{"id":24807,"date":"2026-03-20T12:45:33","date_gmt":"2026-03-20T10:45:33","guid":{"rendered":"https:\/\/inteca.com\/?post_type=business-insights&#038;p=24807"},"modified":"2026-03-20T15:38:31","modified_gmt":"2026-03-20T13:38:31","slug":"wdrozenie-nis2-wymagania-techniczne","status":"publish","type":"business-insights","link":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/","title":{"rendered":"Wdro\u017cenie NIS2 w Polsce: jak osi\u0105gn\u0105\u0107 zgodno\u015b\u0107 z KSC i przygotowa\u0107 organizacj\u0119 na audyt"},"content":{"rendered":"<h2 data-heading=\"Czym jest wdro\u017cenie NIS2 i dlaczego jest priorytetem dla zarz\u0105du?\">Czym jest wdro\u017cenie NIS2?<\/h2>\n<p>Wdro\u017cenie NIS2 to proces dostosowania organizacji do wymaga\u0144 dyrektywy NIS2 i polskich przepis\u00f3w wdra\u017caj\u0105cych, czyli do nowelizacji ustawy o krajowym systemie cyberbezpiecze\u0144stwa. Oznacza to systemowe zarz\u0105dzanie ryzykiem, ci\u0105g\u0142e cyberbezpiecze\u0144stwo oraz formaln\u0105 zgodno\u015b\u0107 potwierdzan\u0105 dowodami.<\/p>\n<p>Wdro\u017cenie NIS2 nie jest jednorazowym projektem technicznym. To program obejmuj\u0105cy zarz\u0105dzanie, \u015brodki techniczne i organizacyjne, reagowanie na incydenty, bezpiecze\u0144stwo \u0142a\u0144cucha dostaw, szkolenia oraz odpowiedzialno\u015b\u0107 kadry zarz\u0105dzaj\u0105cej. Regulacjom tym nie podlegaj\u0105 wszystkie podmioty, lecz tylko te, kt\u00f3re spe\u0142niaj\u0105 kryteria podmiot\u00f3w kluczowych i wa\u017cnych.<\/p>\n<h2 data-heading=\"Kogo dotyczy wdro\u017cenie NIS2: podmiot kluczowy, podmiot wa\u017cny czy dostawca?\">Kogo dotyczy wdro\u017cenie NIS2: podmiot kluczowy, podmiot wa\u017cny czy dostawca?<\/h2>\n<p>Wdro\u017cenie NIS2 dotyczy podmiot\u00f3w dzia\u0142aj\u0105cych w sektorach kluczowych i wa\u017cnych, w tym podmiot\u00f3w publicznych oraz cz\u0119\u015bci firm prywatnych. W praktyce kwalifikacja zale\u017cy od sektora, skali dzia\u0142alno\u015bci i wp\u0142ywu na ci\u0105g\u0142o\u015b\u0107 us\u0142ug.<\/p>\n<p>Najcz\u0119\u015bciej klasyfikowane s\u0105:<\/p>\n<ul>\n<li>\n<p>podmiot kluczowy,<\/p>\n<\/li>\n<li>\n<p>podmiot wa\u017cny,<\/p>\n<\/li>\n<li>\n<p>dostawcy us\u0142ug cyfrowych,<\/p>\n<\/li>\n<li>\n<p>przedsi\u0119biorca realizuj\u0105cy us\u0142ugi dla sektor\u00f3w krytycznych,<\/p>\n<\/li>\n<li>\n<p>dostawca ICT istotny dla bezpiecze\u0144stwa us\u0142ug.<\/p>\n<\/li>\n<\/ul>\n<p>Podmioty kluczowe i podmioty wa\u017cne podlegaj\u0105 r\u00f3\u017cnym modelom nadzoru, ale oba typy podmiot\u00f3w maj\u0105 obowi\u0105zki wynikaj\u0105ce z dyrektywy. To prowadzi do kolejnego pytania: jak wdro\u017cenie dyrektywy NIS2 wygl\u0105da w polskim porz\u0105dku prawnym.<\/p>\n<figure id=\"attachment_24831\" aria-describedby=\"caption-attachment-24831\" style=\"width: 1280px\" class=\"wp-caption alignnone\"><img decoding=\"async\" class=\"wp-image-24831 size-full\" src=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Podmioty-kluczowe-i-wazne-podzial.png\" alt=\"Tabela por\u00f3wnawcza podmiot\u00f3w kluczowych i wa\u017cnych w ustawie o KSC \u2014 r\u00f3\u017cnice w wielko\u015bci organizacji, sektorach, modelu nadzoru (ex-ante vs ex-post), obowi\u0105zku audytu, wysoko\u015bci kar (do 10 mln EUR vs 7 mln EUR) oraz identyczne obowi\u0105zki raportowania incydent\u00f3w 24h\/72h\/30 dni.