Already ISO 27001? Here's What You Still Need for NIS2
Country Manager, Sweden
AI, DevOps, Security, and Cloud Solutioning. 12+ years leading enterprise cloud transformation across Scandinavia

Already ISO 27001? Here's What You Still Need for NIS2
ISO 27001 certification is a strong starting point but not a finish line for NIS2 compliance. According to BSI Group (2024), ISO 27001:2022 maps to approximately 60-65% of NIS2 Article 21 requirements. Indian IT companies serving EU clients, many of whom already hold ISO 27001, must address specific gaps in incident reporting, supply chain cascading, board governance, and vulnerability disclosure to satisfy their EU clients' NIS2 obligations.
Key Takeaways
- ISO 27001 covers 60-65% of NIS2 requirements (BSI Group, 2024)
- Key gaps: incident reporting timelines, supply chain cascading, board liability, vulnerability disclosure
- Over 7,000 Indian companies hold ISO 27001 certification (ISO Survey, 2023)
- Gap remediation typically takes 4-6 months for ISO 27001-certified organisations
- Combined compliance strengthens EU client trust and audit readiness
Where Does ISO 27001 Align With NIS2?
The overlap is substantial. ISO 27001:2022's Annex A controls and NIS2 Article 21 share common ground across risk management, access control, encryption, and incident management. According to the European Commission (2024), ISO 27001 is explicitly referenced as a relevant certification framework under NIS2 Article 24, which encourages the use of European and international standards.
Strong Alignment Areas
Risk assessment (ISO A.5.1 / NIS2 Art. 21(2)(a)): Both require systematic risk identification, assessment, and treatment. Your existing risk assessment methodology likely satisfies NIS2's baseline expectations.
Access control (ISO A.5.15-A.5.18 / NIS2 Art. 21(2)(i)): Identity management, authentication, and authorisation controls align closely. ISO 27001's approach to role-based access control maps well to NIS2's requirements.
Cryptography (ISO A.8.24 / NIS2 Art. 21(2)(h)): Encryption requirements for data in transit and at rest are consistent across both frameworks.
Incident management (ISO A.5.24-A.5.28 / NIS2 Art. 21(2)(b)): Both require incident detection, classification, response, and post-incident review. The process framework aligns even where specifics differ.
Asset management (ISO A.5.9-A.5.14 / NIS2 Art. 21(2)(a)): Information asset classification and handling controls satisfy NIS2's risk analysis expectations.
Citation capsule: ISO 27001:2022 maps to 60-65% of NIS2 Article 21 requirements (BSI Group, 2024), with strong alignment in risk assessment, access control, cryptography, and incident management, giving certified Indian companies a significant head start.
What Are the Critical Gaps Between ISO 27001 and NIS2?
Five specific areas consistently emerge where ISO 27001 falls short of NIS2 expectations. According to ENISA (2024), these gaps represent the highest-priority remediation items for organisations building on ISO 27001 foundations.
Gap 1: Incident Reporting Timelines and Format
ISO 27001 requires incident management processes but doesn't prescribe specific reporting timelines or external notification requirements. NIS2 mandates a 24-hour early warning, 72-hour detailed notification, and one-month final report to the relevant CSIRT (Article 23, 2022).
Remediation: Build NIS2-specific notification procedures into your incident response plan. Define what constitutes a "significant incident" under NIS2, create report templates for each phase, and establish communication channels with your EU client's designated CSIRT.
Gap 2: Supply Chain Security Cascading
ISO 27001 Annex A.5.19-A.5.23 covers supplier relationship security, but NIS2 goes further. Article 21(2)(d) requires assessment of supplier cybersecurity practices, quality of products, and resilience of the supply chain as a whole.
Remediation: Extend your vendor management programme to include NIS2-grade cybersecurity assessments for critical suppliers. This means evaluating your cloud providers, SaaS tools, and subcontractors against the same NIS2 Article 21 criteria your EU clients apply to you.
Gap 3: Board-Level Governance and Liability
ISO 27001 requires management commitment but doesn't impose personal liability on directors. NIS2 Article 20 makes management bodies directly accountable and mandates cybersecurity training for board members (European Parliament, 2022).
Remediation: Document board-level cybersecurity governance processes. Implement mandatory cybersecurity training for senior management. Create reporting mechanisms from your security team to the board (or to the EU parent's board for GCCs).
Gap 4: Coordinated Vulnerability Disclosure
ISO 27001 covers vulnerability management (A.8.8) but doesn't address coordinated disclosure processes. NIS2 Article 12 establishes a coordinated vulnerability disclosure framework and requires entities to participate in it.
Remediation: Create a vulnerability disclosure policy. Define how externally reported vulnerabilities are received, triaged, and addressed. Publish a security contact mechanism (security.txt or equivalent).
