One Control Set, Three Regulations: How to Satisfy NIS2, DORA, and GDPR Without Tripling Your Work
By ArvexLab Team — Compliance Research
The Triple-Regulation Challenge
If your organization is a financial institution operating in the EU, you are likely subject to three overlapping cybersecurity and data protection regimes: the NIS2 Directive, the Digital Operational Resilience Act (DORA), and the General Data Protection Regulation (GDPR).
Each regulation has its own scope, terminology, reporting requirements, and supervisory authority. Without a unified approach, organizations end up building three parallel compliance programmes — tripling the documentation, tripling the audit burden, and tripling the risk of inconsistency.
The reality is that these three regulations share significant common ground. A well-designed unified control framework can satisfy 70-80% of all three sets of requirements with a single set of controls and evidence. This guide shows you how.
Where the Three Regulations Overlap
The Control Overlap Matrix
The following table maps key security domains to their requirements across all three regulations. Where a cell contains a reference, that regulation has an explicit requirement in that domain.
| Security Domain | NIS2 | DORA | GDPR |
|---|---|---|---|
| Risk assessment | Art. 21(2)(a) | Art. 6-16 (ICT risk framework) | Art. 32(1) (security of processing) |
| Incident handling | Art. 21(2)(b), Art. 23 | Art. 17-23 (incident management) | Art. 33-34 (breach notification) |
| Business continuity | Art. 21(2)(c) | Art. 11-12 (BCM and DR) | Art. 32(1)(c) (resilience) |
| Supply chain security | Art. 21(2)(d) | Art. 28-30 (ICT third-party risk) | Art. 28 (processors) |
| Network security | Art. 21(2)(e) | Art. 9 (protection and prevention) | Art. 32(1)(a) (encryption) |
| Security testing | Art. 21(2)(f) | Art. 24-27 (TLPT) | Art. 32(1)(d) (regular testing) |
| Training and awareness | Art. 21(2)(g) | Art. 13(6) (training) | Art. 39 (DPO awareness) |
| Cryptography | Art. 21(2)(h) | Art. 9(4)(b) (encryption) | Art. 32(1)(a) (pseudonymisation, encryption) |
| Access control | Art. 21(2)(i) | Art. 9(4)(c) (access management) | Art. 32(1)(b) (confidentiality) |
| MFA and secure comms | Art. 21(2)(j) | Art. 9(4) (security tools) | Implied by Art. 32 |
Key Insight
ISO 27001 Annex A provides the best unifying framework. An organization with a mature ISO 27001 implementation covers the vast majority of controls required by all three regulations. The gaps are in the regulation-specific requirements: reporting timelines, supervisory interactions, and sector-specific provisions.
The Triple-Reporting Problem
The most operationally complex overlap is incident reporting. Each regulation has different timelines, different authorities, and different thresholds.
Incident Reporting Timeline Comparison
| Regulation | Initial Notification | Detailed Report | Final Report | Authority |
|---|---|---|---|---|
| NIS2 | 24 hours (early warning) | 72 hours | 1 month | National CSIRT |
| DORA | 4 hours (major incident) | 72 hours | 1 month | NCA (e.g., BaFin, CSSF) |
| GDPR | 72 hours (personal data breach) | Included in initial | Follow-up as needed | Data Protection Authority |
Building One Incident Response Process
Instead of maintaining three separate incident response procedures, build a unified incident response workflow with parallel notification tracks:
- Detection and classification (Hour 0) — When an incident is detected, classify it against all three frameworks simultaneously. Is it a cybersecurity incident (NIS2)? Does it impact ICT operational resilience (DORA)? Does it involve personal data (GDPR)?
- DORA 4-hour notification — If the incident qualifies as a major ICT-related incident under DORA, submit the initial notification to your financial NCA within 4 hours. This is the tightest deadline.
- NIS2 24-hour early warning — Submit the early warning to your national CSIRT within 24 hours. Since you already classified the incident at Hour 0, this should be straightforward.
- GDPR 72-hour breach notification — If personal data is involved, notify your Data Protection Authority within 72 hours. Also assess whether affected data subjects must be notified.
- 72-hour detailed reports — Both NIS2 and DORA require detailed reports at the 72-hour mark. Prepare a single comprehensive incident report and adapt it for each authority's format.
- 1-month final report — Submit the final report covering root cause analysis, mitigation measures, and cross-border impact to all relevant authorities.
Pro tip: Use a single incident record in your compliance platform and generate authority-specific reports from it. This ensures consistency and avoids the risk of contradictory information reaching different regulators.
Supply Chain: Three Requirements, One Programme
Each regulation addresses third-party risk, but with different emphasis:
NIS2 Article 21(2)(d) — Supply Chain Security
- Requires risk assessment of direct suppliers and service providers
- Focuses on the overall security of the supply chain
- Mandates contractual security clauses
- Emphasis on vulnerability handling and secure development practices
DORA Articles 28-30 — ICT Third-Party Risk
- Detailed Register of Information for all ICT provider contracts
- Criticality assessment of ICT services
- Sub-outsourcing chain documentation
- Exit strategies for critical providers
- ESA oversight of critical ICT third-party service providers
GDPR Article 28 — Processors
- Data processing agreements (DPAs) with all processors
- Documented instructions for processing
- Sub-processor management and notification rights
- International transfer safeguards (Chapter V)
The Unified Approach
Build a single vendor management programme that satisfies all three:
- Vendor inventory — Maintain one centralized inventory that classifies each vendor by: NIS2 criticality, DORA ICT service classification, and GDPR processor status
- Contract clauses — Include NIS2 security clauses, DORA contractual provisions (Art. 30), and GDPR DPA terms in a single contract addendum
- Risk assessment — Run one due diligence process that covers security posture (NIS2/DORA) and data protection practices (GDPR)
- Ongoing monitoring — Track vendor security and data protection performance through unified questionnaires and continuous monitoring
Risk Management: One Register, Three Views
Rather than maintaining separate risk registers for cybersecurity risk (NIS2), ICT operational risk (DORA), and data protection risk (GDPR), build a unified risk register with framework-specific views.
