NIS2 Complete Toolkit
497,00 €
- 68 editable DOCX + XLSX files
- Instant download after payment
- Covers Article 21(2)(a)–(j) in full
- 1 year of updates included
- Secured by Stripe
Digital download — once you confirm at checkout, the EU 14-day withdrawal right is waived per Directive 2011/83/EU, Art. 16(m).
Description
Every NIS2 Article 21 security measure—documented, cross-referenced, and ready to customise. The Complete Toolkit gives your organisation 68 editable DOCX and XLSX templates mapped to three regulatory sources: the NIS2 Directive, Implementing Regulation CIR 2024/2690 Annex, and ENISA technical guidance—with ISO 27001:2022 cross-references built in. No other template set on the market provides this triple-source mapping across every document.
CIR 2024/2690 referenced
ISO 27001:2022 cross-referenced
ENISA guidance referenced
UK English
Editable DOCX/XLSX
Why Organisations Are Scrambling to Document NIS2 Compliance
The NIS2 Directive required EU member states to transpose its provisions into national law by 17 October 2024. That deadline has passed, and enforcement frameworks are going live across the EU. Three regulatory realities now face every organisation in scope:
- Enforcement is active. National competent authorities can now audit and sanction entities that lack documented security measures. Waiting for “final guidance” is no longer a viable strategy.
- Penalties are severe. Under Article 34 of the NIS2 Directive, administrative fines may reach up to €10,000,000 or 2% of total worldwide annual turnover—whichever is higher—subject to national implementing law and supervisory authority discretion.
- Board members carry personal liability. Article 20 places management bodies directly responsible for approving and overseeing cybersecurity risk-management measures. Lack of documented governance is not a defensible position.
The gap most organisations face is not technical—it is documentary. Policies, procedures, risk assessments, and audit trails must exist before an auditor arrives. The question is how to produce them accurately and efficiently.
68 Editable Templates Mapped to Three Regulatory Sources
The Complete Toolkit replaces months of policy drafting with a structured documentation set that covers every measure listed in Article 21(2)(a) through (j). Each template follows a consistent 9-section structure—Purpose, Scope, Definitions, RACI matrix, Requirements, Exceptions, Monitoring, References, and Appendix—with pre-filled RACI tables for six organisational roles, red-highlighted placeholders for your organisation-specific data, and 3+ KPIs per document for board reporting.
The 68 documents are organised into 10 functional categories:
1. Management & Planning
5 docs — Welcome Guide, Implementation Guide, Project Launch Pack, Project Plan, Training Plan
2. Risk Management
7 docs — Information Security Policy, Risk Assessment Methodology, Risk Assessment Table, Risk Treatment Table, Residual Risk Acceptance, Risk Report, Risk Treatment Plan
3. Core Security Policies
23 docs — IT Security, Clear Desk, Mobile/Remote Working, BYOD, Physical Security, Information Classification, Asset Management, IT Asset Register, Network Security, Patching, Logging, Change Management, Backup, Information Transfer, Secure Communications, Disposal, Encryption, Access Control, Authentication, Password Policy, ICT Acquisition, ICT Security Requirements, HR Security + Statement of Acceptance
4. Business Continuity
9 docs — BIA Methodology, BIA Questionnaire, BC Strategy, BC Plan, Crisis Management Plan, Exercise Plan, Exercise Report, Backup Policy, Disaster Recovery Plan
5. Supply Chain
6 docs — Supplier Security Policy, Security Clauses, Confidentiality Statement, Supplier Directory, Self-Assessment Questionnaire, Compliance Checklist
6. Incident Management
5 docs — Incident Handling Policy, Minor Incident Procedure, Incident Log, Notification Forms (24h/72h/1-month per Art. 23), Corrective Actions Register
7. Measurement & KPIs
2 docs — Measurement Methodology, Measurement Report
8. Board & Governance
2 docs — Board Briefing Pack, Board Resolution Template
9. Compliance & Audit Tools
9 docs — NIS2–ISO Mapping Spreadsheet, Gap Analysis, Training Tracker, Internal Audit Checklist, CIR Compliance Matrix, GDPR–NIS2 Checklist, NCA Registration Guide, Audit Procedure, Audit Report
10. System Layer
8 docs — Master Map, Role Matrix, Quick-Start Cards (NIS2 Officer, IT Lead, HR Manager), Incident Flowchart, Implementation Flowchart, Dependency Map
See all 68 document titles
- 00a — Welcome & Overview
- 00b — Implementation Guide
- 00c — Master Map
- 00d — Role Matrix
- 00e — Quick-Start Card: NIS2 Officer
