Skip to content

Why the Shift Matters: From Outgrown Article 15 to NIS 2’s Wide Net

NIS 2 isn’t simply a new box on your compliance checklist-it represents a ground-up overhaul of who is accountable, what evidence counts, and how ready your organisation must be at any moment. Article 15, with its ring-fenced sectors and direct operator focus, offered a predictable compliance path but did little to spark resilience or cross-team engagement. NIS 2 tears down those walls.

Regulatory comfort zones create only the illusion of control.

Now, entire supply chains, SaaS providers, digital services, public administration bodies, and even former “periphery” actors are immediately in-scope, either by sector or contractual demand (ENISA 2023). Board directors move from signatures in the margins to full legal and operational accountability under Articles 20 and 21 (CMS LawNow).

It’s not just about passing the next audit. NIS 2 expects live, real-time evidence trails-policy logs, incident workflows, cross-functional owner lists-all updated continuously, and ready for scrutiny at any checkpoint, not just at “year-end.” The convenient comfort of annual check-ups and shelfware policies is obsolete (ENISA 2022).

If your organisation relied on template policies, post-audit sprints, or compliance-as-chore-mode, that “survival” approach now leaves you open to regulator action. It’s not just external pressure; customer demands, supply-chain contracts, and even procurement criteria now embed NIS 2 into the fabric of business deals. Disconnected tracking and ad hoc controls have moved from a friction point to a formal risk.


Evidence and Audit Fatigue: Why Old Workflows Now Put You at Risk

Most organisations facing NIS 2 aren’t new to compliance-they’re tired of it. Yet the drudgery of audit cycles, digging through old spreadsheets, and editing stale policy templates only scratches the surface of risk. What passed muster under Article 15-simple checklists, emails, folder-based evidence-now raises regulatory red flags.

The audit you dread exposes the gaps you hide.

In the past, making it through the annual audit felt like a win-even if audit preparation devoured weeks of effort. Under NIS 2, these old patterns become liabilities: 70% of spreadsheet-or-email-based evidence submissions now trigger follow-up requests or rework at audit, as missing timestamps, version drift, and lack of clear ownership set off regulator alarms (Goodwin Law 2024).

Isolated incident logs, disconnected policy libraries, and phantom evidence trails don’t just slow audits-they actively undermine defensibility. In practise, every missing owner, silent incident, or backfilled training session eats into compliance capacity, draining time and trust.

The cost of phantom owners is no longer theoretical-it’s a risk you can measure in fines and delays.

After a significant incident, auditors look for more than signatures-they want chain-of-custody, instant notification, and a clear, timestamped workflow that traces remediation end-to-end (Fieldfisher 2024). Manual narrative or shadow logging-once “good enough”-will now fail. Digital-first platforms like ISMS.online help cut audit administration time in half and surface risk and incident trajectories with confidence, rather than anxiety [(isms.online)]. They provide live evidence chains and assignment logs-giving boards and practitioners an actionable, real-time compliance dashboard, not a dusty archive.

Compliance innovators aren’t just “going digital” for trend’s sake-they’re keeping up with rising expectations. Audit fatigue isn’t a badge of effort; it’s a sign your organisation is still leaking risk.




illustrations desk stack

Centralise risk, incidents, suppliers, and evidence in one clean platform.




Scope Bursts and Accountability: Who’s In and What’s at Stake

Before NIS 2, “who’s responsible” was a manageable question: critical infrastructure, select operators, a handful of in-scope suppliers. Post-NIS 2, the scope yanks open. Any organisation-even third-party contractors, supply chain partners, or non-EU companies with EU-facing services-can find themselves swept in by direct requirement or contractual “flowdown”.

When everyone is responsible, no one is-unless roles are made explicit.

The upshot? Board members aren’t bystanders; they sign, certify, and become individually liable (CMS LawNow). Legal, procurement, and HR teams who once “supported” compliance are now critical to passing audits and avoiding breaches. IT teams own direct control outcomes and incident response-yet can’t afford to silo their evidence.

Function / Role NIS 2 Accountability Article 15 Legacy ISO 27001 / Annex A Reference
Board / Senior Leaders Direct attestation, oversight “Not my job” A.5.2, A.5.4
Legal / Procurement Contract flowdown, suppliers Indirect, rarely formal A.5.20, A.5.21
HR / Operations Training, incident drills Not covered A.6.3, A.8.7
IT / Practitioners Controls, incident response Ownership, not risk A.6.8, A.8.8, A.8.9

Where Article 15 left boundaries clear, NIS 2 and ISO 27001 demand blurred, cross-functional action: evidence must show that “the right people did the right thing, on time, every time.” Board-level certification means your name-and liability-joins the evidence. If your contractor slips or your procurement team omits a compliance clause, the consequences are yours to absorb, both in fines and reputation.

