NIS 2 Documentation Toolkit
Become NIS 2 compliant without a consultant, with an AI wizard that speeds up filling out the documents.-
1 + 1 PACKAGE: The price includes the NIS 2 Documentation Toolkit + (free add-on) Local cybersecurity toolkit You can select a Local cybersecurity toolkit for 1 country during the purchase process
-
The NIS 2 Documentation Toolkit (in English) includes all required cybersecurity and incident reporting templates compliant with NIS 2 and Commission Implementing Regulation (CIR) 2024/2690 — in total, 77 documents Editable MS Word and MS Excel policies, procedures, plans, and forms required for NIS 2 articles 20, 21, and 23 and Commission Implementing Regulation (CIR) 2024/2690
-
The Local cybersecurity toolkit (in local language) includes all cybersecurity and incident reporting templates required by local laws and regulations Every EU country will publish their own laws and regulations based on NIS 2 and CIR 2024/2690 where they specify additional cybersecurity requirements
-
Free updates for 24 months
You’ll receive updated policies and procedures for a full 2 years after your purchase, free of charge.
-
AI-powered wizard Wizard that automatically inserts company-specific information into your documents — company name, logo, job titles, departments, etc.
-
Email support
We will answer your questions within 1 business day. You can send up to 10 questions per month.
-
Expert review of a document After completing the document, you can send it for our review, and we’ll give you our comments on what you need to improve to make it compliant with the standard.
-
One hour of live 1-on-1 online consultation
Set up a time to speak to our experts to resolve issues with implementation or answer questions regarding the standard.
Please select the country for Local cybersecurity toolkit to proceed with checkout
NIS 2 Documentation Toolkit
Total: €1997
NIS 2 Documentation Toolkit
NIS 2 Cybersecurity Training & Awareness
Total: €3733
AES-256bit SSL safe
Toolkit Documents
-
-
Project Launch Decision
-
Project Plan
-
Initial Training Plan
-
Policy on Information System Security
-
-
-
Risk Assessment Methodology
-
Risk Assessment Table
-
Risk Treatment Table
-
Acceptance of Residual Risks
-
Risk Assessment and Treatment Report
-
Risk Treatment Plan
-
-
-
IT Security Policy
-
Clear Desk and Clear Screen Policy
-
Mobile Device and Remote Work Policy
-
Bring Your Own Device (BYOD) Policy
-
Physical Security Policy
-
Information Classification Policy
-
Asset Management Procedure
-
IT Asset Register
-
Security Procedures for IT Department
-
Network Security Policy
-
Vulnerability and Patch Management Procedure
-
Logging and Monitoring Procedure
-
ICT Change Management Procedure
-
Backup Policy
-
Information Transfer Policy
-
Secure Communication Policy
-
Disposal and Destruction Policy
-
Policy on Encryption and Cryptographic Controls
-
Access Control Policy
-
Authentication Policy
-
Password Policy
-
Policy for the Acquisition, Development, and Maintenance of ICT Systems
-
Specification of Acquisition, Development, and Maintenance Requirements of ICT System
-
Security Policy for Human Resources
-
Statement of Acceptance of Cybersecurity Documents
-
Supplier Security Policy
-
Security Clauses for Suppliers and Partners
-
Confidentiality Statement
-
Directory of Suppliers and Service Providers
-
-
-
Business Impact Analysis Methodology
-
Business Impact Analysis Questionnaire
-
Business Continuity Strategy
-
Recovery Time Objectives for Activities
-
Examples of Disruptive Incident Scenarios
-
Preparation Plan for Business Continuity
-
Activity Recovery Strategy for (activity name)
-
Crisis Management Plan
-
Business Continuity Plan
-
Disruptive Incident Response Plan
-
List of Business Continuity Sites
-
Transportation Plan
-
Key Contacts
-
Disaster Recovery Plan
-
Activity Recovery Plan for (activity name)
-
Exercising and Testing Plan
-
Exercising and Testing Report
-
-
-
Incident Handling Policy
-
Minor Incident Response Procedure
-
Incident Log
-
Post Incident Review Form
-
Significant Incident Notification for Recipients of Services
-
Significant Incident Early Warning
-
Significant Incident Notification
-
Significant Incident Intermediate Report
-
Significant Incident Final Report
-
Significant Incident Progress Report
-
-
-
Measurement Methodology
-
Measurement Report
-
Training and Awareness Plan
-
Internal Audit Procedure
-
Internal Audit Program
-
Internal Audit Report
-
Internal Audit Checklist
-
Procedure for Management Review
-
Management Review Minutes
-
Procedure for Corrective Actions
-
Corrective Action Form
-
Adapted for Local Cybersecurity Laws
Thousands of Successful Customers
Serkan
I recently had the pleasure of utilizing the EN AI-Powered ISO 27001 Documentation Toolkit, complete with live expert support, and my experience has been nothing short of exceptional. The AI-powered toolkit significantly streamlined the process of creating and managing our ISO 27001 documentation, making it not only more efficient but also remarkably intuitive. The live expert support added a valuable layer of assurance, providing immediate, knowledgeable assistance whenever needed. This combination of innovative technology and expert guidance greatly facilitated our compliance journey, making complex tasks more manageable and less time-consuming. I highly recommend this toolkit to any organization aiming for ISO 27001 certification. It's a game-changer in simplifying the compliance process while ensuring accuracy and compliance with the standard.
