Skip to content

Are You Truly in Scope for NIS 2-and What Does That Mean for Your Manufacturing Operation?

For manufacturers in the NACE C26–C30 codes (electronics, machinery, vehicles, battery, and advanced equipment producers), NIS 2 compliance is an operational reality-if not today, then within your next major contract cycle. The threshold isn’t just company size or turnover (≥50 staff, €10m+ revenue); it’s the sector’s role in Europe’s critical economic and societal infrastructure. If your entity or group touches any regulated category-semiconductors, critical vehicle systems, batteries, robotics, or industrial automation-the “important entity” bar likely applies with full effect. This brings oversight obligations, supply chain due diligence, detailed incident reporting, and extends beyond classic “cyber” events to include any operational disruption with a digital origin.

How Do Group Structures, Subsidiaries, or Pan-European Supply Chains Shape Your Responsibilities?

Regulators care about the totality of your group, not just what your local office or individual subsidiary reports. Aggregated headcount, revenue, and group-wide activities are tested, targeting any organisation that might attempt to “carve out” bits to fall below the threshold. If you operate across multiple EU member states or within a global parent, expect regulatory expectations to default to the highest standard across the group. Suppliers and partner choices pull risk into your zone with equal strength: ENISA notes that no amount of paperwork will shield you from fault if an in-scope supplier fails or cuts corners.

Why Fast-Track Readiness Now?

Speed isn’t only about “box ticking.” Buyers in automotive, energy, and electronics procurement increasingly demand NIS 2-ready evidence before signing you on, prioritising pre-qualified, confidently compliant partners. This becomes a commercial accelerator, not only a risk mitigator.

ISO 27001/NIS 2 Bridge Table

Default Description

Book a demo


Why the Cyber Threat Landscape Is Escalating for Manufacturing-and Why a Clean Record Isn’t Enough

Unlike less integrated sectors, manufacturers confront adversaries determined to disrupt entire supply chains, extort high-value victims, or leverage compromised systems for larger geopolitical gains. Legacy OT environments, unpatched automation, orphaned developer laptops, and global supplier integrations create unknown terrain for both defenders and attackers. The reality: attackers use advanced reconnaissance, living-off-the-land tactics, and patience-often lurking undetected for months before triggering a breach.

Why Is Third-Party Risk No Longer “Their Problem”?

A compromised supplier can now force your downtime, regulatory investigation, or even mandatory production stops. NIS 2 demands you prove not only that you follow best practise internally, but that critical suppliers and service providers do too-with written records, audit trails, and escalation paths. Failure in one plant or partner can rapidly propagate, carrying legal, financial, and reputational fallout across markets and borders.

Why Are Brownfield, Mixed-Tech Plants in the Crosshairs?

Older factories, “tech stack soup,” and rushed digital upgrades increase exposure: incompatible patching, hard-to-inventory devices, staff developing their own “workarounds,” and high reliance on human procedures. These weaknesses aren’t a death sentence if they’re managed, staged, and escalated with proof. NIS 2 will accept incremental improvement-so long as every risk has a documented owner and closure plan.

Bottom line: Promise less comfort from a blank incident record. What counts is live identification, documentation, and management of risk paths.

Audit-Ready Traceability Table

Trigger Risk Update Control/SoA Link Evidence Logged
Supplier breach Add to risk register 5.19 Incident notice, contract review
Unpatched firmware OT vulnerability update 8.8 Patch tracker, risk justification
Suspected phishing Internal incident review 5.25 SIEM alert, action log
Brownfield IP leak Asset inventory/categor. 8.1, 8.22 Map, owner, closure deadline

True resilience is less about the absence of headlines-more about visible, real-time management, and live-recorded, staged risk reduction.




illustrations desk stack

Centralise risk, incidents, suppliers, and evidence in one clean platform.




What Has Changed in NIS 2 Risk Management and Incident Response for Manufacturing?

Static compliance is obsolete. NIS 2 requires manufacturers to maintain living, role-assigned, and dynamically documented risk management and incident response systems. Board approval, regular scenario rehearsals, and real-time reporting have replaced end-of-year tick-box reviews. Significant incidents-any event that threatens production, contracts, legal obligations, or safety-must now be notified, in evidence-backed, regulator-accessible form, within 24 or 72 hours.

