Skip to content

How Are Maximum NIS 2 Fines Set and Who Decides What You Pay?

Maximum fines under the NIS 2 Directive are designed to catch attention, not to set the baseline for every violation. The headline figures-up to €10 million or 2% of global turnover for essential entities, and €7 million or 1.4% for important entities-exist to signal the seriousness of the regime, but they rarely represent what most organisations will pay. The real amount is defined by your specific circumstances: what happened, your documented processes, your sector’s risk profile, and most importantly, how you react after a violation. There’s no automatic calculator. Instead, the process weighs facts about your actions, intent, and context.

NIS 2 fines reflect not just the risk, but your readiness, sector, and response-numbers move up or down depending on how well you demonstrate control and intent.

Responsibility for determining the fine doesn’t rest with the EU as an institution. Each Member State establishes a national authority-like Germany’s BSI, France’s ANSSI, or Spain’s INCIBE-to assess incidents and impose penalties. These supervisors, not ENISA, investigate, rule, and justify their decisions in line with both NIS 2 and domestic law. ENISA issues guidance and best practises but remains advisory.

Unlike the GDPR-which sometimes codifies minimum fines-NIS 2 leaves minimums undefined. The core test is always “effective, proportionate, and dissuasive”. In reality, most first-time offences draw warnings or mandatory improvement plans, as long as the entity can demonstrate genuine intent to comply, with evidence on hand. Only persistent, repeated, or egregious failings push cases into maximum fine territory.

Country Variations and Sector Overlays

As an EU directive rather than a regulation, NIS 2 demands national implementation. Some countries, such as France and Belgium, have added stricter sector-specific overlays or capped fines differently for certain verticals-Belgium, for example, may limit fines further for some healthcare providers. At the same time, digital infrastructure entities can face stricter or more nuanced interpretations. Because transposition timelines and detail vary, you must stay updated with your own regulators evolving guidance.

Book a demo


What Drives a Fine Higher (or Lower)? Gravity, Behaviour, and Track Record

The fine-setting process is deliberate, risk-based, and nuanced-never automatic. Three major axes decide where your case lands: the gravity and impact of the breach, your behaviour during and after the incident, and your compliance history.

Severity, Duration, and Impact

Regulators first examine the “gravity” of the event along these coordinates:

  • Nature and seriousness: Did the breach disrupt essential services or expose systemic weaknesses? For example, an isolated misconfiguration is judged less severely than months-long negligence or cascading service impacts.
  • Duration: Did the organisation respond swiftly, or did gaps persist due to slow detection, poor escalation, or indecisive correction?
  • Consequences: Was there harm-disrupted critical services, lost availability for customers, excessive downtime, or data exposure? If your sector underpins public welfare (like health, energy, finance), the expectations and scrutiny are markedly higher.

Behavioural Factors: What Happens After the Incident Matters

Regulatory decisions hinge not only on the event, but on your behaviour after it occurs. Full and prompt cooperation, rapid notifications, demonstrable steps to mitigate, and open, context-rich communication reduce financial risk.

Thorough remediation and full cooperation with the regulator are the two levers you control-even post-breach. Only repeated obstruction or neglect pushes incidents into maximum fine territory. (ENISA, NIS 2 FAQ)

Organisations that obstruct, downplay, or attempt to hide the scope of incidents will be penalised more harshly. Any avoidable delay in response can escalate penalties.

Compliance History: Why Track Record is Your Friend

A company that can evidence strong, mature cyber-security controls (such as certification to ISO 27001, diligent risk management, and fast closure of prior audit findings) receives credit for intent and discipline. On the other hand, a repeat offender or company with consistent documentation gaps will face heavier penalties.

Is Prompt Incident Reporting Enough?

Timely notification is vital, but incomplete by itself. Regulators expect you not only to tell, but to remediate root causes, evidence change, and share lessons with relevant staff. Penalties are reduced for organisations that fix more than they are asked and document those actions.




illustrations desk stack

Centralise risk, incidents, suppliers, and evidence in one clean platform.




How Does a NIS 2 Investigation Play Out-And How Should You Prepare?

While incidents often come as a shock, the investigation follows a predictable, sometimes intense, path. Preparation is defined by your ability to produce clear, cross-linked records and show process discipline at each step.