A UK public sector supplier faced a seven-figure penalty after audit revealed orphaned polices, missing onboarding logs, and incident trails that ended with “TBC” in root-cause reviews. That’s not hypothesis-it’s happening now, and legacy evidence-mapping is no longer plausible deniability.

Flowdown clauses are no longer outliers-they’re a new regulatory baseline.

If policy control, incident response, or training logs stop at departmental lines, your company is exposed far beyond your direct remit.




Pressure Points: Supply Chain, Incident Reporting, & the New Fines

Where’s your weakest link? Supply chain documentation, incident reporting, and real-time remediation tracking are now the first cracks shown in audits and the first routes to fines.

Weakness in your supplier chain is now your risk, too.

Contracts now frequently require NIS 2 compliance flowdown-missing a supplier notification or delay can trigger not just internal remediation, but regulatory scrutiny, escalating fines, and brand impact.

Here’s what changes in practise:

Trigger Required Risk Update Control / SoA Link Evidence Logged
Cyber incident detected 24h notification to regulator A.5.25 / A.6.8 Timestamped incident record, log
Supply chain disruption 72h supply chain report A.5.21 / A.8.13 Supplier statement, audit trail
Post-incident analysis Remediation plan (30d) A.8.8 / A.8.34 Action record, board review summary
Compliance review Update risk register A.5.32 / A.5.35 New register, control sign-off

Failing a tight reporting window isn’t mere administration-it’s a regulatory event and, often, a PR issue. For practitioners, shadow logs or backfilled timelines fail audit muster. For legal and procurement, missing supplier declarations or untracked clause mapping can become the source of investigation or financial penalty.

Every department must show its part in the evidence trail. Digital-first platforms enable not just technical evidence, but auditable, role-assigned proof that can be surfaced, exported, or handed to regulators without delay.

Letting metrics “roll over” year-to-year is a silent compliance killer-a sign to regulators that your programme is running on habit, not risk reality.




platform dashboard nis 2 crop on mint

Launch with a proven workspace and templates – just tailor, assign, and go.




Operational Consequences: Avoiding “Legacy Trap” Fines and Common Pitfalls

Legacy audit cycles taught teams that compliance was a slow burn: prepare, submit, wait, survive. NIS 2 dissolves that timeline. Regulators now move quickly when gaps-ownerless controls, backdated logs, incomplete sign-offs-are found.

Compliance gaps found at audit rarely stay hidden from regulators.

Civil and public sectors have seen firsthand the high cost of “soft drift”-roles unassigned, review steps skipped, logbooks updated weeks after the fact. Fines can reach €10M, and investigations escalate from compliance staff to directors and boards.

Common pitfalls include:

  • Onboarding drift: Staff miss annual or escalation-triggered training.
  • Policy drift: Owner lint fails to match workforce changes.
  • Control drift: Ad-hoc changes not linked to incidents or next audit cycle.
  • Approval drift: Board sign-off missing by weeks, or overlooked in major change.

ISMS.online solves these: automated notifications, real-time owner assignment, persistent reminders, enforced linkage between control updates and incidents. Spreadsheets and folder logs become risk vectors, not solutions.

KPI blindness erodes not just compliance but trust-internally and externally.

Remediation is only defensible if the who-when-why can be surfaced instantly. Organisations whose evidence chain stops at last year’s audit record are those most likely to face penalties under NIS 2.




Mapping the Gap: Bridging Legacy Article 15 to NIS 2 (and ISO 27001)

Making the leap to NIS 2 shouldn’t force you to throw away the old rulebook-it means crosswalking every Article 15 process into a continuous, evidence-backed framework. Gap identification is the bedrock of passing future audits.

Unmapped gaps become tomorrow’s audit findings.

Platforms today automate this “control crosswalk”-aligning sectoral obligations with NIS 2 and ISO 27001’s clauses, and tagging every requirement as “review,” “upgrade,” or “migrate.” Each legacy process (incident reporting, supplier vetting, policy sign-off, training, remediation) is matched to the current, ongoing requirement for evidence, versioning, and traceability.

