"By failing to prepare, you are preparing to fail." - Benjamin Franklin
After covering the basics of the NIST Cybersecurity Framework 2.0, the next question that executives and key stakeholders is 'How can we practically use the CSF to manage our cybersecurity risks?'
In this post, I am going to simulate the methodical and practical process of implementing the CSF 2.0 for a medium-sized European Union-based health insurance provider. Why an EU-based health insurance provider? Health insurance companies operating in the European Union face a uniquely complex regulatory environment that intersects cybersecurity, data protection, operational resilience, and healthcare-specific requirements; check out the EU Finance/Healthcare/Data Protection Regulatory Landscape at the end of this article.
This guide provides a detailed roadmap for implementing the NIST Cybersecurity Framework (CSF) 2.0 within a medium-sized health insurance organisation operating in the European Union. The guide is specifically tailored to address the unique regulatory landscape of EU health insurers, who must navigate an increasingly complex web of cybersecurity and data protection requirements including the General Data Protection Regulation (GDPR), the Network and Information Security Directive 2 (NIS2), the Digital Operational Resilience Act (DORA), and various national healthcare data protection laws.
Health insurance companies process some of the most sensitive personal data categories, including health information, financial data, and personally identifiable information (PII) of millions of policyholders. This creates both a significant cybersecurity risk and a profound responsibility to protect this data. Recent cyberattacks on healthcare organizations across Europe have demonstrated the devastating operational, financial, and reputational consequences of inadequate cybersecurity measures.
The NIST Cybersecurity Framework provides a flexible, risk-based approach to managing cybersecurity that aligns well with EU regulatory requirements. Unlike prescriptive standards that mandate specific controls, the CSF focuses on outcomes, allowing organizations to select implementation approaches that best fit their risk profile, resources, and operational context. This outcome-based methodology makes it particularly suitable for medium-sized organizations that must balance comprehensive security with resource constraints.
This guide synthesizes best practices from the official NIST CSF 2.0 documentation with practical implementation strategies specifically adapted for the EU health insurance sector. It provides an eleven-step implementation framework that addresses both the technical and governance dimensions of cybersecurity, recognizing that effective cybersecurity requires not just technology but also appropriate policies, processes, people, and organisational culture.
Key features of this implementation approach include integration with EU regulatory requirements, practical guidance for resource-constrained environments, emphasis on continuous improvement and adaptability, and specific attention to the unique threat landscape facing health insurance organisations.
Determine what you are protecting and why; this establishes a strong foundation (scope and context) that will set the stage for the rest of the framework.
Start off with identifying and document the organisation's broader business goals and objectives as well as high-level facts and assumptions.
For a health insurance company, critical business functions typically include:
Claims processing and adjudication systems that evaluate and pay healthcare provider claims.
Policy administration systems managing enrollment, eligibility, and benefits.
Customer service and member portal systems providing policyholder access to information.
Provider network management systems maintaining healthcare provider relationships and contracts
Utilisation management and prior authorisation systems controlling healthcare utilisation.
Financial systems including premium collection, payment processing, and accounting
Regulatory reporting systems ensuring compliance with governmental and regulatory requirements
Data analytics and actuarial systems supporting risk assessment and pricing
For each critical function, document the systems, data, and processes involved. Use a Business Impact Analysis (BIA) methodology to understand the consequences of disruption. Consider both immediate operational impacts and longer-term consequences such as regulatory penalties, reputational damage, and loss of competitive advantage.
Document dependencies between functions. For example, claims processing depends on eligibility verification, which depends on policy administration data. Understanding these dependencies is crucial for prioritisation and risk assessment.
Risk tolerance represents the organization's willingness to accept uncertainty in pursuit of business objectives. For health insurers, risk tolerance is influenced by regulatory requirements, fiduciary responsibilities to policyholders, reputational considerations, and financial capacity to absorb losses.
Engage executive leadership and the board of directors in defining risk tolerance. This is not a technical exercise but a business decision that requires input from stakeholders across the organisation including the CEO, CFO, CRO (Chief Risk Officer), Legal Counsel, and Compliance leadership.
Consider developing risk tolerance statements for different risk categories:
Data Protection: Given GDPR penalties and the sensitivity of health data, most health insurers adopt a very low risk tolerance for data breaches.
Operational Disruption: Tolerance for system downtime varies by system, with claims processing typically requiring high availability.
Third-Party Risk: Given increasing supply chain attacks and DORA requirements, tolerance for vendor security failures is typically low.
Financial Risk: Define acceptable ranges for cyber-related financial losses, considering insurance coverage and financial reserves.
Document risk tolerance in measurable terms where possible. For example, rather than stating tolerance for data breaches is low, specify that any breach affecting more than 100 individuals is unacceptable, or that systems must recover within defined Recovery Time Objectives (RTOs).
Transform business requirements and risk tolerance into specific, measurable cybersecurity objectives. These objectives should align with both organisational strategy and regulatory requirements.
Example objectives for an EU health insurer might include:
Achieve and maintain compliance with GDPR, NIS2, and DORA requirements within specified timelines
Protect personal health information from unauthorised access, use, or disclosure.
Ensure availability of critical systems with defined uptime percentages.
Detect and respond to security incidents within regulatory timeframes.
Build organisational resilience to recover from cyber incidents within acceptable timeframes.
Manage third-party cybersecurity risks throughout the vendor lifecycle.
Foster a culture of cybersecurity awareness across all organisational levels.
Decide whether your initial CSF implementation will cover the entire organisation or focus on specific systems, business units, or functions. For medium-sized organisations, a phased approach often works best.
Consider starting with your highest-risk or most critical systems. For example, you might begin with:
Claims processing systems due to their criticality and exposure to sensitive data.
Member portal and online services due to their internet exposure and direct policyholder access.
Systems storing special categories of personal data under GDPR.
Document your scope decision clearly, including what is in scope, what is explicitly out of scope, and your rationale for these decisions. This documentation will be valuable for stakeholder communication and future scope expansion.
Also consider geographical scope. If you operate in multiple EU member states, you may need to account for variations in national implementations of EU directives and local healthcare regulations.
Define how you will measure success in achieving your cybersecurity objectives. Metrics should be meaningful, measurable, and aligned with your objectives.
