Guide
NIS2 Checklist
Use this checklist to structure your NIS2 program. Each item can be automated or evidenced via Verity Edge.
| Control Area | What to do | Owner | Next step |
|---|---|---|---|
| Asset inventory | Maintain an up-to-date inventory of all edge systems and sites | IT | Automate this step |
| Incident response | Define alert thresholds, escalation, and MTTR targets | Ops | Create alert rules |
| Backup & recovery | Document policies, test restores, and retain evidence | Compliance | Generate evidence |
| Supply chain | Assess vendors, document data flows, minimize personal data | Compliance | Automate records |
- Do we need personal data to prove compliance?
- No. Verity Edge uses operational metrics only, avoiding PHI/PII in the telemetry pipeline.
- How long does an assessment take?
- Most SMEs reach audit-ready status within an 8-week structured assessment.