NIS2 Risk Assessment Tool

Free, browser-based NIS2 risk assessment based on NIST SP 800-30. No account. No server. Covers all NIS2 Article 21 security measures.

Start Your Assessment →

What NIS2 requires for risk assessment

NIS2 Directive Article 21 mandates that essential and important entities implement “appropriate and proportionate technical, operational and organisational measures” to manage cybersecurity risks. Article 21(2)(a) specifically requires risk analysis and information system security policies as the foundational measure.

The assessment must consider the state of the art, applicable standards, implementation costs, and the probability and severity of incidents. Measures must be proportionate — and proportionality can only be demonstrated through a documented risk analysis.

Designed for NIS2 compliance documentation

Open Risk Register implements the NIST SP 800-30 Revision 1 risk assessment framework — a globally recognised methodology that maps directly onto NIS2 Article 21 requirements.

Structured NIST workflow

The nine-step NIST SP 800-30 process guides you from scope definition through threat identification, vulnerability assessment, and risk determination — producing a fully documented register.

Article 21 aligned

Each assessment step maps to NIS2 Article 21 security measures. The output demonstrates proportionate risk management across all 10 mandatory measures.

Private by design

Your risk data stays in your browser's localStorage. No account, no server transmission, no vendor lock-in. Risk data is sensitive — it should never leave your control.

Nine steps from scope to risk register

Open Risk Register follows the NIST SP 800-30 R1 process. Each step builds on the previous one, ensuring completeness and auditability.

Dashboard

Create and manage multiple assessments. Each covers one system, stored independently in your browser.

Assessment Setup

Define the system under review: name, description, scope boundaries, and organisational context.

Risk Model

Select assessment tier (system or organisation-level), risk scale, and the assessment approach for your maturity.

Threat Sources

Choose from the NIST Appendix D catalogue — adversarial, accidental, structural, and environmental sources.

Threat Events

Map specific attack scenarios to each threat source from the full NIST SP 800-30 Appendix E catalogue.

Vulnerabilities

Document predisposing conditions and control weaknesses that increase the probability of a threat event succeeding.

Likelihood

Score overall likelihood of each threat event, combining source characteristics with your vulnerability profile.

Impact

Assess the potential harm across operational, financial, and reputational dimensions if each threat event occurs.

Results

Review your prioritised risk register. Export as JSON or print a PDF report for governance documentation.

Open Risk Register vs spreadsheet approach

Many organisations attempt NIS2 risk assessment using a custom spreadsheet. Here is how the two approaches compare.

FeatureOpen Risk RegisterSpreadsheet Template
NIST SP 800-30 workflowBuilt-in, guided step-by-stepManual mapping required
Threat source cataloguePre-loaded from NIST Appendix DMust be built from scratch
Threat event cataloguePre-loaded from NIST Appendix EMust be built from scratch
Risk level calculationAutomatic from likelihood and impactManual formulas, error-prone
NIS2 Article 21 alignmentEach step mapped to Article 21 measuresNo inherent alignment
Export optionsJSON backup and PDF reportSpreadsheet file only
Data privacyBrowser-only, no server storageStored on local or shared drive
CostFree foreverFree to build, costly to maintain

NIS2 risk assessment questions

A NIS2-compliant risk assessment must identify threats facing your systems, assess their likelihood and potential impact, document existing controls, and determine residual risk. The output should be a risk register that justifies the security measures you have implemented under Article 21(2).

No tool alone makes you compliant. NIS2 compliance involves legal obligations, incident reporting to national competent authorities, and governance at board level. However, a documented risk assessment is a mandatory prerequisite under Article 21(2)(a), and this tool produces exactly that.

A focused risk assessment for a single system typically takes 2–4 hours. The guided workflow and pre-loaded NIST threat catalogues significantly reduce the time compared to starting from a blank spreadsheet.

Yes. The dashboard supports multiple independent assessments stored in your browser. Each assessment is scoped to a specific system or process, and you can export each one individually.

Start your NIS2 risk assessment now

Free, private, and in your browser. No sign-up required.

Open the Tool →