Consider establishing metrics in several categories:
Compliance Metrics: Percentage of CSF outcomes achieved, audit findings closed, regulatory requirements met
Effectiveness Metrics: Mean time to detect incidents (MTTD), mean time to respond (MTTR), vulnerability remediation rates
Coverage Metrics: Percentage of systems with endpoint protection, percentage of data encrypted, multi-factor authentication adoption
Training Metrics: Percentage of staff completing security awareness training, phishing simulation click rates
Resilience Metrics: Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) achievement
Resources for establishing cybersecurity metrics - SP 800-55v1 and SP 800-55v2: https://csrc.nist.gov/Projects/measurements-for-information-security
Shifting from Strategy into Technical Visibility. Comprehensive asset identification is fundamental to cybersecurity. You cannot protect what you do not know exists. This step involves creating a detailed inventory of all information systems, networks, data repositories, and endpoints within your defined scope.
Create a comprehensive inventory of all information systems including:
Application Systems: Claims management, policy administration, customer relationship management (CRM), enterprise resource planning (ERP), document management, business intelligence, and analytics platforms.
Infrastructure Systems: Servers (physical and virtual), storage systems, network equipment (routers, switches, firewalls), cloud infrastructure, and backup systems.
Endpoints: Desktop computers, laptops, mobile devices, tablets, and any IoT devices.
Development and Testing Environments: Systems used for application development, testing, and quality assurance.
For each system, document:
System name, description, and business purpose.
Technical details including hardware specifications, operating systems, databases, network configurations, and key technologies.
Hosting location (on-premises, cloud provider, hybrid)
Data classification level (see Data Classification section below).
System owner and technical custodian.
Users and access controls.
Interface points and data flows to/from other systems.
Regulatory requirements applicable to the system.
Use automated discovery tools where possible to identify systems and assets, but recognise that automated discovery must be supplemented with manual verification and documentation. Shadow IT (unauthorised or unmanaged systems) is a common gap in asset inventories.
Document your network architecture including network segments, trust boundaries, communication flows, and security controls. Create network diagrams showing:
Network zones and segments (DMZ, internal networks, production networks, development networks).
Security boundaries and enforcement points (firewalls, proxies, VPNs).
Internet connectivity points and external connections.
Remote access mechanisms.
Connections to third parties including cloud service providers, business partners, and vendors.
Understanding network architecture is essential for implementing network segmentation, defining security boundaries, and controlling data flows. This becomes particularly important for GDPR compliance when personal data crosses borders or is processed by third parties.
Identify all locations where data is stored including:
Primary Databases: Production databases containing policyholder information, claims data, provider information
Data Warehouses and Analytics Platforms: Systems consolidating data for reporting and analysis.
Backup and Archive Systems: All backup copies and archived data.
File Shares and Document Management: Shared network drives, SharePoint, document management systems.
Email Systems: Email servers and archives.
Cloud Storage: Any data stored in cloud services (SaaS, IaaS, PaaS).
Mobile Devices and Endpoints: Data stored locally on end-user devices.
For each data repository, classify the sensitivity of data stored (see next section) and document data retention requirements, applicable legal and regulatory requirements, access controls and authorization mechanisms, and encryption status (at rest and in transit).
Establish a data classification framework appropriate for health insurance operations. A typical framework includes:
Assign data classification labels to all data repositories and ensure that security controls are proportionate to classification levels. Higher classifications require stronger encryption, more restrictive access controls, more comprehensive logging, and enhanced monitoring.
Clear accountability is essential for effective cybersecurity. Define roles and responsibilities for cybersecurity across the organisation:
Board of Directors: Oversight of cybersecurity risk, approval of cybersecurity strategy, ensuring adequate resources.
Chief Information Security Officer (CISO): Overall cybersecurity program leadership, risk assessment, security architecture.
Data Protection Officer (DPO): GDPR compliance, privacy program, data protection impact assessments.
IT Leadership: Infrastructure security, system administration, technical control implementation.
Business Unit Owners: Security of business applications and data within their domain.
Security Operations Team: Monitoring, incident detection and response, threat intelligence.
Compliance Function: Regulatory compliance, audit coordination, policy development.
Legal Counsel: Legal requirements, contract reviews, incident notification decisions.
All Employees: Following security policies, reporting incidents, maintaining awareness.
A comprehensive risk management strategy provides the foundation for all cybersecurity decisions. This step involves identifying potential threats, assessing their likelihood and impact, and determining how to address them.
Conduct systematic risk assessments using a consistent methodology. The assessment should evaluate:
Asset Value: The importance of the asset to business operations and the sensitivity of data it processes.
Threat Likelihood: The probability of a threat being realized based on threat intelligence, historical data, and current threat landscape.
Vulnerability: Weaknesses that could be exploited by threats, including technical vulnerabilities, process gaps, and people issues.
Impact: The potential consequences if a threat is realised, considering confidentiality, integrity, and availability impacts.
Identify threats relevant to health insurance operations. Consider both external and internal threats:
External Threats:
Ransomware attacks targeting healthcare organisations for financial gain.
Data breaches aimed at stealing health information for identity theft or fraud.
Business email compromise and fraud schemes.
Distributed Denial of Service (DDoS) attacks disrupting online services.
Supply chain attacks through compromised vendors or service providers.
Advanced Persistent Threats (APTs) from nation-state actors or organised crime.
Phishing and social engineering attacks targeting employees.
Internal Threats:
Insider threats from malicious employees or contractors.
Accidental data exposure or loss by employees.
Privilege misuse or unauthorized access by authorized users.
Shadow IT introducing unmanaged security risks.
Environmental and Operational Threats:
Natural disasters affecting data centers or operations.
Hardware failures and system outages.
Software vulnerabilities and misconfigurations.
Third-party service disruptions.
Use a risk rating matrix to categorize risks. A common approach uses a 5x5 matrix with likelihood and impact each rated from 1 (very low) to 5 (very high):
Document all identified risks in a risk register that includes risk description, affected assets, likelihood and impact ratings, inherent risk level, existing controls, residual risk level, risk owner, and risk treatment decision.