\" width=\"1280\" height=\"720\" srcset=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Podmioty-kluczowe-i-wazne-podzial.png 1920w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Podmioty-kluczowe-i-wazne-podzial-300x169.png 300w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Podmioty-kluczowe-i-wazne-podzial-1024x576.png 1024w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Podmioty-kluczowe-i-wazne-podzial-768x432.png 768w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Podmioty-kluczowe-i-wazne-podzial-1536x864.png 1536w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><figcaption id=\"caption-attachment-24831\" class=\"wp-caption-text\"><em>Por\u00f3wnanie statusu podmiotu kluczowego i wa\u017cnego w ustawie o KSC \u2014 kryteria kwalifikacji, rygor nadzoru i konsekwencje.<\/em><\/figcaption><\/figure>\n<h2 data-heading=\"Jak wygl\u0105da wdro\u017cenie dyrektywy NIS2 w Polsce przez ustaw\u0119 o KSC?\">Jak wygl\u0105da wdro\u017cenie dyrektywy NIS2 w Polsce przez ustaw\u0119 o KSC?<\/h2>\n<p>Wdro\u017cenie dyrektywy NIS2 w Polsce realizuje nowelizacja ustawy o Krajowym Systemie Cyberbezpiecze\u0144stwa. Ta nowelizacja ustawy o KSC wprowadza do polskiego porz\u0105dku prawnego nowe kategorie podmiot\u00f3w, nowe przepisy nadzorcze i nowe obowi\u0105zki operacyjne.<\/p>\n<p>W praktyce nowelizacj\u0119 ustawy nale\u017cy czyta\u0107 jako zestaw wymaga\u0144: samoidentyfikacja, rejestracja, audyt, raportowanie incydent\u00f3w i utrzymywanie zdolno\u015bci reagowania. Dlatego po ustaleniu statusu podmiotu, kluczowe staje si\u0119 zrozumienie, jakie obowi\u0105zki w zakresie cyberbezpiecze\u0144stwa trzeba wdro\u017cy\u0107.<\/p>\n<h2 data-heading=\"Jakie nowe obowi\u0105zki w zakresie cyberbezpiecze\u0144stwa nak\u0142ada wdro\u017cenie NIS2?\">Jakie nowe obowi\u0105zki w zakresie cyberbezpiecze\u0144stwa nak\u0142ada wdro\u017cenie NIS2?<\/h2>\n<p>Wdro\u017cenie NIS2 nak\u0142ada obowi\u0105zki prawne i operacyjne, kt\u00f3re obejmuj\u0105 zarz\u0105dzanie ryzykiem, bezpiecze\u0144stwem informacji oraz bezpiecze\u0144stwem sieci i system\u00f3w informatycznych\u00a0 Celem regulacji jest trwa\u0142e podniesienie poziomu cyberbezpiecze\u0144stwa.<\/p>\n<p>Najwa\u017cniejsze nowe obowi\u0105zki obejmuj\u0105:<\/p>\n<ol>\n<li>\n<p>Analiz\u0119 ryzyka dla us\u0142ug i system\u00f3w informatycznych.<\/p>\n<\/li>\n<li>\n<p>Wdro\u017cenie \u015brodk\u00f3w zarz\u0105dzania ryzykiem proporcjonalnych do skali zagro\u017ce\u0144.<\/p>\n<\/li>\n<li>\n<p>Ustanowienie polityki i procedur bezpiecze\u0144stwa.<\/p>\n<\/li>\n<li>\n<p>Obs\u0142ug\u0119 i zg\u0142aszanie incydent\u00f3w do w\u0142a\u015bciwego CSIRT.<\/p>\n<\/li>\n<li>\n<p>Raportowanie incydent\u00f3w w wymaganych terminach.<\/p>\n<\/li>\n<li>\n<p>Bezpiecze\u0144stwo \u0142a\u0144cucha dostaw i ocen\u0119 dostawc\u00f3w.<\/p>\n<\/li>\n<li>\n<p>Audyt i dzia\u0142ania koryguj\u0105ce.<\/p>\n<\/li>\n<li>\n<p>Szkolenia kadry zarz\u0105dzaj\u0105cej i personelu.