
Osgiliath - Charcoal
A practical roadmap for plants that can’t stop, can’t patch, and can’t afford a compliance fire drill.
Manufacturing leaders know NIS2 is coming fast, but they don’t know what “good” looks like, and they definitely don’t want a 200‑page ISMS binder dropped on their desk.
The fear is real: “Will NIS2 force us to redesign the entire plant?”
Absolutely not. Done right, NIS2 compliance strengthens production instead of slowing it down.
This blueprint shows how to meet NIS2 requirements by building operational resilience, not checklists, using a Crawl - Walk - Run approach aligned to the NIST CSF Manufacturing Profile and Machinery Directive requirements.
The Core Idea: Compliance by Doing the Right Operational Things
NIS2’s OT‑relevant requirements fall into five buckets:
- Identify: Know your assets, risks, dependencies
- Protect: Segment, control access, secure remote operations
- Detect: Monitor for anomalies and configuration changes
- Respond: Plan, coordinate, contain
- Recover: Restore production fast and trace what happened
This is not paperwork, but the minimum structure a factory needs to run safely in 2026+.
The OT NIS2 Blueprint
Built for legacy environments, mixed vendor ecosystems, and plants where downtime is not an option.
CRAWL
Objective: “Understand what we must protect and why.”
This phase addresses NIS2’s risk management, organizational governance, and supply chain expectations, without yet touching production systems.
Establish the Manufacturing Risk Baseline
NIS2 requires a risk management process, not perfection.
We focus on what matters to operations:
- Identify critical production assets and their role in uptime
- Map IT dependencies: MES, historians, AD, patch servers
- Document supplier and OEM1 access dependencies
- Identify single‑point‑of‑failure personnel (a major NIS2 governance gap)
Build the Minimal Required OT Asset Inventory
Not a full CMDB, only what’s needed for NIS2:
- PLCs, HMIs, SCADA, robots, engineering stations
- Firmware versions (for compensating controls)
- Known vulnerabilities
- Communication dependencies (line to line, line to utilities, OT to IT)
- Third‑party managed systems
NIS2 wants controlled infrastructure, not a perfect list.
Define NIS2 Governance Roles
You need exactly three:
- Asset owner (per production area)
- Process owner for changes
- Incident coordinator (not necessarily a cyber expert)
This satisfies the “roles, responsibilities & authority” clause without bureaucracy.
Identify “Gaps That Can Burn Down the Plant”
These are the compliance‑relevant OT timebombs:
- Shared admin accounts
- Vendor laptops with unrestricted access
- Undocumented remote access
- No change logs
- Unknown internet connections
- Zero evidence of configuration modifications
- Machines with safety‑critical software but no integrity checks
This forms your NIS2 Gap Analysis output, lean and actionable.
WALK
Objective: “Implement the required protections without breaking production.”
This is where we map the plant environment to NIS2 network security, access control, supply chain controls, and incident reporting.
Establish the OT–IT Boundary
Every regulator expects one thing:
Clear separation between enterprise IT and operational networks.
Actions:
- Build or validate the industrial DMZ
- Enforce directional rules (e.g., historian pull only)
- Block risky IT services toward OT
- Move remote access to the DMZ, no more direct PLC access
This step alone dramatically reduces risk and meets multiple NIS2 controls.
Introduce Role‑Based OT Access Control
Minimal changes, maximal compliance:
- Assign owners to critical systems
- Remove unused accounts
- Enforce unique accounts per technician/OEM
- Document and review access quarterly
- Introduce approvals for engineering changes
This satisfies NIS2’s Identity & Access Management section with minimal operational impact.
Build Vendor and Supply Chain Safeguards
NIS2 is heavy on supply‑chain oversight, but you don’t need contracts rewritten, you need structure:
- Log vendor access
- Place vendor connections behind monitored jump hosts
- Require explicit approval for every session
- Assign accountability for configuration changes made by OEMs
This operationalizes NIS2 supply chain obligations in a factory‑friendly way.
Deploy Lightweight Monitoring for OT
This is not SIEM. This is NIS2‑aligned early anomaly detection:
- Monitor abnormal network traffic
- Track configuration changes on PLCs/HMIs/SCADA
- Identify unexpected new devices
- Flag unauthorized remote sessions
- Log interventions on safety‑critical systems (Machinery Directive link)
OT monitoring = NIS2 detection plus real operational protection.
RUN
Objective: “Build muscle memory and prove resilience.”
This phase aligns with NIS2 incident response, continuity, recovery, and governance evidence.
Create an OT‑Specific Incident Response Playbook
IT IR plans are useless in OT, your IR plan must focus on:
- Safety and operational continuity
- Who shuts down what (and when)
- OEM involvement procedures
- How to preserve evidence without stopping the line
- Recovery vs rollback decisions
- Communication flows (internal, authorities, suppliers)
This satisfies multiple NIS2 Articles on reporting and response.
Define the OT Backup & Recovery Standard
NIS2 requires resilience and recovery of critical systems:
- Ensure offline backups of PLC logic
- Maintain version history of engineering changes
- Store SCADA configs securely with access auditing
- Document recovery steps for each production area
- Test recovery on a non‑production line or lab environment
This maps directly to the NIST CSF Recover function.
Run a Tabletop Exercise (TTX)
The fastest path to NIS2 readiness:
- Simulate a realistic OT incident (accidental or malicious)
- Test cross‑department cooperation
- Validate roles
- Validate escalation paths
- Validate reporting procedures
- Identify operational choke points
A 2‑hour TTX does more for compliance than any document.
Produce the NIS2 Evidence Package
Now you have:
- Governance roles
- Risk assessment
- Asset inventory
- OT–IT boundary controls
- Access control framework
- Vendor access model
- Monitoring evidence
- IR procedures
- Recovery documentation
- Tabletop exercise outputs
This is the ISMS for NIS2, no binder needed.
What’s Required vs. What’s Nice‑to‑Have
Required for NIS2 Minimum Compliance
- OT asset identification
- Documented risk assessment
- Clear roles and governance
- OT–IT network segmentation
- Access control & account management
- Monitoring for anomalies
- Incident response procedures
- Recovery strategy & evidence
- Supplier access oversight
- Logging & evidence of system changes
Nice‑to‑Have (Maturity Boosters, Not Mandatory)
- Zero‑trust segmentation
- Digital twins for testing
- Automated configuration validation
- Full SIEM integration
- Predictive maintenance workflows
- Continuous vulnerability scanning (not feasible in legacy OT)
This keeps compliance grounded in operational reality.
Final Message: Compliance Through Resilience, Not Checklists
If NIS2 feels overwhelming, it’s because most vendors sell it as a documentation exercise.
But manufacturing plants don’t need binders, they need structure:
- Clear ownership
- Safe boundaries
- Logged access
- Controlled changes
- Faster recovery
- Predictable operations
When you focus on these, NIS2 becomes:
- cheaper
- faster
- safer
- and directly tied to uptime
Compliance is the by‑product of operational resilience.
Not the other way around.
original equipment manufacturer ↩︎