Resources for establishing a Risk Management Strategy:
NIST Risk Management Framework: https://csrc.nist.gov/projects/risk-management
ISO 27005:2022 Risk Management: https://www.iso.org/standard/80585.html
Organisational Profiles are a key component of the CSF implementation. The Current Profile documents your existing cybersecurity posture, while the Target Profile defines your desired future state. The gap between these profiles drives your action plan.
The Current Profile assesses which CSF outcomes you are currently achieving. For each outcome in the CSF Core:
Determine if the outcome is being achieved (yes, partially, or no).
Document the evidence supporting your assessment.
Identify the specific controls, processes, or technologies that achieve the outcome.
Note any limitations or gaps in current implementation.
Conduct this assessment through a combination of document review, system examinations, interviews with system owners and technical staff, and testing of controls. For a medium-sized organisation, this assessment typically takes 4-8 weeks depending on complexity and resource availability.
Example Current Profile assessment for outcome ID.AM-01 (Inventories of hardware managed by the organization are maintained):
Achievement Level: Partially Achieved.
Evidence: Asset management database maintained in ServiceNow; automated discovery tool scans network quarterly.
Gaps: Mobile devices not consistently tracked; some remote worker equipment not inventoried; discovery tool misses some network segments.
The Target Profile defines which CSF outcomes you want to achieve based on your business objectives, risk assessment, and regulatory requirements. Not all CSF outcomes may be relevant or necessary for your organisation.
For EU health insurers, priority outcomes typically include:
All Govern (GV) function outcomes to address NIS2 governance requirements.
Identity and Access Management outcomes supporting GDPR access controls.
Data Security outcomes protecting special category personal data.
Detection and Response outcomes enabling timely incident notification.
Recovery and Resilience outcomes supporting DORA requirements.
Supply Chain Security outcomes addressing third-party risks.
NIST provides a Quick-Start Guide for Creating and Using Organisational Profiles: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1301.pdf
Consider using NIST's Community Profiles if available for the healthcare or insurance sector (https://www.nist.gov/cyberframework/profiles).
The CSF Implementation Tiers describe the degree to which an organization's cybersecurity risk management practices exhibit the characteristics defined in the framework. Tiers range from Partial (Tier 1) to Adaptive (Tier 4). For EU health insurers, the tier selection has direct implications for demonstrating compliance under NIS2, which expects appropriate and proportionate risk management measures.
Selecting your current and target tier is not simply an aspirational exercise, it drives decisions about governance structures, risk management processes, staffing, tooling, and budget. The four tiers are:
Most medium-sized health insurers will find themselves at Tier 1 or Tier 2 when beginning a CSF implementation. NIS2 compliance expectations broadly align with Tier 3 behaviours, making Tier 3 the appropriate near-term target for organisations within NIS2 scope.
When assessing your current tier, evaluate four dimensions:
Risk Management Process: How risks are identified, assessed, and managed (informally or formally).
Integrated Risk Management Programme: Whether cybersecurity risk is integrated into enterprise risk management.
External Participation: Whether the organisation engages with external bodies such as ISACs, ENISA, or national CERTs.
Supply Chain Risk Management: Whether third-party and supply chain risks are actively governed.
Document your current and target tiers in your Organisational Profile and revisit the assessment annually or when significant organisational changes occur.
ENISA Good Practices for Security of Healthcare Services: https://www.enisa.europa.eu/publications/cyber-hygiene-in-the-health-sector
Moving from Tier 1 to Tier 3 requires investment in people, processes, and technology. For a medium-sized EU health insurer, a realistic progression might span 18–36 months, subject to available budget and leadership commitment. Considerations include:
Dedicated security staff: at minimum a CISO or Head of Information Security, a Security Operations lead, and a DPO (mandatory under GDPR).
Security tooling: endpoint detection and response (EDR), a SIEM platform, vulnerability management, and identity and access management (IAM) solutions.
Process formalisation: documented incident response plan, business continuity plan, risk management framework, and vendor assessment programme.
Governance: a Cybersecurity Steering Committee with executive representation, quarterly risk reporting to the board.
With your risk assessment, target profile defined, and gap analysis performed, you can now select the security controls that will close identified gaps and reduce risk to acceptable levels. For EU health insurers, control selection must satisfy multiple overlapping frameworks simultaneously: the CSF, GDPR Article 32, NIS2 Article 21, and DORA's ICT risk management requirements.
The CSF does not prescribe specific controls; instead, it references Informative References, widely adopted standards and guidelines that organisations can use to implement CSF outcomes. The most relevant for EU health insurers are NIST SP 800-53, ISO/IEC 27001/27002, and CIS Controls v8.
Given the risk landscape and regulatory environment, the following control domains warrant priority attention:
Identity and Access Management (IAM)
Health insurance systems hold highly sensitive personal data. Strict access controls are fundamental. Key controls include:
Multi-factor authentication (MFA) for all remote access, administrative accounts, and systems processing special category data.
Role-based access control (RBAC) with least privilege, no user should have access beyond what their job function requires.
Privileged Access Management (PAM) solutions to control, monitor, and audit privileged user activity.
Regular access reviews, at least quarterly for privileged accounts, annually for standard users.
Automated deprovisioning when employees leave or change roles.
NIST SP 800-63 Digital Identity Guidelines: https://pages.nist.gov/800-63-3/
Data Encryption
GDPR Article 32 explicitly cites encryption as an appropriate measure. For health insurers:
Encrypt all special category personal data at rest using AES-256 or equivalent.
Enforce TLS 1.2 or higher for all data in transit; disable legacy protocols (SSL, TLS 1.0/1.1).
Implement full-disk encryption on all laptops and portable media.
Manage encryption keys through a dedicated key management system, separate from the data it protects.
Ensure cloud-stored data is encrypted with keys controlled by the organisation (customer-managed keys where offered).
Vulnerability and Patch Management
Unpatched vulnerabilities are one of the most common attack vectors. A structured programme must include:
Regular vulnerability scanning, weekly for internet-facing systems, monthly for internal systems at minimum.
Penetration testing at least annually, and after significant system changes.
A defined patching SLA: critical vulnerabilities patched within 24–72 hours, high within 7 days, medium within 30 days.
A software bill of materials (SBOM) for key applications to enable rapid identification of affected components when new vulnerabilities emerge.
Threat-led penetration testing (TLPT) as required under DORA for in-scope entities.
ENISA Good Practice Guide on Vulnerability Disclosure: https://www.enisa.europa.eu/publications/vulnerability-disclosure
Network Security and Segmentation
Network segmentation limits the blast radius of a successful attack. For health insurers:
Segment networks by sensitivity — separate production systems from development and test, isolate systems processing health data.
Implement a Zero Trust Architecture (ZTA) approach: verify every user and device, assume breach within the perimeter.
Deploy next-generation firewalls with application-layer inspection and intrusion prevention systems (IPS).
Conduct regular firewall rule reviews — remove redundant rules, document all permitted traffic flows.
Monitor and control DNS traffic to detect command-and-control communications.
NIST SP 800-207 Zero Trust Architecture: https://csrc.nist.gov/publications/detail/sp/800-207/final
Security controls impose operational overhead. The goal is to select controls that reduce risk materially without creating disproportionate friction. For medium-sized organisations, practical considerations include:
Prioritise high-impact, low-friction controls first (e.g., MFA, automated patching, email security gateways).
Leverage cloud-native security controls where systems are cloud-hosted, this reduces implementation complexity.
Consider managed security services for capabilities requiring 24/7 coverage that internal teams cannot sustain.
Automate compliance checks where possible using policy-as-code and configuration management tools.
Implementation is where strategy becomes operational reality. This step translates the controls selected in Step 6 into deployed, configured, and validated security measures across the organisation. For EU health insurers, implementation must be systematic, documented, and testable, both to ensure effectiveness and to demonstrate compliance to regulators.
A phased implementation approach prevents disruption to business operations and allows lessons from early phases to inform later ones. Suggested phasing:
Technical controls are the automated mechanisms that enforce security policy. Key deployments for health insurers include:
Endpoint Protection and Detection
Deploy Endpoint Detection and Response (EDR) on all managed endpoints - laptops, desktops, and servers.
Ensure real-time threat detection with behavioural analytics, not just signature-based antivirus.
Configure automatic isolation of infected endpoints to contain breaches.
Extend EDR coverage to mobile devices through a Mobile Device Management (MDM) solution.
Establish a baseline of normal endpoint behaviour to enable anomaly detection.
Security Information and Event Management (SIEM)
A SIEM platform is central to the detection and response capabilities required by NIS2. Implementation considerations:
Onboard log sources from all critical systems: firewalls, endpoint agents, Active Directory/LDAP, cloud platforms, key applications.
Develop and tune detection rules aligned with the MITRE ATT&CK framework - particularly tactics relevant to healthcare organisations.
Define alert triage workflows with escalation paths and SLAs for initial response.
Integrate threat intelligence feeds to enrich alerts with context about known threat actors and indicators of compromise (IoCs).
Retain logs for a minimum of 12 months (online) and 24 months (archive) to support incident investigations and regulatory requests.
MITRE ATT&CK Framework: https://attack.mitre.org/
Email Security
Email remains the primary initial access vector. Implement layered email security:
Enforce DMARC, DKIM, and SPF email authentication to prevent domain spoofing.
Deploy advanced threat protection with sandboxing to detonate suspicious attachments and URLs.
Implement anti-phishing controls including impersonation detection and lookalike domain blocking.
Enable email data loss prevention (DLP) rules to detect and block transmission of sensitive data such as policy numbers, health information, or payment details.
Cloud Security
If the organisation uses cloud services (likely for a medium-sized insurer), cloud-specific controls are essential:
Configure Cloud Security Posture Management (CSPM) to continuously scan for cloud misconfigurations (leading cause of data breaches).
Enforce cloud access controls through a Cloud Access Security Broker (CASB) for SaaS applications.
Enable cloud platform logging (e.g., AWS CloudTrail, Azure Monitor, GCP Cloud Audit Logs) and route to SIEM.
Assess and document the shared responsibility model for each cloud service in use; understand what the provider protects and what you must protect.
Ensure data residency requirements are met; GDPR requires that EU personal data remain within the EU or an adequacy decision country unless appropriate safeguards are in place.
ENISA Cloud Security Guide: https://www.enisa.europa.eu/publications/cloud-security-guide-for-smes
Technical controls alone are insufficient. Administrative controls establish the rules, processes, and accountability structures that govern security behaviour:
Information Security Policy: An overarching policy approved by senior leadership, reviewed annually, setting out the organisation's commitment to information security and high-level requirements.
Acceptable Use Policy: Defines permissible use of organisational IT resources, including personal device use, internet access, and email.
Data Classification and Handling Policy: Establishes how data is classified and the handling requirements for each classification level.
Access Control Policy: Specifies how access to systems and data is requested, approved, provisioned, reviewed, and revoked.
Incident Response Policy and Procedure: Defines roles, responsibilities, and processes for detecting, reporting, and managing security incidents in accordance with NIS2 and GDPR notification timelines.
Business Continuity and Disaster Recovery Plan: Documents how the organisation will maintain and restore operations following a disruptive event, with RTOs and RPOs aligned to regulatory requirements.
Third-Party Security Policy: Establishes minimum security requirements for vendors and suppliers, including assessment processes and contractual obligations.
Change Management Policy: Ensures security is considered in all system changes, with testing and approval gates before production deployment.
All policies should be formally approved by senior leadership, communicated to all relevant personnel, accessible through a central document management system, and reviewed at least annually or when significant changes occur.
Human error and social engineering are consistently identified as primary causes of security incidents in the healthcare sector. A robust awareness programme is both a CSF requirement (PR.AT) and a NIS2 obligation:
Deliver mandatory security awareness training to all staff at onboarding and annually thereafter.
Include specific modules on handling health data, GDPR obligations, phishing recognition, password hygiene, and incident reporting.
Conduct quarterly (or bi-annual) phishing simulation campaigns with immediate educational feedback for employees who click.
Provide role-specific training for high-risk groups: IT administrators (privileged access risks), finance staff (business email compromise), and HR (employee data handling).
Brief the board and senior management on cybersecurity threats and their responsibilities under NIS2 the directive explicitly places obligations on management bodies.
