Description
The ‘NIS 2 Directive’, or simply ‘NIS2’, is a European Union directive that specifies the cybersecurity requirements to be implemented by EU companies considered to be critical infrastructure
Ensure your compliance with the European NIS2 Directive with our NIS2 Documentation Kit, a complete solution for creating the required document system.
Included are:
_ 35 essential procedures, policies and forms to meet the basic obligations of the NIS2 directive quickly and easily
_ NIS 2 Minimum Requirements Compliance Checklist consisting of 51 assessment points (pdf format) – _Extract_Check list NIS 2
_ Implementation plan for compliance with EU Directive NIS 2, pdf format
_ Supplier/third party information security management check list (Excel format, 30 points supplier information security assessment)
_ NIS 2 implementation guide in ISO 27001 certified and non-certified companies
EXTRACT_NIS 2 IMPLEMENTATION GUIDE .pdf
_ Excel application KPI x NIS 2 – contains 9 KPIs (with user guide) to correctly apply and manage the NIS 2 Directive
_ Software AR 27001 – Asset Risk Analysis Software according to ISO 27001 (commercial value 397 Euro i.e.), to be used as support to perform the risk analysis required by the NIS2 Directive
Software functions
_ creation of asset inventory
_ risk analysis and automatic calculation of the risk level of each threat for each asset
_ calculation of the impact level of the risks on the assets analysed
_ export in pdf and print the following reports:
1) Risk assessment report
2) Report of unacceptable risk treatment plan
3) Impact assessment report
Minimum requirements
Windows 7, 8, 10 and higher
Licence for 1 pc
Support and updates not included
List of contents (36 files in MS Word format)
Examples
6_Risk_Management_Policy_qrt_21_2_A en-GB
8_Cybersecurity_Incident_Management_Procedure_NIS2 en-GB
| 1_Methodology of risk management according to the NIS2 Directive.docx |
| 1_Proc_ Approval of cybersecurity risk management measures and development of the Risk Treatment Plan.docx |
| 1_Risk_Treatment_Plan.xlsx |
| 10_Backup_Policy_Art_21_2_C en-GB.docx |
| 11_Disaster_Recovery_Plan_NIS2_art_21-2_c en-GB.docx |
| 12_Crisis Management Plan Article 21(2)(Cen-GB.docx |
| 13_Declaration of Confidentiality_Art_21_2_D en-GB.docx |
| 13_Security Clauses for Suppliers and Partners.docx |
| 13_Security Policy for Suppliers_Article 21(2)(D).docx |
| 14_Methodology for Assessing the Effectiveness of Cybersecurity Risk Management Measures_art_21_2_e en-GB.docx |
| 15_Internal Audit Procedure_Art_21_2_f en-GB.docx |
| 15_Internal_Audit_Report_Art_21_2_F en-GB.docx |
| 15_Methodology for Assessing the Effectiveness of Cybersecurity Risk Management Measures_Art_21_2-F en-GB.docx |
| 15_Top Management Review Procedure_Art_21_2_F en-GB.docx |
| 16_Cybersecurity_Policy_Art_21_2_g en-GB.docx |
| 17_Training and Awareness Raising Plan_Art_21_2_G en-GB.docx |
| 18_Policy on the Use of Encryption_Art_21_2_H en-GB.docx |
| 19_HR_Security_Policy_Art_21_2_i en-GB.docx |
| 2_Internal_Audit_Report_NIS2 en-GB.docx |
| 2_Management_Review_Minutes_NIS2 en-GB.docx |
| 2_Measurement_Report_NIS2 en-GB.docx |
| 20_Access Control Policy_Art_21_2_i en-GB.docx |
| 21_Asset Management Policy_Art_21_2_i en-GB.docx |
| 22_Authentication Policy_Art_21_2_j en-GB.docx |
| 23_Information Transfer Policy_Art_21_2_j en-GB.docx |
| 23_Secure Communication Policy for Secure Voice, Video and Text Communications_Art_21_2_j en-GB.docx |
| 24_Corrective Action Form_NIS2 en-GB.docx |
| 24_Procedure for Corrective Action_Art_21_4 en-GB.docx |
| 3_Training_and_Awareness_Plan_NIS2 en-GB.docx |
| 4_Risk_Treatment_Plan_NIS2 en-GB.docx |
| 4_Risk_Treatment_Table_NIS2 en-GB.docx |
| 6_Risk_Management_Policy_qrt_21_2_A en-GB.docx |
| 7_Information_System_Security_Policy_Art_21_2-A en-GB.docx |
| 8_Cybersecurity_Incident_Log_NIS2 en-GB.docx |
| 8_Cybersecurity_Incident_Management_Procedure_NIS2 en-GB.docx |
| 9_Business Continuity Plan _Art21_2_C en-GB.docx |
All documents are provided in MS Word format, easily editable to suit the specific needs of your organisation. You will be ready to structure your document system quickly and without complications, saving valuable time and ensuring compliance.
As it is a generic template, it requires customisation of the content to adapt it to the realities where it is applied, with the support of lawyers and ICT technicians.
Main advantages:
- Ready to use: Download documents immediately and start working.
- Fully customisable: Adapt each document to your business reality.
- Time-saving: Avoid the hassle of creating complex documentation from scratch.
- Compliance : Each document is designed to meet the requirements of the NIS2 directive.
How does it work?
- Purchase the NIS2 Documentation Kit.
- Immediately download the files in MS Word format.
- Customise the documents according to your business needs.
- Implement the NIS2-compliant document system.
Don’t wait any longer! Put your company on the right path to compliance with the NIS2 Documentation Kit, available for immediate download after payment.
Technical specifications:
- File format: MS Word (.docx) . MS Excel (.xlxs)
- Compatibility: Microsoft Word / Excel 2010 or later versions
- Download: Immediate, available after payment









Reviews
There are no reviews yet.