Retail & Consumer GoodsProfessional & Financial ServicesTechnology & Digital UK-wide

The Network and Information Systems (NIS) Regulations 2018 impose cyber security and incident reporting obligations on operators of essential services (OES) and relevant digital service providers (RDSP). These regulations aim to protect the UK's critical national infrastructure from cyber threats.

If you operate in energy, transport, water, health, or digital infrastructure sectors, you may be designated as an OES with specific compliance obligations. This guide explains how to determine if you are in scope, what compliance requires, and how to meet your incident notification duties.

Who the NIS Regulations apply to

The regulations create two categories of regulated entities with different obligations:

  • Operators of essential services (OES) - Organisations designated by a competent authority as providing essential services that depend on network and information systems
  • Relevant digital service providers (RDSP) - Online marketplaces, online search engines, and cloud computing services above certain thresholds

OES are subject to more stringent requirements and oversight than RDSP. Your sector competent authority will notify you if you are designated as an OES.

Competent authorities and the CAF

Each sector has a designated competent authority responsible for identifying OES, setting sector-specific guidance, and enforcing compliance:

Energy sector (electricity, oil, gas)
Ofgem
Transport sector (air, rail, maritime, road)
Department for Transport
Health sector (NHS trusts, ICBs, independent providers)
Department of Health and Social Care
Drinking water supply and distribution
Defra (Environment Agency in practice)
Digital infrastructure (DNS, IXPs, TLD registries)
Ofcom
Digital services (cloud, marketplace, search)
Information Commissioner's Office (ICO)

NCSC role: The National Cyber Security Centre (NCSC) is the UK's single point of contact for NIS matters and the Computer Security Incident Response Team (CSIRT), providing technical guidance and incident response support across all sectors.

The NCSC Cyber Assessment Framework (CAF)

Competent authorities use the NCSC CAF to assess OES compliance across 14 core principles:

Objective A: Managing security risk
Governance, risk management, asset management, supply chain
Objective B: Protecting against cyber attack
Service protection policies, identity and access control, data security, system security, resilient networks and systems, staff awareness
Objective C: Detecting cyber security events
Security monitoring, anomaly detection
Objective D: Minimising impact of incidents
Response and recovery planning, lessons learned
Assessment approach
Competent authorities assess against CAF principles using Indicators of Good Practice (IGPs)
Outcome focus
CAF assesses whether outcomes are achieved, not prescriptive controls

What CAF assessment involves:

  • Your competent authority may conduct assessments directly or require self-assessment against CAF principles
  • Assessment considers your specific context, threat environment, and the criticality of your services
  • You must demonstrate appropriate and proportionate security measures for your risk profile
  • CAF uses a maturity model approach - the expected level depends on your sector and service criticality

Preparing for CAF assessment:

  1. Review the NCSC CAF guidance and understand the 14 principles
  2. Conduct a gap analysis against each principle's Indicators of Good Practice
  3. Document your security measures and evidence of their effectiveness
  4. Identify and address gaps before formal assessment
  5. Engage with your competent authority early to understand sector-specific expectations

Incident notification requirements

OES and RDSP must notify their competent authority of significant incidents affecting service continuity or security. This is separate from (and additional to) GDPR data breach notification.

What constitutes a reportable incident

For OES: An incident with significant impact on essential service continuity. For RDSP: An incident with substantial impact on digital service provision. Consider: number of users affected, duration, geographic spread, and economic impact.

When in doubt, report: Competent authorities prefer precautionary notifications over unreported significant incidents.

Dual notification obligations

A single cyber incident may trigger notification requirements under both NIS Regulations and UK GDPR:

NIS notification
To your sector competent authority if significant impact on service continuity
GDPR notification
To the ICO if personal data breach poses risk to individuals
Individual notification
To affected individuals if GDPR breach poses high risk
Timeline for both
72 hours from becoming aware
Key difference
NIS focuses on service continuity, GDPR on personal data protection

Practical implication: A ransomware attack on an NHS trust, for example, could require notification to NHS England (NIS competent authority), the ICO (GDPR data breach), and affected patients (if high risk to their rights). Establish clear incident response procedures that address both regulatory frameworks.

Penalties and enforcement

Competent authorities have significant enforcement powers under the NIS Regulations. While the focus is on improving security posture rather than punitive action, persistent non-compliance carries serious consequences.

Enforcement in practice

Competent authorities typically take a proportionate approach:

  1. Assessment and guidance - Initial focus on identifying gaps and providing improvement guidance
  2. Improvement plans - Where deficiencies exist, you may be required to submit and implement an improvement plan with defined timescales
  3. Follow-up inspection - Verification that improvements have been made
  4. Enforcement notices - If improvement plans are not followed, formal enforcement action
  5. Penalty notices - Reserved for serious, persistent, or wilful non-compliance

Organisations that engage constructively with their competent authority, acknowledge shortcomings, and demonstrate genuine efforts to improve are unlikely to face maximum penalties.

HEALTHCARE & SOCIAL CARE Requirement

NHS organisations and the Data Security and Protection Toolkit

NHS organisations designated as OES have an additional compliance mechanism: the Data Security and Protection Toolkit (DSPT).

DSPT Version 7 (September 2024) adopts the NCSC Cyber Assessment Framework as its foundation, aligning NHS cyber security assessment with NIS Regulations requirements. Completing DSPT to "Standards Met" level demonstrates progress towards NIS compliance.

NHS OES incident reporting: Report to NHS England within 72 hours for incidents with an adverse effect on security or significant impact on service continuity. NHS England is the competent authority for health sector OES in England.

Geographic variations:

  • Scotland: NHS Scotland health boards
  • Wales: Local Health Boards
  • Northern Ireland: Health and Social Care Trusts
MANUFACTURING & ENGINEER… Requirement

Energy sector OES requirements

Ofgem regulates NIS compliance for energy sector OES, including electricity generators, transmission and distribution network operators, and oil and gas suppliers.

Energy sector considerations:

  • Industrial control systems (ICS) and operational technology (OT) require specific security approaches
  • Smart grid and smart meter infrastructure creates additional attack surfaces
  • Supply chain security is particularly important given critical infrastructure dependencies

Ofgem publishes sector-specific guidance on NIS compliance expectations for energy organisations.

Compliance roadmap for OES

If you have been designated as an OES or believe you may be in scope, follow this roadmap:

  1. Confirm your designation status

    Contact your sector regulator if you have not received formal OES designation notification.

  2. Identify your competent authority

    Determine which authority regulates your sector (see table above).

  3. Review the NCSC CAF

    Understand the 14 core principles and Indicators of Good Practice (IGPs).

  4. Conduct a gap analysis

    Assess your security posture against CAF principles and document evidence.

  5. Develop an improvement plan

    Create a prioritised plan for identified gaps with realistic timescales.

  6. Establish incident response procedures

    Include NIS notification requirements alongside GDPR obligations.

  7. Engage with your competent authority

    Build a relationship before formal assessment to understand expectations.

  8. Maintain ongoing compliance

    Implement continuous monitoring and regular CAF assessment.

Other frameworks: NIS/CAF sits alongside Cyber Essentials (baseline hygiene), ISO 27001 (security management), UK GDPR (data protection), and sector standards (PCI-DSS, FCA resilience). Develop a unified programme mapping controls to multiple frameworks.

Upcoming changes: The Cyber Security and Resilience Bill (expected 2025/2026) will expand NIS scope and add supply chain requirements.