The Investigation Lifecycle: What to Expect

  1. Detection or Notification: You report a breach as required by law, but sometimes the authority will discover issues first, via monitoring or whistleblowers.
  2. Investigation & Evidence Request: Evidence is requested: system and access logs, incident timelines, policies and procedures, response actions, training records, and approval trails for policy changes.
  3. Right to Reply: You, often coordinating with your legal counsel, submit context on what occurred, root cause analyses, corrective action details, and any independent assessments (e.g. internal or external forensics).
  4. Ruling: The national authority issues a finding, balancing gravity with proportional mitigation, and provides a rationale for the penalty, warning, or closure. The process is documented, and you retain a right to appeal (bsi.bund.de; eur-lex.europa.eu).

Investigation outcomes are shaped as much by documentation discipline as by technical sophistication.

Why Many Fines Escalate (and How to Defend Against It)

Fines frequently climb due to entirely avoidable gaps:

  • Missing or weakly linked records: If events are not fully logged, approvals are omitted, or you can’t show who was responsible and what happened.
  • Unclear ownership of controls: When process diagrams, responsibility matrices, or reporting chains are absent or contradictory.
  • Disconnected process and outcome: When technical fixes or remediations are not mapped to specific policy controls or procedures.

Here, platforms like ISMS.online offer decisive advantage. Automated audit chains, centralised approvals, and linked documentation built into workflows mean every task, control sign-off, and remediation becomes part of a living compliance narrative (isms.online). Your preparation must centre on ensuring each process step is mapped-before a breach ever occurs.

Proportionality and Appeal: What If You Disagree?

NIS 2 legally mandates a proportional, justifying process. Documented, measured, and transparent engagement with your local authority doesn’t merely lower the initial fine-it also strengthens your position on appeal. The appeal process has no room for empty claims; you must show linked process, signatures, and evidence trails at each stage to secure downward adjustments.




What Forms of Evidence Move the Needle: Automation, Documentation, and Proof

Telling the regulator “we fixed it” only matters if you can prove it, with timestamped, mapped, and role-accountable evidence.

Most Influential Evidence Types

  • Timestamped technical logs: Patch deployments, admin actions, role changes, or vulnerability scans-all time and owner mapped.
  • Incident and remediation documentation: Post-incident review flow, root cause analysis, assigned tasks, corrective actions, and close-out reporting.
  • Mapped policies and Statement of Applicability (SoA): A verifiable SoA, cross-linked to each control, marked by owner, framework reference, and date (ENISA).
  • Staff training records: Who received which updates, signed key policies, completed quizzes, and when.

A centralised ISMS collates this, ensuring no action exists without an evidence chain. Every update-patch, policy, training completion, or risk reassessment-should flow directly into your risk register, SoA, and evidence bank (isms.online).

Incident records, change logs, and linked approvals lead to much greater trust from both auditors and national authorities.

Why Standalone Technical Evidence Is Not Enough

Technical action by itself is only one layer. You must also evidence the process and human elements-approvals, review, sign-off, and stakeholder communication:

  • Change Approval: Who signed off the remediation and when.
  • Risk linkage: Mapping each action to documented risks and demonstrating re-assessment.
  • Change communication: Notifying those impacted or retrained as needed to prevent recurrence.

If proof stops at a patch log, scrutiny will follow.




platform dashboard nis 2 crop on mint

Launch with a proven workspace and templates – just tailor, assign, and go.




How NIS 2 and GDPR Fines Interact: Stacking, Coordination, and Double-Jeopardy

A common anxiety: “Can we be fined twice if both network security (NIS 2) and data protection (GDPR) are breached?” European law is clear that no stacking of financial penalties applies for the same facts. The regulator that oversees the more specific or stringent regime-here, usually GDPR-handles the financial penalty, while the other focuses on operational consequences.

Are Dual Fines Possible for the Same Event?

No: only one financial penalty per incident. If both NIS 2 and GDPR apply, the GDPR fine takes precedence. NIS 2 authorities may require remediation or further operational safeguards, but cannot add a duplicative fine.

One incident, one financial penalty. Parallel notification and remedial action, but no duplicate fines.

Your Dual Responsibilities: Notification and Oversight

Despite financial protection against “double jeopardy”, your obligations to report and evidence compliance for both regulatory authorities remain. Both must be notified promptly; both, in theory, may request supporting documentation. ISMS.online makes parallel notification and evidence delivery more manageable, establishing audit trails for both compliance targets.

National and Sector Variations: Invoking the Details

In sectors considered particularly critical (energy, finance, healthcare, public administration), or certain member states, extra sector overlays or national rules may further influence how fines are set or capped (akd.eu; noerr.com). Always consult your sector-specific regulator circulars and participate in any cross-sectoral compliance forums for updated guidance.




How to Make Every Remediation Step Count: Proportionality, Audit Chains & ISO 27001 Alignment

“Show, Don’t Just Do”: Mapping Actions to Operations

For regulators, what matters is not what you “meant” but what you can show-a mapped, timestamped chain from incident through remediation to risk/control. Log chains, approvals, and evidence must cross-link naturally to relevant controls (in the SoA) and updated risks. If you remediate, you must also update the underlying records and policies, documenting every step, person, and time.

Management and technical sign-off, tied to linked evidence, is what turns a policy into real mitigation. It’s the difference between a warning and a multi-million fine.

ISO 27001 Crosswalk: Fulfilment at a Glance

The table below bridges the expectation of NIS 2 proportional penalties with ISO 27001 operational standards. Each shows the practical mapping a regulator will expect to see-or ask for-during an investigation (isms.online).

Expectation Operationalisation ISO 27001/Annex A Reference
Prove incident response speed Incident logs, task assignments, timeline monitoring Clause 6.1, A.5.24, A.5.26
Show policy updated post-incident Documented updates, change approvals Clause 7.5.2, A.5.1, A.5.2
Evidence of employee training Records of attendance, completed acknowledgement A.6.3, A.7.7, A.8.7
Demonstrate technical fixes applied Patch logs, vulnerability management records A.8.8, A.8.31, A.8.32
Proof of risk assessment/review Dated risk reports, mitigations, management review Clause 6.1/8.2, A.5.7, A.5.9

All workflow chains in ISMS.online support these requirements, ensuring you can generate “defence-in-depth” for any remediation, mapped traceably to identified controls and risks.

Traceability Chain: Mini-Scenario Table

The following table demonstrates how ISMS.online auto-links incidents, risk updates, control application, and evidence into a continuous record.

Trigger Risk Update Control/SoA link Evidence Logged
Malware detected Added to register, assess A.8.7, SoA 16.1 Antivirus logs, SoA update
Phishing email User awareness retraining A.6.3, SoA 12.1 Training records, quiz result
Data breach Policy/process review A.5.14, SoA 8.1 Incident notes, revised policy
Patch missed Patch management change A.8.8, SoA 14.2 Patch logs, root cause analysis

ISMS.online auto-links every step: events, risks, controls, and evidence, forming a defensible audit record for both internal review and regulatory defence.

Visual Summaries and Stakeholder Dashboards

Stakeholders and external regulators expect visual clarity on compliance posture. With ISMS.online, dashboards and reports present incident histories, remediation chains, and compliance gaps at a glance-unifying technical, operational, and documentation evidence to support your proportionality defence.




platform dashboard nis 2 crop on moss

From Articles 20–23 to audit plans – run and prove compliance, end-to-end.




Get Your Compliance Evidence Ready with ISMS.online Today

Staying audit-ready means going beyond tick-box compliance-ISMS.online makes every remediation, approval, and update instantly auditable. Your team can centralise evidence chains, link technical and policy documentation, and maintain a real-time dashboard of compliance health.

  • Automated evidence chains: Centralise NIS 2, GDPR, and ISO 27001 requirements against a single action log.
  • Live dashboards: Provide at-a-glance risk matrices, mitigation progress, and audit-status visualisations.
  • Centralised documentation and sign-off: Every update is tracked and attributed, establishing a ready defence against audit challenge or fine.

You can’t always prevent incidents. But with the right evidence, you can prove intent, minimise penalties, and win trust-no matter the challenge.

Practitioner Pro-Tip: Audit Prep in 1/3 the Time

Manual records and spreadsheet sprawl create anxiety and drain resources. By embedding evidence collection, approval, and control mapping directly into your ISMS.online workflows, you cut through administrative burden, reduce time-to-audit, and raise assurance, while ensuring every incident and remediation step leave a traceable, defensible shadow across all compliance mandates.

Microcopy Templates for Audit Packs and Inbound Readiness

  • “All evidence, incident logs, and mitigation steps mapped to ISO 27001-see attached dashboard extract.”
  • “Compliance traceability from incident to remediation is available on request; workflow approvals and SoA updates included.”
  • “Training records, policy updates, and control assignments are centralised and time-stamped for proportionate review.”



Start Your Compliance Transformation with ISMS.online Today

Ready to eliminate compliance uncertainty and raise your organisation’s resilience? Switch to ISMS.online-the platform built for audit-strength evidence, mapped controls, and no-nonsense access to your compliance health. Unify incident response, evidence collection, policy updates, and risk management in one powerful system.

