NIS 2 Incident Reporting Requirements: 24h, 72h, and 1-Month Deadlines Explained
NIS 2 introduces one of the most demanding incident reporting frameworks in cybersecurity regulation. Organizations must issue an early warning within 24 hours, a detailed notification within 72 hours, and a comprehensive final report within one month of becoming aware of a significant incident. Missing these deadlines can result in penalties on top of the incident itself. This guide breaks down each reporting phase, what constitutes a significant incident, and how to build an incident reporting process that meets NIS 2 requirements.
Table of Contents
What Constitutes a Significant Incident Under NIS 2
- Significant incidents must cause or be capable of causing severe operational disruption or financial loss
- Classification considers user impact, duration, geographic spread, and disruption extent
- Potential threats that could cause significant harm may also trigger reporting
- Organizations should err on the side of reporting when significance is uncertain
- Internal criteria for significance classification must be documented and consistently applied
Phase 1: Early Warning Within 24 Hours
- Early warning must be submitted within 24 hours of becoming aware of a significant incident
- Must indicate if the incident is suspected malicious and if it could have cross-border impact
- The early warning is intentionally lightweight — full investigation is not required at this stage
- Pre-drafted templates and 24/7 authorized reporters are essential for meeting the deadline
- The clock starts at awareness, not occurrence, but organizations cannot neglect detection
Phase 2: Incident Notification Within 72 Hours
- Incident notification must be submitted within 72 hours of awareness
- Must include initial severity assessment, indicators of compromise, and mitigation measures
- Full root cause analysis is not required at this stage
- If the incident is ongoing, describe current state and expected resolution timeline
- Criminal incidents should also be reported to designated law enforcement authorities
Phase 3: Final Report Within One Month
- Final report due within one month of the incident notification submission
- If the incident is ongoing, submit a progress report at one month and final report after resolution
- Must include detailed description, root cause, mitigation measures, and cross-border impact
- Should include incident timeline, technical details, impact assessment, and lessons learned
- The final report serves as the definitive record and may inform regulatory policy development
Building an NIS 2-Compliant Reporting Process
- Establish 24/7 incident detection with internal escalation targets well within NIS 2 deadlines
- Create pre-populated report templates for each of the three reporting phases
- Designate primary and backup reporters with current authority contact information
- Conduct tabletop exercises at least twice annually simulating the full reporting cycle
- Integrate reporting into incident response so evidence collection happens alongside remediation
Coordination with Other Reporting Obligations
- Map all applicable reporting obligations across NIS 2, GDPR, DORA, and sector regulations
- Design processes that satisfy multiple reporting frameworks from a single incident record
- A single incident may require reports to CSIRT, DPA, sector regulators, and law enforcement
- Consistent incident records prevent contradictions across multiple regulatory reports
- Monitor member state developments for potential single reporting portal availability
Key Takeaways
- NIS 2 incident reporting follows a three-phase timeline: 24-hour early warning, 72-hour notification, and one-month final report
- Significant incidents are those causing or capable of causing severe operational disruption or financial loss
- Pre-built templates, designated reporters, and regular tabletop exercises are essential for meeting deadlines
- The 24-hour clock starts at awareness, not incident occurrence, but detection cannot be neglected
- Organizations must coordinate NIS 2 reporting with GDPR, DORA, and sector-specific obligations
Frequently Asked Questions
What happens if I miss the 24-hour early warning deadline?
Missing NIS 2 reporting deadlines can result in administrative fines and other enforcement measures. Competent authorities consider the severity and circumstances when determining penalties. Even if you miss the 24-hour deadline, submit the early warning as soon as possible — late reporting is better than no reporting, and demonstrating good faith efforts can mitigate penalties.
Do I report to my national CSIRT or competent authority?
This depends on how your member state has transposed NIS 2. Some member states designate the CSIRT as the primary recipient, others designate sector-specific competent authorities, and some establish a single reporting point. Check your national transposition law for the correct reporting channel. In many cases, ENISA provides a directory of national reporting contacts.
What if I am not sure whether an incident is significant?
When in doubt, report. The early warning is intentionally lightweight, and submitting an early warning for an incident that ultimately proves less severe carries minimal regulatory risk. Failing to report a significant incident, however, can result in substantial penalties. Your internal classification criteria should include a presumption of significance for incidents affecting critical services.
Can I submit combined reports for NIS 2 and GDPR?
Some member states are working toward single reporting portals that accept combined notifications. However, NIS 2 and GDPR reports go to different authorities (CSIRT/competent authority versus Data Protection Authority) and have different requirements. For now, organizations should prepare separate reports but use a single internal incident record to ensure consistency across submissions.
How should I handle cross-border incidents?
If a significant incident has cross-border impact, you must indicate this in the early warning. The national CSIRT will coordinate with CSIRTs in affected member states through the CSIRTs Network. You are required to report to the authorities in the member state where your main establishment is located (or where your representative is designated for non-EU entities).
Does the one-month final report deadline extend if the incident is still ongoing?
Yes. If the incident is still being handled at the one-month mark, you must submit a progress report at that time and then submit a final report within one month after the incident handling is complete. This prevents organizations from being forced to submit incomplete final reports for complex, long-running incidents.
Generate NIS 2 Directive policies automatically
PoliWriter creates all the policies you need for NIS 2 Directive compliance, customized to your organization. AI-powered, audit-ready, hours not months.
Get Started Free