Use this checklist to structure your NIS2 program. Each item can be automated or evidenced via Verity Edge.
| Control Area | What to do | Owner | Next step |
|---|---|---|---|
| Asset inventory | Maintain an up-to-date inventory of all edge systems and sites | IT | Automate this step |
| Incident response | Define alert thresholds, escalation, and MTTR targets | Ops | Create alert rules |
| Backup & recovery | Document policies, test restores, and retain evidence | Compliance | Generate evidence |
| Supply chain | Assess vendors, document data flows, minimize personal data | Compliance | Automate records |