{"id":187060,"date":"2026-04-20T14:08:47","date_gmt":"2026-04-20T12:08:47","guid":{"rendered":"https:\/\/factorialhr.com\/blog\/?p=187060"},"modified":"2026-04-21T19:23:34","modified_gmt":"2026-04-21T17:23:34","slug":"faq-nis2","status":"publish","type":"post","link":"https:\/\/factorial.fr\/blog\/faq-nis2\/","title":{"rendered":"FAQ sur la directive NIS2 en France"},"content":{"rendered":"<p id=\"p-rc_15280f0d160a3502-224\" data-path-to-node=\"1\"><span data-path-to-node=\"1,1\"><span class=\"citation-965\">La nouvelle directive NIS2 marque <\/span><b data-path-to-node=\"1,1\" data-index-in-node=\"34\"><span class=\"citation-965\">un tournant d\u00e9cisif pour la cybers\u00e9curit\u00e9 en Europe<\/span><\/b><span class=\"citation-965\">, et de nombreuses entreprises en France ne savent pas comment elle va les affecter ni ce qu&rsquo;elles doivent faire exactement. <\/span><\/span><span data-path-to-node=\"1,4\"><span class=\"citation-964\">\u00cates-vous tenu de vous y conformer ? <\/span><\/span><span data-path-to-node=\"1,7\"><span class=\"citation-963\">Quels sont les risques si vous ne le faites pas ? <\/span><\/span><span data-path-to-node=\"1,10\"><span class=\"citation-962\">Par o\u00f9 commencer ?<\/span><\/span><\/p>\n<p id=\"p-rc_15280f0d160a3502-225\" data-path-to-node=\"2\"><span data-path-to-node=\"2,1\"><span class=\"citation-961\">Cette FAQ offre des <\/span><b data-path-to-node=\"2,1\" data-index-in-node=\"20\"><span class=\"citation-961\">r\u00e9ponses claires et rapides aux questions les plus fr\u00e9quentes<\/span><\/b><span class=\"citation-961\"> sur la directive NIS2 en France, afin que vous compreniez son impact et les d\u00e9marches que vous devriez entreprendre au plus vite.<\/span><\/span><\/p>\n<h2 data-path-to-node=\"4,0\">1. <span data-path-to-node=\"4,2\"><span class=\"citation-960\">Qu&rsquo;est-ce que la directive NIS2 et quel est son objectif ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-226\" data-path-to-node=\"5\"><span data-path-to-node=\"5,1\"><span class=\"citation-959\">La directive NIS2 est une r\u00e9glementation europ\u00e9enne dont le but est d&rsquo;am\u00e9liorer la cybers\u00e9curit\u00e9 dans l&rsquo;ensemble de l&rsquo;Union europ\u00e9enne. <\/span><\/span><span data-path-to-node=\"5,4\"><span class=\"citation-958\">Son objectif principal est de mieux prot\u00e9ger les entreprises et les services essentiels contre les cyberattaques, en \u00e9tablissant des exigences communes en mati\u00e8re de s\u00e9curit\u00e9 et de gestion des risques. <\/span><\/span><span data-path-to-node=\"5,7\"><span class=\"citation-957\">De plus, elle vise \u00e0 renforcer la coop\u00e9ration entre les pays et \u00e0 s&rsquo;assurer que les organisations r\u00e9agissent rapidement face aux incidents de s\u00e9curit\u00e9.<\/span><\/span><\/p>\n<h2 data-path-to-node=\"6,0\">2. <span data-path-to-node=\"6,2\"><span class=\"citation-956\">Qu&rsquo;est-ce qui change avec NIS2 par rapport \u00e0 NIS1 ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-227\" data-path-to-node=\"7\"><span data-path-to-node=\"7,1\"><span class=\"citation-955\">D&rsquo;une part, la directive NIS2 \u00e9largit le champ d&rsquo;application de la r\u00e9glementation pr\u00e9c\u00e9dente (NIS1), en englobant beaucoup plus d&rsquo;entreprises et de secteurs. <\/span><\/span><span data-path-to-node=\"7,4\"><span class=\"citation-954\">D&rsquo;autre part, elle \u00e9tablit des r\u00e8gles plus strictes en mati\u00e8re de gestion des risques, de notification des incidents et de supervision. <\/span><\/span><span data-path-to-node=\"7,7\"><span class=\"citation-953\">Une autre diff\u00e9rence cl\u00e9 est qu&rsquo;elle accro\u00eet la responsabilit\u00e9 de la direction des entreprises et durcit les sanctions en cas de non-conformit\u00e9.<\/span><\/span><\/p>\n<h2 data-path-to-node=\"8,0\">3. <span data-path-to-node=\"8,2\"><span class=\"citation-952\">Quand la directive NIS2 entre-t-elle en vigueur en France ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-228\" data-path-to-node=\"9\"><span data-path-to-node=\"9,1\"><span class=\"citation-951\">La directive NIS2 est entr\u00e9e en vigueur au niveau europ\u00e9en au d\u00e9but de l&rsquo;ann\u00e9e 2023 et fixait une date limite non n\u00e9gociable pour tous les pays : le 17 octobre 2024. <\/span><\/span><span data-path-to-node=\"9,4\"><span class=\"citation-950\">\u00c0 ce jour, la France accuse un retard consid\u00e9rable. <\/span><\/span><span data-path-to-node=\"9,7\"><span class=\"citation-949\">Bien qu&rsquo;\u00e0 la fin de l&rsquo;ann\u00e9e 2024, le \u00ab<a href=\"https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000043956924\" target=\"_blank\" rel=\"noopener\"> projet de loi R\u00e9silience<\/a> \u00bb ait \u00e9t\u00e9 pr\u00e9sent\u00e9 au S\u00e9nat et ait ensuite progress\u00e9 vers l&rsquo;Assembl\u00e9e nationale, le processus l\u00e9gislatif a \u00e9t\u00e9 ralenti par l&rsquo;instabilit\u00e9 politique du pays, notamment la dissolution de l&rsquo;Assembl\u00e9e nationale.<\/span><\/span><\/p>\n<p data-path-to-node=\"9\"><span data-path-to-node=\"9,10\"><span class=\"citation-948\">Ce retard a conduit la Commission europ\u00e9enne \u00e0 \u00e9mettre des mises en demeure et \u00e0 lancer des proc\u00e9dures d&rsquo;infraction contre le pays. <\/span><\/span><span data-path-to-node=\"9,13\"><span class=\"citation-947\">Malgr\u00e9 ce retard, l&rsquo;Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information (ANSSI) exhorte les entreprises \u00e0 mettre en \u0153uvre d\u00e8s \u00e0 pr\u00e9sent les mesures n\u00e9cessaires, l&rsquo;adoption d\u00e9finitive de la loi \u00e9tant imminente.