Guide
NIS Regulations: compliance for operators of essential services
How to comply with the Network and Information Systems (NIS) Regulations 2018 as an operator of essential services. Covers OES designation, the NCSC Cyber Assessment Framework (CAF), incident notification requirements, and sector competent authorities.
The Network and Information Systems (NIS) Regulations 2018 impose cyber security and incident reporting obligations on operators of essential services (OES) and relevant digital service providers (RDSP). These regulations aim to protect the UK's critical national infrastructure from cyber threats.
If you operate in energy, transport, water, health, or digital infrastructure sectors, you may be designated as an OES with specific compliance obligations. This guide explains how to determine if you are in scope, what compliance requires, and how to meet your incident notification duties.
Who the NIS Regulations apply to
The regulations create two categories of regulated entities with different obligations:
- Operators of essential services (OES) - Organisations designated by a competent authority as providing essential services that depend on network and information systems
- Relevant digital service providers (RDSP) - Online marketplaces, online search engines, and cloud computing services above certain thresholds
OES are subject to more stringent requirements and oversight than RDSP. Your sector competent authority will notify you if you are designated as an OES.
Competent authorities and the CAF
Each sector has a designated competent authority responsible for identifying OES, setting sector-specific guidance, and enforcing compliance:
- Energy sector (electricity, oil, gas)
- Ofgem
- Transport sector (air, rail, maritime, road)
- Department for Transport
- Health sector (NHS trusts, ICBs, independent providers)
- Department of Health and Social Care
- Drinking water supply and distribution
- Defra (Environment Agency in practice)
- Digital infrastructure (DNS, IXPs, TLD registries)
- Ofcom
- Digital services (cloud, marketplace, search)
- Information Commissioner's Office (ICO)
NCSC role: The National Cyber Security Centre (NCSC) is the UK's single point of contact for NIS matters and the Computer Security Incident Response Team (CSIRT), providing technical guidance and incident response support across all sectors.
The NCSC Cyber Assessment Framework (CAF)
Competent authorities use the NCSC CAF to assess OES compliance across 14 core principles:
- Objective A: Managing security risk
- Governance, risk management, asset management, supply chain
- Objective B: Protecting against cyber attack
- Service protection policies, identity and access control, data security, system security, resilient networks and systems, staff awareness
- Objective C: Detecting cyber security events
- Security monitoring, anomaly detection
- Objective D: Minimising impact of incidents
- Response and recovery planning, lessons learned
- Assessment approach
- Competent authorities assess against CAF principles using Indicators of Good Practice (IGPs)
- Outcome focus
- CAF assesses whether outcomes are achieved, not prescriptive controls
What CAF assessment involves:
- Your competent authority may conduct assessments directly or require self-assessment against CAF principles
- Assessment considers your specific context, threat environment, and the criticality of your services
- You must demonstrate appropriate and proportionate security measures for your risk profile
- CAF uses a maturity model approach - the expected level depends on your sector and service criticality
Preparing for CAF assessment:
- Review the NCSC CAF guidance and understand the 14 principles
- Conduct a gap analysis against each principle's Indicators of Good Practice
- Document your security measures and evidence of their effectiveness
- Identify and address gaps before formal assessment
- Engage with your competent authority early to understand sector-specific expectations
Incident notification requirements
OES and RDSP must notify their competent authority of significant incidents affecting service continuity or security. This is separate from (and additional to) GDPR data breach notification.
What constitutes a reportable incident
For OES: An incident with significant impact on essential service continuity. For RDSP: An incident with substantial impact on digital service provision. Consider: number of users affected, duration, geographic spread, and economic impact.
When in doubt, report: Competent authorities prefer precautionary notifications over unreported significant incidents.
Dual notification obligations
A single cyber incident may trigger notification requirements under both NIS Regulations and UK GDPR:
- NIS notification
- To your sector competent authority if significant impact on service continuity
- GDPR notification
- To the ICO if personal data breach poses risk to individuals
- Individual notification
- To affected individuals if GDPR breach poses high risk
- Timeline for both
- 72 hours from becoming aware
- Key difference
- NIS focuses on service continuity, GDPR on personal data protection
Practical implication: A ransomware attack on an NHS trust, for example, could require notification to NHS England (NIS competent authority), the ICO (GDPR data breach), and affected patients (if high risk to their rights). Establish clear incident response procedures that address both regulatory frameworks.
Penalties and enforcement
Competent authorities have significant enforcement powers under the NIS Regulations. While the focus is on improving security posture rather than punitive action, persistent non-compliance carries serious consequences.
Enforcement in practice
Competent authorities typically take a proportionate approach:
- Assessment and guidance - Initial focus on identifying gaps and providing improvement guidance
- Improvement plans - Where deficiencies exist, you may be required to submit and implement an improvement plan with defined timescales
- Follow-up inspection - Verification that improvements have been made
- Enforcement notices - If improvement plans are not followed, formal enforcement action
- Penalty notices - Reserved for serious, persistent, or wilful non-compliance
Organisations that engage constructively with their competent authority, acknowledge shortcomings, and demonstrate genuine efforts to improve are unlikely to face maximum penalties.
NHS organisations and the Data Security and Protection Toolkit
NHS organisations designated as OES have an additional compliance mechanism: the Data Security and Protection Toolkit (DSPT).
DSPT Version 7 (September 2024) adopts the NCSC Cyber Assessment Framework as its foundation, aligning NHS cyber security assessment with NIS Regulations requirements. Completing DSPT to "Standards Met" level demonstrates progress towards NIS compliance.
NHS OES incident reporting: Report to NHS England within 72 hours for incidents with an adverse effect on security or significant impact on service continuity. NHS England is the competent authority for health sector OES in England.
Geographic variations:
- Scotland: NHS Scotland health boards
- Wales: Local Health Boards
- Northern Ireland: Health and Social Care Trusts
Energy sector OES requirements
Ofgem regulates NIS compliance for energy sector OES, including electricity generators, transmission and distribution network operators, and oil and gas suppliers.
Energy sector considerations:
- Industrial control systems (ICS) and operational technology (OT) require specific security approaches
- Smart grid and smart meter infrastructure creates additional attack surfaces
- Supply chain security is particularly important given critical infrastructure dependencies
Ofgem publishes sector-specific guidance on NIS compliance expectations for energy organisations.
Compliance roadmap for OES
If you have been designated as an OES or believe you may be in scope, follow this roadmap:
-
Confirm your designation status
Contact your sector regulator if you have not received formal OES designation notification.
-
Identify your competent authority
Determine which authority regulates your sector (see table above).
-
Review the NCSC CAF
Understand the 14 core principles and Indicators of Good Practice (IGPs).
-
Conduct a gap analysis
Assess your security posture against CAF principles and document evidence.
-
Develop an improvement plan
Create a prioritised plan for identified gaps with realistic timescales.
-
Establish incident response procedures
Include NIS notification requirements alongside GDPR obligations.
-
Engage with your competent authority
Build a relationship before formal assessment to understand expectations.
-
Maintain ongoing compliance
Implement continuous monitoring and regular CAF assessment.
Other frameworks: NIS/CAF sits alongside Cyber Essentials (baseline hygiene), ISO 27001 (security management), UK GDPR (data protection), and sector standards (PCI-DSS, FCA resilience). Develop a unified programme mapping controls to multiple frameworks.
Upcoming changes: The Cyber Security and Resilience Bill (expected 2025/2026) will expand NIS scope and add supply chain requirements.