Track training completion rates and phishing simulation results as KPIs reported to the board.
ENISA Awareness and Cyber Hygiene Resources: https://www.enisa.europa.eu/topics/cybersecurity-education
When implementing security controls that involve processing personal data (e.g., SIEM log collection, user behaviour analytics), ensure compliance with GDPR:
Conduct a Data Protection Impact Assessment (DPIA) for any processing likely to result in high risk (required under GDPR Article 35).
Document the legal basis for processing employee data for security monitoring purposes (typically the organisation's legitimate interest).
Inform employees transparently about security monitoring through privacy notices and employment onboarding documentation.
Minimise data collected for security purposes to what is strictly necessary and define retention periods.
Ensure DPO involvement in the design of security monitoring systems that process personal data.
Implementing controls is not sufficient; their effectiveness must be verified and validated. Control assessment serves to confirm that controls are operating as intended, identify gaps or degradations in performance, provide evidence for regulatory compliance, and generate data to support risk-informed decision-making.
This step maps directly to the CSF's ID.RA (Risk Assessment) and PR.PS (Protective Technology) outcomes, and is a requirement under NIS2 Article 21(1), which mandates that entities 'take appropriate and proportionate technical and organisational measures to manage the risks'.
Vulnerability assessments and penetration tests provide direct evidence of control effectiveness against real-world attack techniques:
Conduct internal vulnerability scans weekly or bi-weekly against all in-scope systems.
Perform external vulnerability assessments monthly against internet-facing infrastructure.
Engage qualified third parties to conduct annual penetration tests covering network, web application, and social engineering vectors.
For organisations in scope of DORA, conduct Threat-Led Penetration Testing (TLPT) as specified in DORA Articles 26–27, this is a more advanced, intelligence-driven form of testing conducted by specialist firms.
Track and remediate all identified vulnerabilities within the defined SLAs established in Step 6.
Retest remediated vulnerabilities to confirm resolution before closing findings.
TIBER-EU Framework for Threat Intelligence-Based Ethical Red Teaming: https://www.ecb.europa.eu/pub/pdf/other/ecb.tiber_eu_framework.en.pdf
Structured audits provide systematic assurance that controls are in place and operating effectively:
Internal Audits: Conduct periodic internal security audits against the Target Profile. These can be performed by internal audit teams or the security team, but should be independent of the teams being assessed.
External Audits: Engage external auditors at least annually to provide independent assurance. For NIS2-regulated entities, supervisory authorities may conduct audits.
Configuration Reviews: Regularly review security configurations of key systems (firewalls, servers, cloud environments, Active Directory) against hardening benchmarks such as CIS Benchmarks.
Access Reviews: Conduct quarterly reviews of privileged access rights and annual reviews of all user access — verify that access is appropriate to current roles and revoke unnecessary access.
Policy Compliance Reviews: Assess adherence to security policies through sampling, testing, and interviews.
CIS Benchmarks: https://www.cisecurity.org/cis-benchmarks/
Systematic measurement enables evidence-based security management. Establish a security metrics programme that tracks:
Report security metrics to the board or a dedicated Cybersecurity Steering Committee at least quarterly. Senior leadership visibility is a NIS2 requirement and essential for securing resources and sustaining programme momentum.
The gap analysis conducted in Step 4 should be treated as a living document. Re-run the analysis at least annually and after significant events such as material changes to the IT environment, major security incidents, new regulatory requirements, changes in the threat landscape, and significant organisational changes such as mergers or outsourcing.
Updated gap analysis results feed directly into the prioritised action plan (Step 4), ensuring the programme remains aligned to current risk reality rather than a historic snapshot.
Supply chain attacks have grown dramatically in both frequency and sophistication. Health insurers are heavily dependent on third parties (cloud providers, claims processing platforms, document management vendors, IT managed services, actuarial systems, and many others) each of which may represent an entry point for adversaries. This dependency creates significant shared risk.
This step addresses the CSF's Govern.Supply Chain (GV.SC) and Identify.Risk Assessment (ID.RA) outcomes and aligns with NIS2 Article 21(2)(d) on supply chain security and DORA's detailed requirements on ICT third-party risk management (Articles 28–44).
Establish a structured Third-Party Risk Management (TPRM) programme covering the full vendor lifecycle:
1. Vendor Identification and Tiering
Not all vendors carry equal risk. Classify vendors by the sensitivity of the data they access and the criticality of the services they provide:
Critical Vendors: Process special category personal data or provide services essential to core operations. Examples: core policy administration SaaS, claims payment processors, cloud infrastructure providers.
High-Risk Vendors: Access personal data but are not critical to core operations, or provide significant IT infrastructure. Examples: HR systems, finance platforms, IT managed services.
Standard Vendors: Limited or no access to personal data, non-critical services. Examples: office supplies, general professional services.
Apply the most rigorous due diligence to Critical and High-Risk vendors.
2. Pre-Contract Due Diligence
Before engaging a new vendor in the Critical or High-Risk tiers, conduct due diligence including:
Security questionnaire aligned to your minimum security requirements
Review of vendor security certifications (ISO 27001, SOC 2 Type II) and penetration test reports
Reference checks on vendor security practices
GDPR Data Processing Agreement (DPA) review; mandatory under GDPR Article 28 for any processor handling personal data on your behalf
Assessment of vendor's incident response and breach notification capabilities
Review of vendor's business continuity and disaster recovery arrangements
3. Contractual Protections
Ensure contracts with vendors who process personal data or provide critical services include:
Data Processing Agreement (DPA) incorporating all mandatory GDPR Article 28 clauses
Right to audit or to receive third-party audit reports annually
Minimum security requirements and obligation to maintain them
Incident and breach notification obligations (no longer than 24 hours for initial notification to allow you to meet your own regulatory obligations).