<\/span><\/span><\/p>\n<p data-path-to-node=\"9\">\ud83d\udccc En savoir plus sur <a href=\"https:\/\/factorial.fr\/blog\/nis2-entree-vigueur\/\">l\u2019entr\u00e9e en vigueur de la directive <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">NIS2<\/span><\/span> en France<\/a>.<\/p>\n<h2 data-path-to-node=\"10,0\">4. <span data-path-to-node=\"10,2\"><span class=\"citation-946\">Quelles entreprises sont tenues de se conformer \u00e0 la directive NIS2 ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-229\" data-path-to-node=\"11\"><span data-path-to-node=\"11,1\"><span class=\"citation-945\">La directive NIS2 s&rsquo;applique aux entreprises consid\u00e9r\u00e9es comme des entit\u00e9s essentielles et importantes, c&rsquo;est-\u00e0-dire celles qui exercent des activit\u00e9s dans des secteurs critiques ou qui ont un impact significatif sur l&rsquo;\u00e9conomie ou la soci\u00e9t\u00e9. <\/span><\/span><span data-path-to-node=\"11,4\"><span class=\"citation-944\">En g\u00e9n\u00e9ral, elle concerne les moyennes et grandes entreprises (plus de 50 employ\u00e9s ou plus de 10 millions d&rsquo;euros de chiffre d&rsquo;affaires), bien qu&rsquo;elle puisse \u00e9galement inclure des organisations plus petites si leur activit\u00e9 est particuli\u00e8rement critique.<\/span><\/span><\/p>\n<p data-path-to-node=\"11\">\ud83d\udccc En savoir plus sur <a href=\"https:\/\/factorial.fr\/blog\/entreprises-concernees-nis2\/\">les entit\u00e9s concern\u00e9es par la directive <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">NIS2<\/span><\/span> en France<\/a>.<\/p>\n<div class=\"source-inline-chip-container ng-star-inserted\">\n<h2 data-path-to-node=\"12,0\">5. Quels sont les secteurs concern\u00e9s par la directive NIS2 ?<\/h2>\n<p data-path-to-node=\"13\"><span data-path-to-node=\"13,1\"><span class=\"citation-942\">La directive NIS2 fait la distinction entre les secteurs hautement critiques (entit\u00e9s essentielles) et les autres secteurs critiques (entit\u00e9s importantes).<\/span><\/span><\/p>\n<p data-path-to-node=\"15\"><span data-path-to-node=\"15,0\"><b data-path-to-node=\"15,0\" data-index-in-node=\"0\"><span class=\"citation-941\">Secteurs hautement critiques :<\/span><\/b><\/span><\/p>\n<ul data-path-to-node=\"16\">\n<li>\n<p data-path-to-node=\"16,0,0\"><span data-path-to-node=\"16,0,0,1\"><span class=\"citation-940\">\u00c9nergie.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,0,0\">Transports.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,2,0\"><span data-path-to-node=\"16,2,0,1\"><span class=\"citation-938\">Secteur bancaire.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,3,0\"><span data-path-to-node=\"16,3,0,1\"><span class=\"citation-937\">Infrastructures des march\u00e9s financiers.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,4,0\"><span data-path-to-node=\"16,4,0,1\"><span class=\"citation-936\">Sant\u00e9.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,5,0\"><span data-path-to-node=\"16,5,0,1\"><span class=\"citation-935\">Eau potable.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,6,0\"><span data-path-to-node=\"16,6,0,1\"><span class=\"citation-934\">Eaux us\u00e9es.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,7,0\"><span data-path-to-node=\"16,7,0,1\"><span class=\"citation-933\">Infrastructures num\u00e9riques.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,8,0\"><span data-path-to-node=\"16,8,0,1\"><span class=\"citation-932\">Gestion des services TIC (fournisseurs de services g\u00e9r\u00e9s).<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,9,0\"><span data-path-to-node=\"16,9,0,1\"><span class=\"citation-931\">Administration publique.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"16,10,0\"><span data-path-to-node=\"16,10,0,1\"><span class=\"citation-930\">Espace.<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p data-path-to-node=\"18\"><span data-path-to-node=\"18,0\"><b data-path-to-node=\"18,0\" data-index-in-node=\"0\"><span class=\"citation-929\">Autres secteurs critiques :<\/span><\/b><\/span><\/p>\n<ul data-path-to-node=\"19\">\n<li>\n<p data-path-to-node=\"19,0,0\"><span data-path-to-node=\"19,0,0,1\"><span class=\"citation-928\">Services postaux et d&rsquo;exp\u00e9dition.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"19,1,0\"><span data-path-to-node=\"19,1,0,1\"><span class=\"citation-927\">Gestion des d\u00e9chets.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"19,2,0\"><span data-path-to-node=\"19,2,0,1\"><span class=\"citation-926\">Fabrication, production et distribution de produits chimiques.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"19,3,0\"><span data-path-to-node=\"19,3,0,1\"><span class=\"citation-925\">Production, transformation et distribution de denr\u00e9es alimentaires.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"19,3,0\"><span data-path-to-node=\"19,4,0,1\"><span class=\"citation-924\">Fabrication (notamment machines, v\u00e9hicules, \u00e9quipements \u00e9lectroniques, etc.).<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"19,5,0\"><span data-path-to-node=\"19,5,0,1\"><span class=\"citation-923\">Fournisseurs num\u00e9riques (places de march\u00e9 en ligne, moteurs de recherche, r\u00e9seaux sociaux).<\/span><\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-250\" data-path-to-node=\"19,6,0\"><span data-path-to-node=\"19,6,0,1\"><span class=\"citation-922\">Recherche.<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<div class=\"factorial-banner inline-banner banner-other category-nis2\"\n    data-banner-id=\"187213\"\n    data-banner-type=\"other\"\n    data-category=\"NIS2\">\n    <div class=\"banner-content\">\n        <div class=\"banner-text\">\n                            <h4>Pr\u00e9parez-vous \u00e0 NIS2 avec plus de contr\u00f4le et moins de chaos<\/h4>\n            \n                            <p>Centralisez appareils, acc\u00e8s et processus IT en un seul endroit pour r\u00e9duire les t\u00e2ches manuelles et gagner en visibilit\u00e9.<\/p>\n            \n                            <a href=\"https:\/\/factorial.fr\/nis2-factorial-it#factorial-it-demo-form-nis2\"\n                    class=\"factorial-cta-button not-prose freebie\" data-cta=\"other\" data-cta-position=\"inline-banner\">\n                    En savoir plus                <\/a>\n                    <\/div>\n\n        <div class=\"banner-image has-image\">\n            <img decoding=\"async\" src=\"https:\/\/factorialhr.com\/wp-content\/uploads\/2026\/04\/21114628\/FR-sidebar-1-nis-iso.png\" class=\"not-prose\" \/>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n<h2 data-path-to-node=\"20,0\">6. <span data-path-to-node=\"20,2\"><span class=\"citation-921\">La directive NIS2 concerne-t-elle les PME ou uniquement les grandes entreprises ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-251\" data-path-to-node=\"21\"><span data-path-to-node=\"21,1\"><span class=\"citation-920\">Bien que la nouvelle directive NIS2 vise principalement les moyennes et grandes entreprises, elle peut, dans certains cas, impacter les PME. <\/span><\/span><span data-path-to-node=\"21,4\"><span class=\"citation-919\">Par exemple, si elles font partie de la cha\u00eene d&rsquo;approvisionnement d&rsquo;une entreprise assujettie ou si elles op\u00e8rent dans des secteurs critiques. <\/span><\/span><span data-path-to-node=\"21,7\"><span class=\"citation-918\">Dans la pratique, de nombreuses PME devront s&rsquo;y adapter indirectement, car leurs clients ou partenaires exigeront d&rsquo;elles le respect de certaines exigences en mati\u00e8re de cybers\u00e9curit\u00e9. <\/span><\/span><\/p>\n<h2 data-path-to-node=\"22,0\">7. <span data-path-to-node=\"22,2\"><span class=\"citation-917\">Que sont les entit\u00e9s essentielles et importantes ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-252\" data-path-to-node=\"23\"><span data-path-to-node=\"23,1\"><span class=\"citation-916\">La directive NIS2 classe les entreprises en deux grands groupes :<\/span><\/span><\/p>\n<ul data-path-to-node=\"24\">\n<li>\n<p id=\"p-rc_15280f0d160a3502-253\" data-path-to-node=\"24,0,1\"><span data-path-to-node=\"24,0,1,0\"><b data-path-to-node=\"24,0,1,0\" data-index-in-node=\"0\"><span class=\"citation-915\">Entit\u00e9s essentielles :<\/span><\/b><span class=\"citation-915\"> ce sont des organisations appartenant \u00e0 des secteurs hautement critiques (comme l&rsquo;\u00e9nergie, les transports ou la sant\u00e9) et qui sont soumises \u00e0 un niveau de supervision plus \u00e9lev\u00e9.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"24,1,0\"><b data-path-to-node=\"24,1,1,0\" data-index-in-node=\"0\"><span class=\"citation-914\">Entit\u00e9s importantes :<\/span><\/b><span class=\"citation-914\"> elles appartiennent \u00e0 d&rsquo;autres secteurs pertinents, mais avec un niveau de criticit\u00e9 l\u00e9g\u00e8rement inf\u00e9rieur.<\/span><\/p>\n<\/li>\n<\/ul>\n<p>\ud83d\udccc En savoir plus sur <a href=\"https:\/\/factorial.fr\/blog\/entreprises-essentielles-vs-importantes-nis2\/\">la diff\u00e9rence entre les entit\u00e9s essentielles et importantes<\/a>.<\/p>\n<h2 data-path-to-node=\"25,0\">8. <span data-path-to-node=\"25,2\"><span class=\"citation-913\">Si je suis un fournisseur ou si je fais partie de la cha\u00eene d&rsquo;approvisionnement, la directive NIS2 me concerne-t-elle ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-255\" data-path-to-node=\"26\"><span data-path-to-node=\"26,1\"><span class=\"citation-912\">Oui, m\u00eame si vous n&rsquo;y \u00eates pas directement assujetti, la directive NIS2 peut tout de m\u00eame vous affecter si vous faites partie de la cha\u00eene d&rsquo;approvisionnement d&rsquo;une entreprise qui l&rsquo;est. <\/span><\/span><span data-path-to-node=\"26,4\"><span class=\"citation-911\">Les organisations assujetties doivent garantir la s\u00e9curit\u00e9 de leurs fournisseurs ; il est donc courant qu&rsquo;elles commencent \u00e0 exiger des mesures de cybers\u00e9curit\u00e9, des audits ou des certifications de la part de tiers. <\/span><\/span><span data-path-to-node=\"26,7\"><span class=\"citation-910\">Dans la pratique, de nombreuses entreprises devront s&rsquo;adapter \u00e0 NIS2 de mani\u00e8re indirecte afin de pouvoir continuer \u00e0 travailler avec leurs clients.<\/span><\/span><\/p>\n<h2 data-path-to-node=\"27,0\">9. <span data-path-to-node=\"27,2\"><span class=\"citation-909\">Quelles obligations la directive NIS2 impose-t-elle aux entreprises ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-256\" data-path-to-node=\"28\"><span data-path-to-node=\"28,1\"><span class=\"citation-908\">La directive NIS2 \u00e9tablit une s\u00e9rie d&rsquo;obligations ax\u00e9es sur la gestion proactive de la cybers\u00e9curit\u00e9 et l&rsquo;att\u00e9nuation des risques. <\/span><\/span><span data-path-to-node=\"28,4\"><span class=\"citation-907\">Parmi les principales, on retient :<\/span><\/span><\/p>\n<ul data-path-to-node=\"29\">\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><span data-path-to-node=\"29,0,1,0\"><b data-path-to-node=\"29,0,1,0\" data-index-in-node=\"0\"><span class=\"citation-906\">Gouvernance et responsabilit\u00e9 d&rsquo;entreprise :<\/span><\/b><span class=\"citation-906\"> la direction g\u00e9n\u00e9rale est le responsable ultime de la cybers\u00e9curit\u00e9, elle doit approuver les mesures et d\u00e9finir des r\u00f4les clairs (et assume la responsabilit\u00e9 en cas de n\u00e9gligence).