Magazine
Cloud Storage
Enterprise Storage

Securing Your Future: The NIS-2 Essential Entities Best Backup Solution

26.02.2026

13

Minutes
Thomas Demoor
CTO Impossible Cloud
Navigating compliance, data sovereignty, and robust recovery for critical EU infrastructure.

The European Union's NIS-2 Directive (Directive (EU) 2022/2555) significantly evolves cybersecurity legislation, aiming to bolster the collective resilience of critical infrastructure across the continent. For organisations classified as 'essential entities', the directive introduces a comprehensive set of obligations, with a particular emphasis on robust cybersecurity risk management and incident response. A cornerstone of this framework is the requirement for effective backup and disaster recovery strategies, making the selection of a compliant backup solution a paramount concern for IT leaders and compliance officers.

Failing to meet these new standards carries substantial risks, including administrative fines of up to €10 million or 2% of global annual turnover, whichever is higher, alongside potential personal liability for senior management. This necessitates a strategic re-evaluation of existing backup infrastructures, moving beyond mere data preservation to a holistic approach that encompasses data sovereignty, immutability, rapid recovery, and supply chain security. This article will delve into the intricacies of NIS-2, outline the critical role of backup, and provide a framework for identifying a compliant and resilient cloud storage solution.

Key Takeaways

  • The NIS-2 Directive mandates robust backup and disaster recovery for essential entities, with significant penalties for non-compliance and personal liability for management.
  • A NIS-2 compliant backup solution must prioritise EU data residency, strong encryption, immutable storage, and S3 compatibility to ensure data sovereignty and operational resilience.
  • EU sovereign cloud providers like Impossible Cloud offer the ideal balance of compliance, security, predictable costs, and performance, mitigating CLOUD Act risks and simplifying the path to NIS-2 readiness.

Understanding NIS-2: Scope and Obligations for Essential Entities

The NIS-2 Directive significantly expands the scope of its predecessor, NIS-1, bringing a wider array of sectors and entities under its regulatory umbrella. Essential entities, which face the most stringent oversight, typically include medium to large organisations operating in sectors deemed highly critical to the economy and society. These sectors span energy, transport, banking, financial market infrastructures, health, drinking water, wastewater, digital infrastructure (including cloud computing services), public administration, and space. Member States were required to transpose the directive into national law by 17 October 2024, with full implementation expected within two years from October 2024.

Key obligations under NIS-2 for these entities include comprehensive cybersecurity risk management measures, stringent incident reporting protocols, and robust business continuity plans. Organisations must implement technical and organisational measures to manage risks to the security of network and information systems, covering areas such as incident handling, supply chain security, access control, and encryption. Furthermore, NIS-2 places direct accountability on senior management for cybersecurity compliance, requiring them to approve risk management measures and potentially facing personal liability for infringements.

Incident reporting is a critical component, with essential entities mandated to provide an 'early warning' within 24 hours of becoming aware of a significant incident, a detailed report within 72 hours, and a final report within one month. A 'significant incident' is defined as one causing severe operational disruption or financial loss, or affecting other persons by causing considerable material or non-material damage. These requirements underscore the need for proactive and well-documented cybersecurity strategies, with backup and recovery forming a foundational element.

The Indispensable Role of Backup and Disaster Recovery in NIS-2 Compliance

For essential entities, backup and disaster recovery are not merely IT best practices; they are explicit and fundamental requirements for achieving NIS-2 compliance. The directive explicitly calls out 'backup management and disaster recovery' as part of the mandatory risk-management measures. A robust backup strategy is central to ensuring business continuity and operational resilience, enabling organisations to recover swiftly from cyber incidents such as ransomware attacks, data corruption, or system failures. Without a reliable and tested backup solution, the ability to restore critical services and data following an incident is severely compromised, directly impacting an entity's compliance posture and potentially leading to prolonged downtime and significant financial and reputational damage.

NIS-2 mandates that organisations develop, maintain, and regularly test business continuity and disaster recovery plans tailored to cyber scenarios. This includes defining clear recovery time objectives (RTOs) and recovery point objectives (RPOs), establishing fallback procedures, and ensuring that operations can be restored quickly. The integrity and availability of data are paramount, and backups serve as the ultimate safety net. Organisations must regularly verify backup integrity, detect changes in backup configurations, and validate that backups are protected from unauthorised access.

