incident should be followed by a full report, where all data required by the authority are submitted.
The second phase might come much later (e.g. weeks, months) than the previous, as soon as the operator has collected all necessary data in order to provide a full overview of the incident.
It is recommended that the company keeps ongoing contact with the authority in cases where the incident is complex and the investigation could take a long time.
Beyond what has at this time already been reported, the preventive measures that the company will take should be in focus. There needs to be a risk analysis which shows that the corrective measures in the total cyber security setup is adequate for preventing a similar incident in the future.
Here the full supply-chain needs to be addressed. Within the first 72 hours it is important to notify and investigate the supply chain. However in the final incident reporting a thorough analysis of the supply chain should have been conducted.
In the preparation for compliance to the NIS2-Directive the supply-chain should have been assessed as to the degree of compliance with NIS2, and also any vulnerabilities related to the supply-chain. In the final reporting this should be analyzed to both find out if there are impacts from the supply-chain to the company, but also if the incidence has had impacts upon suppliers in the supply-chain.
Here again many both internal and external inputs are needed, and a process should be devised to handle this. Tools to facilitate this in an easy and straightforward manner is also recommended.
Conclusions
Both in the preparation for compliance with the NIS2-Directive as well as for proper reporting of an incident requires that procedures other than technological cyber security are in place. I.e. procedures that can assure that the organization can handle a cyber security incident, i.e. that the right technology and processes are in place, and also that work on continuously improving cyber security is undertaken.
So, follow-up on the risk analyses, assessments both internally and externally is to be scheduled and organized, and to be in compliance these activities also need to be documented.
Therefore in addition to technological tools for monitoring networks and IT-environments, organizations should implement tooling to assess the current situation internally, assess the supply-chain and make gap-analysis to move towards a safer cyber security setup.
If you want to know more visit: