Four Frameworks, One Vendor: The Regulatory Exposure Problem NIS2, DORA, CRA, and the Revised CSA Create
By Dritan Saliovski
European enterprises are now subject to four converging cybersecurity frameworks: NIS2, DORA, the Cyber Resilience Act, and the proposed revised Cybersecurity Act. Each evaluates different dimensions of the same vendor relationship. A supplier that satisfies one framework can be disqualified under another. Most compliance teams are still running these as separate programs, which means the cross-framework exposure stays invisible until it surfaces as a regulatory finding or a forced technology replacement.
Key Takeaways
- The revised Cybersecurity Act (CSA2), proposed January 2026, introduces "non-technical risk" as a formal criterion for assessing ICT suppliers - country of origin, government influence exposure, and geopolitical alignment now factor into procurement decisions across 18 critical sectors
- The Commission can retroactively designate a supplier as high-risk and require phase-out of already-deployed components within 36 months, a first in EU cybersecurity law
- CRA reporting obligations begin 11 September 2026; NIS2 audits are underway across member states; DORA has been in force since January 2025 - compliance timelines are converging, not sequenced
- Fines for revised CSA supply chain violations could reach 7% of global turnover, the highest penalty ceiling in the current EU cybersecurity stack
- A single regulatory exposure matrix across all four frameworks converts fragmented compliance programs into one strategic vendor governance conversation
Four frameworks, four different questions about the same vendor
Each framework evaluates a different risk dimension. NIS2 asks whether your organization manages cybersecurity risk across its supply chain, with incident reporting obligations and management accountability. DORA asks whether financial entities can maintain operational resilience through ICT disruptions, with prescriptive requirements for critical third-party provider oversight and resilience testing. The Cyber Resilience Act asks whether the products you deploy were designed and maintained with security built in, with vulnerability reporting and conformity assessment obligations. The revised Cybersecurity Act asks a question none of the others touch: whether the supplier's jurisdiction, ownership structure, and government exposure create non-technical risks that compromise the security of EU critical infrastructure.
These are not overlapping requirements with minor variations. They are structurally different assessment dimensions applied to the same supplier relationship. A cloud provider can satisfy NIS2 supply chain due diligence requirements, meet DORA's critical third-party standards, and ship CRA-compliant products, yet still be designated as a high-risk supplier under the revised CSA because of where it is headquartered or who controls it.
The lex specialis principle adds complexity rather than clarity. DORA prevails over NIS2 where they directly overlap for financial entities, but the revised CSA introduces a horizontal layer that cuts across both. An organization subject to DORA still faces NIS2 obligations in areas DORA does not cover - specifically personnel security measures and MFA/encryption policy documentation, as detailed in our analysis of Sweden's Cybersecurity Act implementation. The CRA then adds product-level obligations that neither NIS2 nor DORA address: a vendor's organizational compliance does not guarantee that its products meet CRA essential cybersecurity requirements.
What the revised Cybersecurity Act changes
On 20 January 2026, the European Commission proposed a comprehensive overhaul of the original 2019 Cybersecurity Act. The revision introduces a trusted ICT supply chain security framework that formalizes non-technical risk assessment, a first in EU law.
Non-technical risk means the Commission can now evaluate whether a supplier is established in, or controlled by entities from, a third country that poses cybersecurity concerns. The designation criteria include whether that jurisdiction requires vendors to disclose software or hardware vulnerabilities to local authorities before they are exploited, whether it lacks independent judicial remedies for cybersecurity concerns, and whether it harbors threat actors conducting malicious cyber operations.
The consequences for designated high-risk suppliers are material. They face exclusion from procurement procedures for key ICT components, exclusion from EU funding programs, and prohibition from obtaining EU cybersecurity certification. Operators of electronic communications networks would be required to ensure they do not rely on high-risk suppliers for critical assets.
The most significant provision is retroactive reclassification. The Commission can designate a supplier as high-risk after its products are already deployed, triggering a mandatory phase-out period that should not exceed 36 months. For telecom operators still using equipment from suppliers like Huawei and ZTE, this provision has immediate practical implications. But the mechanism applies across all 18 sectors covered by NIS2, including energy, transport, healthcare, banking, and digital infrastructure.
Fines for supply chain violations under the revised CSA could reach 7% of worldwide turnover, depending on the nature of the breach. That exceeds the penalty ceilings under NIS2 (EUR 10 million or 2% of turnover for essential operators) and DORA (EUR 5 million or 2% of turnover).