Key Shifts in Practise

  • Continuous risk register: Updated with every production, supplier, or tech change. The register must reflect current and emerging risks, underpinned by board approval and regular review.
  • Living incident playbooks: No more generic crisis binders. Procedures must track actual play, staff rehearsals, drills, and lessons learned-timestamped and retrievable for audit.
  • Documented roles for notification/escalation: Cover for holidays, night shifts, and staff turnover is mandatory.

Example: Traceability Table for Asset/Event Notification

Asset/Event Owner Role Notification Duty Escalation Path Evidence Logged
SCADA OT downtime Plant Manager 24-hr to CSIRT Ops > Board > CSIRT Outage log, notif.
Supplier breach Vendor Lead Prompt review Legal > CISO Notification email
IT ransomware Security Ops IT escalation CISO > Board SIEM record, ticket
Severe incident CISO 72-hr to Regulator Board > Regulator Incident report

What Is “Enough” for Audit-Ready Evidence?

  • Risk register shows when, why, and by whom each change was made.
  • Live-tested incident playbook (last exercise, scenario, participants).
  • Audit-traceable logs for all incidents (including attempts), not just successful attacks.

Note: Attempted incidents are not formal notifications but must be logged, classified, and reviewed. Documentation is as vital as incident response.




Bridging Legacy OT and Modern IT for Real NIS 2 Compliance: Asset Inventory and Gap Management

Perfection is not the bar-credible, staged, and documented improvement is. Manufacturers can comply even with legacy assets and complex brownfield operations, so long as every critical asset is mapped, every exception is justified, and ownership for closure is assigned.

Digital Inventory: Needed, Not Impractical

A perfect database is not needed, but you must maintain a regularly updated critical asset map and risk register, annotating what cannot be digitised and why. Gap logs, paper controls, and staged upgrades are allowed for slow-to-modernise plants.

OT/IT Asset–Control Mapping Table

Asset Risk Minimum Action Annex A Ref
PLC Malware/lock Network zone, physical isolation 8.20,8.22
File Server Ransomware/IP MFA/logging 8.5, 7.10
Air-gap SCADA Insider threat Access logs, key control 7.3, 7.4
VPN Gateway Supply chain Supplier ISO check, MFA 5.19,8.31

Can Physical Controls Stand in for Digital Gaps?

Until digital upgrades complete, physical controls (locked cabinets, paper visitor logs) are valid-if enforced and recorded. NIS 2 wants visibility, rationale, and improvement progression-not excuses.

Incremental, justified improvement, with built-in closures and accountability, will always outweigh perfect on paper but neglected in practise.




platform dashboard nis 2 crop on mint

Launch with a proven workspace and templates – just tailor, assign, and go.




Why Supply Chain Due Diligence Is Now Operational-And How Much Proof Is Enough?

NIS 2 raises supply chain governance beyond traditional “tick-box” vendor reviews. Now, you must actively track, document, and escalate every critical supplier incident, status change, contract exception, or failed compliance response. Quarterly risk checks are a minimum for critical suppliers. Every instance of failed proof, process change, or incident must be registered, explain new risk exposure, and be linked to assigned owners for action or acceptance.

Supply Chain Due Diligence Trigger Table

Trigger Risk Register Update Control/SoA Link Evidence Logged
Data breach in supplier Risk entry, assessment 5.19, 8.29 Inc. log, notif. email
Failed contract Escalation, re-contract 5.20, 5.21 Minutes, comms
Compliance refusal Risk acceptance/mitigate 2.1,8.2 Board notes, file log
Supplier process change Update risk/categorise 6.1, A5 Risk register
Status upgrade (to NIS 2) Reclassification, notify 5.22, 8.23 Supplier file

Track, assess, and document escalation for every failed check or process change-regulators now expect a living log of these exchanges, with no “audit by memory” gaps.




Which ISO/IEC Standards Map to NIS 2-and How Do You Close Cross-Standard Gaps in Manufacturing?

