Sweden's Cybersecurity Act (SFS 2025:1506), which implements the NIS2 Directive, entered into force on 15 January 2026. It applies to organisations in 18 designated sectors with at least 50 employees or turnover of at least EUR 10 million. If your business is in scope, you need to register with the supervisory authority, implement risk-management measures, and maintain incident-reporting routines.
Sweden's Cybersecurity Act is now in force, and more Swedish businesses are affected than many expect. For organisations in the right sector and size bracket, NIS2 is not just about policy documents but about registration, risk management, and real incident reporting.
Sweden implemented NIS2 late. The original EU deadline was October 2024, but the Swedish Cybersecurity Act did not enter into force until 15 January 2026 after the European Commission opened infringement proceedings against Sweden. The law is now in force - and affected organisations need to act.
What is NIS2 and why does it matter to Swedish businesses?
NIS2 is the EU's updated cybersecurity directive and replaces the older NIS framework from 2018. Its purpose is to raise resilience in essential and digitally dependent organisations through clearer requirements for risk management, incident reporting, and leadership accountability.
This is not the same as GDPR. GDPR focuses on personal data, while NIS2 focuses on operational security, networks, information systems, and the ability to withstand cyber incidents. That means many Swedish businesses need to work against both frameworks in parallel.
Which businesses are covered by the Cybersecurity Act?
The law covers organisations in 18 designated sectors. The main rule is that a company is in scope if it operates in the right sector and has at least 50 employees or at least EUR 10 million in turnover or balance sheet total. Some actors are covered regardless of size, such as trusted service providers and parts of digital infrastructure.
The Swedish law also applies a clear whole-entity approach. That means the organisation's full IT footprint can be in scope, not just the systems you personally classify as critical. For Swedish businesses, this is a stricter application than many initially expected.
- Energy
- Transport
- Banking
- Financial market infrastructures
- Health
- Drinking water
- Waste water
- Digital infrastructure
- ICT service management (B2B)
- Public administration
- Space
- Postal and courier services
- Waste management
- Chemicals
- Food
- Manufacturing
- Digital providers
- Research
What is required if you are in scope?
The first step is registration with the relevant supervisory authority as soon as possible. After that, you need to show that you work with risk-management measures that are technical, operational, and organisational - not just policies on paper but controls that work in practice.
You also need incident-reporting routines with early detection, rapid escalation, and clear decision paths. Finally, NIS2 increases leadership accountability. Management can be held personally responsible and must receive security training, which makes cybersecurity a board and leadership issue rather than just an IT topic.
What happens if you do not comply?
The sanction model is primarily administrative rather than criminal. Supervisory authorities can issue injunctions, formal remarks, and other corrective requirements when they find gaps in registration, risk management, or incident handling.
For serious or long-running failures, the administrative fines can be substantial. In some situations, restrictions for people in management roles can also become relevant. The message is clear: the law expects active governance and cannot be deferred indefinitely.
How Microsoft 365 and Zero Trust help you meet NIS2 requirements
For many Swedish SMEs, a large part of the technical foundation already exists inside Microsoft 365. MFA and Entra ID strengthen identity protection, Intune gives you device control, and Microsoft Defender adds detection, protection, and monitoring. When these elements are set up inside a Zero Trust model, you move much closer to the risk-based approach NIS2 expects.
That does not mean licences alone create compliance. Configuration, ownership, follow-up, and training are what make the difference. But with the right Microsoft architecture, it becomes possible to combine security, traceability, and practical operations in a way that is realistic even for smaller organisations.
Conclusion
NIS2 is now Swedish law, and the requirements are more operational than many businesses first assumed. For organisations in scope, the next step is to confirm coverage, register, and build a security model that holds up both technically and organisationally.
Frequently asked questions
Does NIS2 apply to all Swedish companies?
No. The law applies to organisations in designated sectors and normally covers entities that meet the size threshold of 50 employees or EUR 10 million in turnover or balance sheet total. Some actor types, such as parts of digital infrastructure and trusted services, can be in scope even if they are smaller.
What is the difference between NIS2 and GDPR?
GDPR is about how personal data is processed and protected. NIS2 and Sweden's Cybersecurity Act are about protecting networks, systems, operations, and resilience against cyber incidents. Many organisations need to work with both at the same time.
What happens if we do not register?
If you are in scope but fail to register, the supervisory authority can treat that as a compliance failure. That can lead to injunctions, formal remarks, and ultimately administrative fines.
How quickly do we need to report an incident?
Your planning baseline should follow the NIS2 timeline: early warning within 24 hours, incident notification within 72 hours, and a final report within one month unless your supervisory authority specifies otherwise. That is why internal routines need to exist before the first incident happens.
Does Microsoft 365 help us meet NIS2 requirements?
Yes, Microsoft 365 can provide a large part of the technical foundation if it is configured properly. MFA, Entra ID, Intune, Defender, and a clear Zero Trust model support identity protection, device security, logging, and incident handling - but they still need to be paired with governance, training, and leadership accountability.
Ready to take the next step?
Not sure whether your business is in scope or where to begin? Book a free 30-minute review and we will walk through your situation and give you practical next steps.
Book a free review