<\/span><\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,1,1,0\" data-index-in-node=\"0\"><span class=\"citation-905\">Gestion des risques li\u00e9s \u00e0 la cybers\u00e9curit\u00e9 :<\/span><\/b><span class=\"citation-905\"> \u00e9valuer et g\u00e9rer en continu les risques pesant sur les syst\u00e8mes d&rsquo;information, les r\u00e9seaux et les services physiques.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,2,1,0\" data-index-in-node=\"0\"><span class=\"citation-904\">Mesures de s\u00e9curit\u00e9 techniques et organisationnelles :<\/span><\/b><span class=\"citation-904\"> mettre en \u0153uvre des contr\u00f4les d&rsquo;acc\u00e8s stricts, une authentification multifacteur (MFA), le chiffrement des donn\u00e9es, la protection de l&rsquo;infrastructure et une cyber-hygi\u00e8ne de base.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,3,1,0\" data-index-in-node=\"0\"><span class=\"citation-903\">Gestion de la cha\u00eene d&rsquo;approvisionnement :<\/span><\/b><span class=\"citation-903\"> s&rsquo;assurer que les fournisseurs directs et les prestataires de services respectent des exigences de cybers\u00e9curit\u00e9 \u00e9quivalentes afin d&rsquo;\u00e9viter les attaques par des tiers.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,4,1,0\" data-index-in-node=\"0\"><span class=\"citation-902\">Notification des incidents :<\/span><\/b><span class=\"citation-902\"> signaler les menaces graves et les incidents de s\u00e9curit\u00e9 aux autorit\u00e9s comp\u00e9tentes en respectant strictement les d\u00e9lais l\u00e9gaux (24 h, 72 h et 1 mois).<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,5,1,0\" data-index-in-node=\"0\"><span class=\"citation-901\">Tests et audits :<\/span><\/b><span class=\"citation-901\"> r\u00e9aliser des \u00e9valuations p\u00e9riodiques, des audits de s\u00e9curit\u00e9 et des simulations pour mesurer l&rsquo;efficacit\u00e9 des mesures mises en place.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,6,1,0\" data-index-in-node=\"0\"><span class=\"citation-900\">Sensibilisation et formation :<\/span><\/b><span class=\"citation-900\"> former obligatoirement et p\u00e9riodiquement l&rsquo;ensemble du personnel (y compris la direction) \u00e0 la cybers\u00e9curit\u00e9 et aux bonnes pratiques.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,7,1,0\" data-index-in-node=\"0\"><span class=\"citation-899\">Plans de continuit\u00e9 et de reprise :<\/span><\/b><span class=\"citation-899\"> garantir que l&rsquo;entreprise puisse continuer \u00e0 fonctionner et se r\u00e9tablir rapidement apr\u00e8s un incident grave (via des plans de reprise d&rsquo;activit\u00e9 et des sauvegardes s\u00e9curis\u00e9es).<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,8,1,0\" data-index-in-node=\"0\"><span class=\"citation-898\">Rapports et documentation :<\/span><\/b><span class=\"citation-898\"> tenir un registre document\u00e9 de toutes les politiques, des mesures adopt\u00e9es, des preuves et des \u00e9valuations des risques.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-257\" data-path-to-node=\"29,0,1\"><b data-path-to-node=\"29,9,1,0\" data-index-in-node=\"0\"><span class=\"citation-897\">Coop\u00e9ration avec les autorit\u00e9s et d&rsquo;autres entit\u00e9s :<\/span><\/b><span class=\"citation-897\"> collaborer avec les organismes nationaux et internationaux, et participer \u00e0 des r\u00e9seaux de partage d&rsquo;informations sur les cybermenaces.<\/span><\/p>\n<\/li>\n<\/ul>\n<div class=\"source-inline-chip-container ng-star-inserted\">\n<h2 data-path-to-node=\"30,0\">10. Comment les incidents de s\u00e9curit\u00e9 doivent-ils \u00eatre notifi\u00e9s ?<\/h2>\n<p id=\"p-rc_15280f0d160a3502-267\" data-path-to-node=\"31\"><span data-path-to-node=\"31,1\"><span class=\"citation-895\">La directive NIS2 est extr\u00eamement stricte quant aux temps de r\u00e9ponse. <\/span><\/span><span data-path-to-node=\"31,4\"><span class=\"citation-894\">Elle oblige les entreprises \u00e0 notifier \u00e0 l&rsquo;autorit\u00e9 nationale comp\u00e9tente tout incident significatif en suivant un mod\u00e8le par \u00e9tapes immuable :<\/span><\/span><\/p>\n<ul data-path-to-node=\"32\">\n<li>\n<p id=\"p-rc_15280f0d160a3502-268\" data-path-to-node=\"32,0,1\"><span data-path-to-node=\"32,0,1,0\"><b data-path-to-node=\"32,0,1,0\" data-index-in-node=\"0\"><span class=\"citation-893\">Alerte pr\u00e9coce :<\/span><\/b><span class=\"citation-893\"> dans un d\u00e9lai maximum de 24 heures apr\u00e8s avoir pris connaissance de l&rsquo;incident, un premier avis doit \u00eatre \u00e9mis (m\u00eame si tous les d\u00e9tails ne sont pas encore connus).<\/span><\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-268\" data-path-to-node=\"32,0,1\"><b data-path-to-node=\"32,1,1,0\" data-index-in-node=\"0\"><span class=\"citation-892\">Notification formelle :<\/span><\/b><span class=\"citation-892\"> dans un d\u00e9lai maximum de 72 heures, une mise \u00e0 jour comprenant une \u00e9valuation initiale de l&rsquo;incident, de sa gravit\u00e9 et de son impact doit \u00eatre envoy\u00e9e.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-268\" data-path-to-node=\"32,0,1\"><b data-path-to-node=\"32,2,1,0\" data-index-in-node=\"0\"><span class=\"citation-891\">Rapport final :<\/span><\/b><span class=\"citation-891\"> dans un d\u00e9lai maximum d&rsquo;un mois, un document d\u00e9taillant l&rsquo;analyse compl\u00e8te de la cyberattaque, les cons\u00e9quences r\u00e9elles et les mesures d&rsquo;att\u00e9nuation adopt\u00e9es doit \u00eatre remis.