ISO 27001 and IEC 62443 do much of the heavy lifting-if your control system isn’t just a paper SoA but a digitised, versioned, and actively updated framework. The new EU sector guidance calls for continuous Statement of Applicability (SoA) updates: live mapping, role assignment, and all gaps tracked in real time.

ISO/NIS 2 Bridge Table (Compact)

NIS 2 Article What You Must Show ISO/Annex A Ref
Article 21 Risk register, update log, evidence 6.1, A5.7, A8.2
Article 23 Set roles, notify, track response A5.24, A5.26
Supply Chain Prove due diligence trails 5.19–5.21, 8.29
Asset Inventory Map OT/IT, explain legacy gaps 8.9, 8.10, A8.1
Audit/Evidence Test trails, link records to events 9.2, 9.3, A8.15

Traceability Table: Example

Trigger Risk Register Control/SoA Evidence
Supplier incident Yes 5.19 Incident log, board
OT asset not patchable Yes 8.8 Justification, log
Process change in supply Yes 6.1 Risk update, email

Remember: an honest gap with planned closure is preferred by auditors to unsubstantiated claims of “full compliance.”




platform dashboard nis 2 crop on moss

From Articles 20–23 to audit plans – run and prove compliance, end-to-end.




What Does Good-Enough, “Audit-Ready” Evidence Actually Look Like for a Manufacturer Under NIS 2?

Audit readiness is evolving from “well organised files” into a daily habit of evidence logging, role assignment, and version checking. Auditors and regulators now expect to see: living change and risk registers; versioned, retrievable incident and supply chain records; audit trails for every asserted control, approval, and remediation; and accessible, time-stamped logs-digital where possible, but physical is temporarily allowed for legacy assets.

What Satisfies External Review?

  • Risk registers with who/what/when-and why changes were made.
  • Live, version-controlled incident logs and playbooks.
  • “Pull-ready” supporting records: policy packs, training logs, SoA trails.
  • Scheduled and spot-check audit parity: readiness must be continuous.

Audit-ready isn’t a file-it’s a system. Living, cross-referenced, retrievable, and trusted by every role from the plant floor to the board.




Turning Compliance from Overhead Into Asset-How ISMS.online Powers Manufacturing Resilience

For manufacturers tackling fragmented spreadsheets, disjointed incident logs, and stitch-together risk registers, compliance can feel more like a drag than a competitive edge. However, with the right platform-unifying everything from policies and controls to asset mapping, risk register management, incident triage, and supply chain diligence-compliance shifts from a costly, reactive afterthought to a catalyst for growth.

With ISMS.online, manufacturers routinely cut audit preparation time by half, eliminate evidence silos, and build trust with buyers and regulators alike. Automated reminders, policy engagement, versioned evidence, and supplier tracking converge in a single, live operational workspace. This accelerates supply chain onboarding, shortens risk escalation cycles, and means your audit readiness is proven-not just promised-every day.

Identity CTA:

Set your team up to lead - not lag - in the new manufacturing compliance era: audit-ready, board-credible, and primed to win as NIS 2 cements its grip on the sector.

Book a demo



Frequently Asked Questions

Who falls in-scope as an “important entity” under NIS 2 for manufacturing-and does NACE C26–C30 mean you’re always included?

Manufacturers are classified as an “important entity” under NIS 2 if their operations or headquarters fall within NACE codes C26–C30-which covers electronics, electrical equipment, machinery, vehicles, and transport equipment-and the group meets either of these criteria: at least 50 employees or annual turnover/exceeds €10 million. What changes under NIS 2: the test occurs at the group level across all EU subsidiaries, not just standalone legal entities. Even if each individual plant falls below the threshold, a multinational group with multiple small subs may tip into scope once aggregated. Your supply chain positioning matters just as much-if your operation provides components to regulated “essential entities” (think energy, health, or finance), contracts or RFPs may demand NIS 2 compliance even if your regulator hasn’t flagged you yet [EU Digital Strategy – NIS 2].

Every contract, supplier expansion, or acquisition can alter your compliance boundary. Treat it as flexible, not fixed.