Sub-processing restrictions (vendor must obtain your consent before engaging sub-processors)
Data return and deletion obligations on contract termination
Liability and indemnity provisions for security breaches
GDPR Standard Contractual Clauses for Controllers to Processors: https://commission.europa.eu/law/law-topic/data-protection/international-dimension-data-protection/standard-contractual-clauses-scc_en
4. Ongoing Monitoring and Annual Review
Third-party risk does not end at contract signature. Establish ongoing oversight:
Annual security reassessment for all Critical and High-Risk vendors
Monitor vendor security advisories, public breach disclosures, and threat intelligence for indications of vendor compromise
Track vendor performance against contractual security obligations (incident notification timeliness, audit cooperation, training completion rates for vendor staff accessing your systems)
Conduct periodic on-site audits or review third-party audit reports for Critical vendors
Maintain an up-to-date register of all vendors with access to your systems or data, including sub-processors
5. DORA-Specific Third-Party Requirements
If your organisation falls within DORA's scope, additional requirements apply to ICT third-party service providers:
Maintain a Register of Information for all ICT third-party service providers, submitted annually to your national competent authority
For ICT services supporting critical or important functions, conduct thorough due diligence before contracting and at least annually thereafter
Ensure contracts include all mandatory provisions specified in DORA Article 30, including exit strategies, data security, audit rights, and service continuity requirements
Establish a written exit plan for each critical ICT third-party service provider covering data recovery, transition to alternatives, and business continuity during transition
DORA Article 30 - Key Contractual Provisions: https://eur-lex.europa.eu/eli/reg/2022/2554
Security incidents affecting third-party systems may require coordinated response. Ensure your Incident Response Plan (see Step 10) includes procedures for notifying relevant third parties when incidents involve shared systems or data, receiving and acting on incident notifications from vendors, and including critical vendors in tabletop exercises and simulations.
Steps 1–9 have focused on building the foundations of your cybersecurity programme. Step 10 operationalises the dynamic functions of the CSF: Detect, Respond, and Recover. These functions are the organisation's ability to identify cybersecurity events in real time, respond to them effectively, and restore normal operations. For EU health insurers, these capabilities are directly scrutinised by regulators under NIS2 and DORA.
Continuous monitoring transforms security from a periodic activity into an always-on operational function. Key components include:
Security Operations Centre (SOC)
A SOC (in-house, outsourced, or hybrid), provides the human and technical capability to monitor, detect, triage, and respond to threats. For a medium-sized health insurer, a hybrid model (internal security team supported by a managed SOC provider) often represents the best balance of cost, coverage, and capability.
Define SOC scope: which assets are monitored, what alert types are handled, escalation thresholds.
Establish operating hours - consider whether 24/7 coverage is required given your threat profile and regulatory obligations.
Define and document alert triage procedures, including playbooks for the most common alert types.
Measure SOC performance against MTTD and MTTR KPIs.
Threat Intelligence
Threat intelligence provides context and early warning of emerging threats, enabling proactive rather than purely reactive security:
Subscribe to sector-specific threat intelligence feeds , the Health-ISAC (Information Sharing and Analysis Centre) provides healthcare-specific intelligence
Consume national CERT feeds from your member state's national cybersecurity authority (e.g., CERT-FR in France, BSI in Germany, NCSC in Ireland, CERT.pl in Poland)
Participate in EU-level information sharing coordinated by ENISA under NIS2 Article 29
Integrate threat intelligence into SIEM rules and controls to block known malicious indicators
Share anonymised threat information with peers; many NIS2 entities will be expected to participate in sector information sharing
Health-ISAC: https://h-isac.org/
An effective Incident Response (IR) capability is among the most critical cybersecurity capabilities for a health insurer, given the sensitivity of the data involved and the strict regulatory notification timelines under GDPR and NIS2.
Incident Response Plan
Document a formal Incident Response Plan (IRP) covering:
Incident classification and severity levels (Critical, High, Medium, Low)
Roles and responsibilities during an incident - IR Lead, Technical Team, Legal Counsel, Communications, Executive Sponsor
Detection and escalation procedures
Containment, eradication, and recovery procedures
Internal and external communication protocols
Evidence preservation and forensic investigation procedures
Regulatory notification procedures (see timelines below)
Post-incident review process
Regulatory Notification Timelines
EU health insurers are subject to multiple overlapping incident notification obligations. Understanding and meeting these timelines is critical; failures carry significant penalties:
These timelines are demanding, particularly the 72-hour GDPR window which runs from when the organisation becomes aware of the breach. Ensure your IR plan includes pre-defined notification templates, a decision tree for determining reportability, and a pre-engaged legal counsel who understands GDPR breach notification.
Note that NIS2 and GDPR notifications may be required simultaneously for the same incident; coordinate internally to ensure consistency across notifications and designate a lead function (typically Legal/DPO) to manage external communications.
EDPB Guidelines on Personal Data Breach Notification: https://edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-92022-personal-data-breach-notification-under_en
Incident Response Testing
Plans that are never tested fail when needed. Conduct regular exercises to validate and improve IR capabilities:
Tabletop exercises: quarterly scenario-based discussions simulating incident scenarios (ransomware, data breach, insider threat) with key stakeholders
Technical simulations: semi-annual full simulations involving IR team members responding to a live scenario in a controlled environment
Third-party participation: include critical vendors, legal counsel, and crisis communications advisors in annual exercises
Regulatory notification drills: simulate the notification process to verify that the 72-hour GDPR and 24-hour NIS2 timelines can be met
The Recover function of the CSF focuses on restoring normal operations after a cybersecurity incident. For health insurers, operational continuity is critical, disruptions to claims processing or member services directly impact policyholders who may need access to healthcare benefits.
Business Continuity Plan (BCP)
Develop a Business Continuity Plan addressing:
Identification of critical business functions and their maximum tolerable periods of disruption (MTPD).
Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) for each critical system, aligned with business requirements and regulatory expectations under DORA.
Manual fallback procedures for operating in the absence of key systems.
Crisis management structure and escalation contacts.
Communication plans for employees, customers, regulators, and media.
Dependencies on third parties and coordination requirements.
Disaster Recovery Plan (DRP)
The DRP provides technical recovery procedures for critical IT systems:
Documented recovery procedures for each critical system, tested and version-controlled.
Regular backup testing; backups are only valuable if recovery from them is verified (aim for at least monthly restore tests).
Immutable backups stored offline or in an isolated environment to protect against ransomware that attempts to encrypt or delete backups.
Geographic redundancy for the most critical systems (data replication to a secondary site or cloud region).