Peter De Rudder
I used the Advisera ISO27001 toolkit a few years ago to build our ISMS. That toolkit was a great help. Now we need to comply with NIS2. The NIS2 toolkit has also some good material like the incident reporting which is very strict under NIS2. To document our NIS2 controls I used the Advisera "Comprehensive Guide to the NIS2 directive". In this document you have a very good table to check your existing controls and list the controls you are missing. A big thanks to the Advisera team who are always willing to help out if you have any questions.
Brian Gould
With the need to demonstrate GDPR compliance, the toolkit has enabled me to get through the required documents methodically and the online assistance has been fabulous.
Kevin Harkin
It provided a clear outline of what was required saving a massive amount of time and research.
Piers Anderson
Using the toolkit to create documentation has focused us on the tasks and changes that we need to make.
Steven Bailey
Allowed me to kickstart the documentation set of the project.
Vaclav Jakoubek
I have used the templates to get some know how for my work. Based on this I have prepared my methodology. Thanks for this.
Dragutin Vukovic
Although I already have all needed documentation in place, in your documentation toolkit I found a number of ideas for improvements to my documents.
Fabrizio Salvadori
Surely it is an essential starting point to deepen and tailor corporate documentation and to achieve the results planned in a shorter time. Thank's
Please select the country for Local cybersecurity toolkit to proceed with checkout
NIS 2 Documentation Toolkit
Total: €1997
NIS 2 Documentation Toolkit
NIS 2 Cybersecurity Training & Awareness
Total: €3733
AES-256bit SSL safe
What Makes the NIS 2 Toolkit Special?
WHY CHOOSE ADVISERA?
STEP-BY-STEP GUIDANCE FOR YOUR IMPLEMENTATION
WIZARDS THAT SPEED UP YOUR DOCUMENT WRITING BY 50%
90% COMPLETE – GUIDANCE FOR THE REMAINING 10%
ADDITIONAL INSTRUCTIONS FOR MORE SPECIFIC TASKS
FULLY CUSTOMIZABLE DOCUMENTS
ALL THE SUPPORT YOU NEED
Right for Your Business?
Created by Experts
Easy to Understand, Simple to Use
Built for Critical Infrastructure Entities
How does EXPERT SUPPORT work?
-
1
Live expert support
Our NIS 2 expert will meet with you and tell you where to start, what the next steps are, and how to resolve any issues you may face with security management. You can meet via Zoom, MS Teams, or through any other means at your convenience.
-
2
Email support
Reach out to us at any time during your implementation project, and have your questions answered within 24 hours by our experts.
-
3
Expert review of a document
Once you complete your documents, let our experts review them – they’ll provide you with feedback and indicate what needs to be improved.
Live expert support
Email support
Expert review of a document
Dejan Kosutic
NIS 2 Documentation Toolkit Options
NIS 2 Documentation Toolkit
Total: €1997
Please select the country for Local cybersecurity toolkit to proceed with checkout
NIS 2 Documentation Toolkit
NIS 2 Cybersecurity Training & Awareness
Total: €3733
Please select the country for Local cybersecurity toolkit to proceed with checkout
AES-256bit SSL safe
Frequently Asked Questions
Didn’t find the answer? Check out our FAQs. This easy-to-use section will help you to find answers to the most-asked questions.
Where can I check if a country has published local cybersecurity legislation based on NIS 2?
When and how will I get the toolkit?
Is this AI technology reliable?
What payment methods do you accept?
How do you keep my payment information safe?
Which currencies are accepted?
I’m just not certain if these documents are what I need. Can I take a look before buying?
Who is Advisera?
Schedule a Free Presentation
Need some help? Contact us now. We respond quickly.