Internet Security Auditors Blog

Implementation of the NIS2 Directive: Relationship and Synergies with ISO 27001

Written by David Galindo | Mar 20, 2026 11:11:16 AM
Although we are still awaiting the official publication of the NIS2 Directive in Spain—which will establish the definitive regulatory framework to ensure a high level of cybersecurity in entities belonging to critical sectors—it is important to remember that this Directive has been binding for all Member States since it entered into force in January 2023. Therefore, organizations should not delay planning its implementation.

Additionally, the Directive has already been transposed in most Member States (at the time of this article, only Spain, France, the Netherlands, Ireland, and Estonia have yet to complete this process, according to the ECSO – European CyberSecurity Organisation. Its arrival in Spain—where the draft bill has already been published and analyzed in this blog: https://blog.isecauditors.com/en/nis2-directive-transposition-in-spain-and-draft-law occur at any moment.

To support organizations affected by NIS2, we will publish several articles focused on analyzing the main relationships and synergies with other widely adopted security standards, both nationally and internationally, which can be highly compatible with the NIS2 Directive and facilitate its implementation. In this article, we will examine the key aspects that make ISO/IEC 27001:2022 an excellent starting point for implementing the NIS2 Directive.

Differences in the Nature of Compliance

Nature of Compliance NIS2 Directive (EU) 2022/2555 ISO/IEC 27001:2022
Mandatory within the EU legal framework Voluntary (Internationally certifiable standard)

NIS2 is a Directive published by the European Commission, making compliance mandatory for all entities within its scope.

ISO/IEC 27001, on the other hand, is a standard developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and its implementation is voluntary. Despite this, ISO/IEC 27001 has become one of the most recognized and widely adopted security standards, often required by other regulations or service contracts.

Its recognition is also influenced by the fact that it is a certifiable standard, allowing organizations to obtain a conformity certificate that often serves as sufficient evidence of maintaining an adequate level of information security.

For this reason, many organizations already have an information security management system aligned with ISO/IEC 27001 requirements, which—as we will see—provides a solid foundation for implementing the NIS2 Directive.

Scope of Application

Scope of Application  NIS2 Directive (EU) 2022/2555  ISO/IEC 27001:2022
Essential and important entities in critical sectors Any organization, regardless of sector or size

 
In general, NIS2 applies to medium and large enterprises (with some exceptions), whether public or private, operating in highly critical sectors and other critical sectors listed in Annexes I and II, respectively, that provide services or conduct activities within the European Union.

Thus, applicability is determined based on sector criticality and organizational size, with these criteria (and their exceptions) clearly defined in the Directive.

ISO/IEC 27001, however, is applicable to any organization and allows defining the scope of the information security management system across the entire organization, a business unit, or a specific service. Although the scope must be clearly defined, implementation can occur regardless of sector or size, facilitating alignment with NIS2.

A Common Objective: Increasing the Level of Security

Objective   NIS2 Directive (EU) 2022/2555   ISO/IEC 27001:2022
Raise cybersecurity levels in essential and important entities Implement an information security management system

 
Although they differ slightly in how they achieve it, NIS2 and ISO/IEC 27001 share the objective of establishing a management framework that increases the cybersecurity level of the entities implementing them.

ISO/IEC 27001 relies on implementing an information security management system to achieve this goal, while NIS2 relies on its legal nature to ensure that entities within its scope comply and manage cybersecurity risks according to the criticality of their societal role. In other words, ISO/IEC 27001 defines the structure for security management, while NIS2 establishes specific mandatory security measures.

A Similar Approach: Risk Management

Approach   NIS2 Directive (EU) 2022/2555   ISO/IEC 27001:2022
Risk‑based, oriented toward minimum legal requirements Fully risk‑based and focused on continuous improvement

 
Both frameworks use a risk‑based approach to ensure that applied security measures are adequate and proportional to the organization’s risk level.

In ISO/IEC 27001, risk management is integrated into the PDCA (Plan‑Do‑Check‑Act) model, requiring organizations to identify risks, define and implement controls, review and evaluate them, and continuously improve.

NIS2 establishes clear obligations related to risk management, aligned with ISO/IEC 27001, requiring organizations to assess, mitigate, and continuously review risks under the direct supervision of top management.

Neither framework mandates a specific methodology, so organizations already aligned with ISO/IEC 27001 can adapt their risk management processes to meet NIS2 requirements.