Beyond technical implementation, NIS-2 also emphasises the security of the supply chain. This means that any third-party backup provider or cloud storage solution used by an essential entity must also adhere to stringent security standards. Organisations must assess, monitor, and manage cyber risks across their entire value chain, including their direct suppliers of products and services. This extends to ensuring that contractual agreements with backup providers include specific cybersecurity obligations, incident notification procedures, and alignment with recognised standards such as ISO 27001 or SOC 2.

Key Criteria for a NIS-2 Compliant Backup Solution

Selecting the best backup solution for NIS-2 essential entities requires a meticulous evaluation against several critical criteria. These criteria ensure not only technical efficacy but also adherence to the directive's overarching principles of risk management, data integrity, and operational resilience. A compliant solution must offer comprehensive data protection, robust security features, and clear jurisdictional alignment.

Data Residency and Sovereignty

For EU-based essential entities, data residency is a paramount concern. While GDPR does not strictly mandate that all EU resident data remain physically within the EU/EEA, it imposes stringent conditions for international data transfers, requiring adequate levels of protection. The US CLOUD Act, for instance, allows US authorities to compel US-based cloud providers to hand over data stored anywhere in the world, regardless of its physical location or local data protection laws. This creates a direct conflict with EU data protection principles and can undermine data sovereignty. Therefore, choosing a backup solution with infrastructure exclusively located within the EU, under EU jurisdiction, is crucial to mitigate extraterritorial access risks and ensure legal certainty.

Security Measures: Encryption, Immutability, and Access Control

NIS-2 mandates robust security measures, and a backup solution must reflect this. End-to-end encryption (in transit and at rest) is essential to protect sensitive data from unauthorised access. Immutable Storage, often implemented via Object Lock, is vital for ransomware protection, preventing data from being altered or deleted for a specified period. Strong access controls, including Identity and Access Management (IAM) with Multi-Factor Authentication (MFA) and Role-Based Access Control (RBAC), are necessary to ensure only authorised personnel can access backup data.

Reliability, Availability, and Recoverability

The ability to recover data quickly and reliably is at the heart of NIS-2's business continuity requirements. A backup solution must offer high durability (e.g., 99.999999999%) and availability to ensure data is always accessible when needed. Regular testing of backup and recovery procedures is explicitly required by NIS-2 and ISO 27001. This includes validating backup integrity and measuring recovery times against defined RTOs. Solutions that provide automated restore testing and disaster recovery drills can significantly aid compliance efforts.

S3 Compatibility and Vendor Lock-in Avoidance

S3 compatibility has become a de facto standard for object storage, offering flexibility and avoiding vendor lock-in. A backup solution that is fully S3-compatible allows essential entities to leverage existing tools, applications, and scripts without costly re-architecting. This also aligns with the spirit of the EU Data Act, which aims to facilitate data portability and switching between data processing service providers, reducing vendor lock-in.

Evaluating Cloud Storage Approaches for NIS-2 Compliance

When considering cloud storage for NIS-2 compliant backups, essential entities face a choice between various approaches, each with distinct implications for security, sovereignty, and cost. Understanding these differences is crucial for making an informed decision that aligns with regulatory obligations and operational needs. The primary options typically include hyperscaler cloud providers, EU sovereign cloud providers, and on-premise solutions.

Hyperscaler Cloud Providers (e.g., AWS, Azure, Google Cloud)

Major US-based hyperscalers offer extensive global infrastructure and a wide range of services. While they provide data centres within the EU, their ultimate corporate jurisdiction remains outside the EU. This exposes data to potential extraterritorial access requests, such as those under the US CLOUD Act, even if the data is physically stored in an EU data centre. This can create a conflict with GDPR and NIS-2 requirements for data sovereignty and supply chain security. Furthermore, their pricing models often include complex egress fees and API call charges, which can lead to unpredictable costs, especially during large-scale data recovery operations.

