Compliance Documentation Audit for NIS2 Baseline Obligations: Method Overview


Article Thumbnail

Compliance Documentation Audit for NIS2 Baseline Obligations: Method Overview

February 13, 2026

Applies to: NIS2 entities (essential and important) operating under ACN baseline specifications.

A Compliance Documentation Audit is the fastest way to understand whether your NIS2 documentation set is only formally present or actually usable for governance, risk management, and supervisory evidence. In Aegister’s model, the audit maps each required document to applicable NIS2 requirements, measures documentary maturity on a 0–4 scale, verifies evidence traceability, and checks whether board-level approvals are in place where required.

For organizations already notified by ACN, incident-notification duties run on the 9-month window, while baseline security measures run on the 18-month window from the inclusion notice; for first-wave notifications communicated from 12 April 2025, that timeline lands around January 2026 and October 2026 respectively.

Key Takeaways

  • NIS2 documentation quality is a governance issue, not a formatting issue.
  • The audit must connect legal obligations (Articles 23, 24, 25) to concrete document evidence.
  • Appendix C approval checkpoints should be tested early to avoid late-stage board bottlenecks.
  • A practical output is a remediation queue ordered by critical, major, and minor actions.

Scope of This Article

This article covers:

  • What the Compliance Documentation Audit service is.
  • Which document families are typically reviewed.
  • How the methodology turns findings into a prioritized remediation plan.

This article does not cover:

  • Client-specific findings or data.
  • Full proprietary templates or full internal scoring sheets.

Regulatory Anchor Points and Timeline

AnchorWhat it means for documentationOperational implication
Legislative Decree 138/2024Articles 23, 24, 25 set obligations for governance, cyber risk measures, and incident notification.Document sets must be board-aware, risk-based, and incident-ready.
ACN Determination on baseline obligationsDefines baseline specifications and technical annexes for NIS entities.Requirements must be mapped at measure/point level, not only at policy-title level.
ACN Reading GuideClarifies evidence logic, risk-based clauses (Appendix B), and board-approved documents (Appendix C).The audit must test documentary evidence, risk linkage, and approvals as separate controls.
ACN NIS portal: baseline modalities/specificationsProvides implementation context for baseline obligations and incident obligations.Planning should align remediation sequencing with active notification duties and the baseline deadline window.

What We Audit in Practice

Document familyTypical examples in a NIS2 programWhat the audit verifies
Policy setDomain policies (risk, governance, access control, continuity, incidents, suppliers)Coverage of applicable requirements and governance ownership
ProceduresAccess, incident response, logging, backup, monitoring, supplier checksOperability: roles, steps, timings, escalation paths
PlansRisk treatment, continuity, disaster recovery, incident-management plansCross-references, consistency, and review cadence
Inventories and registriesAsset, supplier, privileged-access, training, backup, vulnerability recordsEvidence existence, traceability, and update discipline
Governance evidenceApproval records, revision history, formal accountability pointsReadiness for supervisory checks and internal board oversight

Aegister Audit Workflow (5 Phases)

  1. Scope and applicability setup
    We define perimeter, entity type, and obligations in scope, then normalize the documentary baseline.
  2. Requirement-to-document mapping
    Each relevant requirement is mapped to one or more expected documentary controls.
  3. Quality scoring
    Each requirement is reviewed across five dimensions with a 0–4 score.
  4. Cross-document coherence and evidence checks
    We test whether policies, procedures, plans, and evidence references are mutually consistent.
  5. Remediation planning and executive reporting
    Findings are converted into a sequenced action plan suitable for operational teams and board reporting.

Scoring Model Used in the Audit

DimensionCore questionTypical red flag
CoverageIs the requirement materially addressed?Requirement absent or only implicit
SpecificityAre roles, steps, and timings operationally clear?Generic principle statements only
TraceabilityIs there explicit requirement-level traceability?Normative references too generic
EvidenceAre required supporting records/plans/procedures traceable?Mentioned evidence not locatable
Formal approval (where applicable)Is governance approval path explicit where required?Missing approval pathway for board-relevant documents

Maturity Scale

ScoreLabelPractical meaning
0Not addressedImmediate compliance risk
1Partially mentionedHigh risk of audit failure
2Addressed with gapsMedium risk; targeted remediation needed
3Substantially compliantMinor refinements needed
4Fully compliantOperationally and evidentially robust

Board-Approval Checkpoints (Appendix C Focus)

The ACN reading framework highlights specific items that require formal approval by governing/management bodies (Appendix C context). In practice, we test at least the following 11 checkpoints during documentary audit design:

Measure pointAudit checkpoint area
GV.RM-03:p1Cyber risk management strategy/policy approval path
GV.PO-01:p1Security policy approval path
GV.PO-01:p2Policy review and update approval path
ID.RA-06:p1Risk-treatment plan approval path
ID.IM-04:p1Business continuity plan approval path
ID.IM-04:p2Disaster recovery plan approval path
ID.IM-04:p3Crisis-management plan approval path
PR.AT-01:p1Cyber training plan approval path
RS.MA-01:p1Incident-management plan approval path
GV.SC-07:p1Supply-chain risk assessment approval path
GV.SC-07:p2Supply-chain risk-treatment approval path

Official interpretation remains defined in ACN baseline documentation and annexes.

Typical Gaps We Detect (Anonymized)

  • Policies with limited operational depth (roles/timings/escalation missing).
  • Missing or weak cross-references between incident lifecycle documents.
  • Evidence cited in text but not traceable in the controlled document set.
  • Inconsistent review frequencies across related documents.
  • Late governance formalization (approvals treated as end-stage paperwork).

Service Deliverables

  • Audit matrix: requirement-to-document traceability and scoring.
  • Finding register: critical/major/minor prioritization with rationale.
  • Executive pack: board-ready summary with risk-oriented language.
  • Remediation roadmap: phased backlog (quick wins + structural fixes).

FAQ

Is this only a document quality review?

No. It is a compliance-readiness assessment that connects obligations, documentary controls, and governance evidence against the NIS2 baseline framework.

Can we run this before all documents are final?

Yes. Running the audit on draft sets is typically more efficient because structural gaps can be fixed before formal approval cycles.

Does this replace technical security testing?

No. It complements technical assessments by validating documentary governance, process design, and evidence traceability.

Why check approvals so early?

Because approval requirements can become a late blocker if governance workflow is not built into document architecture from the beginning.

What if some facts are unclear in source material?

Details are defined in the official call and baseline documentation: ACN Reading Guide, ACN NIS baseline page.

Conclusion

A Compliance Documentation Audit gives organizations a practical control point between “documents exist” and “documents are audit-ready.” For NIS2 baseline obligations, this distinction is decisive: the effective target is not only producing policies, but proving governance ownership, operational applicability, and evidence readiness in a timeframe aligned with ACN baseline obligations.

Related reading

Official Sources

Share this post