Whitepaper on the NIS2 Law

NIS2 Domino Effect: Why Even Small Suppliers Are Now Being Forced into Compliance

Key Takeaways at a Glance
- The domino effect: Companies that fall under NIS2 are legally required to assess their entire supply chain for cybersecurity risks. This means small suppliers are indirectly regulated.
- Serious consequences: If security evidence is insufficient, small suppliers may not face direct government fines, but they may be excluded from supplier networks and lose major customers.
- Specific demands: B2B customers increasingly require multi-factor authentication (MFA), incident response plans, and contractual audit rights.
- Competitive advantage: Companies that can proactively demonstrate security standards such as ISO 27001 shorten their sales cycles and stand out from unprepared competitors.
Introduction
“We are far too small for NIS2.” This is something we often hear from SME suppliers, craft businesses, or specialized service providers. From a legal perspective, this is often true, since the directive usually applies only from 50 employees upward. But the economic reality in B2B business looks very different.
More and more medium-sized companies are losing contracts or being excluded from tenders because they cannot provide evidence of information security. Existing customers suddenly demand audits, and new contracts contain pages of security clauses.
The reason is the so-called NIS2 domino effect. Large, directly regulated companies are legally required to monitor the cybersecurity of their supply chain without gaps. This review affects every partner in the chain, from cloud providers and maintenance service providers to component suppliers. Anyone who fails to meet the requirements puts their ability to remain a supplier at serious risk.
Table of Contents:
What does NIS2 mean for the supply chain?
The NIS2 Directive requires companies in critical and important sectors, such as energy, healthcare, transport, or digital infrastructure, to meet strict cybersecurity standards. One central and often underestimated lever of the directive is mandatory risk management across the entire supply chain.
Companies that fall directly under NIS2 must prove that their suppliers and service providers do not create an entry point for cybercriminals.
For you as a supplier, this means:
- Your IT systems and processes will be systematically reviewed by customers.
- Contracts will be expanded with strict security and reporting obligations.
- In a worst-case scenario, you may be classified as a security risk and removed from the supply chain.
The legal obligation of the “large companies” therefore becomes a practical obligation for the “small companies.”
Whitepaper on the NIS2 Law
The difference: direct obligation vs. indirect market pressure
To avoid expensive wrong investments, it is important to make a clear distinction:
Direct NIS2 obligation applies when your company itself operates in one of the regulated sectors and exceeds the size thresholds, usually from 50 employees or €10 million in revenue. In this case, violations may result in significant government fines and personal liability for management.
Indirect market pressure arises when you fall below the size thresholds but work for major customers that are subject to NIS2. In this case, you do not face government sanctions, but you do face the direct loss of revenue and market share. For most SMEs, this economic pressure is the much bigger and more existential threat.
Why major customers are now scrutinizing their suppliers
Vendor risk management, meaning the review of supplier risks, is not new. However, NIS2 turns it from a voluntary good-practice measure into a strict legal obligation. In practice, SMEs mainly encounter three tools:
- Extensive supplier questionnaires: B2B customers request detailed information, often 50+ questions, about your IT security measures and certifications.
- Strict contract clauses: Contracts contain stricter minimum standards for encryption, patch management, and extremely short response times in an emergency.
- Audit and inspection rights: Customers secure the right to review your security architecture via remote audit or on-site inspection.
Specific requirements: what customers will expect from you
When B2B customers approach you, they usually require a mix of technical and organizational measures:
- Basic technical security: Consistent use of multi-factor authentication (MFA), complete encryption of sensitive data, and documented, timely patch management.
- Emergency preparedness: Tested backup processes that guarantee fast recovery, as well as a basic incident response plan for cyberattacks.
- Organizational requirements: A written IT security policy and regular phishing and security training for your team.
- Contractual obligations: The obligation to report security incidents that could affect the customer extremely quickly, often within 24 to 72 hours.
The competitive advantage of proactive compliance
What may initially sound like annoying bureaucracy can be used as a powerful sales lever. Companies that proactively do their cybersecurity homework secure tangible market advantages:
- Protection of the core business: You remain permanently eligible as a supplier for regulated major customers, while unprepared competitors are filtered out.
- Faster sales cycles: If you can provide standardized security evidence directly during the first contact, this can drastically shorten customer approval processes.
- Positioning as a premium partner: Strong and verifiable security maturity builds trust and often justifies a higher price level compared to low-cost providers.
Practical checklist for suppliers
You do not need to invest huge amounts of budget immediately. Approach the topic in a structured way:
Phase 1: Analysis & Quick Wins
- Review customer structure: Which of your customers fall directly under NIS2 or supply critical sectors themselves?
- Enable MFA: Enforce multi-factor authentication for all business-critical accounts and admin access.
- Test backup routines: Do not only create backups, but also test actual recovery in an emergency.
Phase 2: Organization & Documentation
- Clarify responsibilities: Who in the company takes the lead for IT security in an emergency?
- Create a security policy: Document a simple and understandable IT security policy for all employees.
- Train employees: Conduct regular, short awareness sessions on phishing and social engineering.
- Define reporting channels: Define how and how quickly major customers will be informed in the event of your own security incident.
ISO 27001 as a bridge to NIS2 compliance
For suppliers looking for universal and robust proof, there is hardly any way around ISO 27001.
This international framework for information security management systems (ISMS) covers most of the requirements that NIS2-regulated companies must place on their supply chain. In practice, such a certificate often saves you from having to fill out dozens of individual and time-consuming supplier questionnaires from your customers.
Conclusion
The NIS2 domino effect has arrived in the B2B world. Anyone working for larger corporations can no longer hide behind the argument “We are too small for the law.” In this case, the market regulates itself through contracts.
Do not wait until an important major customer puts pressure on you and terminates the collaboration. Use the time now to build the technical foundations, document processes properly, and use compliance as a strong sales argument.
FAQ
What happens if I ignore my customer’s NIS2 requirements as a supplier?
As a non-regulated SME, you may not face direct government fines. Economically, however, you risk immediate exclusion from new tenders or the termination of existing contracts, since your customers are legally required to replace insecure partners.
Is cyber insurance sufficient proof for my customers?
No. Insurance only covers financial damage, but it does not improve the security level of your systems. NIS2 explicitly requires the implementation of technical and organizational protective measures. In addition, modern cyber insurance providers now often require these basic measures before entering into a contract.
Do we, as a small business, need to get expensive ISO 27001 certification immediately?
Not necessarily. As a first step, many major customers are completely satisfied if you can provide a well-founded self-declaration and a clear, documented roadmap showing how you align your IT security with standards such as ISO 27001. If you are not sure which option is best for your company, feel free to contact us without obligation.
Who can support me with implementing the NIS2 Directive?
At heyData, we are happy to help you with all questions related to NIS2. On the one hand, you receive a digital platform from us that conveniently and automatically covers all processes. On the other hand, you also receive expert advice from one of our compliance specialists. Feel free to contact us for an initial free consultation.
Important: The content of this article is for informational purposes only and does not constitute legal advice. The information provided here is no substitute for personalized legal advice from a data protection officer or an attorney. We do not guarantee that the information provided is up to date, complete, or accurate. Any actions taken on the basis of the information contained in this article are at your own risk. We recommend that you always consult a data protection officer or an attorney with any legal questions or problems.