Where the frameworks diverge on supply chain
The table below maps how each framework handles the same vendor governance question. The divergences are where cross-framework exposure emerges.
| Assessment dimension | NIS2 | DORA | CRA | Revised CSA |
|---|---|---|---|---|
| What it evaluates | Organizational security posture | ICT operational resilience | Product security by design | Supplier jurisdiction and geopolitical risk |
| Scope | 18 sectors, entity-wide | Financial sector, ICT systems | All products with digital elements on EU market | Same 18 NIS2 sectors (horizontal layer) |
| Supply chain obligation | Due diligence on direct suppliers and service providers | Critical third-party provider register and oversight | Manufacturer responsibility for product lifecycle security | Non-technical risk assessment of supplier origin and control |
| Incident reporting | 24h early warning, 72h notification, 1-month final report | 4h initial classification, 72h intermediate, 1-month final | 24h vulnerability/incident report, 72h follow-up, 14-day final (vulnerabilities) / 1-month (incidents) | Via NIS2 framework (no separate timeline) |
| What can trigger a supplier change | Evidence of inadequate security measures | Concentration risk or resilience failure at CTPP | Non-compliant product recalled from EU market | High-risk designation based on jurisdiction, retroactive, with 36-month phase-out |
| Maximum fine | EUR 10M or 2% of global turnover | EUR 5M or 2% of global turnover | EUR 15M or 2.5% of global turnover | Up to 7% of worldwide turnover |
The structural gap: NIS2 and DORA assess what a vendor does (security measures, resilience practices). The CRA assesses what a vendor makes (product security). The revised CSA assesses who a vendor is and where it comes from. A vendor can score well on all three operational dimensions and still fail the jurisdictional test, or vice versa.
The geopolitical variable compliance programs miss
The regulatory convergence described above is happening against a backdrop of US-EU trade tensions that create a second layer of vendor exposure no cybersecurity framework currently captures.
On 11 March 2026, the US Trade Representative initiated Section 301 investigations into 16 economies, including the EU, targeting structural excess manufacturing capacity. Separately, the US administration has explicitly characterized EU digital regulation, including the Digital Markets Act and Digital Services Act, as discriminatory against American technology companies. The USTR has signaled that digital regulation could become the basis for its own Section 301 investigation, citing the potential for tariffs or fees on services.
This creates a bidirectional risk that most compliance teams are not structured to see. On one side, the revised CSA's non-technical risk criteria establish a mechanism that could functionally restrict US-origin suppliers from EU critical infrastructure if the Commission determines that US jurisdiction poses cybersecurity concerns. On the other side, US retaliatory measures - whether tariffs, service fees, or regulatory restrictions - could affect EU vendors operating in the US market. Organizations evaluating how vendor trust and political risk affect procurement will recognize this dynamic from the AI platform context.
The structural point extends beyond any single administration or trade dispute. The EU is building permanent mechanisms for technology sovereignty through the CSA2, the Cloud and AI Development Act, and the Digital Omnibus package. The US has demonstrated, across administrations, a willingness to use trade enforcement tools against digital regulation it considers discriminatory. This dynamic will persist regardless of election outcomes on either side of the Atlantic.
No cybersecurity questionnaire currently in use captures jurisdictional or trade-policy exposure. The vendor that passes your NIS2 supply chain assessment and DORA critical third-party review may carry geopolitical risk that only becomes visible when a Commission implementing act or a Section 301 determination changes the regulatory ground underneath a technology relationship you assumed was stable.
How to build the exposure matrix
The gap between running four separate compliance programs and running one integrated vendor governance program is a single tool: a regulatory exposure matrix that maps critical vendors against all applicable frameworks plus jurisdictional risk.
Structure. List critical vendors down the left column. Run NIS2, DORA, CRA, and the revised CSA across the top as separate columns. Add a final column for trade and jurisdictional exposure. For each intersection, document assessment status (compliant, gap identified, not assessed), criteria used, gaps identified, and remediation owner.
Where to start. Prioritize vendors that operate in the infrastructure layer: cloud providers, identity and access management platforms, network equipment suppliers, managed security services, and any vendor whose product is embedded in systems you cannot easily replace. These are the relationships where a forced phase-out under the revised CSA would be most disruptive and most expensive. For organizations deploying AI agents alongside these infrastructure vendors, the AI data governance framework adds another dimension to the assessment.
