SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

NIS2 compliance with ASSA ABLOY Solutions

17 Oct 2025

NIS2 compliance with ASSA ABLOY Solutions
Contact company
Contact ASSA ABLOY Opening Solutions
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • NIS2 expands cybersecurity regulations, impacting 160,000 organisations and their physical security strategies.
  • Organisations face severe penalties for non-compliance, including fines up to €10 million.
  • ASSA ABLOY solutions enhance NIS2 compliance by securing digital infrastructure from hybrid attacks.
Related Links
  • ASSA ABLOY: Digitalising access benefits and insights

The European Union's NIS2 Directive is reshaping strategies across organisations by emphasising both cybersecurity and physical security measures. While traditionally the focus has been on cybersecurity, the directive now highlights the importance of cyber-physical resilience. This shift brings significant consequences for organisations failing to comply, including hefty penalties.

NIS2 builds upon the 2016 NIS Directive on Network and Information Security, tightening IT security requirements, particularly for critical infrastructure, and extending them to additional sectors. The European Commission anticipates that approximately 160,000 organisations will be affected by NIS2 from the outset.

Important change for security

For security and facilities managers, a critical shift introduced by NIS2 is the "all-hazards approach." This broader regulatory strategy mandates enhanced digital security measures paired with processes and devices that protect digital infrastructure physically.

Consequently, cyber-physical resilience becomes vital as the volume and sophistication of hybrid cyber-physical attacks increase. Enhancing collaboration between cyber and physical security teams is essential to address these evolving threats.

NIS2 and physical security: Scope, compliance, financial penalties

NIS2's scope now reaches above formal infrastructure sectors, including energy, utilities, transport, telecoms

NIS2's scope now reaches beyond traditional infrastructure sectors, including energy, utilities, transport, telecoms, and data centres. It also encompasses sectors such as healthcare, digital services, and various manufacturing industries, including food, chemicals, and automotive. Organisations within these categories should review the directive to determine their compliance obligations.

The directive mandates taking appropriate technical, operational, and organisational measures to manage risks to network and information security and minimising the impact on service recipients. Protecting areas where malicious actors could access digital infrastructure, such as IoT devices or servers, is essential, necessitating robust access control protocols.

Non-compliance with NIS2 may result in substantial penalties, potentially reaching up to €10 million or 2% of global annual turnover. Older security systems could thus pose significant liability risks.

NIS2 impact on access control workflows

NIS2's impact on security management involves implementing the "all-hazards" approach. This includes refining risk analysis of digital devices, ensuring supply-chain security, optimising physical access management for personnel, enhancing cyber hygiene training, and planning for business continuity in breach scenarios. Security teams must promptly assess their current cyber-physical resilience to identify necessary improvements.

NIS2 compliance efforts

Access management plays a crucial role in achieving NIS2 compliance. Advanced access solutions can enhance cyber-physical resilience through improved identity management, auditability, and remote building control. Systems requiring regular credential renewal reduce the risk of unauthorised key circulation, a potential vulnerability for digital infrastructure.

Solutions from ASSA ABLOY offer robust digital access systems to enhance compliance with the NIS2 Directive. They ensure comprehensive access control, supporting both online and offline scenarios, enabling instant cancellation of lost credentials, and providing scalable control over formerly inaccessible access points. Wireless solutions offer easy installation without structural modifications.

In an era of hybrid attacks, physical access often remains a critical vulnerability. Mitigating this with digital enhancements aligns with NIS2 obligations, alleviating compliance concerns for security decision-makers. ASSA ABLOY's experts offer guidance to align features with directive requirements, bolstering organisational cyber-physical security frameworks.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Show full press release

In the ongoing implementation of the EU’s NIS2 Directive, much attention has been paid to its implications for cybersecurity. Yet, arguably, the impact on organisations’ physical security and access strategy is just as important. In fact, NIS2 ushers in a new degree of focus on cyber–physical resilience – with significant potential penalties for organisations which do not comply with the framework’s demands.

NIS2 replaces 2016’s original NIS Directive on Network and Information Security. It represents a major legislative tightening of the minimum requirements for IT security in critical infrastructure and expands them to include several new sectors. The European Commission estimates that around 160,000 organisations will be impacted by NIS2 right away.

Important change for security

The most important change for security and facilities managers to digest is the switch to an “all-hazards approach” to regulation. In practice, this approach compels impacted organisations to reinforce their digital security measures with additional processes and devices which physically protect the security of their digital infrastructure.

Thus, cyber–physical resilience – and increased convergence between the operations and goals of cyber and physical security teams – becomes a key element in the response to a increase in both the volume and the sophistication of hybrid cyber–physical attacks.

NIS2 and physical security: scope, compliance, financial penalties

The potential scope of NIS2 regulations encompasses a much-expanded range of organisations and sectors. Alongside the typical infrastructure sub-sectors such as energy and utilities, transport, telecoms, waste management, data centres and the like, is added a broader understanding of what constitutes “critical” national infrastructure: healthcare (including research), digital services and a range of manufacturing businesses including food, chemicals, automotive and more.

Organisations which operate in any of these sectors should consult the directive to ascertain whether they, too, face NIS2 obligations.

A significant element of the new obligations is the extended all-hazards approach, referenced above. According to Article 21 of the directive, entities must “take appropriate and proportionate technical, operational, and organisational measures to manage the risks to the security of network and information systems [...] and to prevent or minimise the impact of security incidents on the recipients of their services and on other services.”

Physical access to digital infrastructure

In other words, any areas of a site where malicious actors may gain physical access to digital infrastructure, whether IoT devices, access management terminals, servers or anything else, must now have appropriate protection against digital, physical and hybrid attack. Access control devices and protocols must be up to this task.

Potential punishments for non-compliance with NIS2 can be severe. According to the directive’s text, organisations may face fines of up to €10 million, or 2% of their global annual turnover. Older locking systems therefore represent a major liability risk for many organisations.

NIS2 impact on access control workflows

Thus, NIS2’s implications for security and facilities management – and potential financial penalties for organisations – are significant. The all-hazards approach is especially important here.

Measures to implement and monitor “all-hazards” compliant processes include the fine-tuning of risk analysis for on-site digital devices; supply-chain security measures including safer procurement and data handling; physical access for personnel, including employees and visitors; cyber-hygiene training; planning for business continuity in the event of a breach; and more.

Security teams should urgently evaluate their existing cyber–physical resilience to quickly identify areas where additional measures or upgrades are needed.

NIS2 compliance efforts

Access management is a key element in any impacted organisation’s NIS2 compliance efforts. Intelligent access solutions can contribute to improving cyber–physical resilience with, for example, enhanced identity management, auditability, and round-the-clock remote building control. Credentials which require regular revalidation and/or expire automatically drastically reduce the risk of unauthorised keys in circulation – another potential vulnerability for digital infrastructure.

Digital access solutions from ASSA ABLOY empower them to secure every layer and can contribute significantly to achieving compliance with the NIS2 Directive.

They help protect organisations and data by enabling control over who goes where and when for each user, with the ability to cancel lost credentials instantly. They support both online and offline access control, improving workflows through flexible management—whether remotely or on-site.

ASSA ABLOY specific features and benefits

The offering includes digital access systems or access hardware to upgrade existing setups, providing scalable control over access points that were previously unreachable and securing protection classes 1 to 4. Wireless solutions are simple to install and require no wiring or structural modifications.

Physical access is often considered one of the biggest backdoors for cyber criminals in an era of growing hybrid attacks. Closing it with digital access enhancements will ensure NIS2 obligations are met – and free security decision-makers from compliance worries.

ASSA ABLOY experts are available to guide them through the specific features and benefits that align with the directive’s requirements and enhance the organisation’s cyber–physical security framework.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Security management
  • Security devices
  • Security access systems
  • Identity management
  • Hybrid security
  • Cyber security
  • Internet of Things (IoT)
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Electronic locking devices
  • Barricades
  • Storage
  • Barriers
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

Ensure your organisation's compliance with NIS2 Directive using ASSA ABLOY’s robust access solutions, enhancing cyber–physical resilience and safeguarding against hefty penalties for non-compliance.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec