NIS2 Emergency Planning: A Complete Guide to Building Business Continuity That Actually Works

A practical guide for implementing backup, recovery and crisis management obligations in accordance with NIS2 with specific steps, roles and testing procedures for real incidents.

Author
Dr. Kilian Schmidt
Date
Updated on
26.1.2026
NIS2 Emergency Planning: A Complete Guide to Building Business Continuity That Actually Works

NIS2 Emergency Planning: A Complete Guide to Building Business Continuity That Actually Works

When ransomware locks your systems at 2 AM on a Friday, your emergency plan either saves the company or reveals itself as fiction. There's no middle ground. The document sitting in SharePoint, unread, becomes worthless the moment you actually need it.

Article 21(2)(c) of the NIS2 Directive requires "business continuity, such as backup management and disaster recovery, and crisis management." These aren't suggestions. They're legal requirements with penalties reaching €10 million or 2% of global turnover for essential entities. But beyond the regulatory pressure lies a more fundamental truth: a properly built emergency plan is the difference between a disruption that costs hours and one that threatens your company's survival.

This guide walks through every step of creating an emergency plan that satisfies NIS2 requirements and actually functions under pressure. No theoretical frameworks. No checkbox exercises. Practical steps that thousands of European companies have used to build real resilience.

Understanding What NIS2 Actually Requires

The NIS2 Directive doesn't ask for vague "preparedness." It demands specific capabilities across three distinct domains that work together during incidents.

Backup management ensures critical data can be restored when primary systems fail or become compromised. This includes not just having backups, but verifying they work and protecting them from the same threats affecting production systems.

Disaster recovery covers the technical restoration of systems and services. When your database server fails or ransomware encrypts your infrastructure, DR procedures bring systems back online in a defined sequence with verified functionality.

Crisis management coordinates the human response. While technical teams restore systems, someone must make decisions, communicate with stakeholders, fulfill the 24-hour regulatory notification requirement, and ensure the business continues operating through alternate means if necessary.

The Implementing Regulation (EU) 2024/2690 adds specific evidence requirements: documented plans, business impact analysis, backup policies with restoration procedures, records of testing, and crisis communication templates. Regulators expect to see not just that you planned, but that you tested, documented the results, and improved based on findings.

Step 1: Business Impact Analysis — Finding What Actually Matters

You cannot protect everything equally. Attempting to do so wastes resources and creates confusion during actual incidents. Business Impact Analysis (BIA) identifies what matters most and establishes the recovery requirements that drive all subsequent planning.

Identifying Critical Business Functions

Start with what the business does, not what IT systems exist. Ask: if this function stopped entirely, what would happen in one hour? One day? One week?

Consider a mid-sized manufacturing company as an example. Their critical functions might include customer order processing, production scheduling, quality management systems, and financial transactions. Notice these are business activities, not applications. The ERP system matters because it supports these functions, not as an end in itself.

For each function, document who depends on it, what regulatory obligations attach to it, and what happens operationally when it fails. A customer portal outage for a SaaS company damages revenue and reputation immediately. An internal HR system outage is annoying but survivable for days.

Defining Recovery Requirements

Every critical function needs two specific metrics defined by business stakeholders, not IT alone.

Recovery Time Objective (RTO) answers: how quickly must this function be restored before unacceptable harm occurs? The answer varies dramatically by function. A hospital's patient records system might need a 15-minute RTO. A marketing analytics dashboard might tolerate 72 hours.

Recovery Point Objective (RPO) answers: how much data loss is acceptable? If you backup daily at midnight and an incident occurs at 11 PM, you could lose nearly 24 hours of data. For transaction systems, this might be catastrophic. For configuration files that rarely change, daily backups may be sufficient.

In general, RTO and RPO can only be determined if the so called MTPD (Maximum Tolerable Period of Disruption) has been determined. If we know, for instance, that we can survive a downtime of, let's say, 3 days.

Once the MTPD has been calculated, we know that our RTO must be smaller than or equal to out MTPD, as otherwise the organization would not survive the outage. This is typically determined before RTO and RPO.