Quick inclusion table for manufacturing

Situation In scope? Rationale
Standalone plant, over 50 staff Yes NIS 2 direct, by size/turnover
Grouped subs, each under 50, total >50 Yes NIS 2 applies at EU group aggregate level
Major supplier to essential sector Yes Critical supply function triggers inclusion
Non-EU parent, EU subsidiary Yes Jurisdiction applies to EU-located operations

If your group structure or customer base is dynamic, you should continually recheck your scope-regulators expect you to do so at least annually, or at every major business change.


Which cyber threats are manufacturers-especially brownfield and supply-driven-most exposed to under NIS 2?

Manufacturing is a top target for advanced threat actors, with brownfield sites (those blending legacy machinery with new digital OT/IT layers) and complex supply chains magnifying the risk. Key exposures include:

  • Outdated ICS/PLC vulnerabilities: Unpatchable or unsupported control systems are frequent ransomware or remote exploit entry points, with real-world cases causing multi-day plant closures and production loss.
  • Supply chain attacks: Compromised remote support tools, vendor laptops infecting shopfloor networks, and infected software updates can propagate malware-your supplier’s breach may quickly become your own regulatory incident.
  • Ghost assets and poor visibility: Old computers or forgotten devices can offer undetected backdoors, especially when asset inventories lag behind reality.
  • People risk-social engineering: Maintenance staff, contractors, or agency workers with rotating access can be phished, offering attackers lateral entry into the production environment.

Adversaries exploit the least-secure link; sometimes that's not your firewall, but a supplier laptop or overlooked device in the corner of the plant.

Incidents affecting your suppliers or customers, if they disrupt your continuity or data flow, now also count as your compliance problem under NIS 2 [].


What risk, incident response, and board reporting evidence must C26–C30 manufacturers maintain for NIS 2?

Risk management under NIS 2 is a living, not static, obligation. Your risk register is no longer an annual artefact: it must be updated when incidents happen, assets change, or significant supplier events occur. For each risk, document:

  • Assigned owner (by name/role-not just “IT” or “compliance”)
  • Date of last review/version
  • Documented decision or closure (not just “closed,” but why/how)
  • Stored record of each escalation and decision point (audit trail of notifications)
  • Evidence of periodic board review and sign-off

Incident response plans now require concrete evidence: notification playbooks with 24-hour and 72-hour escalation timelines (Article 23), as well as logs that demonstrate the actual flow of an incident-from local escalation (plant to CISO), to board/advisor, to regulator if needed.

Example: Evidence required for board and regulator review

Trigger Owner Escalation Path Evidence Examples
Supplier incident Vendor manager CISO → Regulator Risk register, comms log
Plant outage Supv/manager CSIRT → Board SIEM alert, shift log
Ransomware event Security/IT lead CISO → Regulator/Board Incident playbook, rota

Always maintain real-time or near-real-time documentation. Static, annual filings are a regulatory risk [].


How do manufacturers with legacy OT reconcile NIS 2 compliance with practical realities (and regulator scrutiny)?

Regulators recognise legacy OT can’t be patched overnight. What auditors want: a credible, phased roadmap with honest exception handling and “stepping-stone” controls. Prove you:

  • Maintain an up-to-date asset register: (including partial inventory for legacy)
  • Implement compensating controls: where patching isn’t feasible-manual network segmentation, badge logs, access keys, scheduled checks
  • Document written exceptions: For every unmitigated risk, detail why, for how long, and the planned closure/remediation date, with sign-off from CISO or board
  • Review controls regularly: Quarterly/after material change-never just annually

A visible, versioned improvement plan outweighs promises of instant fixes. Transparency, not perfection, satisfies the audit.

By documenting intent and exceptions, and aligning your improvement roadmap with budget and board review, you retain control of your compliance journey [].


What supply chain due diligence and escalation records must manufacturers produce for a NIS 2 audit?