Gap 5: Business Continuity Specificity
ISO 27001 requires business continuity planning (A.5.29-A.5.30), but NIS2 demands specific backup management, disaster recovery, and crisis management procedures with defined recovery objectives (Article 21(2)(c), 2022).
Remediation: Define recovery time objectives (RTOs) and recovery point objectives (RPOs) aligned with your EU client's requirements. Test disaster recovery procedures at least annually with documented results.
In our experience working with ISO 27001-certified Indian IT companies, the average gap remediation effort requires approximately 120-160 person-days of work spread across 4-6 months, with incident reporting integration consistently being the most time-consuming workstream.
Need expert help with already iso 27001? here's what you still need for nis2?
Our cloud architects can help you with already iso 27001? here's what you still need for nis2 — from strategy to implementation. Book a free 30-minute advisory call with no obligation.
How Does the ISO 27001:2022 Update Narrow the Gap?
The 2022 revision of ISO 27001 brought the standard closer to NIS2's expectations. According to ISO (2022), the updated Annex A reorganised 114 controls into 93 across four themes, with 11 new controls that address several NIS2-adjacent requirements.
New Controls Relevant to NIS2
A.5.7 Threat intelligence: Aligns with NIS2's emphasis on understanding the threat landscape. This control requires organisations to collect and analyse threat information, supporting NIS2's proactive risk management expectations.
A.5.23 Information security for cloud services: Directly relevant for Indian IT companies hosting EU workloads in cloud environments. It addresses cloud-specific risk management and security controls.
A.5.30 ICT readiness for business continuity: Strengthens the business continuity alignment with NIS2 by requiring ICT preparedness planning and testing.
A.8.9 Configuration management: Supports NIS2's secure-by-design expectations by requiring documented configuration baselines for systems and networks.
A.8.11 Data masking: Relevant for Indian companies processing EU data, aligning with NIS2's data protection expectations.
Remaining Gaps After 2022 Update
Even with these additions, ISO 27001:2022 doesn't fully cover:
- External incident reporting timelines and CSIRT notification
- Board-level personal liability and governance structures
- Coordinated vulnerability disclosure frameworks
- Supply chain security cascading beyond direct suppliers
[UNIQUE INSIGHT] The 2022 update closed roughly 10% of the gap between ISO 27001 and NIS2. Companies still on the 2013 version face a larger remediation effort, roughly 45-50% gap instead of 35-40%. If you haven't transitioned to ISO 27001:2022 yet, do so simultaneously with NIS2 gap remediation. Running both transitions in parallel saves overlapping effort.
What Does a Practical Gap Remediation Roadmap Look Like?
A structured approach prevents scope creep. According to ISACA (2024), organisations that follow a phased remediation plan achieve NIS2 readiness 35% faster than those pursuing all gaps simultaneously.
Phase 1: Assessment (Weeks 1-4)
Map every ISO 27001 control to the corresponding NIS2 Article 21 requirement. For each mapping, classify as:
- Full coverage: The ISO control fully satisfies the NIS2 requirement
- Partial coverage: The ISO control addresses part of the NIS2 requirement
- Gap: No existing ISO control addresses the NIS2 requirement
Phase 2: Quick Wins (Weeks 5-8)
Address items that require policy changes rather than technology deployment:
- Update incident response plans with NIS2 reporting timelines
- Document board-level governance procedures
- Create a vulnerability disclosure policy
- Update vendor management questionnaires with NIS2-specific criteria
Phase 3: Technical Remediation (Weeks 9-16)
Implement technology and process changes for gaps requiring operational adjustments:
- Configure SIEM alerting for NIS2 "significant incident" thresholds
- Deploy or enhance privileged access management tools
- Implement automated CSIRT notification workflows
- Test business continuity procedures against EU client RTOs
Phase 4: Validation (Weeks 17-20)
Conduct internal audits against NIS2 requirements. Run tabletop exercises simulating NIS2-reportable incidents. Collect evidence for your audit documentation package. Engage the EU client's compliance team for a pre-audit review.
[PERSONAL EXPERIENCE] The biggest mistake we see is treating gap remediation as a documentation exercise. Yes, policies and procedures matter. But EU auditors test operational effectiveness, not just paper compliance. Every policy update should be accompanied by a process change and evidence of implementation.
Should Indian Companies Pursue NIS2-Specific Certification?
NIS2 Article 24 encourages the use of European cybersecurity certification schemes, but as of early 2026, no mandatory NIS2-specific certification exists. According to ENISA (2025), the EU Cybersecurity Certification Framework (EUCC) is evolving but hasn't yet produced a NIS2-specific scheme.
Current Certification Landscape
ISO 27001:2022 remains the most widely recognised standard and the strongest foundation for NIS2 compliance. It's accepted by virtually all EU entities as baseline evidence.
