Who is really in scope when remote work crosses EU borders
For NIS2 compliance, remote workers are now the weak link that regulators examine first. When an employee is an EU resident working fully remote for a US parent, that person can bring the company under the NIS2 Directive as an in-scope digital service provider, even if headquarters never set foot in any EU Member State. A US-based SaaS platform with a handful of EU remote engineers handling critical customer data can be treated like an essential or important entity in high-impact sectors under Directive (EU) 2022/2555, particularly where Annex I or Annex II activities are involved and the size-cap thresholds are met.
Scope does not stop with residents, because traveling staff using remote access from EU hotels or co-working spaces can still trigger obligations when they handle sensitive data or critical systems. Supervisory authorities in several Member States have clarified in guidance and Q&A documents that entities with stable EU operations, including distributed teams of remote workers, must show concrete cybersecurity and risk management measures rather than vague policies. For example, the German BSI and the French ANSSI have both issued guidance that stresses demonstrable technical and organizational measures for remote access and cloud-based operations. For IT and security leaders this turns every remote laptop, unmanaged tablet, and third-party contractor device into a regulated access point under NIS2 and related national implementing requirements, especially where those endpoints support critical services or essential business processes.
The legal test is brutally operational, since regulators look at where services are offered and where data is processed, not where the board meets. That means US organizations serving EU customers through remote service providers or distributed support teams fall into NIS2 compliance scope even when only a slice of their activity touches Europe. Treating NIS2 compliance for remote workers as a governance afterthought rather than a core cyber hygiene and security controls problem is now a direct business continuity and regulatory enforcement risk, and it undermines incident reporting readiness when cross-border remote access is involved.
The three artifacts inspectors ask for first and the MDM evidence gap
When NIS2 inspectors arrive, they usually start with three artifacts that most distributed organizations cannot produce cleanly. They ask for a documented risk management framework that maps cyber and human risk to specific security controls, a current supply chain and third-party register covering remote service providers, and an incident response and incident reporting runbook aligned with the core NIS2 timelines (early warning, incident notification, and final report). For remote teams they then drill into secure remote configurations, remote access policies, and proof that management training on cybersecurity and compliance actually reached remote workers, often checking sign-in sheets, LMS exports, or e-learning completion logs.
The biggest evidence hole is mobile device management, because industry surveys consistently show that a large majority of organizations use BYOD while only a minority have a formal MDM policy, and that gap makes NIS2 compliance for remote workers look like a set of unmanaged entities in the eyes of regulators. For instance, several recent Menlo Security and Verizon DBIR studies report that more than half of recent cyber incidents involved a remote worker device or connection, and that unmanaged endpoints are disproportionately represented in successful attacks. Without MDM, IT cannot prove that sensitive data on personal phones is encrypted, that cyber hygiene baselines are enforced, or that incident response actions like remote wipe actually work across all devices. This turns every unmanaged endpoint into a potential NIS2 non-compliance finding and a likely focus area during post-incident supervision.
Inspectors also correlate governance documents with operational telemetry, so they expect to see logs from VPNs, zero-trust access tools, and identity and access management platforms that show how remote access is controlled in practice. Typical evidence includes authentication logs (timestamp, user ID, device ID, source IP, MFA status, outcome), device posture checks (OS version, patch level, encryption state), privileged access records, and audit trails for configuration changes. They compare the supply chain register with actual integrations and APIs to verify that critical digital dependencies and cloud service providers are covered by contracts with explicit NIS2 security and incident-reporting clauses. When those records are missing or outdated, essential entities and important entities alike struggle to defend their risk management story, especially when a cyber incident started with a remote worker and cascaded into a wider disaster recovery and business continuity event.
A 30 day playbook for remote work governance under NIS2
Security leaders who just realized they are in scope for NIS2 compliance on remote workers need a compressed but realistic playbook. Week one should focus on a pre-inspection inventory that lists governance documents, the incident response runbook, the incident reporting workflow, the supply chain register, and the training log for all remote staff and contractors. In parallel, teams must map which remote workers handle critical data, which sectors and services they support, and which organizations or entities in EU Member States rely on those services, using a simple CSV schema with columns such as role, system, data category, location, and applicable NIS2 obligation. A practical example might include rows like “SRE, production database, customer identifiers, Berlin, incident reporting and business continuity” to make risk ownership visible.
Week two belongs to device and access hardening, starting with a mandatory MDM rollout for any endpoint touching sensitive data or critical systems. That means enforcing full-disk encryption, strong identity and access management, baseline cyber hygiene controls, and secure remote connectivity for both individual remote workers and distributed remote teams across time zones. A concise MDM policy checklist should cover enrollment rules, minimum OS versions, patching cadence, encryption standards, conditions for remote wipe, and exceptions handling, with each item mapped to a risk scenario such as “lost laptop with customer data” or “compromised contractor tablet.” Security teams should also tighten remote access paths into production, segment third-party connections, and document security controls that protect the digital supply chain from a compromised remote laptop or tablet.