<\/p>\n<\/li>\n<\/ol>\n<p>NIS2 wymaga wykazania zgodno\u015bci dowodami, nie deklaracjami. Dlatego kolejny etap wdro\u017cenia powinien obejmowa\u0107 uporz\u0105dkowany plan dzia\u0142ania.<\/p>\n\n<style>.kadence-column24807_c8c182-c0 > .kt-inside-inner-col,.kadence-column24807_c8c182-c0 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column24807_c8c182-c0 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column24807_c8c182-c0 > .kt-inside-inner-col{flex-direction:column;}.kadence-column24807_c8c182-c0 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column24807_c8c182-c0 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column24807_c8c182-c0{position:relative;}.kadence-column24807_c8c182-c0, .kt-inside-inner-col > .kadence-column24807_c8c182-c0:not(.specificity){margin-top:0px;margin-bottom:0px;}@media all and (max-width: 1024px){.kadence-column24807_c8c182-c0 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column24807_c8c182-c0 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column24807_c8c182-c0\"><div class=\"kt-inside-inner-col\">\n<!-- \u2550\u2550\u2550 BANER CROSS-LINK \u2550\u2550\u2550 -->\n<!-- Wklej w tre\u015b\u0107 artyku\u0142u. Zmie\u0144 href, tytu\u0142 artyku\u0142u i opcjonalnie tag. -->\n\n<style>\n  .inteca-crosslink {\n    display: flex;\n    align-items: center;\n    gap: 20px;\n    padding: 20px 24px;\n    background: var(--bg-light, #f8f9fb);\n    border: 1px solid var(--border-light, rgba(127,140,141,0.12));\n    border-left: 3px solid var(--primary-blue, #3e7c93);\n    border-radius: 0 12px 12px 0;\n    text-decoration: none;\n    color: inherit;\n    transition: all 0.25s ease;\n    margin: 20px 0;\n    font-family: 'Poppins', -apple-system, BlinkMacSystemFont, sans-serif;\n  }\n\n  .inteca-crosslink:hover {\n    border-left-color: var(--accent-orange, #d35400);\n    box-shadow: 0 4px 16px rgba(0,0,0,0.05);\n    transform: translateX(4px);\n  }\n\n  .inteca-crosslink-icon {\n    flex-shrink: 0;\n    width: 40px;\n    height: 40px;\n    border-radius: 8px;\n    background: var(--primary-dark, #19242f);\n    display: flex;\n    align-items: center;\n    justify-content: center;\n    font-size: 16px;\n  }\n\n  .inteca-crosslink-body {\n    flex: 1;\n    min-width: 0;\n  }\n\n  .inteca-crosslink-label {\n    font-size: 11px;\n    text-transform: uppercase;\n    letter-spacing: 1px;\n    font-weight: 600;\n    color: var(--primary-blue, #3e7c93);\n    margin-bottom: 2px;\n  }\n\n  .inteca-crosslink-title {\n    font-size: 15px;\n    font-weight: 500;\n    color: var(--text-dark, #1a1a2e);\n    line-height: 1.4;\n  }\n\n  .inteca-crosslink:hover .inteca-crosslink-title {\n    color: var(--accent-orange, #d35400);\n  }\n\n  .inteca-crosslink-arrow {\n    flex-shrink: 0;\n    font-size: 18px;\n    color: var(--text-muted, #6b7280);\n    transition: all 0.25s ease;\n  }\n\n  .inteca-crosslink:hover .inteca-crosslink-arrow {\n    color: var(--accent-orange, #d35400);\n    transform: translateX(4px);\n  }\n<\/style>\n\n<!