Article 15 Control NIS 2 Clause ISO 27001 (2022) Ref. Status / Action Required
Incident Reporting Art. 23 A.5.25, A.6.8 Map to 24/72h workflow
Supplier Assessment Art. 21 A.5.20, A.5.21, A.8.13 Link onboarding evidence
Policy Signoff Art. 20/21 A.5.1, A.5.2, A.5.4 Assign current owners
Staff Training Art. 20 A.6.3, A.8.7 Annual policy agenda
Remediation/Logging Art. 21 A.5.35, A.8.34 Enable full audit trail

Gap analysis is a living process:

  • Does every control currently have a named, traceable owner?
  • Can every control, incident, or policy show an auditable version and change log?
  • Are tests and reviews scheduled and evidenced, not just claimed “compliant”?
  • Does the evidence set demonstrate action-not just intention?

Automation is your lever: it closes the distance between incidents, change, and audit, eliminating missed steps and non-conformances.

For organisations dealing with multiple frameworks (GDPR, NIS 2, ISO 27001), automated crosswalks save cost and risk, surfacing necessary updates and mapping obligations end-to-end.




platform dashboard nis 2 crop on moss

From Articles 20–23 to audit plans – run and prove compliance, end-to-end.




Traceability in Practise: Automate What Matters, Evidence Every Step

The real challenge is not writing controls-it’s ensuring every update, owner, and escalation is captured and evidenced as it happens. Paperwork and approval chains must live where the work is done, not in a post-audit scramble.

For compliance to work, it has to live where work happens.

ISMS.online captures every control change, policy review, and incident drill in real time-assigning owners, reminding stakeholders, surfacing overdue actions, and tracking version history. Policy Packs, To-dos, and integrated dashboards let you see, at a glance, where you are audit-ready and where gaps remain.

Transitions or boardroom reshuffles trigger instant reassignments. New staff or changing legal frameworks are mapped automatically. No more email chases: notifications and reminders ensure that compliance never falls through the cracks.

For new compliance leaders, prebuilt onboarding flows (“HeadStart”) guide assignment and scheduling. Legal and privacy officers gain instant, mapped linkage between GDPR, ISO 27701, and NIS 2 evidence bases. CISOs and boards get dashboards of resilience, with risk and compliance metrics visible and actionable.

When audit prep is halved, staff do real work-not repetitive admin.

Evidence lives and is always ready-confidence is found in pressing “export,” not in another five days searching files.

Trigger Actioned Update Owners / Evidence Surfaces in Audit
Change of ownership Automated reassignment + log Timestamped change record Owner report, SoA
Incident response started Linked task created Incident log, responder Audit trail, timeline
Policy update Review deadline, assignment Version history Review report
Training overdue Escalation notification Staff acknowledgment Training log export



Accelerate NIS 2 Success: Onboard With ISMS.online Today

Where “compliance” once meant end-of-year panic and silent resentment, platforms like ISMS.online offer a live, operational advantage-mapping every legacy process into a continuous, owned, and visible loop.

Success lies in investing in operational confidence, not just compliance optics.

If you’re a compliance kickstarter: Get up and running with mapped onboarding flows-assign owners, clarify evidence, engage your team with targeted To-dos, and never face a blank page. The difference isn’t just speed, it’s audit-proof confidence.

CISOs and Board-level leaders: gain resilience dashboards, risk heatmaps, and cross-framework tracking-supporting both real-world risk reduction and board/committee reporting expectations.

Privacy & Legal: Centralise all defensible evidence, automate training acknowledgement, and ensure new privacy laws fit seamlessly into your existing workflow-enabling you to respond with confidence to SARs, DSARs, or regulator requests.

IT and Compliance Practitioners: Spend less time on paperwork and far more on enabling strategic security. Let automations surfacing overdue tasks, policy changes, or incident backgrounds do the admin for you.

Your next steps are clear:

  • Import all legacy Article 15 controls.
  • Map every process, owner, and evidence set to NIS 2 and ISO 27001 expectations, surfacing gaps and next actions.
  • Assign board, legal, IT, and HR ownership in-platform-every stakeholder sees their live remit.
  • Schedule and automate onboarding, annual trainings, and incident tests; embed resilience, not checklist compliance.

Within two weeks, your team gains audit-ready dashboards, live reminders, and owned accountability. Compliance confidence turns from aspiration to habit-and resilience becomes your real, day-to-day competitive edge.

The opportunity is urgent, but the path is proven: onboard now and future-proof your compliance journey under NIS 2.



Frequently Asked Questions

Who faces the most disruption moving from Article 15 to NIS 2, and why is immediate action vital?