<\/span><\/p>\n<\/li>\n<\/ul>\n<p id=\"p-rc_15280f0d160a3502-271\" data-path-to-node=\"33\"><span data-path-to-node=\"33,1\"><span class=\"citation-890\">La directive NIS2 oblige les entreprises \u00e0 signaler tout incident de cybers\u00e9curit\u00e9 affectant les services essentiels. <\/span><\/span><span data-path-to-node=\"33,4\"><span class=\"citation-889\">La notification doit \u00eatre adress\u00e9e \u00e0 l&rsquo;autorit\u00e9 nationale comp\u00e9tente. <\/span><\/span><span data-path-to-node=\"33,7\"><span class=\"citation-888\">Le d\u00e9lai d\u00e9pend de la gravit\u00e9 de l&rsquo;incident : g\u00e9n\u00e9ralement entre 24 et 72 heures \u00e0 compter de sa d\u00e9tection. <\/span><\/span><span data-path-to-node=\"33,10\"><span class=\"citation-887\">Des d\u00e9tails sur la nature de l&rsquo;incident, son impact et les mesures prises doivent y \u00eatre inclus. <\/span><\/span><\/p>\n<div class=\"source-inline-chip-container ng-star-inserted\">\n<h2 data-path-to-node=\"34,0\">11. La direction de l&rsquo;entreprise a-t-elle une responsabilit\u00e9 l\u00e9gale avec NIS2 ?<\/h2>\n<p id=\"p-rc_15280f0d160a3502-272\" data-path-to-node=\"35\"><span data-path-to-node=\"35,1\"><span class=\"citation-885\">Oui, totale et absolue. <\/span><\/span><span data-path-to-node=\"35,4\"><span class=\"citation-884\">La directive NIS2 coupe court \u00e0 l&rsquo;excuse selon laquelle \u00ab la cybers\u00e9curit\u00e9 n&rsquo;est qu&rsquo;un probl\u00e8me du service informatique \u00bb et fait peser la responsabilit\u00e9 directement sur les \u00e9paules du conseil d&rsquo;administration et de la direction g\u00e9n\u00e9rale. <\/span><\/span><span data-path-to-node=\"35,7\"><span class=\"citation-883\">Cela se traduit par deux obligations critiques :<\/span><\/span><\/p>\n<ul data-path-to-node=\"36\">\n<li>\n<p id=\"p-rc_15280f0d160a3502-273\" data-path-to-node=\"36,0,1\"><span data-path-to-node=\"36,0,1,0\"><b data-path-to-node=\"36,0,1,0\" data-index-in-node=\"0\"><span class=\"citation-882\">Formation obligatoire :<\/span><\/b><span class=\"citation-882\"> les dirigeants sont tenus de se former r\u00e9guli\u00e8rement \u00e0 la cybers\u00e9curit\u00e9 afin de comprendre les risques technologiques de leur secteur et de pouvoir \u00e9valuer correctement les mesures mises en place.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-273\" data-path-to-node=\"36,0,1\"><b data-path-to-node=\"36,1,1,0\" data-index-in-node=\"0\"><span class=\"citation-881\">Responsabilit\u00e9 directe pour n\u00e9gligence :<\/span><\/b><span class=\"citation-881\"> si une entreprise subit un incident grave pour ne pas avoir approuv\u00e9 ou appliqu\u00e9 les mesures requises, les dirigeants peuvent \u00eatre tenus personnellement responsables d&rsquo;un point de vue l\u00e9gal. <\/span>En fait, dans le cas des entit\u00e9s essentielles, les autorit\u00e9s peuvent aller jusqu&rsquo;\u00e0 suspendre temporairement les cadres dirigeants de leurs fonctions de direction.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<h2 data-path-to-node=\"38,0\">12. <span data-path-to-node=\"38,2\"><span class=\"citation-879\">Comment commencer \u00e0 se conformer \u00e0 la directive NIS2 ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-276\" data-path-to-node=\"39\"><span data-path-to-node=\"39,1\"><span class=\"citation-878\">S&rsquo;adapter \u00e0 la directive NIS2 ne se fait pas du jour au lendemain. <\/span><\/span><span data-path-to-node=\"39,4\"><span class=\"citation-877\">Les entreprises devraient suivre cette feuille de route :<\/span><\/span><\/p>\n<ul data-path-to-node=\"40\">\n<li>\n<p id=\"p-rc_15280f0d160a3502-277\" data-path-to-node=\"40,0,1\"><span data-path-to-node=\"40,0,1,0\"><b data-path-to-node=\"40,0,1,0\" data-index-in-node=\"0\"><span class=\"citation-876\">Classification et p\u00e9rim\u00e8tre :<\/span><\/b><span class=\"citation-876\"> identifier formellement si l&rsquo;entreprise est assujettie \u00e0 la loi et dans quelle cat\u00e9gorie elle se situe (entit\u00e9 essentielle ou importante).<\/span><\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-277\" data-path-to-node=\"40,0,1\"><b data-path-to-node=\"40,1,1,0\" data-index-in-node=\"0\"><span class=\"citation-875\">Implication de la direction :<\/span><\/b><span class=\"citation-875\"> informer la direction g\u00e9n\u00e9rale de ses nouvelles responsabilit\u00e9s l\u00e9gales et s&rsquo;assurer du budget n\u00e9cessaire \u00e0 l&rsquo;adaptation.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-277\" data-path-to-node=\"40,0,1\"><b data-path-to-node=\"40,2,1,0\" data-index-in-node=\"0\"><span class=\"citation-874\">Audit initial :<\/span><\/b><span class=\"citation-874\"> \u00e9valuer l&rsquo;\u00e9tat actuel de la cybers\u00e9curit\u00e9 au sein de l&rsquo;entreprise par rapport aux exigences de la directive NIS2 afin de d\u00e9tecter les failles existantes et d&rsquo;\u00e9valuer la criticit\u00e9 des syst\u00e8mes.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-277\" data-path-to-node=\"40,0,1\"><b data-path-to-node=\"40,3,1,0\" data-index-in-node=\"0\"><span class=\"citation-873\">Plan d&rsquo;action :<\/span><\/b><span class=\"citation-873\"> mettre en \u0153uvre les solutions n\u00e9cessaires pour combler ces failles : s\u00e9curit\u00e9 des r\u00e9seaux, sauvegardes immuables, contr\u00f4le d&rsquo;acc\u00e8s (MFA), chiffrement, etc.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-277\" data-path-to-node=\"40,0,1\"><b data-path-to-node=\"40,4,1,0\" data-index-in-node=\"0\"><span class=\"citation-872\">Protocoles de r\u00e9ponse et de notification :<\/span><\/b><span class=\"citation-872\"> d\u00e9finir et documenter des processus clairs pour savoir comment r\u00e9agir face \u00e0 une attaque et s&rsquo;assurer de pouvoir en informer les autorit\u00e9s dans les 24 premi\u00e8res heures.