  • Save critical hours and administrative frustration on every audit, evidence search, and compliance review.
  • Cut the risk of fines to a minimum by mapping every remediation to a registered risk and approved control.
  • Build stakeholder and regulator trust with real-time dashboards, traceable approvals, and continuous improvement logs.

Move beyond compliance anxiety-make your next encounter with regulators, auditors, or the board your strongest performance yet.
ISMS.online: Where compliance isn’t dread-it’s the foundation of operational peace of mind.



Frequently Asked Questions

Who determines NIS 2 fines, and why does “entity type” dramatically change your risk?

NIS 2 fines are decided and enforced by your own national cyber-security regulator-not by Brussels-with each EU Member State free to investigate, sanction, and assign penalties within strict boundaries set by the Directive. The single most influential risk factor is your “entity type”: are you an “essential entity” (like energy, healthcare, finance, or digital infrastructure), or an “important entity” (technology suppliers, regional logistics, SaaS platforms supporting critical functions)?
Essential entities risk fines up to €10 million or 2% of global turnover, and face more frequent audits, regulatory outreach, and intervention. Important entities receive a lower ceiling-€7 million or 1.4%-but aren’t immune. These caps are not minimums; the actual amount is shaped by case facts, cooperation, and your mapped evidence.
National authorities decide your status based on sector and company profile (see NIS 2 Annexes I/II), and this status directs how much scrutiny, paperwork, and audit heat you’ll see. In effect, your “entity type” becomes the lens for both risks and regulator attention-with well-prepared organisations turning this to their advantage by automating evidence mapped to every obligation.

Regulators don’t go hunting blind-they focus on where your status and mapped controls overlap or leave gaps.

ISMS platforms like ISMS.online can classify your entity, track obligations by status, and surface audit-ready evidence on demand.

Snapshot Table: Entity Type and Fine Exposure

Entity Type Fine Ceiling Typical Sectors Scrutiny Level
Essential €10M / 2% turnover Energy, health, finance High: direct audit
Important €7M / 1.4% turnover Tech/services/logistics Medium: “on demand”

Which factors most often drive the size of a NIS 2 fine-and which are under your control?

National regulators apply a structured proportionality principle: fines are rarely arbitrary and hinge on severity, notification speed, remediation actions, history, and the clarity of your documentation,.
Key escalators for fines include:

  • Widespread, chronic, or cross-border impact: Bigger scope, bigger risk, bigger penalty.
  • Delays in reporting: Every day late adds exposure.
  • Poor evidence and audit trails: Gaps or ambiguity in logs, policy sign-offs, or remediation documentation amplify risk.
  • Repeat or systematic failures: Regulatory patience wears thin with patterns.
  • Negligence or concealment: Concealed or chronic neglect triggers the highest fines.

Most powerful mitigators? Documented, timely action, mapped controls, proactive staff training, and a complete log connecting every step to a responsible person or team.

Regulators penalise not the incident, but a broken chain of signed evidence and missed opportunities for rapid control.

If your ISMS platform centralises these links with timestamps and cross-references, you turn theoretical multi-million risks into repairable findings-with a documented story the regulator can’t easily ignore.


What happens in a NIS 2 compliance investigation, and where do even diligent teams go wrong?

The typical NIS 2 investigation follows a predictable yet high-pressure journey:

  1. Incident is reported or flagged-by your organisation, third party, or regulator’s own monitoring.
  2. Regulator issues evidence requests-logs, risk assessments, policy links, incident and closure reports (timeline is often days, not months)-see,.
  3. Team rushes to collect proof-should include integrated SoA links, signed policies, root-cause documentation, and closure/management sign-off.
  4. Outcome: findings, corrective orders, or formal fine-with a right to reply based on documentary evidence.

Where do the majority stumble?

  • Fragmented, manual audit trails: that fail to connect incidents to SoA controls and risk register updates.
  • Unsigned or undated policies: , “verbal sign-off,” or email-only actions with no workflow integration.
  • Remediation work with missing root-cause and management closure logs.:

If your traceability snaps at any point, or you can’t show “who, what, when, and why,” the regulator fills the gap with their own-and often harsher-narrative.

Defensible audit log musts:

  • Every incident mapped to a signed control or policy,
  • Complete timeline from notification to closure,
  • Role-based attribution for every step,
  • Instant retrieval for both internal and regulatory review.

In the regulator’s eyes, if there’s no digital thread, the event never happened.

ISMS.online makes each stage retrievable and auto-mapped the instant the incident is logged.


What counts as actual evidence in a NIS 2 case, and how does a modern ISMS turbocharge your defence?

