Skip to main content
All Insights
Regulatory Compliance·8 min read·

Sweden's Cybersecurity Act (2025:1506): NIS2 Is Now Law

By Dritan Saliovski

The Cybersecurity Act (Cybersäkerhetslag, SFS 2025:1506) entered into force on 15 January 2026, transposing the EU NIS2 Directive into Swedish law and replacing the Information Security Act (2018:1174) with enterprise-wide obligations across 18 sectors — including strengthened accountability requirements for senior management and fines reaching €10 million.

Key Takeaways

  • Sweden's Cybersecurity Act (SFS 2025:1506) entered into force on 15 January 2026, expanding sector coverage from 7 under NIS1 to 18
  • In-scope threshold: 50+ employees, or annual turnover and balance sheet total exceeding €10 million; trusted service providers and sole providers of essential services are covered regardless of size
  • Essential operators face fines up to €10M or 2% of global annual turnover; important operators face up to €7M or 1.4%
  • Management liability is personal — board members and CEOs must approve, supervise, and undergo specific cybersecurity training, with potential management sanctions under Swedish supervisory authority processes
  • ISO 27001:2022 certification covers a significant portion of the Act's control requirements, with key gaps in incident reporting, governance, and scope

From Branch-Level to Entity-Wide Scope

The previous NIS Act covered 7 sectors and applied only to the specific operational branch within an organization that triggered the regulation. The Cybersecurity Act inverts that logic entirely. If any part of your operations falls within a designated sector, the entire entity must comply — including HR systems, finance platforms, and internal IT infrastructure alongside the operational systems directly linked to the regulated service.

Entity-wide scope is the single biggest structural change. A drinking water producer must now ensure its payroll, finance, and internal IT systems meet the same security standards as its operational water production systems. Network and information systems are interconnected across business functions, and the law reflects that reality.

Sweden chose a decentralized supervisory model. Oversight is expected to be distributed across sector-specific regulators — PTS for digital infrastructure and electronic communications, Finansinspektionen for banking and financial market infrastructure, Transportstyrelsen for transport, Energimyndigheten for energy, IVO and Socialstyrelsen for healthcare — coordinated nationally by MCF (formerly MSB). Your supervisory relationship depends on what your organization does.

18 Sectors: Who Is In Scope

The Act designates sectors across two annexes. Highly Critical Sectors (Annex I) cover energy, transport, banking, financial markets, healthcare, drinking water, wastewater, digital infrastructure, ICT service management (B2B), public administration, and space. Other Critical Sectors (Annex II) cover postal and courier services, waste management, chemicals, food production, manufacturing, digital providers, and research.

State authorities, regions, and municipalities are in scope. Organizations are classified as either essential or important operators — a classification that affects supervision intensity and penalty ceilings. Essential operators face proactive supervision, including security audits at any time. Important operators face reactive supervision triggered by evidence of non-compliance.

Ten Minimum Obligations and Incident Reporting

The Act mandates proportionate measures across ten minimum security areas, based on an all-hazards risk assessment: risk analysis strategies, incident handling, business continuity, supply chain security, secure system development and maintenance, effectiveness testing, cyber hygiene and training, cryptography and encryption, personnel security and access control, and secure authentication and communication.

Incident reporting follows a mandatory multi-stage timeline. An early warning must reach MCF or the relevant supervisory authority within 24 hours of identifying a significant incident, including whether the incident is suspected to be unlawful or malicious. A full incident notification with initial severity and impact assessment is due within 72 hours — trust service providers face a shortened 24-hour deadline for this stage. A comprehensive final report covering root cause analysis, mitigation measures, and cross-border impact is due within one month.

What Existing Frameworks Cover — and What They Miss

Organizations already certified against ISO 27001:2022 are not starting from zero. Estimated coverage of the Act's requirements is approximately 80%. DORA-compliant financial entities reach approximately 75%. Holding both certifications brings estimated coverage to approximately 90%.

The gaps for ISO 27001-certified organizations are targeted and known. ISO does not mandate the 24h/72h/1-month incident reporting structure to supervisory authorities — this obligation is entirely new. It does not require board-level cybersecurity training as a sanctionable obligation. And its ISMS boundary is typically narrower than the entity-wide scope the Act requires, which extends to HR, finance, and administrative systems beyond the security perimeter.

For DORA-regulated financial entities, the relationship is explicit in the Act: DORA prevails in areas of direct overlap. NIS2 adds obligations where DORA is silent — specifically personnel security measures (Article 21 I) and MFA and encryption policy documentation (Article 21 J). Financial entities must also register separately with MCF and their sector-specific Swedish authority under NIS2, independent of their DORA obligations.

Organizations with no existing framework face the full compliance build across all ten requirement areas.

What This Means in Practice

Four immediate actions apply to all in-scope entities: confirm applicability against sector and size thresholds, self-identify and register with MCF, classify the entity as essential or important, and conduct a gap assessment against the ten minimum requirement areas.

If ISO 27001 is in place, the remediation priorities are incident reporting workflow (24h/72h/1-month with assigned roles), board training documentation, and scope extension to HR, finance, and administrative systems beyond the existing ISMS boundary. If DORA compliance is in place, the gaps are narrower but specific: HR security, MFA and encryption policies, entity-wide scope, and MCF registration.

The full Intelligence Brief — covering the complete framework coverage matrix, supervisory authority mapping by sector, and maturity-level action plans — is available below.

Free Resource

Download the Sweden Cybersecurity Act Intelligence Brief

Submit your details and we'll send the Sweden Cybersecurity Act Intelligence Brief directly to your inbox.