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-277\" data-path-to-node=\"40,0,1\"><b data-path-to-node=\"40,5,1,0\" data-index-in-node=\"0\"><span class=\"citation-871\">S\u00e9curiser la cha\u00eene d&rsquo;approvisionnement :<\/span><\/b><span class=\"citation-871\"> revoir les contrats avec les fournisseurs technologiques et les prestataires de services, en exigeant qu&rsquo;ils respectent des exigences de cybers\u00e9curit\u00e9 \u00e9quivalentes.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-277\" data-path-to-node=\"40,0,1\"><b data-path-to-node=\"40,6,1,0\" data-index-in-node=\"0\"><span class=\"citation-870\">Sensibilisation continue :<\/span><\/b><span class=\"citation-870\"> former p\u00e9riodiquement l&rsquo;ensemble du personnel (y compris les dirigeants) pour cr\u00e9er une v\u00e9ritable culture de la cybers\u00e9curit\u00e9 et \u00e9viter les erreurs humaines.<\/span><\/p>\n<\/li>\n<\/ul>\n<div class=\"factorial-banner inline-banner banner-other category-nis2\"\n    data-banner-id=\"187213\"\n    data-banner-type=\"other\"\n    data-category=\"NIS2\">\n    <div class=\"banner-content\">\n        <div class=\"banner-text\">\n                            <h4>Pr\u00e9parez-vous \u00e0 NIS2 avec plus de contr\u00f4le et moins de chaos<\/h4>\n            \n                            <p>Centralisez appareils, acc\u00e8s et processus IT en un seul endroit pour r\u00e9duire les t\u00e2ches manuelles et gagner en visibilit\u00e9.<\/p>\n            \n                            <a href=\"https:\/\/factorial.fr\/nis2-factorial-it#factorial-it-demo-form-nis2\"\n                    class=\"factorial-cta-button not-prose freebie\" data-cta=\"other\" data-cta-position=\"inline-banner\">\n                    En savoir plus                <\/a>\n                    <\/div>\n\n        <div class=\"banner-image has-image\">\n            <img decoding=\"async\" src=\"https:\/\/factorialhr.com\/wp-content\/uploads\/2026\/04\/21114628\/FR-sidebar-1-nis-iso.png\" class=\"not-prose\" \/>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n<h2 data-path-to-node=\"41,0\">13. <span data-path-to-node=\"41,2\"><span class=\"citation-869\">Existe-t-il des logiciels sp\u00e9cifiques pour se conformer \u00e0 la directive NIS2 ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-284\" data-path-to-node=\"42\"><span data-path-to-node=\"42,1\"><span class=\"citation-868\">Oui, il existe des outils con\u00e7us pour faciliter la conformit\u00e9 \u00e0 la directive NIS2, bien qu&rsquo;il n&rsquo;y ait pas de logiciel officiel unique. <\/span><\/span><span data-path-to-node=\"42,4\"><span class=\"citation-867\">Ces solutions aident \u00e0 g\u00e9rer les risques, \u00e0 documenter les contr\u00f4les et \u00e0 s&rsquo;assurer que les exigences de la directive sont respect\u00e9es. <\/span><\/span><span data-path-to-node=\"42,7\"><span class=\"citation-866\">Parmi les plus remarquables, on trouve :<\/span><\/span><\/p>\n<ul data-path-to-node=\"43\">\n<li>\n<p id=\"p-rc_15280f0d160a3502-285\" data-path-to-node=\"43,0,1\"><span data-path-to-node=\"43,0,1,0\"><b data-path-to-node=\"43,0,1,0\" data-index-in-node=\"0\"><span class=\"citation-865\">Plateformes GRC (Governance, Risk &amp; Compliance) :<\/span><\/b><span class=\"citation-865\"> elles permettent de centraliser la gestion des risques, des politiques et des audits.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-285\" data-path-to-node=\"43,0,1\"><b data-path-to-node=\"43,1,1,0\" data-index-in-node=\"0\"><span class=\"citation-864\">Logiciels sp\u00e9cifiques \u00e0 NIS2 :<\/span><\/b><span class=\"citation-864\"> des outils qui aident \u00e0 documenter les mesures de s\u00e9curit\u00e9, les incidents et les preuves de conformit\u00e9.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-285\" data-path-to-node=\"43,0,1\"><b data-path-to-node=\"43,2,1,0\" data-index-in-node=\"0\"><span class=\"citation-863\">Solutions techniques de cybers\u00e9curit\u00e9 :<\/span><\/b><span class=\"citation-863\"> SIEM, EDR et surveillance des r\u00e9seaux pour d\u00e9tecter et r\u00e9pondre aux incidents.<\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-285\" data-path-to-node=\"43,0,1\"><b data-path-to-node=\"43,3,1,0\" data-index-in-node=\"0\"><span class=\"citation-862\">Conseils ou ressources externes :<\/span><\/b><span class=\"citation-862\"> services sp\u00e9cialis\u00e9s qui aident \u00e0 adapter les processus et \u00e0 former le personnel au respect de la r\u00e9glementation.<\/span><\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"44,0\">14. <span data-path-to-node=\"44,2\"><span class=\"citation-861\">Quelles sont les sanctions en cas de non-conformit\u00e9 \u00e0 la directive NIS2 ? <\/span><\/span><\/h2>\n<p id=\"p-rc_15280f0d160a3502-289\" data-path-to-node=\"45\"><span data-path-to-node=\"45,1\"><span class=\"citation-860\">Le non-respect de la directive NIS2 porte le risque financier \u00e0 un tout autre niveau, alignant les amendes li\u00e9es \u00e0 la cybers\u00e9curit\u00e9 sur celles que nous connaissons d\u00e9j\u00e0 en mati\u00e8re de protection des donn\u00e9es (RGPD). <\/span><\/span><span data-path-to-node=\"45,4\"><span class=\"citation-859\"><a href=\"https:\/\/factorial.fr\/blog\/sanctions-nis2\/\">Les sanctions en cas de non-conformit\u00e9 \u00e0 NIS2<\/a> se divisent en deux paliers selon la classification de l&rsquo;entreprise :<\/span><\/span><\/p>\n<ul data-path-to-node=\"46\">\n<li>\n<p id=\"p-rc_15280f0d160a3502-290\" data-path-to-node=\"46,0,1\"><span data-path-to-node=\"46,0,1,0\"><b data-path-to-node=\"46,0,1,0\" data-index-in-node=\"0\"><span class=\"citation-858\">Pour les entit\u00e9s essentielles :<\/span><\/b><span class=\"citation-858\"> des amendes pouvant aller jusqu&rsquo;\u00e0 10 millions d&rsquo;euros ou 2 % du chiffre d&rsquo;affaires annuel mondial total de l&rsquo;exercice pr\u00e9c\u00e9dent (le montant le plus \u00e9lev\u00e9 \u00e9tant toujours retenu).