NIS 2 makes supplier risk a real-time, versioned data set-not a “tick-box” on onboarding forms. For every critical supplier, maintain:

  • Signed cyber-security and incident notification clauses in contracts (with tracked negotiation if not accepted)
  • Chain of custody for each contractual change, risk acceptance, or escalation (email, digital log, board record)
  • Ongoing communications in the risk register: every reminder, missed deadline, or supplier-provided justification
  • Documentation of board-level approval for any risk “accepted” due to lack of supplier cooperation
Supplier Issue Action (Who/What) Update to Risk File Audit Evidence
Contract clause refusal Board/legal sign-off Yes Board note, email log
Missed certification Procurement/CISO escalation Yes Email, risk register
Ongoing issues/incidents Risk board review, action plan Yes Audit log, plan copy

Every escalation or “risk accepted” decision must be owned-compliance here is cumulative and ongoing [].


Where do NIS 2, ISO 27001, and IEC 62443 requirements overlap-and where do manufacturing SoAs (Statements of Applicability) fail most at audit?

All three frameworks require risk management, asset registers, assigned controls, and supplier due diligence. What separates NIS 2: every control must be “live-linked”-that is, linked to a current risk, explicit owner, version/review cycle, and matched to proof of incidents handled and lessons applied. Typical Statement of Applicability (SoA) failures in audits:

  • No owner or last review date for given controls
  • Controls not mapped to supply chain risks/events
  • Stale evidence: “Policy in place” but no update since last audit
  • Absence of incident response playbooks with tested notification paths

Compact ISO 27001/NIS 2 Bridge Table

NIS 2 Expectation Operationalisation Action ISO 27001 / Annex A Ref
Living risk register Dynamic updates, board review 6.1, A5.7
Role-based escalation Playbooks, staff coverage logs A5.24, A5.26
Supplier due diligence Versioned contracts, risk logs 5.19, 5.21, 8.29
Board-ready dashboards Real-time evidence reporting 9.3, A5.35, A5.36

The most audit-ready manufacturers show live, digital mapping of who owns each risk/control and real-world evidence of review, escalation, and closure.


What defines “audit-ready evidence” for manufacturing, and how can you automate and centralise it for NIS 2?

Audit-ready evidence means every risk, asset, supply chain event, and incident is centralised, versioned, assigned an owner, and instantly retrievable for the board, auditors, or regulators. In practise, this looks like:

  • Digital, dynamic registers: risks, assets, supplier compliance, incidents
  • Board and management review dashboard, with owner assignment and last update logged
  • Automated reminders for every policy, contract, or escalation step
  • Time-stamped logs for every risk update or incident action

When executed via a platform such as ISMS.online, each action-risk register update, contract escalation, incident assignment-is version-controlled, role-linked, and flagged for management attention when overdue. This transforms compliance from a last-minute deadline stressor into a visible board-level strength [].

A compliance system that creates resilience capital: every digital action is a visible, reviewable signal to auditors, partners, and regulators.

Traceability workflow table (example)

Trigger Risk update Control/SoA Ref Evidence logged
Supplier breach Registration, board note A5.21 Contract, comms log
Plant outage Log update, root cause A5.26, 8.13 SIEM log, incident report
Staff turnover Role update 5.2 Roster, shift logs

How does using a unified platform like ISMS.online move manufacturing firms from compliance burden to competitive advantage under NIS 2?

Centralising your risk, asset, incident, and supplier management in a single, digitally linked environment turns NIS 2 compliance into an operational asset, not a check-box chore. Every real-world action-risk review, contract escalation, policy update, or incident management-gets time-stamped, owner-assigned, and versioned, providing leadership, regulators, and customers with immediate proof and oversight. Automating reminders, owner-tracking, and reporting ensures nothing slips through the cracks and audit readiness becomes routine.

Strategic advantages:

  • On-demand, versioned evidence for board/regulator, cutting audit fatigue and speed-to-evidence from weeks to minutes.
  • Real-time risk gap and escalation reporting: issues are visible and acted on, not buried.
  • Each compliance cycle grows your “resilience capital”-making you the benchmark factory for customers and partners.

In a world of rising regulatory expectations, manufacturers who can show living, owner-assigned, fully-auditable compliance don’t just avoid penalties-they win contracts, build trust, and lead their sector.

Position your manufacturing team as industry leaders. With living risk registers, clear ownership, and end-to-end evidence trails, NIS 2 compliance becomes a mark of your operational strength and partnership value-not a hurdle.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.