- 00f — Quick-Start Card: IT Lead
- 00g — Quick-Start Card: HR Manager
- 00h — Incident Flowchart
- 00i — Implementation Flowchart
- 00j — Document Dependency Map
- 01 — Project Launch Pack
- 02 — Project Plan
- 03 — Initial Training Plan
- 04 — Information Security Policy
- 05 — Risk Assessment Methodology
- 06 — Risk Assessment Table
- 07 — Risk Treatment Table
- 08 — Acceptance of Residual Risks
- 09 — Risk Assessment & Treatment Report
- 10 — Risk Treatment Plan
- 11 — IT Security Policy
- 12 — Clear Desk & Clear Screen Policy
- 13 — Mobile & Remote Working Policy
- 14 — BYOD Policy
- 15 — Physical Security Policy
- 16 — Information Classification Policy
- 17 — Asset Management Policy
- 18 — IT Asset Register
- 19 — Network Security Policy
- 20 — Vulnerability & Patch Management
- 21 — Logging & Monitoring Policy
- 22 — Change Management Policy
- 23 — Backup Policy
- 24 — Information Transfer Policy
- 25 — Secure Communications Policy
- 26 — Secure Disposal Policy
- 27 — Encryption & Cryptographic Controls
- 28 — Access Control Policy
- 29 — Authentication Policy (incl. MFA)
- 30 — Password Policy
- 31 — ICT Acquisition Policy
- 32 — ICT Security Requirements
- 33 — HR Security Policy
- 34 — Statement of Acceptance
- 35 — BIA Methodology
- 36 — BIA Questionnaire
- 37 — Business Continuity Strategy
- 38 — Business Continuity Plan
- 39 — Crisis Management Plan
- 40 — Exercise Plan
- 41 — Exercise Report
- 42 — Supplier Security Policy
- 43 — Supplier Security Clauses
- 44 — Confidentiality Statement
- 45 — Supplier Directory
- 46 — Measurement Methodology
- 47 — Measurement Report
- 48 — Incident Handling Policy
- 49 — Minor Incident Procedure
- 50 — Incident Log
- 51 — Incident Notification Forms
- 52 — Corrective Actions Register
- 53 — NIS2–ISO 27001 Mapping Spreadsheet
- 54 — Gap Analysis Workbook
- 55 — Training Tracker
- 56 — Internal Audit Checklist
- 57 — CIR 2024/2690 Compliance Matrix
- 58 — Board Briefing Pack
- 59 — Board Resolution Template
- 60 — Supplier Self-Assessment Questionnaire
- 61 — Supplier Compliance Checklist
- 62 — NCA Registration Guide
- 63 — GDPR–NIS2 Crosswalk Checklist
- 64 — Disaster Recovery Plan
- 65 — Audit Procedure
- 66 — Audit Report Template
How Every Article 21 Measure Is Covered
The table below maps each Article 21(2) security measure to the toolkit documents and CIR 2024/2690 Annex sections that address it.
| NIS2 Article | Security Measure | Toolkit Documents | CIR Annex |
|---|---|---|---|
| Art. 21(2)(a) | Risk analysis & information system security | Docs 04–10: Information Security Policy, Risk Assessment Methodology, Risk Assessment & Treatment Tables, Residual Risk Acceptance, Risk Report, Risk Treatment Plan | Sections 1–2 |
| Art. 21(2)(b) | Incident handling | Docs 48–52: Incident Handling Policy, Minor Incident Procedure, Incident Log, Notification Forms (24h/72h/1-month), Corrective Actions Register | Section 3 |
| Art. 21(2)(c) | Business continuity & crisis management | Docs 23, 35–41, 64: BIA Methodology & Questionnaire, BC Strategy & Plan, Crisis Management Plan, Exercise Plan & Report, Backup Policy, Disaster Recovery Plan | Section 4 |
| Art. 21(2)(d) | Supply chain security | Docs 42–45, 60–61: Supplier Security Policy, Security Clauses, Confidentiality Statement, Supplier Directory, Self-Assessment, Compliance Checklist | Section 5 |
| Art. 21(2)(e) | Acquisition, development & maintenance | Docs 20, 22, 31–32: Vulnerability & Patch Management, Change Management, ICT Acquisition, ICT Security Requirements | Section 6 |
| Art. 21(2)(f) | Effectiveness assessment | Docs 46–47, 53–57, 62–66: Measurement Methodology & Report, NIS2–ISO Mapping, Gap Analysis, Audit Checklist, CIR Compliance Matrix, Audit Procedure & Report | Section 7 |
| Art. 21(2)(g) | Cybersecurity training & awareness | Doc 03: Initial Training Plan with role-specific modules; Doc 55: Training Tracker | Section 8 |
| Art. 21(2)(h) | Cryptography & encryption | Doc 27: Encryption & Cryptographic Controls | Section 9 |
| Art. 21(2)(i) | HR security, access control & asset management | Docs 28–30, 33–34: Access Control, Authentication (MFA), Password Policy, HR Security, Statement of Acceptance; Docs 16–18: Information Classification, Asset Management, IT Asset Register | Sections 10–12 |
| Art. 21(2)(j) | Multi-factor authentication & secure communications | Docs 25, 29: Secure Communications Policy, Authentication Policy (incl. MFA requirements) | Section 11 |
Which Product Fits Your Starting Point
The Complete Toolkit contains all 68 generic documents. Sector packs contain fully rewritten, sector-adapted versions—not subsets of the Complete Toolkit. Choose based on your industry and scope.
