NIS2

Access Control under NIS2: Who has access to what?

NIS2 requires robust access control. Learn the principles, access review process, and how to avoid common mistakes.

  1. 80%
    of data breaches involve stolen or weak credentials
    Verizon DBIR
  2. Access
    Access control is an explicit requirement in NIS2 Article 21
    NIS2 Directive
  3. Identity
    Identity management is #1 CISO priority 2026
    Evanta Survey

Identity is the new perimeter

With hybrid work, cloud services and API integrations, the traditional network perimeter has dissolved. Today, identity and access control is the most important line of defence.

NIS2 recognises this by explicitly requiring control over access to networks and systems.

The fundamental question: Can you today list exactly who has access to your critical systems and why they have that access?

NIS2 requirements for access control

Article 21.2j — Human resources security, access control procedures and asset management:

Organisations shall take appropriate measures for:

  • Control of access to network and information systems
  • Asset management
  • Human resources security and awareness training

In practice:

  • Document who has access to what
  • Ensure permissions are justified
  • Review permissions regularly
  • Remove permissions when roles change/terminate
  • Implement strong authentication

Fundamental principles

Least privilege

Grant only necessary permissions. Start with zero and add what's needed, not the other way around.

Need-to-know

Access to information only for those who need it for their job duties.

Separation of duties

Critical processes require multiple people. No one should be able to act alone in sensitive processes.

Defence in depth

Multiple layers of controls. If one layer fails, the next one is there.

The access review process

  1. Inventory permissions Collect data on who has access to which systems. Include user accounts, service accounts, API keys and external users.
  2. Identify anomalies Compare actual permissions against roles and responsibilities. Do users have more access than they need? Are there accounts for terminated employees?
  3. Decision: keep or remove For each permission: is it justified? If yes, document why. If no, remove it.
  4. Implement changes Remove unjustified permissions. Update access documentation. Communicate changes.
  5. Document and follow up Save decisions and justifications. Plan the next review. Report status to management.

Frequency for access reviews

CategoryFrequencyExamples
Privileged accountsQuarterlyAdministrators, root, service accounts with high access
Critical systemsQuarterlyFinancial systems, customer data, production
Sensitive dataSemi-annuallyPersonal data, trade secrets
Other systemsAnnuallySupport systems, internal tools
Upon changeImmediatelyRole changes, termination, organisational changes

Common mistakes

Accumulated permissions

Users change roles but keep old permissions. After a few years, they have more access than the CEO.

Shared accounts

The "Admin" account everyone knows about. No traceability, no accountability.

No offboarding

Accounts for terminated employees that are never closed. Potential backdoor.

Service accounts with passwords

Service accounts with static passwords that are never changed. Compromised forever.

Over-privileging

"Give admin rights and it'll work" — the standard response that creates risks.

No MFA

Critical systems without multi-factor authentication. Stolen passwords are enough for breach.

MFA everywhere

Where MFA should be implemented:

  • All external access points (VPN, RDP, webmail)
  • Critical systems and applications
  • Privileged accounts (administrators)
  • Cloud services and SaaS
  • Console access to servers and network equipment

Not just password + SMS: SMS is better than nothing, but weaker than:

  • Authenticator apps (TOTP)
  • Hardware keys (FIDO2/WebAuthn)
  • Push notifications with number matching

Automation

Provisioning

  • Automate assignment of standard permissions based on role
  • Integration between HR systems and identity management
  • Reduce manual errors and delays

Deprovisioning

  • Automatic deactivation upon employment termination
  • Integration with HR termination process
  • No forgotten accounts

Access certification

  • Automated reminders for access reviews
  • Workflow for approval/rejection
  • Traceability and documentation

Checklist

Fundamentals:

  • Inventory of all user accounts
  • Documentation of service accounts
  • MFA on critical systems
  • Process for onboarding/offboarding

Access review:

  • Schedule for regular reviews
  • Process to identify anomalies
  • Documentation of decisions
  • Reporting to management

Automation:

  • Integration with HR systems
  • Automated provisioning
  • Automated deprovisioning
  • Workflow for access requests

Access control is one of several requirement areas in NIS2. See our NIS2 framework overview for a complete picture of all requirements, or use our NIS2 classification tool to check if you are in scope.

How Securapilot can help

Securapilot supports access control and access reviews:

  • Risk management — Identify risks linked to access
  • Documentation — Policies and procedures
  • Follow-up — Track reviews and decisions
  • Reporting — Status for management
  • Suppliers — Control over external access

Book a demo and see how we can support your access control.


Frequently asked questions

What is least privilege?

The principle of giving users only the permissions required to perform their job duties, nothing more. Reduces damage if an account is compromised.

How often should access reviews be conducted?

Depends on risk. Critical systems and privileged accounts: quarterly or more frequently. Other systems: semi-annually or annually. All changes should be documented.

What is separation of duties?

Distributing critical tasks among multiple people so no single individual can perform a malicious action. Example: those who approve payments should not be able to register them.

Is MFA mandatory under NIS2?

NIS2 doesn't explicitly mention MFA, but requires appropriate technical measures for access control. In practice, MFA is a fundamental control that is expected.


#access control#NIS2#access review#identity#permissions#Zero Trust

We use anonymous statistics without cookies to improve the website. Read more