Here's a practical example of how this looks documented:

Business Function RTO RPO Key Systems Dependencies
Customer transactions 4 hours 15 minutes Payment gateway, CRM, order database Internet connectivity, payment processor
Production scheduling 8 hours 1 hour ERP, MES Network, production floor terminals
Financial reporting 72 hours 24 hours ERP, data warehouse Finance team availability
Customer support 12 hours 24 hours Ticketing system, phone system Customer data access

These numbers drive everything else. If customer transactions require 15-minute RPO, you need near-continuous replication or very frequent backups. If financial reporting tolerates a 72-hour RTO, you have flexibility in how you approach its recovery.

Mapping Dependencies

Every function depends on systems, data, people, and third parties. Document these dependencies explicitly because during a crisis, missing a single dependency means a failed recovery.

For customer transactions, the dependency chain might look like this: the payment gateway requires internet connectivity and credentials stored in a specific vault. The CRM requires a database server, an application server, and integration with an email service. Order processing requires ERP connection and inventory system access. Each link in this chain must be recoverable within the function's RTO.

Step 2: Building Your Backup Management System

Backups represent your last line of defense. When ransomware encrypts production and attackers have deleted online backups, your offline copies determine whether you recover or pay.

The 3-2-1-1-0 Backup Strategy

Modern backup strategy extends the classic 3-2-1 rule:

Maintain three copies of critical data: production plus two backups. Use two different media types, because a bug affecting your primary backup system shouldn't compromise your secondary. Keep one copy offsite, geographically separated from your primary location. Add one copy offline or immutable, completely disconnected from any network that an attacker could reach. Verify zero errors through regular restoration testing.

The offline or immutable copy deserves emphasis. Sophisticated ransomware attacks specifically target backup systems. They compromise backup credentials, delete backup catalogs, and encrypt backup data alongside production. An air-gapped copy that physically cannot be reached through your network is your insurance against this scenario.

Backup Configuration by System Type

Different systems require different approaches based on their RPO requirements.

For systems requiring near-zero RPO, implement synchronous replication to a secondary site or continuous data protection that captures every change. Transaction databases and critical business applications typically fall here.

For systems with 1-24 hour RPO, daily or more frequent scheduled backups suffice. Verify they complete successfully and test restoration quarterly. Most business applications fit this category.

For systems with multi-day RPO, weekly backups with longer retention may be appropriate. Documentation, static configurations, and development environments often fall here.

Backup Documentation Requirements

For NIS2 compliance, document your backup strategy comprehensively. This documentation should cover what data is backed up and at what frequency, where backups are stored physically and logically, how long backups are retained, who can access backup systems and with what credentials, how backups are protected including encryption and access controls, and the procedures for restoration, including step-by-step instructions.

Step 3: Disaster Recovery Procedures

Backups without restoration procedures are just storage costs. DR procedures translate backup capability into actual recovery.

Creating Recovery Procedures That Work

Each critical system needs documented recovery procedures detailed enough that someone unfamiliar with the system could execute them. This isn't an insult to your team; it's recognition that during a 2 AM crisis, your primary expert might be unavailable.

A recovery procedure for a database server might include these elements:

Pre-recovery assessment: Check what caused the failure. Verify backup integrity before beginning restoration. Confirm network connectivity to the restoration target. Estimate total recovery time and communicate to stakeholders.

Recovery execution: Start with the detailed steps. Connect to backup management console using credentials from the password vault (location specified). Navigate to the backup catalog and select the most recent verified backup. Initiate restoration to the designated recovery server. This typically takes 2-4 hours for a database of this size. Monitor progress and address any errors that appear.

Verification: Once restored, run database integrity check using the specified command. Verify application connectivity by testing the designated URL. Confirm data currency by checking the timestamp of the last transaction. Execute test transactions through the application.

Completion: Notify the technical lead that the database is restored and verified. Update the incident log with restoration details. Schedule post-incident review within 48 hours.

Notice the specificity. Not "restore the backup" but exactly how, where to find credentials, what commands to run, how long each step takes, and how to verify success.

Recovery Sequence Planning

Systems have dependencies. You cannot restore your web application before the database it depends on is running. Document the recovery sequence based on these dependencies.