Defined and tested failover procedures for cloud and on-premises systems.
Annual full DR tests simulating a major system failure, with documented results and action items.
NIST SP 800-34 Contingency Planning Guide: https://csrc.nist.gov/publications/detail/sp/800-34/rev-1/final
DORA Guidance on Digital Operational Resilience Testing: https://www.eba.europa.eu/regulation-and-policy/operational-resilience
The final step is, in many ways, the most important and the least finite. Cybersecurity is not a project with a completion date but an ongoing discipline that must evolve alongside the organisation, the technology landscape, the regulatory environment, and the threat landscape. The CSF's iterative design explicitly supports this: profiles are updated, tiers progress, and action plans are revised continuously.
Step 11 institutionalises continuous improvement through governance, measurement, learning, and culture. For EU health insurers, this step also ensures that the cybersecurity programme sustains its regulatory compliance posture over time, not just at the point of initial implementation.
Effective governance is the structural mechanism that drives accountability and sustains the programme. Establish the following governance structures:
Board-Level Oversight
NIS2 places direct obligations on management bodies, not just IT or security teams. Establish formal board-level cybersecurity governance:
Cybersecurity is a standing agenda item at board meetings at least quarterly.
The board receives a cybersecurity dashboard with key risk indicators (KRIs), major incident summaries, compliance status, and programme progress.
Board members complete basic cybersecurity awareness training; NIS2 Recital 74 highlights the importance of management bodies being sufficiently trained.
The board formally approves the Cybersecurity Strategy, major risk acceptance decisions, and significant security investments.
Cybersecurity Steering Committee
A Cybersecurity Steering Committee provides executive-level direction and cross-functional coordination:
Membership: CISO, CTO, CRO, DPO, Legal Counsel, Chief Operations Officer, and relevant business unit heads.
Meeting cadence: at least monthly, with extraordinary meetings when significant incidents or changes occur.
Responsibilities: approve major security initiatives, resolve resource conflicts, review risk posture, oversee compliance status, and sponsor cultural change.
CISO Responsibilities and Reporting Line
The CISO's position in the organisational structure signals the seriousness with which the organisation treats cybersecurity. For NIS2-regulated entities:
The CISO should report to the CEO or COO (not subordinate to the CTO) to maintain independence in risk reporting.
The CISO must have direct access to the board and should present to the board at least twice per year.
CISO responsibilities encompass security strategy, risk management, compliance oversight, incident command, and security culture.
DPO Independence and Integration
Under GDPR, the Data Protection Officer must be independent and cannot be dismissed for performing their duties. Ensure the DPO is integrated into cybersecurity governance:
DPO must be consulted on all processing activities with high data protection risk, including security monitoring systems.
DPO participates in the Cybersecurity Steering Committee.
DPO leads or co-leads the GDPR breach notification process following security incidents.
DPO conducts or commissions regular data protection audits that include security control assessment.
EDPB Guidelines on Data Protection Officers: https://www.edpb.europa.eu/our-work-tools/our-documents/guidelines/data-protection-officer_en
The CSF profile is not a static document. Establish a formal review cycle to keep it current:
Annual Full Review: Reassess both the Current and Target Profiles comprehensively. Update based on changes to the threat landscape, regulatory requirements, business objectives, and lessons learned from incidents and exercises.
Trigger-Based Updates: Update the profile when significant events occur - a major incident, a new regulation (e.g., national transposition of EU directives), a significant IT change such as a cloud migration, or a material acquisition or outsourcing arrangement.
Action Plan Updates: Refresh the prioritised action plan following each profile review to ensure it reflects current gaps and risk priorities.
Document all profile versions and maintain a change history to demonstrate the evolution of the security programme to regulators and auditors.
Sustaining a culture of measurement is essential for continuous improvement. Establish a balanced set of KPIs and KRIs reviewed by the Cybersecurity Steering Committee monthly and the board quarterly:
Key Performance Indicators (KPIs)
CSF Target Profile achievement rate (% of target outcomes achieved)
Vulnerability remediation rate within SLA by severity
Security awareness training completion rate
Mean time to detect (MTTD) and mean time to respond (MTTR)
Third-party risk assessment completion rate
Audit findings closed within target timeframe
Key Risk Indicators (KRIs)
Number of critical/high vulnerabilities open beyond SLA
Number of systems without MFA on administrative access
Number of unreviewed privileged accounts
Phishing simulation click rate trends
Number of open major audit findings
Number of critical vendors without current security assessment
SIEM alert false positive rate (high rates indicate degraded detection quality)
Every security incident, near-miss, exercise, and audit is an opportunity to improve. Formalise the lessons learned process:
Post-Incident Reviews (PIRs): Conduct a structured PIR within 14 days of every significant incident (Severity 1 and 2). PIRs should identify root causes, contributing factors, detection effectiveness, response effectiveness, and specific corrective actions with owners and deadlines.
Exercise Debriefs: Following every tabletop or simulation exercise, conduct a debrief that documents strengths, gaps, and improvement actions.
Audit Finding Tracking: Maintain a centralised register of all audit findings and track remediation progress. Report overdue findings to the Cybersecurity Steering Committee.
Threat Intelligence Integration: When threat intelligence reveals new tactics, techniques, or procedures (TTPs) targeting health insurance organisations, review current controls and update detection rules, IR playbooks, and training content accordingly.
The regulatory and threat environments are dynamic. Institutionalise mechanisms to stay current:
Subscribe to ENISA publications and alerts: ENISA publishes the annual Threat Landscape report and sector-specific guidance that is directly relevant to health insurance operations.
Monitor national supervisory authority communications from your Data Protection Authority and NIS2 Competent Authority for regulatory updates and enforcement trends.
Participate in sector-specific information sharing forums, Insurance Europe, national insurance industry associations, and Health-ISAC all provide relevant intelligence and regulatory engagement.
Maintain awareness of European Court of Justice (ECJ) rulings on data protection, these can create immediate compliance obligations (e.g., the Schrems II ruling which invalidated Privacy Shield).
Track NIST CSF updates and new Community Profiles ; NIST continues to publish supplementary materials, quick-start guides, and sector-specific profiles that can inform your Target Profile.