On-Premise Solutions

Keeping backups entirely on-premise offers maximum control over data residency and direct physical security. However, this approach demands significant upfront capital expenditure for hardware, ongoing maintenance, and dedicated IT resources. Scaling capacity can be slow and costly, and achieving high durability and resilience against site-specific disasters (e.g., fire, flood) requires complex multi-site deployments. The 3-2-1 backup rule, often recommended for ISO 27001 compliance, suggests having one copy offsite, which on-premise solutions struggle to achieve without additional cloud integration.

EU Sovereign Cloud Providers

EU sovereign cloud providers are specifically designed to address the unique regulatory and sovereignty concerns of European organisations. By operating exclusively within EU jurisdiction and adhering to EU data protection laws, they eliminate the risk of extraterritorial access from non-EU governments. These providers typically offer transparent pricing models without hidden fees, and their focus on European compliance frameworks (GDPR, NIS-2, EU Data Act) simplifies the compliance journey for essential entities. They often combine the scalability and resilience of cloud infrastructure with the legal certainty of EU data residency.

To illustrate the differences, consider the following comparison:

Comparison of Cloud Storage Approaches for NIS-2 Backup Compliance
Criteria US Hyperscaler Cloud On-Premise EU Sovereign Cloud
Data Residency & Jurisdiction EU data centres available, but US corporate jurisdiction (CLOUD Act risk) Full local control, but limited geographical resilience Exclusively EU data centres, EU corporate jurisdiction (no CLOUD Act risk)
NIS-2 Supply Chain Security Complex due diligence due to non-EU ultimate control and potential for extraterritorial access Direct control over own supply chain, but requires internal expertise Simplified due diligence, clear EU legal framework, transparent operations
Cost Predictability Variable, with egress fees, API charges, and tiered storage complexities High upfront CAPEX, ongoing OPEX for maintenance and scaling Transparent, predictable pricing (e.g., no egress fees, no API charges)
Scalability & Durability High scalability, 11 nines durability Limited scalability, durability depends on internal architecture High scalability, 11 nines durability
S3 Compatibility Native S3 API (AWS), S3-compatible APIs (Azure, GCP) Requires third-party software or custom development Full S3 API compatibility
Certifications (e.g., ISO 27001, SOC 2) Typically certified, but scope may not fully address EU sovereignty concerns Requires internal certification efforts Typically certified, with a focus on EU compliance

Impossible Cloud: The NIS-2 Essential Entities Best Backup Solution for EU Sovereignty

For essential entities navigating the complexities of NIS-2 compliance, Impossible Cloud offers a compelling and robust backup solution that is sovereign by design. Built on decentralised architecture and operated exclusively in certified European data centres across Germany, the Netherlands, the UK, and Denmark, Impossible Cloud ensures that your data remains within EU jurisdiction, free from extraterritorial access risks such as the US CLOUD Act. This commitment to EU-only data residency provides the legal certainty and digital sovereignty that NIS-2 demands for critical infrastructure.

Impossible Cloud's S3-compatible object storage serves as a drop-in replacement for existing backup infrastructures, allowing organisations to leverage their current tools, applications, and scripts without costly code rewrites. This full S3-API compatibility ensures seamless integration with leading backup solutions like Veeam, Acronis, MSP360, and Nakivo, simplifying the migration process and accelerating the path to NIS-2 compliance. The Always-Hot object storage model ensures all data is immediately accessible, eliminating tier-restore delays and providing predictable latencies crucial for meeting stringent RTOs during incident recovery.

Security is paramount, and Impossible Cloud is engineered to deliver multi-layer encryption for data in transit and at rest, Immutable Storage (Object Lock) for ransomware protection, and robust IAM with MFA/RBAC. These features directly address NIS-2's requirements for strong cybersecurity risk management measures, protecting data integrity and confidentiality. Furthermore, Impossible Cloud holds key certifications including ISO 27001, SOC 2 Type II, and PCI DSS, providing verifiable assurance of its security posture and simplifying your own compliance audits. You can learn more about our commitment to security and compliance on our S3-compatible object storage page.

