darxai: engineering, AI, and cybersecurity darxai
Back to blog
NIS2 for SMBs: a 90-day plan to start without freezing operations

Cybersecurity 2 min read

NIS2 for SMBs: a 90-day plan to start without freezing operations

A practical guide to prioritize NIS2 measures in an SMB: scope, evidence, owners, risks, and the first technical controls.

In this article +

NIS2 is not solved by buying a tool. For an SMB, real progress starts when the team knows which assets are critical, who owns them, and which evidence can be shown after an incident or audit.

This guide is not legal advice. It turns a broad obligation into an initial technical plan that a small team can execute without freezing the business.

Short answer

An SMB should start NIS2 with three deliverables: an asset inventory, a risk register, and a prioritized control plan. Then it should close basic controls around identity, backups, patching, incident response, and supplier management.

Initial prioritization

WeekGoalUseful evidenceRisk reduced
1-2Define scope and critical assetsInventory of systems, domains, applications, and ownersNot knowing what to protect
3-4Assess the main risksRisk matrix with impact, probability, and ownerPrioritizing by intuition
5-6Review identity and accessPrivileged users, MFA, joiners and leaversAccount compromise
7-8Validate backups and recoveryDocumented restore testLong operational outage
9-10Review critical suppliersList of third parties and processed dataInherited third-party risk
11-12Simulate an incidentRunbook, owners, and response timesImprovisation during a crisis
flowchart TD
  A[Asset inventory] --> B[Risk map]
  B --> C[Priority controls]
  C --> D[Remediation plan]
  D --> E[Evidence test]
  E --> F[Monthly review]
  F --> B

Controls that usually pay back first

ControlWhy it mattersPragmatic implementation
MFA on critical accountsReduces unauthorized access from leaked credentialsStart with email, admins, VPN, and cloud panels
Tested backupsAn untested backup is an assumptionRun a partial restore every quarter
Patch managementLowers exposure to known vulnerabilitiesMonthly windows and justified exceptions
Supplier registerNIS2 looks at the supply chainClassify third parties by criticality and data handled
Incident runbookPrevents slow decisions during a crisisOne-page document with roles, contacts, and steps

The common mistake

The common mistake is starting with long documents before knowing which systems support the operation. Documentation matters, but it must come from technical reality: assets, data, permissions, logs, backups, and contracts.

A good first diagnosis answers:

  1. Which systems cannot be down for more than one day.
  2. Which accounts could cause the most damage if compromised.
  3. Which suppliers have access to data or infrastructure.
  4. Which evidence exists today and which evidence is missing.
  5. Which measures reduce the most risk with the least disruption.

Progress indicators

IndicatorGoodBad
Inventoried assetsOwner and criticality definedTechnical list with no owner
RisksPrioritized by operational impactEverything has the same priority
EvidenceScreenshots, logs, tests, and datesClaims without proof
IncidentsRoles and timing defined”Call IT”
SuppliersContracts and access reviewedNobody knows who can access what

Working sources

  • Google Search Central recommends useful, original content with demonstrable experience. This article avoids promising a magic checklist and focuses on verifiable operational decisions.
  • Security practices must be adapted to each company’s sector, size, systems, and concrete obligations.

Next step

Apply cybersecurity and compliance to your company?

We assess, harden, and monitor systems, applications, and processes to reduce risk and support compliance with ENS, NIS2, DORA, and GDPR.