NIS2 cybersecurity organization document: how to structure it for GV.RR-02 approval


Article Thumbnail

NIS2 cybersecurity organization document: how to structure it for GV.RR-02 approval

January 28, 2026

The “Cybersecurity organization” document is one of the mandatory documents in Appendix C and must be approved by governing and management bodies under GV.RR-02 point 1. In practice, this document defines who is accountable for cyber decisions, who executes controls, and how escalation and reporting work.

Key takeaways

  • The cybersecurity organization document is explicitly listed in Appendix C and requires formal approval.
  • A generic org chart is not enough; governance roles, responsibilities, and decision rights must be explicit.
  • The document should connect board oversight, operational ownership, and evidence outputs.
  • A structured template reduces ambiguity and accelerates approval cycles.

What the document must prove

Governance objectiveMinimum expected outputEvidence to maintain
Clear accountabilityNamed governance and operational rolesRole appointment records
Decision ownershipDefined approval and escalation chainApproval matrix and minutes
Operational continuityRole substitutes and availability modelSubstitution table and handover records
Execution traceabilityRole-to-control mappingRACI matrix linked to controls

Suggested template structure (practical)

1. Purpose, scope, and references

State that the document governs cybersecurity organization under NIS baseline obligations and list legal/ACN references.

2. Governance model

Describe board-level oversight, management responsibilities, and reporting cadence.

3. Roles and responsibilities

Define each role (for example: governance sponsor, cybersecurity owner, incident decision owner, CSIRT liaison) with clear duties.

4. Escalation and decision workflow

Map triggers, decisions, approvers, and response timelines for relevant cyber events.

5. Interfaces with other mandatory documents

Show links to risk, incident, continuity, and training documents to prevent governance silos.

6. Approval and review cycle

Include formal approval block, next review date, and change-management process.

Frequent drafting mistakes

  1. Using job titles without named accountability.
  2. Missing substitute roles for critical functions.
  3. No link between governance roles and operational controls.
  4. Governance section not aligned with incident-notification obligations already in force.
  5. Approval page present but review cadence undefined.

20-day implementation checklist

  1. Confirm current governance and operational cyber roles.
  2. Build a role-to-control RACI map.
  3. Define escalation path with approval authority at each step.
  4. Add substitute and continuity coverage for critical roles.
  5. Align this document with incident-management and risk documentation.
  6. Submit for legal/compliance review before board approval.

FAQ

Is this document mandatory for board approval?

Yes. Appendix C explicitly lists “Cybersecurity organization” with reference GV.RR-02 point 1 and requires approval by governing and management bodies.

Can we reuse our existing IT organization chart?

Only partially. You need explicit cybersecurity governance duties, escalation ownership, and accountability evidence, not only reporting lines.

What is the fastest way to make it approval-ready?

Use a standardized template with fixed governance sections, role catalog, RACI mapping, and pre-filled approval/review blocks.

Conclusion and next steps

A defensible cybersecurity organization document should make governance decisions auditable and operational execution unambiguous. If your team is still working from fragmented org notes, move to a structured template workflow and close board approval early in the October 2026 path.

Related reading

Official sources

Share this post