Beyond technical capabilities, Impossible Cloud offers predictable, transparent pricing with no hidden egress fees, no API call costs, and no minimum storage duration. This predictable by design approach allows essential entities to accurately budget for their backup and disaster recovery needs, avoiding the cost surprises often associated with hyperscaler models. This financial clarity, combined with superior data sovereignty and enterprise-grade performance, positions Impossible Cloud as the ideal NIS-2 essential entities best backup solution for organisations prioritising compliance and control.

Implementing a Resilient Backup Strategy with Impossible Cloud for NIS-2

Adopting Impossible Cloud as your backup solution for NIS-2 compliance involves a strategic approach that integrates seamlessly with your existing cybersecurity framework. The first step is to conduct a thorough risk assessment, identifying all critical data and systems that fall under NIS-2's scope and defining clear Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). This assessment should inform your backup frequency, retention policies, and disaster recovery plan, all of which can be configured and managed within Impossible Cloud's flexible S3-compatible environment.

Leveraging Impossible Cloud's full S3-API compatibility, essential entities can easily integrate their chosen backup software. Whether you use Veeam, Acronis, MSP360, or other verified integrations, the transition to Impossible Cloud as your secure, sovereign backup target is straightforward. This allows you to maintain familiar operational workflows while benefiting from EU-only data residency and predictable pricing. Implementing Object Lock for critical backups provides an additional layer of ransomware protection, ensuring data immutability for compliance with NIS-2's resilience requirements.

Regular testing of your backup and disaster recovery plan is not just a recommendation but a NIS-2 mandate. With Impossible Cloud, you can design and execute automated restore tests and disaster recovery drills, documenting the results to provide audit-ready evidence of your compliance. The multi-AZ replication and 11 nines durability of Impossible Cloud's architecture ensure that your data is resilient and available, even in the face of localised disruptions. For organisations looking to understand the financial benefits, our pricing page offers transparent details, and you can read customer success stories to see real-world impact.

Furthermore, NIS-2's emphasis on supply chain security means that your choice of cloud provider is critical. Impossible Cloud's commitment to European data centres and EU legal certainty simplifies your third-party risk management, providing a transparent and compliant partner in your cybersecurity ecosystem. By choosing Impossible Cloud, essential entities can not only meet but exceed NIS-2's backup and recovery obligations, building a truly resilient and sovereign digital infrastructure.

FAQ

What is the NIS-2 Directive and who does it apply to?

The NIS-2 Directive is an EU cybersecurity regulation that expands on NIS-1, aiming to strengthen cybersecurity across critical sectors. It applies to 'essential entities' and 'important entities' in sectors like energy, transport, health, banking, and digital infrastructure. These entities are typically medium to large organisations, though some smaller entities providing critical services are also included.

Why is backup so critical for NIS-2 essential entities?

Backup and disaster recovery are explicit requirements under NIS-2 for essential entities. They are crucial for business continuity, enabling rapid recovery from cyber incidents like ransomware attacks or data loss. Robust, tested backups ensure data availability and integrity, which are fundamental to meeting NIS-2's risk management and incident response obligations.

What are the penalties for NIS-2 non-compliance?

Non-compliance with NIS-2 can result in substantial administrative fines. For essential entities, penalties can reach up to €10 million or 2% of the company's total global annual turnover, whichever is higher. Additionally, senior management can be held personally liable for cybersecurity infringements.

How does the CLOUD Act affect NIS-2 compliance for EU organisations?

The US CLOUD Act allows US authorities to compel US-based cloud providers to provide data, regardless of where it's stored, which can conflict with EU data protection laws like GDPR and NIS-2. For EU essential entities, using a US-headquartered cloud provider, even with EU data centres, introduces a risk of extraterritorial data access, undermining data sovereignty.

What role does data sovereignty play in choosing a NIS-2 backup solution?

Data sovereignty is crucial for NIS-2 compliance as it ensures that data is subject only to EU laws, preventing access by non-EU governments. Choosing a backup solution with infrastructure exclusively in EU data centres, operated by an EU-based provider, is vital to maintain legal certainty and protect sensitive data from foreign legal mandates.

Would you like more information?

Send us a message and our experts will get back to you shortly.