A typical sequence might be: First, restore core infrastructure, including network, DNS, and authentication. Second, restore database systems. Third, restore application servers. Fourth, restore integration and middleware. Fifth, restore user-facing systems.

Within each phase, specify the order of individual system restoration.

Alternative Operations

Sometimes, full recovery takes longer than business can tolerate. Document workarounds that allow critical functions to continue during extended outages.

If your order management system is down for 24 hours, can customer service take orders via phone and enter them manually later? If email is unavailable, do you have an alternate communication channel? If your primary data center is completely lost, can you operate from a secondary location?

These alternatives aren't preferred, but they provide continuity options while technical recovery proceeds.

Step 4: Crisis Management Team and Procedures

Technical recovery alone isn't sufficient. Someone must coordinate the overall response, make decisions, and manage communications.

Defining the Crisis Management Team

Your crisis management team needs clear roles with defined responsibilities and pre-authorized decision-making authority.

Executive sponsor holds ultimate authority for major decisions, including resource allocation, external communication approval, and business impact tradeoffs. This person can commit company resources without waiting for additional approvals.

Crisis coordinator manages the overall response, ensures all workstreams are progressing, identifies blockers, and maintains the incident timeline. This person doesn't do technical work; they ensure technical work happens.

Technical lead directs IT recovery efforts, coordinates technical teams, and provides status updates to the crisis coordinator. They make technical decisions about recovery approach and sequence.

Communications lead handles internal employee communications, external customer notifications, media inquiries, if applicable, and coordinates with marketing and PR. They ensure consistent messaging and timely updates.

Legal and compliance contact addresses regulatory notification requirements, including the NIS2 24-hour requirement, assesses liability implications, and advises on communication content.

Each role needs a primary and a backup person assigned. Document contact information and escalation procedures.

Pre-Authorized Decision Authority

During crises, waiting for approvals costs critical time. Define in advance what decisions each team member can make without escalation.

The technical lead might be authorized to spend up to €50,000 on emergency vendor support, bring in contractors, and make system configuration changes. The communications lead might be authorized to send internal updates and standard customer notifications. The executive sponsor might need to approve external media statements, expenditures above the threshold, and decisions affecting customer contracts.

Document these authorities explicitly so nobody hesitates during an actual incident.

Crisis Communication Templates

When an incident occurs, you don't have time to craft communications from scratch. Prepare templates in advance.

For internal employee notification: "We are currently experiencing a technology incident affecting [systems]. Our teams are working to restore service. [Work from home/come to office] instructions. Updates will follow every [timeframe]. Questions to [contact]."

For customer notification: "We are aware of an issue affecting [services]. Our technical teams are actively working on a resolution. We expect [estimated impact/timeline]. We will provide updates as we have more information. We apologize for any inconvenience."

For regulatory notification, NIS2 requires a 24-hour early warning to your national CSIRT or competent authority. This template should include entity identification, description of the incident and affected systems, initial assessment of impact, preliminary indication of whether the incident was caused by unlawful or malicious acts, and contact information for follow-up.

Having these templates reviewed by legal and approved in advance eliminates delay when you need to communicate under pressure.

Step 5: Testing Your Emergency Plan

An emergency plan that has never been tested is an assumption about what would happen, not a demonstrated capability. Testing reveals gaps, builds team muscle memory, and validates that recovery actually works.

Types of Testing

Tabletop exercises gather the crisis management team to walk through a scenario verbally. No systems are touched. The goal is testing decision-making, communication flows, and identifying gaps in procedures. Run these semi-annually.

A tabletop scenario might be: "It's 7 AM Monday. Overnight, ransomware encrypted 70% of your servers, including all domain controllers. The attackers demand €500,000 in Bitcoin. Your CISO is on vacation in a location without reliable phone service. Go."

Walk through: Who gets notified first? What decisions need to be made immediately? How do you communicate with employees who can't access email? When and how do you notify regulators? What's your negotiation position on ransom? Each question reveals whether your procedures address real scenarios.

Functional tests verify that specific technical capabilities work. Can you actually restore from backup? How long does it take? Test backup restoration quarterly for critical systems.

