NIS2 for SaaS: minimum checklist for 2026
What NIS2 actually demands from a mid-size SaaS: incident reporting, supply-chain, access control, and 3 basic rules we run ourselves.
What NIS2 actually demands from a mid-size SaaS: incident reporting, supply-chain, access control, and 3 basic rules we run ourselves.
Reviewed by:Dezső Mező· Founder · Engineer, DField Solutions· 20 Apr 2026
The NIS2 directive took effect on 17 October 2024, and national laws have since mandated concrete obligations on 'important' and 'essential' organisations. If your SaaS serves EU customers, you're probably 'important'. Our Cybersecurity service covers exactly this readiness work — here's the minimum checklist.
NIS2 mandates: an early-warning within 24 hours, an incident assessment within 72 hours, and a final report within one month. This is runbook work, not 'when-it-happens' work. Write it today.
List critical vendors (AWS, Stripe, SendGrid, …), rank by business risk, and have a DPA + security attestation (SOC2, ISO27001) for every 'important' one.
NIS2 says 'reasonable timeframe'. Practical reading: critical CVE in 48h, high in 7 days, medium in 30 days. Run this as an SLA, not a 'we'll look at it'.
Mandatory security awareness training. Don't stop at click-through; include phishing simulations. You must be able to show the record at audit.
Four of the five items above can be live in 2–3 weeks with your team. The fifth (patch SLA) is a 6-month project. Email us if you want hands-on help.

By
Founder, DField Solutions
I've shipped production products from fintech to creator-tooling — for startups and enterprises, from Budapest to San Francisco.
Keep reading