What to look for. The matrix will surface three categories of findings most organizations miss when running frameworks in isolation. First, vendors with conflicting status across frameworks - satisfying one set of requirements while carrying unaddressed exposure under another. Second, vendors with concentration risk that spans multiple frameworks, where a single provider's failure or restriction would trigger obligations under NIS2, DORA, and potentially the revised CSA simultaneously. Third, vendors with jurisdictional exposure that existing cybersecurity assessments do not capture, including suppliers headquartered in or controlled from jurisdictions that could be designated under the revised CSA's non-technical risk criteria, or suppliers whose market access could be affected by trade enforcement actions in either direction.
Expected outcome. Most organizations will find three to five vendors that create exposure across multiple frameworks they had not previously connected. This takes approximately one focused week with existing procurement, security, and compliance data. It transforms four separate compliance programs into a single strategic vendor governance conversation that the board, the CISO, the procurement function, and legal can all act on. For a detailed look at how Sweden has implemented NIS2 into national law and what that means for affected organizations, see our comprehensive guide to Sweden's Cybersecurity Act 2025.
The full Intelligence Brief - covering the complete four-framework comparison matrix, exposure matrix template with worked examples, remediation prioritization by maturity level, and the regulatory timeline with key compliance milestones - is available below.
Assess Your Cross-Framework Vendor Exposure
Innovaiden works with leadership teams deploying AI agents across their organizations - from initial setup and training to security framework alignment and governance readiness. Reach out to discuss how we can help your team.
Get in TouchFrequently Asked Questions
What are the four EU cybersecurity frameworks that converge on vendor risk?
NIS2 evaluates organizational supply chain due diligence and incident reporting. DORA evaluates ICT operational resilience for financial entities. The Cyber Resilience Act evaluates product security by design. The revised Cybersecurity Act (CSA2), proposed January 2026, evaluates non-technical risk including supplier jurisdiction, ownership, and government exposure. Each applies different assessment criteria to the same vendor relationship.
What is the revised Cybersecurity Act's non-technical risk assessment?
The revised CSA introduces a formal mechanism for the European Commission to evaluate whether an ICT supplier's country of origin, government influence exposure, or geopolitical alignment creates cybersecurity concerns. The Commission can designate suppliers as high-risk and require phase-out of already-deployed components within 36 months, with fines up to 7% of worldwide turnover.
Can a vendor pass one EU framework and fail another?
Yes. A cloud provider can satisfy NIS2 supply chain due diligence, meet DORA's critical third-party standards, and ship CRA-compliant products, yet still be designated as a high-risk supplier under the revised CSA because of where it is headquartered or who controls it. The frameworks assess structurally different dimensions: what a vendor does, what it makes, and who it is.
What is a regulatory exposure matrix and how does it help?
A regulatory exposure matrix maps critical vendors against all four frameworks plus jurisdictional risk in a single view. For each vendor-framework intersection, it documents assessment status, criteria used, gaps identified, and remediation owner. Most organizations running this exercise discover three to five vendors with cross-framework exposure they had not previously connected.
How do US trade tensions affect EU vendor compliance?
Section 301 investigations and tariff actions create a second layer of vendor exposure no cybersecurity framework currently captures. The revised CSA's non-technical risk criteria could functionally restrict US-origin suppliers from EU critical infrastructure, while US retaliatory measures could affect EU vendors in the American market. This bidirectional risk sits outside current compliance questionnaires.
Related Insights
Sources
- European Commission. Proposal for a regulation on cybersecurity requirements for products with digital elements (Cyber Resilience Act). ec.europa.eu. 2024.
- European Commission. Proposal for a revised Cybersecurity Act (CSA2) - trusted ICT supply chain security framework. ec.europa.eu. 2026.
- European Parliament and Council. Regulation (EU) 2022/2554 on digital operational resilience for the financial sector (DORA). eur-lex.europa.eu. 2022.
- European Parliament and Council. Directive (EU) 2022/2555 on measures for a high common level of cybersecurity (NIS2). eur-lex.europa.eu. 2022.
- Swedish Government Offices. Cybersecurity Act (Lag om cybersäkerhet, SFS 2025:10). regeringen.se. 2025.
- USTR. Section 301 investigation announcements. ustr.gov. 2026.
- European Commission. Inception impact assessment for the revised Cybersecurity Act. ec.europa.eu. 2025.