Full-scale exercises simulate actual crisis conditions as closely as possible without affecting production. Activate response procedures, use communication channels, and work through recovery steps. Run these annually or every 18 months for the full scope, with smaller functional tests throughout the year.

Documenting Test Results

For NIS2 compliance, testing must be documented. Record what was tested, including the date, scenario, and participants. Note what worked and what didn't work. Capture specific issues identified and the remediation actions planned with assigned owners and target dates. Document how remediation was verified.

This documentation demonstrates to regulators that you maintain and improve your capabilities over time.

Improving Based on Results

Every test reveals improvement opportunities. Maybe restoration took 6 hours instead of the planned 4. Maybe the backup for a critical system hadn't run successfully for two weeks. Maybe the crisis coordinator didn't know how to reach the executive sponsor.

Each finding needs an owner and a deadline. Track remediation to completion. The next test should verify that the fix worked.

Putting It All Together: Your NIS2 Emergency Plan Documentation

Your complete emergency plan should include these documented components:

Business Impact Analysis covering methodology, critical function identification, RTO, and RPO for each function, dependency mapping, and management approval.

Business Continuity Plan covering scope and objectives, roles and responsibilities, continuity procedures for each critical function, communication procedures, and alternative operations.

Disaster Recovery Plan covering system recovery procedures with step-by-step detail, recovery sequence, resource requirements, contact information for vendors and support, and alternative arrangements.

Backup Management Documentation covering backup policy, backup schedules and coverage, retention periods, security controls, and restoration procedures.

Crisis Management Documentation covering team composition with contact details, activation criteria, response procedures, communication templates, and escalation paths.

Testing Records covering test schedule, results of each test, issues identified, remediation actions and verification.

This documentation serves dual purposes: it guides actual response during incidents, and it demonstrates compliance to regulators.

The Reality Check

Building a complete emergency plan takes effort. For a mid-sized company starting from minimal documentation, expect 2-4 months of focused work to establish the foundation, with ongoing maintenance thereafter.

But the alternative is worse. When an incident occurs without preparation, you're making critical decisions under pressure without information, trying to restore systems without documented procedures, and discovering dependencies through trial and error. The cost in extended downtime, regulatory penalties, and reputation damage far exceeds the investment in proper planning.

NIS2 compliance isn't just about avoiding fines. It's about building the capabilities that let your company survive incidents that are increasingly common and increasingly severe.

Kertos helps companies build and maintain emergency plans that work. Our platform includes integrated BCP and DRP documentation, backup verification tracking, testing management, and the evidence trails regulators expect. We've helped hundreds of European companies build resilience that passes both audits and real incidents.

Start your automated NIS2 assessment

The Founder's Guide about NIS2: Prepare your company Now before

Protect your startup: Discover how NIS2 can impact your business and what you need to consider now. Read the free white paper now!

The Founder's Guide about NIS2: Prepare your company Now before

Protect your startup: Discover how NIS2 can impact your business and what you need to consider now. Read the free white paper now!

NIS2 Emergency Planning: A Complete Guide to Building Business Continuity That Actually Works
Ready, your compliance to put on autopilot?
Dr. Kilian Schmidt

Dr. Kilian Schmidt

CEO & Co-Founder, Kertos GmbH

Dr. Kilian Schmidt developed a strong interest in legal processes early on. After studying law, he began his career as Senior Legal Counsel and Data Protection Officer at the Home24 Group. After working at Freshfields Bruckhaus Deringer, he moved to TIER Mobility, where, as General Counsel, he was significantly involved in expanding the legal and public policy department - and grew the company from one to 65 cities and from 50 to 800 employees. Motivated by limited technological advances in the legal sector and inspired by his consulting work at Gorillas Technologies, he co-founded Kertos to develop the next generation of European data protection technology.

About Kertos

Kertos is the modern backbone of the data protection and compliance activities of scaling companies. We enable our customers to implement integrated data protection and information security processes in accordance with GDPR, ISO 27001, TISAX®, SOC2 and many other standards quickly and cheaply through automation.

Ready to simplify GDPR compliance?

CTA Image

📅 Schedule Your 5min Compliance Check

Please enter your business email to continue. We require a company email address to ensure we can best serve your organization.

📞 5min Compliance Check