NIS2

NIS2 Incident Reporting: Complete Timeline Requirements

24 hours, 72 hours, 1 month — NIS2's incident reporting deadlines are strict. Here's everything you need to know to comply.

  1. 24
    hours for early warning after discovery
    NIS2 Directive Article 23
  2. 72
    hours for incident notification with analysis
    NIS2 Directive Article 23
  3. 1
    month for final report with root cause analysis
    NIS2 Directive Article 23

The clock starts ticking upon discovery

When a significant security incident is discovered, the clock starts. NIS2 gives you 24 hours — not 24 working hours, not “next business day”, but 24 actual hours — to send an early warning to your national CSIRT.

This means an incident discovered on Saturday evening requires a report by Sunday evening. Is your organisation prepared for that?

Critical question: Do you have documented contact paths to your national CSIRT that work outside office hours? If the answer is no, that’s the first thing to address.

What is a “significant incident”?

Not all incidents need to be reported. NIS2 focuses on significant incidents — those that have real impact on the service or others.

An incident is considered significant if it:

  • Has caused or is capable of causing severe operational disruption of the service
  • Has caused or is capable of causing considerable material losses for the entity
  • Has affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage

Examples of significant incidents:

  • Ransomware that encrypts production systems
  • Data breach with leakage of personal data
  • DDoS attack making services unavailable to customers
  • Compromised supplier with access to your systems

The timeline: Three reports, three deadlines

  1. Early warning — within 24 hours The first report is a quick notification that something has happened. It doesn't need to be complete — the purpose is to warn. Include: that an incident has occurred, initial assessment of scope, and whether the incident is suspected to be cross-border or affect other EU countries.
  2. Incident notification — within 72 hours Now more substance is expected. Update with assessment of incident severity and impact, description of what happened (as far as you know), and any indicators of compromise (IOCs) that might help others.
  3. Final report — within 1 month The complete analysis. Contains detailed description of the incident, root cause analysis, measures taken and planned, and lessons learned and improvement actions.

Detailed content per report

Early warning (24 hours)

FieldDescriptionMandatory
Time of discoveryWhen the incident was discoveredYes
Type of incidentPreliminary classificationYes
Affected servicesWhich services are affectedYes
Initial scopeEstimated impactYes
Cross-borderSuspected impact in other countriesYes
Contact personWho the CSIRT can contactYes

Incident notification (72 hours)

FieldDescriptionMandatory
Updated statusCurrent situation and developmentYes
SeverityAssessment of severity levelYes
Technical descriptionWhat happened technicallyYes
ImpactNumber affected, service lossYes
IOCsIndicators of compromiseIf available
Measures takenWhat you’ve done so farYes

Final report (1 month)

FieldDescriptionMandatory
Complete timelineChronology from start to finishYes
Root cause analysisUnderlying cause of the incidentYes
Impact (final)Actual impact, those affectedYes
All measures takenComplete listYes
Lessons learnedWhat you learnedYes
Improvement planHow you prevent recurrenceYes

Who do you report to?

National CSIRT

All significant incidents are reported to your designated national CSIRT. They coordinate technical handling and can assist with analysis and recommendations. Each EU Member State has designated national CSIRTs under NIS2.

Supervisory Authority

Depending on your sector, you also report to your sector-specific authority. Energy regulators for energy, transport authorities for transport, European Banking Authority for banking, etc.

Practical: Each Member State is establishing unified reporting channels under NIS2. Stay updated via your national competent authority for current information on how reporting should be conducted.

Common pitfalls to avoid

No on-call preparedness

24 hours applies even on weekends and nights. Without functioning on-call arrangements and clear contact paths, it becomes impossible to meet time requirements when it really matters.

No prepared templates

During an ongoing incident, the last thing you want to do is figure out format and wording. Have ready templates for all three report types ready to fill in.

Unclear responsibility

Who decides to report? Who writes? Who approves? Unclear roles lead to delays. Document the division of responsibilities now.

Forgotten escalation

The report to CSIRT isn't everything. Don't forget internal escalation to management, possible GDPR report to your Data Protection Authority for personal data incidents, and communication with customers.

Checklist: Are you prepared?

Use this checklist to assess your readiness:

Processes and documentation:

  • Clear definition of what constitutes a significant incident
  • Documented incident handling process
  • Escalation procedures and decision paths
  • Templates for all three report types
  • Contact details for CSIRT and supervisory authority

Organisation and resources:

  • On-call arrangements or equivalent for rapid response
  • Designated incident manager with authority
  • Trained personnel who can act
  • Communication channels that work around the clock

Technical capability:

  • Detection capability to discover incidents
  • Logging to investigate what happened
  • Ability to collect indicators of compromise (IOCs)
  • Backup and recovery capability

Practical tips

Build an incident handling exercise

Conduct regular exercises where you simulate a significant incident. Focus on:

  • Can you produce an early warning within 24 hours?
  • Do the contact paths to CSIRT work?
  • Does everyone involved know what to do?

Create templates now

Don’t wait for the incident. Create templates for:

  1. Early warning — Standard form with pre-filled fields
  2. Incident notification — Structure for deeper analysis
  3. Final report — Template for complete documentation

Establish contact paths

  • Register with your national CSIRT if you haven’t already
  • Test the reporting channel before it becomes critical
  • Have backup contact paths (phone, not just email)

Want to know more about NIS2’s other requirements? Read our NIS2 framework overview for a complete picture of the directive, or check if you’re covered by NIS2 with our classification tool.

How Securapilot can help

Securapilot’s incident management module is built with NIS2’s time requirements in mind:

  • Incident classification — Automatic assessment against NIS2’s definition of significant incident
  • Time tracking — Deadline tracking with warnings before they expire
  • Template generation — Automatic generation of reports based on incident data
  • Escalation — Built-in workflows for approval and escalation
  • Documentation — Complete traceability for the final report

Book a demo and see how we can help you be prepared when it really matters.


Frequently asked questions

What constitutes a 'significant incident' under NIS2?

An incident is considered significant if it has caused or is capable of causing severe operational disruption of the service, considerable material losses for the entity, or affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.

Who do I report to?

In the EU, incidents are reported to your designated national CSIRT and to your sector-specific supervisory authority. The exact reporting pathway depends on your sector and Member State. Each Member State has designated national competent authorities under NIS2.

What happens if I miss the 24-hour deadline?

Missing reporting deadlines can lead to sanctions. However, the most important thing is to report as soon as possible, even if the deadline has passed. Not reporting at all is significantly more serious than reporting late.

Must I report incidents at suppliers?

If an incident at a supplier affects your ability to deliver your services, it may become a reportable incident for you. You need agreements and processes that ensure suppliers promptly inform you of incidents that could impact your operations.


#NIS2#incident reporting#cybersecurity#CSIRT#ENISA#compliance

We use anonymous statistics without cookies to improve the website. Read more