The Importance of Top Management 

Governance   NIS2 Directive (EU) 2022/2555   ISO/IEC 27001:2022
Requires defining cybersecurity responsibilities for top management Requires top management involvement in the ISMS

As analyzed in previous articles, one of NIS2’s key obligations is defining responsibilities for top management: supervising and approving risk management measures, receiving and promoting cybersecurity training, and even being held accountable in case of non‑compliance.

ISO/IEC 27001 also emphasizes leadership and commitment from top management, requiring involvement in establishing the security policy, allocating necessary resources, periodically reviewing the management system, and promoting continuous improvement.

Both frameworks elevate cybersecurity to the highest organizational level, although NIS2’s legal nature implies more severe consequences for non‑compliance.

Specifics in Security Incident Notification

Incident Notification   NIS2 Directive (EU) 2022/2555   ISO/IEC 27001:2022
Mandatory notification of significant incidents within strict deadlines Requires a formal incident management and notification process

NIS2 establishes very specific obligations regarding the notification of significant security incidents*, requiring strict phases and deadlines: early warning within 24 hours, initial notification with a preliminary assessment within 72 hours, and a final detailed report one month after the first notification.

ISO/IEC 27001 also defines controls for incident management in Annex A, such as A.5.24 (Planning and preparation), A.5.25 (Assessment and decision), A.5.26 (Response), A.5.27 (Learning from incidents), and A.5.28 (Evidence collection).

Since these controls do not prescribe specific implementation measures, they can be easily integrated with NIS2 obligations.

(*) Significant security incident:

1. Has caused or may cause major operational disruptions or economic losses for the affected entity (internal impact).
2. Has affected or may affect other individuals or organizations by causing significant material or immaterial harm (external impact).

Complementary Security Measures

Security Measures   NIS2 Directive (EU) 2022/2555   ISO/IEC 27001:2022
Technical, operational, and organizational measures defined in Art. 21 Annex A controls grouped into organizational, people, physical, and technological controls

ISO/IEC 27001 defines its security measures in Annex A, grouped into organizational, people, physical, and technological controls. NIS2 defines its measures in Article 21 (Article 15 of the Spanish draft bill), expanded in greater detail in Implementing Regulation (EU) 2024/2690.

There is a high degree of correspondence between both frameworks, and ISO/IEC 27001 controls can be mapped to nearly all NIS2 requirements.

However, organizations using ISO/IEC 27001 as a base must analyze control implementation in greater depth to ensure compliance with NIS2’s more specific requirements, such as incident notification or assigning a security officer.

These synergies also facilitate review tasks, including internal audits, allowing combined audits to assess compliance with both frameworks and reducing the effort required.

ISO 27001: A Strong Foundation That Does Not Replace NIS2 Compliance

As analyzed throughout this article, the NIS2 Directive and ISO/IEC 27001 are highly compatible, sharing similar objectives and approaches. Implementing ISO/IEC 27001 can significantly support NIS2 compliance, as certified organizations already have risk analysis processes, implemented security controls, formal incident management, and continuous improvement mechanisms.

ISO/IEC 27001 is therefore a strong technical and organizational foundation for meeting NIS2 requirements, reducing the effort needed to adapt to the Directive. However, it does not replace legal compliance with NIS2, and organizations must verify incident notification processes, top management obligations, interactions with competent authorities, and other specific security measures.

For most organizations, the optimal strategy is not choosing between NIS2 and ISO/IEC 27001, but integrating them—using ISO/IEC 27001 as the structural base for the information security management system and adapting it to the legal framework defined by NIS2.

References

Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union: https://eur-lex.europa.eu/eli/dir/2022/2555/oj?locale=es
Commission Implementing Regulation (EU) 2024/2690 of 17 October 2024 laying down implementing rules for Directive (EU) 2022/2555 as regards the technical and methodological requirements of cybersecurity risk‑management measures: https://eur-lex.europa.eu/legal-content/ES/TXT/?uri=CELEX:32024R2690
Draft Law on Cybersecurity Coordination and Governance: https://www.interior.gob.es/opencms/es/servicios-al-ciudadano/participacion-ciudadana/participacion-publica-en-proyectos-normativos/audiencia-e-informacion-publica/
NIS2 Directive – Transposition in Spain and Draft Cybersecurity Law: https://blog.isecauditors.com/en/nis2-directive-transposition-in-spain-and-draft-law
ISO/IEC 27001:2022 Standard: https://www.iso.org/es/norma/27001