<\/span><\/span><\/p>\n<\/li>\n<li>\n<p id=\"p-rc_15280f0d160a3502-290\" data-path-to-node=\"46,0,1\"><b data-path-to-node=\"46,1,1,0\" data-index-in-node=\"0\"><span class=\"citation-857\">Pour les entit\u00e9s importantes :<\/span><\/b><span class=\"citation-857\"> des amendes pouvant aller jusqu&rsquo;\u00e0 7 millions d&rsquo;euros ou 1,4 % du chiffre d&rsquo;affaires annuel mondial total (le montant le plus \u00e9lev\u00e9 \u00e9tant retenu).<\/span><\/p>\n<\/li>\n<\/ul>\n<p id=\"p-rc_15280f0d160a3502-292\" data-path-to-node=\"47\"><span data-path-to-node=\"47,1\"><span class=\"citation-856\">Outre l&rsquo;impact financier, les autorit\u00e9s peuvent imposer des audits p\u00e9riodiques (aux frais de l&rsquo;entreprise en infraction), exiger que le non-respect soit rendu public (avec l&rsquo;\u00e9norme pr\u00e9judice de r\u00e9putation que cela implique) et m\u00eame suspendre les autorisations de l&rsquo;entreprise \u00e0 op\u00e9rer ou \u00e0 fournir des services. <\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La nouvelle directive NIS2 marque un tournant d\u00e9cisif pour la cybers\u00e9curit\u00e9 en Europe, et de nombreuses entreprises en France ne savent pas comment elle va les affecter ni ce qu&rsquo;elles doivent faire exactement. \u00cates-vous tenu de vous y conformer ? Quels sont les risques si vous ne le faites pas ? Par o\u00f9 commencer ?<a href=\"https:\/\/factorial.fr\/blog\/faq-nis2\/\" class=\"read-more\"> [&#8230;]<\/a><\/p>\n","protected":false},"author":352,"featured_media":187062,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1058],"tags":[],"class_list":["post-187060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nis2-fr"],"acf":{"topics":"factorial-it"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.5 (Yoast SEO v21.9.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FAQ sur la directive NIS2 en France | Factorial<\/title>\n<meta name=\"description\" content=\"Vous avez des questions sur la directive NIS2 en France ? Nous r\u00e9pondons aux principales questions sur la NIS2. D\u00e9couvrez-les !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/factorial.fr\/blog\/faq-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FAQ sur la directive NIS2 en France\" \/>\n<meta property=\"og:description\" content=\"Vous avez des questions sur la directive NIS2 en France ? Nous r\u00e9pondons aux principales questions sur la NIS2. D\u00e9couvrez-les !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/factorial.fr\/blog\/faq-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"Factorial\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Factorial\/100064908455810\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-20T12:08:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-21T17:23:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/factorial.fr\/wp-content\/uploads\/2026\/04\/20140833\/faq-directive-nis2-france.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"976\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enrique Quiroga\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@factorialapp\" \/>\n<meta name=\"twitter:site\" content=\"@factorialapp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enrique Quiroga\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/factorial.fr\/blog\/faq-nis2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/factorial.fr\/blog\/faq-nis2\/\"},\"author\":{\"name\":\"Enrique Quiroga\",\"@id\":\"https:\/\/factorial.fr\/blog\/#\/schema\/person\/576a40f0f266777ab73068c097d59014\"},\"headline\":\"FAQ sur la directive NIS2 en France\",\"datePublished\":\"2026-04-20T12:08:47+00:00\",\"dateModified\":\"2026-04-21T17:23:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/factorial.fr\/blog\/faq-nis2\/\"},\"wordCount\":2272,\"publisher\":{\"@id\":\"https:\/\/factorial.fr\/blog\/#organization\"},\"articleSection\":[\"NIS2\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/factorial.fr\/blog\/faq-nis2\/\",\"url\":\"https:\/\/factorial.fr\/blog\/faq-nis2\/\",\"name\":\"FAQ sur la directive NIS2 en France | Factorial\",\"isPartOf\":{\"@id\":\"https:\/\/factorial.fr\/blog\/#website\"},\"datePublished\":\"2026-04-20T12:08:47+00:00\",\"dateModified\":\"2026-04-21T17:23:34+00:00\",\"description\":\"Vous avez des questions sur la directive NIS2 en France ? Nous r\u00e9pondons aux principales questions sur la NIS2. D\u00e9couvrez-les !\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/factorial.fr\/blog\/faq-nis2\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/factorial.fr\/blog\/#website\",\"url\":\"https:\/\/factorial.fr\/blog\/\",\"name\":\"Factorial\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/factorial.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/factorial.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/factorial.fr\/blog\/#organization\",\"name\":\"All-in-one business management software - Factorial\",\"url\":\"https:\/\/factorial.fr\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/factorial.fr\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/factorial.fr\/wp-content\/uploads\/2023\/07\/18155144\/factorial-logo.png\",\"contentUrl\":\"https:\/\/factorial.fr\/wp-content\/uploads\/2023\/07\/18155144\/factorial-logo.png\",\"width\":946,\"height\":880,\"caption\":\"All-in-one business management software - Factorial\"},\"image\":{\"@id\":\"https:\/\/factorial.fr\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/people\/Factorial\/100064908455810\/\",\"https:\/\/twitter.com\/factorialapp\",\"https:\/\/www.linkedin.com\/company\/factorialhr\",\"https:\/\/www.youtube.com\/@factorialmedia\",\"https:\/\/www.instagram.com\/factorial\/#\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/factorial.fr\/blog\/#\/schema\/person\/576a40f0f266777ab73068c097d59014\",\"name\":\"Enrique Quiroga\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/factorial.