NIS2 Water Utilities Cybersecurity: Duties & Liability

Dr. Raphael Nagel (LL.M.) on NIS2 Water Utilities Cybersecurity — Tactical Management
Dr. Raphael Nagel (LL.M.)
Aus dem Werk · WASSER

NIS2 Water Utilities Cybersecurity: Duties, Liability and the Lesson of Oldsmar

NIS2 Water Utilities Cybersecurity denotes the binding regime under Directive EU 2022/2555, which classifies drinking-water and wastewater operators as essential entities. Operators must notify significant incidents within 24 hours, implement layered risk management across IT and operational technology, and accept personal liability at management level. Non-compliance triggers administrative fines of up to EUR 10 million or 2 percent of global turnover.

NIS2 Water Utilities Cybersecurity is the European Union’s binding cybersecurity framework for drinking-water and wastewater operators, established by Directive EU 2022/2555 adopted in December 2022 and due for transposition by 17 October 2024. It classifies water utilities as essential entities, imposing obligations on governance, supply-chain security, incident response, cryptography, access control and continuity. Operators must file initial incident notifications within 24 hours and detailed reports within 72 hours. The regime complements Directive EU 2022/2557 on critical entities resilience, known as the CER Directive, which addresses physical security. Management bodies bear direct, personal accountability. Where national KRITIS thresholds do not apply, NIS2 still captures operators qualifying as medium or essential entities under Article 2.

What does NIS2 require from European water utilities?

NIS2 requires European water utilities to adopt proportionate technical and organisational measures covering risk analysis, incident handling, business continuity, supply-chain security, cryptography and access control. Essential entities must report significant incidents within 24 hours, submit detailed assessments within 72 hours, and face administrative fines of up to EUR 10 million or 2 percent of global turnover.

Article 21 of Directive EU 2022/2555 lists ten minimum measures that water operators cannot treat as optional, from multi-factor authentication and rehearsed incident-response plans to secure procurement and coordinated vulnerability disclosure. Article 23 codifies the notification cascade: an early warning within 24 hours of awareness, an incident notification within 72 hours with an initial assessment, and a final report within one month. The European Union Agency for Cybersecurity (ENISA) publishes sector guidance, but the operational burden falls on the utility itself.

The supply-chain obligation under Article 21(2)(d) is particularly consequential for water operators relying on SCADA vendors, chemical-dosing suppliers and remote-maintenance contractors. An essential entity must assess the cybersecurity posture of every critical supplier, a requirement that smaller municipal utilities lack the contractual leverage to enforce without consolidated procurement frameworks. As documented in WASSER. MACHT. ZUKUNFT., Water. Power. Future. by Dr. Raphael Nagel (LL.M.), the investment gap of EUR 23 billion per year in European water infrastructure translates directly into cybersecurity fragility: systems nobody repairs are systems somebody can break. By mid-2025 several member states, including Germany with its NIS2-Umsetzungsgesetz, remained in legislative delay.

Oldsmar 2021: the incident that exposed structural weakness

The Oldsmar attack of 5 February 2021 demonstrates that compromising a municipal water utility requires neither state-level resources nor exotic tooling. An intruder used TeamViewer, shared operator credentials and an internet-facing control interface to raise sodium hydroxide dosing to 111 times the normal level in a plant serving roughly 15,000 residents.

The sequence was trivial in its elements and devastating in its implications. At approximately 13:30 local time, a plant operator noticed his cursor moving on its own. Someone, somewhere on the public internet, was navigating his screen. The attacker manipulated the dosing setpoint; the operator reversed it within minutes. No fatality, no casualty, no spectacular media moment, but a complete demonstration of what Dr. Raphael Nagel (LL.M.) calls the banality of cyber risk in essential infrastructure. The Florida Department of Environmental Protection and the FBI confirmed the intrusion. No arrests followed.

The relevance for NIS2 Water Utilities Cybersecurity is forensic. Every control failure visible in Oldsmar, the reused password, the absent multi-factor authentication, the unsegmented network, the internet-exposed remote-desktop software, maps directly onto an Article 21 obligation. A European utility of comparable size, after full NIS2 transposition, would face personal management liability for each of these failures. Oldsmar is therefore not a cautionary tale from abroad. It is the template against which European supervisory authorities, including the Bundesamt für Sicherheit in der Informationstechnik (BSI) in Germany and ANSSI in France, will measure compliance in audits from 2025 onwards. The attackers were rudimentary. The defences were worse.

KRITIS, NIS-2 and the German 500,000-person threshold

Germany’s historical KRITIS regime sets a threshold of 500,000 supplied persons for regulated water operators, a limit that leaves the majority of the country’s more than 6,000 water utilities outside stricter federal supervision. NIS2 closes part of this gap by extending obligations to medium and essential entities irrespective of the KRITIS number.