| Document Category | Quick-Start Bundle €249 |
Complete Toolkit €497 |
Manufacturing Pack €349 |
Energy Pack €349 |
|---|---|---|---|---|
| Management & Planning | Generic | Generic | Sector-Adapted | Sector-Adapted |
| Risk Management | Generic | Generic | Sector-Adapted | Sector-Adapted |
| Core Security Policies | Generic | Generic | Sector-Adapted | Sector-Adapted |
| Business Continuity | — | Generic | Sector-Adapted | Sector-Adapted |
| Supply Chain | — | Generic | Sector-Adapted | Sector-Adapted |
| Incident Management | Generic | Generic | Sector-Adapted | Sector-Adapted |
| Measurement & KPIs | Generic | Generic | — | — |
| Board & Governance | — | Generic | — | — |
| Compliance & Audit Tools | — | Generic | — | — |
Who Uses the Complete Toolkit
CISO / NIS2 Officer — You need a documentation set that is audit-ready from day one. The toolkit provides pre-structured policies with regulatory references already embedded, so you can present a complete Article 21 evidence package to your national competent authority.
IT Security Lead — You need implementation-level detail, not abstract policy statements. Every document includes RACI tables for six roles, implementation checklists (0–4 weeks and 1–3 months), and measurable KPIs so your team knows exactly who does what and by when.
Compliance Manager — You need the regulatory mapping done before you start drafting. Each template references the applicable NIS2 Article, CIR 2024/2690 Annex section, and ENISA technical guidance—saving weeks of cross-referencing work.
Board Member / CEO — You need to demonstrate Article 20 due diligence. The Board Briefing Pack and Board Resolution template provide the governance artefacts that show management oversight is documented and active.
Common Questions About the NIS2 Complete Toolkit
Are these templates legal advice?
No. These templates are general samples intended as a starting point for your NIS2 documentation. They do not constitute legal advice. Every document must be reviewed by a qualified professional before adoption, taking into account your sector, jurisdiction, and organisational context.
Can I customise the documents?
Yes. All templates are delivered as editable DOCX and XLSX files. Organisation-specific fields—such as company name, scope, roles, and thresholds—are highlighted in red bold text so nothing is missed during customisation. You can add your logo, adjust section scope, and extend any template to fit your requirements.
What format are the files?
The toolkit contains DOCX (Word) and XLSX (Excel) files. They are compatible with Microsoft Word, Google Docs, LibreOffice Writer, and any application that supports the Open XML format. No proprietary software is required.
Do you offer refunds?
This is a digital download product. The right of withdrawal is waived at checkout in accordance with EU Directive 2011/83/EU, Article 16(m). You will be asked to consent to this waiver before completing payment.
How do I know these cover all NIS2 requirements?
Every document references the specific Article 21(2) measure it addresses, the corresponding CIR 2024/2690 Annex section, and applicable ENISA guidance. The compliance matrix above maps all ten measures to their toolkit documents. Doc 57 (CIR Compliance Matrix) provides a standalone crosswalk for audits.
Are updates included?
Yes. Your purchase includes one year of updates. As EU guidance evolves—new ENISA publications, member state implementation acts, or CIR amendments—updated templates are made available for download at no additional cost during your update period.
I already have ISO 27001 — do I still need this?
Yes. While NIS2 and ISO 27001:2022 share significant overlap, the Directive imposes additional requirements that ISO alone does not cover—including incident notification timelines (Article 23), supply chain due diligence (Article 21(2)(d)), board-level governance obligations (Article 20), and specific CIR 2024/2690 technical measures. Doc 53 (NIS2–ISO 27001 Mapping Spreadsheet) identifies every gap so you know exactly where your existing ISMS needs supplementing.
Start Your NIS2 Documentation Today
The Complete Toolkit provides a structured path from zero documentation to full Article 21 coverage—68 editable templates with the regulatory mapping already done, ready to customise, present to your board, and hand to auditors.
Stripe-secured checkout
VAT handled at checkout
1 year of updates included
Disclaimer: These templates are general samples for internal use. They do not constitute legal advice and must be reviewed by a qualified professional before adoption. No document in this pack guarantees NIS2 compliance. See our full Disclaimer.





Reviews
There are no reviews yet.