By week three and four, leadership must close the governance loop so that NIS2 compliance is not just a technical project but a management obligation with clear accountability. Boards and executives should receive targeted training on the NIS2 Directive, on obligations for essential and important entities, and on how business continuity and disaster recovery plans now depend on remote work resilience. A short incident runbook snippet for remote-origin incidents can help, for example: “T+0: isolate device and revoke tokens; T+4 hours: confirm scope, notify internal stakeholders; T+24 hours: submit early warning to competent authority; T+72 hours: provide incident notification with preliminary impact analysis.” The practical test is simple, because if an inspector asked tomorrow how a cyber incident from a remote worker in an EU city would be contained, reported within the required NIS2 timelines, and traced across the supply chain, your team should be able to answer using a current incident runbook, a sample supply-chain register, and concrete log types rather than reaching for a slide deck or a generic remote work policy.
Key quantitative signals for NIS2 and remote work
- Independent threat reports indicate that more than half of recent security incidents involved a remote worker device or connection, underscoring the centrality of remote access in modern cybersecurity failures and the need for verifiable endpoint controls.
- Industry surveys show that a large majority of organizations allow some form of BYOD for remote workers, yet fewer than half operate with a formal MDM policy that would satisfy strict NIS2 evidence expectations and withstand a post-incident inspection.
- Core NIS2 obligations include time-bound incident reporting, documented risk-based controls, supply chain security measures, and management training records that explicitly cover remote workers and remote service providers, including contractors and outsourced support teams.
- Supervisory authorities across multiple EU Member States are prioritizing inspections of essential entities and important entities that rely heavily on distributed digital operations, cloud platforms, and remote access to critical systems, making remote work governance a frontline compliance concern.
Questions security leaders also ask about NIS2 and remote workers
Which remote workers actually bring a non EU company into NIS2 scope ?
Remote workers bring a non-EU company into NIS2 scope when they are EU residents or provide services into EU markets that fall under regulated sectors, because regulators look at where services are offered and where data is processed rather than where the company is incorporated. If those remote workers handle critical systems or sensitive data for customers in EU Member States, the parent organization can be treated as an essential or important entity under the NIS2 Directive. This applies even when the rest of the workforce and infrastructure is located outside Europe, so long as the digital service footprint in the EU is material and the organization fits the size and sector criteria defined in Directive (EU) 2022/2555 and its national transposition.
How should we document risk management for distributed teams under NIS2 ?
Risk management documentation for distributed teams under NIS2 should start with a clear inventory of remote roles, systems, and data flows, then map specific cyber and human risk scenarios to concrete security controls. The documentation needs to show how remote access is governed, how third-party and supply chain dependencies are evaluated, and how incident response and disaster recovery plans account for remote workers. Regulators expect this documentation to be living evidence, supported by logs, training records, periodic reviews, and version history rather than a static policy file created once for an audit, and it should align with your broader NIS2 remote work governance framework.
Why is mobile device management so critical for NIS2 evidence ?
Mobile device management is critical for NIS2 evidence because it provides verifiable proof that remote worker devices comply with baseline cybersecurity and compliance requirements. With MDM, organizations can demonstrate encryption, patch levels, access controls, and the ability to execute incident response actions such as remote wipe or forced credential resets. Without it, claims about cyber hygiene and secure remote configurations remain largely unsubstantiated, which weakens an organization’s position during inspections after an incident and makes it harder to show that appropriate technical and organizational measures were in place for remote endpoints.
What should be in a pre inspection inventory for NIS2 focused on remote work ?
A pre-inspection inventory for NIS2 focused on remote work should include governance documents, the incident response and incident reporting runbook, the supply chain and third-party register, and a detailed training log that covers all remote staff. It should also list all tools and platforms used for remote access, endpoint protection, identity management, and collaboration, along with the associated security controls and configurations. Finally, the inventory needs a current map of where sensitive data is stored or processed by remote workers, including cloud services and external service providers, plus a simple CSV or table that links each remote role to systems, data categories, and applicable NIS2 obligations so that gaps can be prioritized quickly.
What can we realistically change in 30 days if we just learned we are in scope ?
In 30 days, organizations can realistically complete a scoping assessment, stand up a basic NIS2 governance framework, and close the most visible gaps affecting NIS2 compliance for remote workers. That includes rolling out or tightening MDM for high-risk devices, enforcing stronger access management for remote connections, and documenting an interim incident response and incident reporting process aligned with Directive (EU) 2022/2555 expectations. While deeper structural changes to supply chain contracts and business continuity planning will take longer, this first month can materially improve both security posture and regulatory defensibility, especially if supported by concrete artifacts such as an MDM policy, a supply-chain register, and clearly defined log requirements that demonstrate how remote access is monitored in practice.