-- U\u017bYCIE: skopiuj <a> i zmie\u0144 href + tytu\u0142 -->\n\n<a href=\"\/pl\/insighty-biznesowe\/dyrektywa-nis2\/\" class=\"inteca-crosslink\">\n  <div class=\"inteca-crosslink-icon\">\ud83d\udccb<\/div>\n  <div class=\"inteca-crosslink-body\">\n    <div class=\"inteca-crosslink-label\">Przeczytaj r\u00f3wnie\u017c<\/div>\n    <div class=\"inteca-crosslink-title\">Dyrektywa NIS2: co to jest, kogo dotyczy i jak wdro\u017cy\u0107 wymagania cyberbezpiecze\u0144stwa<\/div>\n  <\/div>\n  <div class=\"inteca-crosslink-arrow\">\u2192<\/div>\n<\/a>\n<\/div><\/div>\n\n\n<h2 data-heading=\"Jak wdro\u017cy\u0107 NIS2 krok po kroku w planie 30\/90\/180 dni?\">Jak wdro\u017cy\u0107 NIS2 krok po kroku?<\/h2>\n<p>Wdro\u017cenie NIS2 nale\u017cy prowadzi\u0107 etapowo, aby r\u00f3wnolegle osi\u0105ga\u0107 zgodno\u015b\u0107 i budowa\u0107 odporno\u015b\u0107 operacyjn\u0105. Sprawdzony model obejmuje trzy horyzonty czasowe.<\/p>\n<h3 data-heading=\"Etap 0\u201330 dni: identyfikacja i governance\">Etap 1: identyfikacja i governance<\/h3>\n<ul>\n<li>\n<p>potwierdzenie statusu podmiotu,<\/p>\n<\/li>\n<li>\n<p>analiza projektu nowelizacji <a href=\"\/pl\/insighty-biznesowe\/ustawa-o-ksc\/\">ustawy o Krajowym Systemie Cyberbezpiecze\u0144stwa,<\/a><\/p>\n<\/li>\n<li>\n<p>inwentaryzacja us\u0142ug, aktyw\u00f3w i zale\u017cno\u015bci w systemach,<\/p>\n<\/li>\n<li>\n<p>uruchomienie minimalnego procesu zg\u0142aszania incydent\u00f3w, poniewa\u017c podmioty wa\u017cne i krytyczne s\u0105 zobowi\u0105zane do zg\u0142aszania incydent\u00f3w ju\u017c od kwietnia 2026 roku,<\/p>\n<\/li>\n<li>\n<p>wyznaczenie r\u00f3l i odpowiedzialno\u015bci zarz\u0105du.<\/p>\n<\/li>\n<\/ul>\n<h3 data-heading=\"Etap 31\u201390 dni: wdro\u017cenia kontrolne\">Etap 2: wdro\u017cenia kontrolne<\/h3>\n<ul>\n<li>\n<p>wdro\u017cenie zarz\u0105dzania to\u017csamo\u015bci\u0105, zabezpiecze\u0144 takich jak MFA, oraz dost\u0119p uprzywilejowany (PAM) do najbardziej wra\u017cliwych zasob\u00f3w,\u00a0<\/p>\n<\/li>\n<li>\n<p>centralizacja log\u00f3w oraz detekcja w SIEM,<\/p>\n<\/li>\n<li>\n<p>segmentacja i kontrola dost\u0119pu,<\/p>\n<\/li>\n<li>\n<p>wdro\u017cenie procesu TPRM dla \u0142a\u0144cucha dostaw,<\/p>\n<\/li>\n<li>\n<p>aktualizacja um\u00f3w z dostawcami ICT.<\/p>\n<\/li>\n<\/ul>\n<h3 data-heading=\"Etap 91\u2013180 dni: audytowalno\u015b\u0107 i doskonalenie\">Etap 3: audytowalno\u015b\u0107 i doskonalenie<\/h3>\n<ul>\n<li>\n<p>testy plan\u00f3w ci\u0105g\u0142o\u015b\u0107 dzia\u0142ania,<\/p>\n<\/li>\n<li>\n<p>\u0107wiczenia reagowania na incydenty,<\/p>\n<\/li>\n<li>\n<p>domkni\u0119cie rejestr\u00f3w dowodowych,<\/p>\n<\/li>\n<li>\n<p>audyt zgodno\u015bci i plan remediacji.<\/p>\n<\/li>\n<\/ul>\n<p>Takie wdro\u017cenie nowych wymaga\u0144 tworzy baz\u0119 do kontroli i audytu. Aby audyt przebieg\u0142 skutecznie, potrzebny jest kompletny pakiet dokument\u00f3w.<\/p>\n<figure id=\"attachment_24827\" aria-describedby=\"caption-attachment-24827\" style=\"width: 1280px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-24827 size-full\" src=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-wdrozenia-ustawy-KSC.png\" alt=\"O\u015b czasu wdro\u017cenia ustawy o KSC od kwietnia 2026 do kwietnia 2028 \u2014 pi\u0119\u0107 milestone'\u00f3w: wej\u015bcie w \u017cycie (kwiecie\u0144 2026), wpis do wykazu podmiot\u00f3w (pa\u017adziernik 2026, 6 miesi\u0119cy), wdro\u017cenie obowi\u0105zk\u00f3w (kwiecie\u0144 2027, 12 miesi\u0119cy), pierwszy audyt bezpiecze\u0144stwa i aktywacja kar pieni\u0119\u017cnych (kwiecie\u0144 2028, 24 miesi\u0105ce).