Skip to content
NIS2 Directive 2022/2555

NIS2 Supply Chain Security

NIS2 requires essential and important entities to implement security measures for their supply chain. VendorTrace supports the vendor oversight evidence requirements directly.

Is your organisation in scope?

NIS2 applies to medium and large entities operating in 18 critical sectors: energy, transport, banking, financial market infrastructure, health, drinking water, digital infrastructure, ICT service management, public administration, and others. Member states may extend scope to additional entities. Consult your legal counsel to confirm whether your organisation is an essential or important entity under NIS2.

Article 21(2)(d)

Supply chain security

Security measures must address risks in the supply chain of each entity, including security-related aspects concerning relationships with direct suppliers or service providers.

How VendorTrace supports this requirement

  • Vendor register documents your ICT supply chain with service category and data handling classification
  • Outside-in scan verifies what each vendor is actually running — infrastructure, sub-processors, data regions
  • Assess: send structured questionnaires to vendors and record their formal responses
  • Scan evidence and vendor-supplied answers in one place for each supplier relationship
Article 21(2)(f)

Policies for ICT products and services

Entities must implement policies for using network and information systems, including ICT products and services acquired from third parties.

How VendorTrace supports this requirement

  • Vendor register classifies every tool as a data processor, sub-processor, or infrastructure provider
  • Certification tracking records which vendors hold ISO 27001, SOC 2, or other certifications
  • Document vault stores vendor-supplied DPAs, security questionnaire responses, and audit reports
  • Change alerts flag when a vendor's infrastructure changes so you can reassess their risk profile
Article 21(2)(a)

Policies on risk analysis and information system security

Entities must maintain policies on risk analysis and information security covering their network and information systems.

How VendorTrace supports this requirement

  • Posture scan provides a baseline risk assessment for your own domain
  • Vendor register with data handling classification supports supply chain risk categorisation
  • Scan history provides a time-series record of your security posture and vendor landscape
  • Audit logs record all review and acknowledgement actions for evidence of ongoing oversight

What VendorTrace does not do

VendorTrace supports supply chain security evidence gathering. It does not constitute a full NIS2 compliance program. NIS2 requires incident reporting to national authorities, CSIRT notification procedures, business continuity plans, and board-level accountability measures that are outside the scope of this platform. Consult a qualified NIS2 advisor for your full compliance roadmap.

Start building your supply chain evidence base

Add your vendors, scan their infrastructure, and send them a structured questionnaire. The Free plan needs no credit card.