ENISA Threat Landscape Report: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025
Policies and technologies are only as effective as the people who operate within them. Building a security-conscious culture is arguably the highest-leverage long-term investment a health insurer can make in cybersecurity:
Tone from the Top: Senior leaders must visibly champion cybersecurity. When executives complete training, discuss security in all-hands meetings, and respond visibly to incidents, it signals that security is genuinely valued.
Reward Reporting: Encourage employees to report suspicious activity without fear of blame. A culture where employees self-censor because they fear consequences for making mistakes is a culture where incidents go unreported and escalate.
Security Champions: Identify and cultivate security champions in each business unit; employees with interest in security who can act as local advocates, answer colleagues' questions, and provide feedback to the security team.
Embed Security in Processes: Integrate security requirements into existing business processes — project management, vendor onboarding, HR, software development. Security should not feel like an external imposition but a natural part of how work is done.
Celebrate Successes: Recognise improvements in security posture, successful incident containment, and security-positive behaviours. Positive reinforcement is more effective than punitive approaches in building lasting cultural change.
As a summary guide, the following roadmap provides a phased view of the journey from initial CSF implementation to a mature, continuously improving cybersecurity programme aligned to EU regulatory expectations:
This roadmap is indicative. The appropriate pace of progression depends on your current maturity level, available resources, regulatory deadlines, and evolving threat environment. Use it as a planning guide, not a rigid prescription.
Implementing the NIST Cybersecurity Framework in an EU health insurance company is a comprehensive undertaking that requires commitment, resources, and sustained effort. However, the benefits are substantial: improved cybersecurity posture, better compliance with EU regulations, enhanced stakeholder confidence, and increased organisational resilience.
This guide provides a foundation for your CSF implementation, regardless of industry sector or size of organisation. The framework's flexibility allows you to adapt implementation to your specific context while maintaining alignment with globally recognised best practices. By following the eleven-step approach outlined in this guide, you can systematically build a robust cybersecurity program that protects your organisation, your policyholders, and the sensitive health data you process.
Supplement it with engagement of qualified cybersecurity professionals, ongoing training and awareness programs, regular consultation with legal and compliance advisors, participation in information sharing and collaboration with peers, and continuous monitoring of regulatory developments and threat landscape changes.
Remember that cybersecurity is not a one-time project but an ongoing journey of continuous improvement. Regular assessment, adaptation to evolving threats, and commitment to learning are essential for long-term success.
Health insurance companies operating in the European Union face a uniquely complex regulatory environment that intersects cybersecurity, data protection, operational resilience, and healthcare-specific requirements. Understanding this landscape is essential for effective CSF implementation.
The GDPR, which came into force in May 2018, establishes comprehensive requirements for protecting personal data of EU residents. For health insurers, this regulation is particularly significant because health data is classified as a special category of personal data requiring enhanced protection under Article 9 (Processing of special categories of personal data - https://gdpr-info.eu/art-9-gdpr/).
Key GDPR requirements relevant to cybersecurity include the obligation to implement appropriate technical and organisational measures to ensure data security (Security of Processing Article 32 - https://gdpr-info.eu/art-32-gdpr/), mandatory breach notification within 72 hours (Article 33 - https://gdpr-info.eu/art-33-gdpr/), requirements for Data Protection Impact Assessments for high-risk processing ( Article 35 - https://gdpr-info.eu/art-35-gdpr/), and the principle of privacy by design and default (Article 25 - https://gdpr-info.eu/art-25-gdpr/).
The GDPR's risk-based approach to data protection aligns well with the CSF 2.0 methodology. Both frameworks emphasise understanding context, assessing risks, implementing proportionate controls, and maintaining accountability through documentation.
NIS2, which EU member states must transpose into national law by October 2024, significantly expands cybersecurity requirements for critical and important entities. Health insurers generally fall under the scope of NIS2 as providers of healthcare services or as important digital service providers.
NIS2 requires organisations to implement risk management measures including policies on risk analysis and information system security, incident handling, business continuity and crisis management, supply chain security, security in network and information systems acquisition, and policies and procedures to assess the effectiveness of cybersecurity risk management measures.
The directive also mandates incident reporting within 24 hours for early warnings and 72 hours for detailed incident notifications, imposes personal liability on management bodies for non-compliance, and requires regular cybersecurity audits and security testing.
DORA, which applies from January 2025, establishes comprehensive requirements for digital operational resilience in the financial sector. While primarily targeting financial entities, many health insurance companies fall within DORA's scope, particularly those offering payment services or maintaining significant financial operations.
DORA requires organisations to establish frameworks for ICT risk management, classify and document ICT-related incidents and report major incidents to regulators, test digital operational resilience through various methods including threat-led penetration testing, manage ICT third-party risk throughout the vendor lifecycle, and share cyber threat information with other financial entities.
The regulation's emphasis on operational resilience, testing, and third-party risk management complements the CSF's Recover function and supply chain security considerations.
Photo by Adi Goldstein on Unsplash
Illustration by VectorElements on Unsplash
Photo by Kevin Ache on Unsplash
Photo by Dave Photoz on Unsplash
Photo by Brett Jordan on Unsplash
Photo by Brice Cooper on Unsplash
Photo by Agence Olloweb on Unsplash
Photo by Martin Sanchez on Unsplash
Photo by Yassine Ait Tahit on Unsplash
Photo by Markus Spiske on Unsplash
NIST Resources:
NIST CSF 2.0: https://www.nist.gov/cyberframework
NIST CSF Quick Start Guides: https://www.nist.gov/cyberframework/quick-start-guides
NIST Special Publication 800-53: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
EU Regulatory Resources:
GDPR Portal: https://gdpr-info.eu/
NIS2 Directive: https://digital-strategy.ec.europa.eu/en/policies/nis2-directive
DORA Regulation: https://eur-lex.europa.eu/eli/reg/2022/2554
European Union Agency for Cybersecurity Guidelines: https://www.enisa.europa.eu/
Industry Standards:
ISO/IEC 27001: https://www.iso.org/isoiec-27001-information-security.html
CIS Controls: https://www.cisecurity.org/controls
COBIT Framework: https://www.isaca.org/resources/cobit