Regulators want traceable, mapped, signed evidence: direct lines from event to risk register to control/policy to review and management closure-with the right person and timestamp at each step.

Incident Register Update Control/SoA Ref Example Evidence
Malware alert Countermeasure review A.8.7, SoA 16.1 Antivirus logs, signed update
Phishing attack Awareness, training A.6.3, SoA 12.1 Training logs, policy sign-off
Data breach Notification, RCA, improvement A.5.14, SoA 8.1 Incident report, closure audit log
Patch failure Change review, rapid response A.8.8, SoA 14.2 Patch logs, role approval

Platforms like ISMS.online integrate these connections: every action is mapped to a control, cross-referenced to the register, and outputted with timestamp, responsible owner, and-where required-management signoff ((https://www.isms.online/resource-library/nis2-directive-checklists/), ISO 27001:2022).
The real value: you replace panicked, manual evidence gathering with a ready-to-export story-the “audit trail” that carries you through investigations and, often, out the other side with reduced (or zero) fines.


Can a single incident trigger both NIS 2 and GDPR fines, and where are the lines drawn?

No, you cannot be fined twice for the same incident under both NIS 2 and GDPR-this “double jeopardy” is expressly forbidden under the latest EU law (EC Council, 2024). If the breach concerns personal data, GDPR authorities lead, and only the data protection regulator’s fine applies, but NIS 2 authorities may still require technical remediation and special reporting.

What changes is not the money, but the evidence demand: you must still satisfy both regulatory regimes with mapped process, documentation, and timely notification.

Dual fines are forbidden, but dual evidence obligations remain-your ISMS must serve both compliance tracks at once.

Centralising your security, privacy, and incident workflows is no longer a luxury-it’s a baseline expectation for resilience.


How do sector or national overlays raise your NIS 2 fine risk, and what keeps you in control?

NIS 2 is just the floor-every Member State and some sectors (like energy, finance, health, or digital infrastructure) may implement higher fine ceilings, tougher reporting windows, or unique controls. France and Belgium, for example, have adopted stricter overlays, while Germany and the Netherlands are planning sector amplifications for 2025 (AKD, 2024,. Regimes like DORA create parallel audit and penalty mechanisms.

How to keep ahead:

  • Quarterly review of sector and country advisories: -shifts arrive with little warning.
  • Automate documentation and incident mapping: -instant “look-back” audits are possible when overlays shift.
  • Proactively map to ISO 27001 and national overlays: -early adopters often win “safe harbour” leniency or regulatory benefit-of-doubt.

Staying compliant is not a checkbox but a perpetual risk loop; overlays mean your evidence must be ready for new rules, not static ones.

A live ISMS dashboard ensures no overlay, sector change, or national escalation catches your evidence off guard.


What does “proportionality” actually mean in defence-and how do you digitally prove your every move?

Proportionality is the legal north star for both imposed and reduced NIS 2 penalties. Every meaningful compliance action-incidents, risk register updates, control links, management sign-offs-should be mapped, timestamped, attributed, and retrievable on demand. The completeness and clarity of this digital chain is every bit as important as intent or impact.

Trigger Risk/Process Update Control/SoA Mapped Audit Evidence Example
Zero-day exploit Vuln. assessment, patch A.8.8, SoA 14.2 Scanner, change log
Vendor breach 3rd-party risk update A.5.19, SoA 11.1 Supplier comms, approvals
Insider alert Access rights review A.8.3, SoA 9.1 IAM logs, manager sign-off

Best-in-class platforms like ISMS.online run this chain end-to-end: every action, no matter how small, is assigned, mapped, and digitally signed. If the regulator reviews your case, the mapped journey itself becomes your strongest mitigation against fines and public consequences.

Every signed action is a line of defence-build the chain, and you build a trusted, future-ready organisation.

Step up your compliance defence: Map, Sign, and Close Your NIS 2 Evidence Chain

With ISMS.online, your entire compliance history-incidents, risks, controls, sign-offs, and overlays-is live, mapped, and retrievable at a click.

  • Cross-mapped events, policies, and actions are instantly accessible for both audits and regulator reviews.
  • Every step leaves a digital fingerprint-timestamped, owner-attributed, and mapped directly to compliance obligations.
  • As sector and national overlays evolve, your controls and evidence adapt-no gaps, no risk of missed requirements.

Teams who map, sign, and close every compliance step walk into regulator meetings with confidence-and walk out with trust, resilience, and a reputation that attracts customers and partners.

Now is the time to future-proof your compliance journey: map your NIS 2 defence with ISMS.online and convert every action into resilience capital.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.