Risk Register Structure
Each risk entry should include:
- Risk description — What could go wrong?
- NIS2 relevance — Which Art. 21 measure does this relate to?
- DORA relevance — Which ICT risk management pillar does this affect?
- GDPR relevance — Does this risk involve personal data or data subject rights?
- Controls — What controls mitigate this risk? (Map each control to all applicable framework requirements)
- Residual risk — Risk level after controls are applied
This approach gives you a single source of truth while enabling framework-specific reporting and audit evidence.
Belgium's CyFun as a Benchmark
Belgium's Centre for Cybersecurity Belgium (CCB) developed the CyberFundamentals (CyFun) framework as its NIS2 implementation tool. CyFun is particularly instructive because it was explicitly designed to overlap with existing standards:
- ~95% overlap with NIS2 Article 21 requirements
- Based on the NIST Cybersecurity Framework and ISO 27001
- Includes three maturity levels: Small, Basic, Important, and Essential
- The "Essential" level satisfies NIS2 requirements for essential entities
CyFun demonstrates that a well-designed unified framework can serve as a compliance accelerator. If your organization operates in Belgium, achieving CyFun certification at the appropriate level effectively satisfies NIS2 while also covering the majority of GDPR Art. 32 and DORA Chapter II requirements.
The 4-Step Implementation Plan
Step 1: Determine Your Primary Regulation
Identify which regulation imposes the strictest requirements for your organization:
- Financial entities: DORA is your primary framework (lex specialis over NIS2)
- Healthcare, energy, transport: NIS2 is primary, with GDPR for personal data
- Technology companies: GDPR may be primary if you process significant personal data, NIS2 if you provide digital infrastructure
Your primary regulation sets the baseline. The others layer additional requirements on top.
Step 2: Map the Overlaps
Using the control overlap matrix above, identify which controls satisfy multiple regulations. For most organizations, this yields:
- 60-70% of controls satisfy all three regulations
- 15-20% of controls satisfy two regulations
- 10-15% of controls are unique to one regulation
Focus your gap analysis on the unique requirements, not the overlaps.
Step 3: Address the Gaps
The most common gaps when moving from a unified baseline:
- NIS2-specific: Management body training and personal accountability (Art. 20), specific incident reporting timelines to CSIRTs
- DORA-specific: Register of Information (Art. 28), threat-led penetration testing (Art. 26-27), digital operational resilience strategy
- GDPR-specific: Data subject rights processes (Art. 15-22), Data Protection Impact Assessments (Art. 35), international transfer mechanisms
Step 4: Unified Evidence Collection
Maintain a single evidence repository with cross-framework tagging. Each piece of evidence should be tagged with every framework requirement it satisfies. During audits, generate framework-specific evidence packs by filtering your repository.
This is where a compliance platform with cross-framework mapping capabilities becomes essential — it eliminates the manual work of maintaining multiple evidence sets.
Practical Tips for Implementation
Start with ISO 27001
If you do not yet have a formal ISMS, implementing ISO 27001 is the most efficient path to multi-framework compliance. It covers the vast majority of NIS2 and DORA requirements and provides a strong foundation for GDPR Art. 32.
Consolidate Your Reporting
Where possible, align your internal reporting cadence across frameworks. A quarterly compliance review that covers NIS2, DORA, and GDPR is far more efficient than three separate reviews.
Train Once, Document Thrice
Management body training can cover all three frameworks in a single session. Document attendance and topics covered, then reference the same training record for NIS2 Art. 20, DORA Art. 5(4), and GDPR accountability obligations.
Use Cross-Framework Mappings
Maintain an explicit mapping document that shows which controls satisfy which requirements across all frameworks. This becomes your Rosetta Stone during audits and significantly reduces the time auditors spend verifying compliance.
FAQ
Q: If I comply with DORA, do I still need to worry about NIS2 and GDPR?
Yes. DORA satisfies most NIS2 requirements for the areas it covers (lex specialis principle), but NIS2 has broader requirements around management accountability and non-ICT supply chain security. GDPR is an entirely separate regime focused on personal data protection — DORA compliance does not address GDPR requirements like data subject rights, DPIAs, or international transfer safeguards.
Q: Can I use a single audit to satisfy all three frameworks?
Not directly, as each framework has its own supervisory authority and audit expectations. However, you can use a single internal audit programme that covers all three, generating framework-specific reports. Some audit firms offer combined engagements that assess all three frameworks in a single visit.
Q: How should I handle conflicting requirements between the frameworks?
In practice, there are very few true conflicts. The most common tension is in incident reporting timelines — resolve this by defaulting to the strictest deadline (DORA's 4 hours for financial entities) and building additional notifications for the other authorities into your workflow.
Q: Is there a single certification that covers NIS2, DORA, and GDPR?
No single certification covers all three. ISO 27001 provides the strongest common foundation. You can supplement it with Belgium's CyFun certification (for NIS2), SOC 2 Type II (for DORA ICT controls), and a GDPR readiness assessment. The combination provides comprehensive coverage.
Ready to assess your NIS2 readiness?
Use our free self-assessment tool or speak with our compliance team.