NIS2 resources
Guides, checklists & official sources
Everything you need to understand NIS2, prepare for compliance, and find the right regulatory guidance — in one place.
FAQ
Frequently asked questions
Plain-language answers to the questions we hear most often from organisations in Bulgaria.
General
Scope
Obligations
Penalties
Pre-audit checklist
What to have ready before a NIS2 audit
A practical checklist of the documents, processes and evidence an auditor or regulator will expect to see.
Governance & policies
Documented cybersecurity policy, formally approved and signed off by senior management
BothAssigned cybersecurity roles and responsibilities — named individuals, not just job titles
BothBoard or management meeting minutes showing cybersecurity was discussed and reviewed
EssentialRecord of cybersecurity training completed by senior management in the last 12 months
BothRisk management
Current risk register covering cybersecurity risks, with risk owners assigned
BothEvidence of a formal risk assessment conducted within the last 12 months
BothVulnerability management process documentation and evidence of recent scans
BothRecord of how security controls are reviewed following infrastructure or threat changes
EssentialIncident response
Documented incident response plan including detection, containment and recovery steps
BothEvidence of incident response plan testing (tabletop or live test) in last 12 months
BothCERT Bulgaria notification contact and 24/72-hour reporting workflow documented
BothLog retention policy and evidence of centralised logging in place
EssentialSupply chain
Register of critical technology suppliers and service providers
BothEvidence of security assessments or questionnaires completed for key vendors
BothContracts with critical suppliers containing cybersecurity requirements or SLAs
EssentialAccess control & technical measures
MFA enforced on all administrative and privileged accounts — evidence of configuration
BothAccess review completed in last 6 months — evidence that least privilege is applied
BothNetwork segmentation documentation showing separation of critical systems
EssentialEncryption policy covering data at rest and in transit
BothBusiness continuity
Backup and recovery procedures documented with defined RTO and RPO targets
BothEvidence of backup restoration test completed within the last 12 months
BothBusiness continuity plan covering cyber incident scenarios, with named crisis contacts
BothCrisis communication plan — who is notified internally and externally during an incident
EssentialOfficial sources
Regulatory & reference links
CERT Bulgaria
National CSIRT — primary point of contact for NIS2 incident notifications
www.govcert.bg
DANS
State Agency for National Security — supervisory authority for NIS2 compliance in Bulgaria
dans.bg
European Commission — NIS2
Official EU NIS2 directive page including the full directive text
digital-strategy.ec.europa.eu/en/policies/nis2-directive
ENISA — NIS2 guidance
EU Agency for Cybersecurity — technical guidance and good practices for NIS2
www.enisa.europa.eu/topics/cybersecurity-policy/nis-directive-new
Not sure where to start?
Take our free readiness assessment or talk to a Sunwell advisor — no obligation.