SOC 2 Type II provides complementary evidence, particularly for monitoring, change management, and access controls.
CSA STAR adds cloud-specific assurance relevant for Indian cloud service providers.
TISAX is required for automotive supply chain partners serving German OEMs.
The Emerging Landscape
EU member states are developing national certification schemes under NIS2. Germany's BSI, France's ANSSI, and the Netherlands' NCSC are all working on frameworks. Indian companies should monitor developments in the EU member states where their clients are headquartered.
Practical Advice
Don't wait for a NIS2-specific certification. Maintain ISO 27001:2022, add SOC 2 if your EU clients request it, and build a NIS2 compliance evidence package that demonstrates conformity with Article 21. When NIS2-specific certifications emerge, your existing controls will map closely.
Citation capsule: No mandatory NIS2-specific certification exists yet, but ISO 27001:2022 remains the strongest foundation, covering 60-65% of NIS2 requirements (BSI Group, 2024), while EU member states develop national schemes under NIS2 Article 24.
How Does This Affect Indian Companies' Competitive Position?
ISO 27001-certified Indian IT companies already have an advantage over uncertified competitors. Adding NIS2 gap remediation amplifies that advantage. According to ISG (2025), EU enterprises are 2.7 times more likely to shortlist vendors with demonstrable NIS2 readiness versus those with ISO 27001 alone.
This matters because India's IT services sector competes globally. Polish, Romanian, and Filipino IT vendors are also pursuing NIS2 readiness. The Indian companies that close the ISO 27001-to-NIS2 gap fastest will capture EU contracts that competitors can't.
The investment is modest relative to the revenue at stake. Gap remediation for an ISO 27001-certified company typically costs INR 25-40 lakh, a fraction of the annual revenue from a single EU enterprise client.
Frequently Asked Questions
Can ISO 27001 certification alone satisfy NIS2 requirements for Indian vendors?
No. ISO 27001 provides a strong foundation covering 60-65% of NIS2 requirements (BSI Group, 2024), but critical gaps remain in incident reporting timelines, supply chain cascading, board governance, and vulnerability disclosure. These gaps require specific remediation beyond the ISO certification scope.
How long does NIS2 gap remediation take for an ISO 27001-certified company?
Typically 4-6 months. Phase 1 assessment takes 3-4 weeks. Policy updates and quick wins take another 4 weeks. Technical remediation requires 8-10 weeks. Validation and internal audit add 3-4 weeks. Companies without ISO 27001 should expect 12-18 months for full implementation.
Should Indian companies upgrade to ISO 27001:2022 before starting NIS2 remediation?
If you're still on ISO 27001:2013, upgrade to the 2022 version simultaneously with NIS2 gap work. The 2022 revision includes 11 new controls that partially address NIS2 gaps. Running both transitions together saves overlapping effort and produces a stronger control framework.
Which ISO 27001 controls map most closely to NIS2 Article 21?
The strongest mappings are: A.5.1 (policies) to Art. 21(2)(a), A.5.15-A.5.18 (access control) to Art. 21(2)(i), A.5.24-A.5.28 (incident management) to Art. 21(2)(b), A.8.24 (cryptography) to Art. 21(2)(h), and A.5.29-A.5.30 (business continuity) to Art. 21(2)(c).
Do EU clients accept ISO 27001 certificates from Indian accreditation bodies?
Yes. ISO 27001 certificates issued by accreditation bodies recognised under the IAF MLA (International Accreditation Forum Multilateral Agreement) are accepted globally. Most Indian certification bodies operate under NABCB accreditation, which is IAF-recognised.
Key Takeaways on Already ISO 27001? Here's You
If you're already ISO 27001 certified, you've done the hardest part. The foundation is built. What remains is targeted gap remediation across five specific areas: incident reporting timelines, supply chain cascading, board governance, vulnerability disclosure, and business continuity specificity.
Don't treat this as starting over. Map your existing controls to NIS2 Article 21. Identify the 35-40% that's missing. Prioritise incident reporting integration because it's where EU auditors focus first.
The Indian IT companies that close this gap become NIS2-ready vendors. Those that don't will watch competitors take their EU contracts.
Your next step: download NIS2 Article 21 and map each requirement against your current ISO 27001 Statement of Applicability.
For hands-on delivery in India, see ISO 27001 Certification for Indian Companies.
About the Author

Country Manager, Sweden at Opsio
AI, DevOps, Security, and Cloud Solutioning. 12+ years leading enterprise cloud transformation across Scandinavia
Editorial standards: This article was written by a certified practitioner and peer-reviewed by our engineering team. We update content quarterly to ensure technical accuracy. Opsio maintains editorial independence — we recommend solutions based on technical merit, not commercial relationships.