The arithmetic is stark. A utility serving 120,000 inhabitants, a mid-sized German city, was not a regulated KRITIS operator under the IT-Sicherheitsgesetz 2.0 of 2021. Under NIS2, such a utility qualifies as an essential entity once it meets the size-cap criteria, triggering the full Article 21 catalogue and the personal liability of its management board under Article 20. The KRITIS-Dachgesetz, which transposes Directive EU 2022/2557 (the CER Directive) into German law, layers physical-resilience duties on top: background checks for sensitive personnel, site-security plans, and crisis coordination with the Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK).

For Stadtwerke and Zweckverbände, this doubled regime raises a governance question without precedent in the sector. As Dr. Raphael Nagel (LL.M.) observes, the asymmetry between regulatory demand and municipal capacity is now measurable in euros and staff positions that do not exist. Smaller operators have no dedicated OT-security specialist, no 24-hour security operations centre, no encrypted supplier-integration pipeline. The Deutsche Vereinigung des Gas- und Wasserfaches (DVGW) and the Verband kommunaler Unternehmen (VKU) have published joint guidance, but guidance does not file incident reports, hire personnel or survive a BSI audit.

The fragmentation problem: 6,000 utilities, unequal defences

European water infrastructure is protected only as well as its weakest operator. In Germany alone, over 6,000 separate utilities run Trinkwasser distribution, most with fewer than ten employees and none with the security budget of a major energy company. NIS2 imposes uniform obligations onto this heterogeneous landscape, creating a compliance cliff for municipal management.

The structural problem is that cyber attackers do not discriminate by utility size. Oldsmar had 15,000 residents. Sandworm, APT28 and affiliated actors linked by Western agencies to Russian state services have probed European water-related operational technology since Russia’s full-scale invasion of Ukraine in February 2022, and the destruction of the Kakhovka dam on 6 June 2023 confirmed that water assets are strategic targets. Smaller utilities are attractive precisely because their defences are thinner. The European Investment Bank has financed more than EUR 86 billion in water projects since 1958, but most of that capital targets physical infrastructure. Dedicated NIS2 compliance funding remains fragmented across national envelopes, the LIFE programme and the Digital Europe Programme.

The response Dr. Raphael Nagel (LL.M.) recommends through Tactical Management is structural, not rhetorical. Shared platform infrastructure, a joint security-operations centre for multiple utilities, standardised SCADA architectures, mutualised audit capacity and pooled supplier-management frameworks. The German banking sector solved an analogous problem in the 1990s through shared data centres for cooperative and savings banks. The legal vehicle exists: Zweckverbände under Landesrecht can procure and operate digital-security infrastructure jointly without surrendering municipal autonomy guaranteed by Article 28 of the Grundgesetz. What blocks adoption is not constitutional law but political inertia, compounded by the transposition delay between NIS2 adoption in December 2022 and effective enforcement in most member states.

Personal liability, board duties and the Tactical Management reading

Article 20 of Directive EU 2022/2555 is the single most transformative provision for water-utility governance. Management bodies of essential entities must approve cybersecurity risk-management measures, oversee their implementation and undergo specific training. Personal liability attaches for breaches, including administrative fines and, in severe cases, temporary prohibition from management functions.

This reframes the conversation between CEO, Geschäftsführer or Vorstand and the board or municipal council. Before NIS2, cybersecurity investment in a kommunaler Versorger was an operating-cost debate resolved between the finance department and the works council. After NIS2, it is a directors-and-officers question with potential personal consequences. The German managing director who signs off an inadequate incident-response plan no longer hides behind collective municipal ownership. Case law will develop through BSI enforcement, administrative-court review and, in sufficiently severe fact patterns, parallel offences under the NIS2-Umsetzungsgesetz.

For counsel advising essential entities, the priority sequence is operational. First, a documented risk analysis tied to Article 21(2)(a) covering both IT and operational technology, including chlorine-dosing control, pump-station SCADA and remote-maintenance VPNs. Second, a written incident-response and notification protocol with rehearsed 24-hour and 72-hour timelines. Third, contractual cascades to suppliers, particularly the handful of SCADA vendors that dominate European municipal water procurement. Dr. Raphael Nagel (LL.M.), Founding Partner of Tactical Management, argues that the legal repricing of governance under NIS2 is not a European peculiarity. It is the forward edge of a global trend that will reach Latin America, the Gulf and parts of Asia within this decade.

