ARTICLE 21 IN PRACTICE

What NIS2 Requires - Mapped to Your Microsoft Environment

NIS2 Article 21 defines ten mandatory measure categories. For Microsoft 365 and Azure environments, each has a direct technical equivalent.

Risk Management & Security Policies Article 21(2)(a) - Defender for Cloud Secure Score as continuous posture baseline, documented configuration policies, defined deviation management. Incident Detection & Response Article 21(2)(b) — Microsoft Sentinel as SIEM, Defender XDR for detection and automated response, defined playbooks and escalation paths. Business Continuity Article 21(2)(c) - Backup and recovery configurations, emergency tenant access, documented crisis procedures.Supply Chain Security Article 21(2)(d) - Entra ID external access governance, Conditional Access for third-party access, documented provider risk assessments.
Access Control & MFA Article 21(2)(i) - Entra ID Conditional Access, MFA enforcement, Privileged Identity Management, Zero Trust architecture.Encryption & Data Protection Article 21(2)(h) - Microsoft Purview Information Protection, BitLocker, TLS enforcement, sensitivity labels.Vulnerability Management Article 21(2)(e) - Defender Vulnerability Management, automated patching via Intune, continuous exposure monitoring.

From Regulatory Requirements to Actionable Securityerungen zu umsetzbarer Sicherheit

Are you facing NIS2 challenges?

Scope of Application

Your company falls within the scope of NIS2 (or this is currently being assessed), and you need clarity on how this will affect your IT systems.

Lack of an implementation model

Specific technical measures are required by law, but there is not yet a clear architectural or implementation model tailored to Microsoft.

Compliance vs. Operations

Regulatory requirements on paper must be translated into the technical reality of your existing IT environment.

Liability and Reporting Obligations

Increased liability risks for management or upcoming external audits now require robust and transparent technical foundations.

Our operation Model

What we are implementing as part of NIS2

Applicability & Gap Analysis

In collaboration with specialized partners, we determine which NIS2 requirements are technically relevant to you and where specific action is needed.

Technical derivation

We translate regulatory requirements into concrete, actionable steps. No theoretical ideals, just technically sound solutions.

Implementation & Embedding

Implementation of the defined measures and seamless integration into your existing operational and accountability models.

Pragmatism instead of overachievement

We tailor our solutions to ensure they meet legal requirements without overburdening your IT organization through over-engineering.

Operational effectiveness

Our focus is on ensuring that NIS2 requirements are effectively implemented in our operations. The goal is not a one-time implementation, but long-term stability.

Clear results for decision-makers

Upon completion, it will be clearly documented which requirements are relevant, how they were specifically implemented in Microsoft, and what remaining organizational tasks remain.

Companies that trust us:

Zwei orange Dokumente mit der Aufschrift 'Verifiably secure with NIS2' und dem Logo von Cycura.

Whitepaper

TECHNICAL EFFECTIVENESS INSTEAD OF A COMPLIANCE CHECKLIST.

How the gap between documented NIS2 compliance and technically effective implementation in Microsoft 365 arises, and what verifiable compliance looks like. For CISOs and compliance officers in affected organizations.

Frequently Asked Questions

FAQ

How long will the NIS2 implementation take?

Depending on the company’s current status and size, the technical implementation of the relevant measures in Microsoft 365 and Azure typically takes 3–6 months. The gap analysis takes 2–4 weeks.

What is NIS2 and which organizations does it apply to?

NIS2 applies to organizations in critical and important sectors in the EU - energy, transport, healthcare, financial services, digital infrastructure, and manufacturing. In Germany, more than 30,000 organizations are covered since December 2025. The threshold is 50+ employees or 10M+ EUR annual revenue in affected sectors.

What are the penalties for non-compliance?

Essential entities: up to 10 million EUR or 2% of global annual turnover. Important entities: up to 7 million EUR or 1.4%. Beyond fines, Article 20 establishes personal management liability - executives can face temporary bans from performing management functions.

What does NIS2 Article 21 require specifically?

Ten mandatory categories: risk analysis and security policies, incident handling, business continuity, supply chain security, system security, effectiveness assessment, basic cyber hygiene, cybersecurity training, encryption, and access control with MFA. These are operational requirements - not documentation obligations.

How does NIS2 affect management liability?

Article 20 requires executives to approve cybersecurity measures and oversee implementation. Personal liability applies for compliance failures - including fines and temporary management bans. NIS2 cannot be fully delegated to IT.

What is the difference between NIS2 compliance and NIS2 documentation?

NIS2 requires effective measures — not documented intent. A policy that exists on paper but is not configured in your actual systems does not satisfy NIS2. cycura implements the required configurations directly in your Microsoft tenant and documents the implementation for regulatory reporting.

Does NIS2 apply to Microsoft 365 and Azure environments?

Yes. The measures defined in Article 21 must be implemented in your actual IT environment. Microsoft Defender XDR, Sentinel, Entra ID, and Purview can satisfy many Article 21 requirements - but only if correctly configured and maintained.

Who is responsible for NIS2 within the company?

Management bears responsibility (Article 20). The CISO or IT manager is responsible for the technical implementation. We provide support for the technical implementation and document it for reporting to the authorities.‍

Is it enough for us to document NIS2?

No. NIS2 requires effective technical and organizational measures. We implement specific security configurations in your Microsoft tenant, rather than just creating policies on paper.

Transparent, glossy triangular loop with glowing orange edges on a black background.

We begin by conducting a structured assessment of your NIS2 relevance and current technical situation. Rather than relying on one-size-fits-all solutions, we focus on providing clarity regarding requirements, dependencies, and feasibility.