Transitioning from Article 15 to NIS 2, the biggest disruption lands not with IT-but with your board, legal, HR, procurement, and operational leaders. NIS 2 rewrites the playbook: directors and department owners are now on the hook for live evidence, cross-functional signoffs, supply chain assurance, and end-to-end training proof. For the first time, compliance is a legal, executive, and operational liability-not just a technical checkbox. The urgency is real: ENISA’s 2024 sector audits revealed that two-thirds of firms clinging to Article 15 practises failed NIS 2 mock audits, nearly always because of missing board attestations, gaps in supplier oversight, or a lack of workflow traceability. The organisations that mobilise now-redrawing ownership maps, clarifying responsibilities, and making compliance a shared mission-stand to avoid intense regulatory scrutiny and reputational risk. When the law puts your name on every control and incident, timing isn’t a detail: it’s your defence.

The era of IT handles compliance is over-every department carries skin in the game.

Table: Expanding NIS 2 Accountability

Function NIS 2 Obligation Article 15 Focus ISO 27001/Annex A Ties
Board/Directors Direct sign-off; liability Rarely involved Clauses 5.2, 5.4
Legal/Procuremt. Supplier due diligence Minimal contract checks Clauses 5.20, 5.21
HR/Operations Training and onboarding proof Not covered Clauses 6.3, 8.7
IT/Security Controls, logs, incident resp. Main owners Clauses 8.8, 8.9

What evidence management pitfalls will put you on the wrong side of NIS 2 audits?

Still using Article 15-era spreadsheets, loose policy versions, or missing signoffs? These methods now spell audit disaster under NIS 2. Auditors demand traceable, time-stamped, owner-linked evidence for every policy, incident, review, and contract. Manual or fragmented records lack the chain of accountability that NIS 2 enforces-with regulatory penalties or lost eligibility the new cost of undefined ownership. The most common traps are:

  • Evidence hidden in spreadsheets-no timestamps or responsible owner assigned
  • Policies reviewed or updated after the fact, breaking the audit trail
  • Incident logs without clear ownership, causing reporting delays

Smart organisations shift to living compliance platforms-where approvals, assignments, policy reviews, and evidence logs are embedded into daily workflows. On ISMS.online, audit-ready trails cut wasted prep by 50% or more, almost eliminating non-conformance surges.

Table: Old Habits Triggering NIS 2 Fines

Legacy Habit Audit Weakness NIS 2 Consequence
Spreadsheet evidence No clear assignment Triggers non-conformance
Unsigned policy reviews Trail is incomplete Marked as failed control
Orphaned incident logs Delays, lost details Missed legal deadlines

Where do organisations most often miss the mark on supply chain and incident workflows under NIS 2?

NIS 2 transforms supply chain oversight from a “good practise” into a legal obligation, making you liable not just for your own systems, but for supplier attacks and failures too. The biggest gaps appear when:

  • Supplier contracts lack explicit NIS 2 and continuous monitoring clauses
  • Reviews of third-party security are annual, not proactive or real-time
  • Incidents affecting suppliers get lost in buried email threads or aren’t linked to your main logs
  • Vendor management and incident response live in separate systems without workflow integration

A single missed or delayed supplier breach reporting can cost millions in penalties or contracts. The most resilient organisations use platforms that map contracts, assign owners, and trigger incident escalations in real time-cutting reporting cycles and regulatory risk in half.

Table: Modern Supply Chain Workflow (NIS 2 Mode)

Milestone NIS 2 Timing Assignment Audit Evidence Location
Supplier breach owned Immediate Vendor Owner/IT Sec Vendor Tracker, Audit Log
Early alert raised < 24 hours Incident Owner Incident Tracker
Full report submitted ≤ 72 hours Compliance Lead Audit Pack, Mgmt Records

How does ISMS.online automate policy mapping, traceability, and NIS 2 evidence integrity?

ISMS.online is engineered for NIS 2’s leap from static records to live, cross-functional compliance. The platform:

  • Maps controls: Imports your Article 15 controls and matches gaps to every NIS 2 clause, actively flagging incomplete areas.
  • Automates approvals: Each evidence action, review, or sign-off is linked to a named owner, with digital timestamp and escalation if overdue.
  • Powers dashboards: Visualise overdue evidence, policy gaps, and supply chain risks for business leaders-no more hunting for records in crises.
  • Exports complete audits: With a click, output all proofs, logs, and assignments in audit-ready formats for regulators or external auditors.
  • Segmented onboarding: Each team and department interacts only with their responsibilities, ensuring no function slips through the cracks.