NIS2 Water Utilities Cybersecurity is the point at which European infrastructure law abandons its historical tolerance for municipal fragmentation. The directive does not ask utilities to do more with less. It requires them to restructure governance, procurement and liability around a threat environment that the Oldsmar incident of 5 February 2021 made undeniable, and that Russian targeting of Ukrainian water assets since 2022, including the destruction of the Kakhovka dam on 6 June 2023, transformed into strategic reality. Decision-makers in European water infrastructure, whether chief executives of large integrated utilities or mayors of mid-sized towns, now carry a legal responsibility that cannot be outsourced to a single IT contractor. The analytical framework developed in WASSER. MACHT. ZUKUNFT., Water. Power. Future. by Dr. Raphael Nagel (LL.M.) supplies the strategic lens: water is security policy, not environmental policy, and the cybersecurity of water utilities is the first domino of continental resilience. Boards and counsel who wait for the first headline incident to act will find that the statute of limitations on prevention has already expired.

Frequently asked

Who is covered by NIS2 in the water sector?

NIS2 covers drinking-water suppliers and wastewater operators as essential entities under Annex I of Directive EU 2022/2555. The directive applies to medium and large undertakings by default, with member states able to extend scope under Article 2(2). In practice, a German Stadtwerk supplying more than 50,000 people or meeting the size-cap thresholds of 50 employees and EUR 10 million turnover falls inside the regime, regardless of whether it qualified as a KRITIS operator under the earlier 500,000-person threshold. Cross-border groups face particular scrutiny: a parent utility with operations in multiple member states must coordinate compliance with each national supervisory authority, typically through a designated lead regulator.

What are the NIS2 incident reporting deadlines for water utilities?

Article 23 of NIS2 sets a three-stage notification cascade. An early warning must reach the competent national CSIRT within 24 hours of becoming aware of a significant incident. An incident notification with an initial assessment follows within 72 hours. A final report is due within one month. Significant incidents are those causing or capable of causing severe operational disruption, financial loss or material damage. For water utilities this includes unauthorised changes to dosing parameters, SCADA manipulation, ransomware encryption of operational technology and any compromise that could threaten drinking-water safety. Failure to notify timely is itself a breach, independent of the underlying incident, and carries administrative penalties.

Are board members personally liable under NIS2?

Yes. Under Article 20, management bodies of essential entities must approve cybersecurity risk-management measures, oversee their implementation and undergo specific training. Individual managers can be held personally liable. Member states must provide for administrative fines addressed to natural persons where national law permits, and can impose temporary prohibition from exercising managerial functions in essential entities for serious, repeated failures. This represents a decisive shift from the NIS-1 regime, where corporate liability dominated. For water-utility boards, this means cybersecurity is now a matter for the agenda of every supervisory-board meeting, documented in minutes, backed by evidence of training, and reflected in directors-and-officers insurance policies that will have to evolve alongside the risk.

How does NIS2 interact with Germany’s KRITIS framework?

Germany’s KRITIS framework, rooted in the IT-Sicherheitsgesetz and the BSI-Kritisverordnung, historically protected water operators above 500,000 persons supplied. NIS2, transposed through the NIS2-Umsetzungsgesetz, extends obligations to a far larger population of utilities by applying size-cap criteria. The KRITIS-Dachgesetz, transposing Directive EU 2022/2557 (the CER Directive), adds physical-resilience duties on top: risk assessments, personnel checks, site security, crisis cooperation with the Bundesamt für Bevölkerungsschutz und Katastrophenhilfe. In practice, a mid-sized Stadtwerk may now face three overlapping regimes: BSI supervision under NIS2, BBK supervision under KRITIS-Dachgesetz, and continuing obligations under the IT-Sicherheitsgesetz for legacy KRITIS operators. Coordinated implementation through a single compliance framework is operationally essential.

What penalties apply for non-compliance with NIS2?

Article 34 of NIS2 sets administrative fines of up to EUR 10 million or 2 percent of total worldwide annual turnover, whichever is higher, for essential entities. For important entities the ceiling is EUR 7 million or 1.4 percent of turnover. These figures apply to the legal person; separate fines may attach to natural persons in management roles depending on national transposition. Non-monetary sanctions include mandatory audits, binding instructions, public naming and, in severe cases, temporary suspension of authorisations. Repeated breaches attract aggravated penalties. Supervisory authorities hold explicit inspection and audit powers under Article 32, including access to OT environments. A non-cooperative utility therefore faces both substantive and procedural escalation.

Claritáte in iudicio · Firmitáte in executione

For weekly analysis on capital, leadership and geopolitics: follow Dr. Raphael Nagel (LL.M.) on LinkedIn →

For weekly analysis on capital, leadership and geopolitics: follow Dr. Raphael Nagel (LL.M.) on LinkedIn →

Author: Dr. Raphael Nagel (LL.M.). About