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcc26a14dc327372e37434cfc64f3917?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcc26a14dc327372e37434cfc64f3917?s=96&d=identicon&r=g\",\"caption\":\"Enrique Quiroga\"},\"url\":\"https:\/\/factorial.fr\/blog\/author\/enrique-quiroga\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FAQ sur la directive NIS2 en France | Factorial","description":"Vous avez des questions sur la directive NIS2 en France ? Nous r\u00e9pondons aux principales questions sur la NIS2. D\u00e9couvrez-les !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/factorial.fr\/blog\/faq-nis2\/","og_locale":"fr_FR","og_type":"article","og_title":"FAQ sur la directive NIS2 en France","og_description":"Vous avez des questions sur la directive NIS2 en France ? Nous r\u00e9pondons aux principales questions sur la NIS2. D\u00e9couvrez-les !","og_url":"https:\/\/factorial.fr\/blog\/faq-nis2\/","og_site_name":"Factorial","article_publisher":"https:\/\/www.facebook.com\/people\/Factorial\/100064908455810\/","article_published_time":"2026-04-20T12:08:47+00:00","article_modified_time":"2026-04-21T17:23:34+00:00","og_image":[{"width":1800,"height":976,"url":"https:\/\/factorial.fr\/wp-content\/uploads\/2026\/04\/20140833\/faq-directive-nis2-france.png","type":"image\/png"}],"author":"Enrique Quiroga","twitter_card":"summary_large_image","twitter_creator":"@factorialapp","twitter_site":"@factorialapp","twitter_misc":{"Written by":"Enrique Quiroga","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/factorial.fr\/blog\/faq-nis2\/#article","isPartOf":{"@id":"https:\/\/factorial.fr\/blog\/faq-nis2\/"},"author":{"name":"Enrique Quiroga","@id":"https:\/\/factorial.fr\/blog\/#\/schema\/person\/576a40f0f266777ab73068c097d59014"},"headline":"FAQ sur la directive NIS2 en France","datePublished":"2026-04-20T12:08:47+00:00","dateModified":"2026-04-21T17:23:34+00:00","mainEntityOfPage":{"@id":"https:\/\/factorial.fr\/blog\/faq-nis2\/"},"wordCount":2272,"publisher":{"@id":"https:\/\/factorial.fr\/blog\/#organization"},"articleSection":["NIS2"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/factorial.fr\/blog\/faq-nis2\/","url":"https:\/\/factorial.fr\/blog\/faq-nis2\/","name":"FAQ sur la directive NIS2 en France | Factorial","isPartOf":{"@id":"https:\/\/factorial.fr\/blog\/#website"},"datePublished":"2026-04-20T12:08:47+00:00","dateModified":"2026-04-21T17:23:34+00:00","description":"Vous avez des questions sur la directive NIS2 en France ? Nous r\u00e9pondons aux principales questions sur la NIS2. D\u00e9couvrez-les !","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/factorial.fr\/blog\/faq-nis2\/"]}]},{"@type":"WebSite","@id":"https:\/\/factorial.fr\/blog\/#website","url":"https:\/\/factorial.fr\/blog\/","name":"Factorial","description":"","publisher":{"@id":"https:\/\/factorial.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/factorial.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/factorial.fr\/blog\/#organization","name":"All-in-one business management software - Factorial","url":"https:\/\/factorial.fr\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/factorial.fr\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/factorial.fr\/wp-content\/uploads\/2023\/07\/18155144\/factorial-logo.png","contentUrl":"https:\/\/factorial.fr\/wp-content\/uploads\/2023\/07\/18155144\/factorial-logo.png","width":946,"height":880,"caption":"All-in-one business management software - Factorial"},"image":{"@id":"https:\/\/factorial.fr\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Factorial\/100064908455810\/","https:\/\/twitter.com\/factorialapp","https:\/\/www.linkedin.com\/company\/factorialhr","https:\/\/www.youtube.com\/@factorialmedia","https:\/\/www.instagram.com\/factorial\/#"]},{"@type":"Person","@id":"https:\/\/factorial.fr\/blog\/#\/schema\/person\/576a40f0f266777ab73068c097d59014","name":"Enrique Quiroga","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/factorial.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcc26a14dc327372e37434cfc64f3917?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcc26a14dc327372e37434cfc64f3917?s=96&d=identicon&r=g","caption":"Enrique Quiroga"},"url":"https:\/\/factorial.fr\/blog\/author\/enrique-quiroga\/"}]}},"_links":{"self":[{"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/posts\/187060"}],"collection":[{"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/users\/352"}],"replies":[{"embeddable":true,"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/comments?post=187060"}],"version-history":[{"count":5,"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/posts\/187060\/revisions"}],"predecessor-version":[{"id":187267,"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/posts\/187060\/revisions\/187267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/media\/187062"}],"wp:attachment":[{"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/media?parent=187060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/categories?post=187060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/factorial.fr\/blog\/wp-json\/wp\/v2\/tags?post=187060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}