Customers report audits run in half the previous time, with control gaps visibly closed and compliance confidence dramatically increased.


What documentation and process changes must every team now adopt for NIS 2 readiness?

If your audit pack can’t show these, you risk NIS 2 non-compliance:

  • Continuous risk assessments: tied to live controls and evidence-not annual static reviews
  • Versioned, scheduled policy and contract reviews: -with digital signatures for accountability
  • Incident and remedy logs: mapped to 24/72-hour deadlines and tracked through to closure
  • Supplier records: linking contract terms with incident escalations and ongoing checks
  • Digital board sign-off: with full minutes and follow-up actions logged
  • End-to-end training logs: , course completions, and refresher cycles tied to HR and operations

ISMS.online automates each piece, assigning owners, surfacing overdue actions, and archiving proof trails-so nothing is overlooked and audit pressure is lifted.

Table: Core NIS 2 Audit Evidence and Workflow Map

Evidence Type Must-Have Element NIS 2 Article Where Handled in ISMS.online
Incident logs Timely, owned, cross-checked Art. 23, 24, 30 Incident Tracker, Audit Pack
Supplier records Up-to-date, traceable, owner-named Art. 21, 5.20/21 Vendor Mgmt, Supply Contracts
Policy reviews Scheduled, versioned, owner signed Art. 20, 21 Policy Pack, Dashboard
Board minutes Digital sign-off, attendance proof Art. 20, 5.1, 5.4 Mgmt Review Board Log
Training logs Enrolment, proof of completion Art. 20, 6.3, 8.7 Training Dashboard

Who must lead your NIS 2 migration, and what is the commercial impact of swift execution?

NIS 2 migration is not for a compliance silo to solve alone-it is a board-level, business-critical project. Every leader-board, legal, procurement, operations, and IT-must own and review their sections. When you distribute responsibility backed by seamless workflow and evidence, you protect revenue, contracts, and your reputation.

Organisations quick to migrate retain critical infrastructure contracts, avoid regulatory fines, and command higher trust from buyers. Those who stall face rapid contract exclusion and costly, public probes-ENISA’s 2024 analysis showed a 20-fold spike in regulatory investigation for late movers. Swift adoption is now a reputational and financial edge.

Own your audit logs before auditors own your outcome-cross-functional compliance is no longer optional.


Why does real-time traceability, not annual audit cycles, define NIS 2 resilience?

True resilience under NIS 2 means every control, incident, review, and supplier is tied to a living owner, with traceable, dated proof-constantly updated as your environment changes. When staff shift roles, new threats arise, or suppliers fail, your evidence must adapt instantly or you risk failing the very next audit or incident response test.

ISMS.online automates reminders, logs every review and assignment, and surfaces gaps for correction-ensuring ongoing compliance, not just periodic audit readiness. Regulators, buyers, and your leadership can trust that resilience is not a snapshot, but a living system.


What are the concrete penalties and transition risks if you delay NIS 2 adoption-and how can you mitigate them?

  • Financial: NIS 2 allows for fines up to €10 million or 2% of worldwide turnover for lapses in evidence, reporting, or supply chain control.
  • Director/C-suite: Ongoing non-compliance risks disqualification and direct personal liability for your leadership team.
  • Contract loss: Failure to comply shuts the door on major bids in government, infrastructure, and regulated sectors.
  • Reputational damage: Public breach notification and repeated audit failures can crater partner, regulator, and buyer trust.

Mitigation strategy: Run Article 15 and NIS 2-compliant evidence systems in parallel during transition. Use automated mapping, clear owner assignment, and workflow tracking to plug evidence and assignment gaps-archiving new records as soon as they exist. Schedule internal workshops and migrations while enforcement windows are still open, so continuous compliance becomes a growth lever, not a race to patch holes under crisis.


What are your very first moves to secure NIS 2 compliance momentum-starting now?

  • Load all Article 15 records and controls into a live, role-mapped compliance platform.
  • Assign every policy, supplier obligation, incident log, and review cycle to a visible owner-resolve undefined assignments right away.
  • Set up automated reminders, escalation, and audit log exports; convene board or cross-functional review as a regular agenda.
  • Train every functional owner and team leader-clarify their role, set up dashboards for their domain.
  • Run a migration drill; secure ongoing platform support to keep your audit, evidence, and ownership KPIs live.

Move with intent, not urgency-early compliance leadership turns regulatory change into lasting business advantage.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.