\" width=\"1280\" height=\"720\" srcset=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-wdrozenia-ustawy-KSC.png 1920w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-wdrozenia-ustawy-KSC-300x169.png 300w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-wdrozenia-ustawy-KSC-1024x576.png 1024w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-wdrozenia-ustawy-KSC-768x432.png 768w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-wdrozenia-ustawy-KSC-1536x864.png 1536w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><figcaption id=\"caption-attachment-24827\" class=\"wp-caption-text\"><em>Kluczowe terminy ustawy o KSC \u2014 od samoidentyfikacji po pierwszy audyt i aktywacj\u0119 kar. Daty orientacyjne dla podmiot\u00f3w spe\u0142niaj\u0105cych przes\u0142anki na dzie\u0144 2 kwietnia 2026.<\/em><\/figcaption><\/figure>\n<h2 data-heading=\"Jakie dokumenty i polityki s\u0105 niezb\u0119dne do zgodno\u015bci z NIS2?\">Jakie dokumenty i polityki s\u0105 niezb\u0119dne do zgodno\u015bci z NIS2?<\/h2>\n<p>Wdro\u017cenie systemu zarz\u0105dzania bezpiecze\u0144stwem informacji wymaga sp\u00f3jnej dokumentacji, kt\u00f3ra potwierdza decyzje, dzia\u0142ania i wyniki. Bez dokument\u00f3w i dowod\u00f3w podmioty kluczowe oraz wa\u017cne nie wyka\u017c\u0105 zgodno\u015bci.<\/p>\n<p>Minimalny pakiet dokumentacji obejmuje:<\/p>\n<ul>\n<li>\n<p>polityki bezpiecze\u0144stwa informacji,<\/p>\n<\/li>\n<li>\n<p>polityki kontroli dost\u0119pu,<\/p>\n<\/li>\n<li>\n<p>procedur\u0119 reagowania na incydent,<\/p>\n<\/li>\n<li>\n<p>procedur\u0119 raportowania do CSIRT,<\/p>\n<\/li>\n<li>\n<p>polityk\u0119 zarz\u0105dzania ryzykiem,<\/p>\n<\/li>\n<li>\n<p>polityk\u0119 bezpiecze\u0144stwa \u0142a\u0144cucha dostaw,<\/p>\n<\/li>\n<li>\n<p>polityk\u0119 backup\/DR\/BCP,<\/p>\n<\/li>\n<li>\n<p>rejestr ryzyk i rejestr incydent\u00f3w,<\/p>\n<\/li>\n<li>\n<p>matryc\u0119 odpowiedzialno\u015bci,<\/p>\n<\/li>\n<li>\n<p>protoko\u0142y test\u00f3w i audyt\u00f3w.<\/p>\n<\/li>\n<\/ul>\n<p>Powy\u017csze dokumenty stanowi\u0105 podstaw\u0119 wdro\u017cenia systemu zarz\u0105dzania bezpiecze\u0144stwem informacji (SZBI).Na tej podstawie mo\u017cna zbudowa\u0107 techniczny model kontroli wspieraj\u0105cy zgodno\u015b\u0107.<\/p>\n<h2 data-heading=\"Jak wygl\u0105da model techniczny wdro\u017cenia NIS2 wspieraj\u0105cy zgodno\u015b\u0107?\">Jak wygl\u0105da model techniczny wdro\u017cenia NIS2 wspieraj\u0105cy zgodno\u015b\u0107?<\/h2>\n<p>Model techniczny wdro\u017cenia NIS2 powinien wspiera\u0107 wymagania prawne i operacyjne. Celem jest wykrywanie zagro\u017ce\u0144, ograniczanie skutk\u00f3w incydent\u00f3w i utrzymanie ci\u0105g\u0142o\u015bci us\u0142ug cyfrowych.<\/p>\n<p>Rekomendowany zestaw kontroli obejmuje:<\/p>\n<ul>\n<li>\n<p>IAM &#8211; zarz\u0105dzanie to\u017csamo\u015bci\u0105 i MFA &#8211; uwierzytelnianie wielosk\u0142adnikowe dla to\u017csamo\u015bci,<\/p>\n<\/li>\n<li>\n<p>PAM dla dost\u0119p\u00f3w uprzywilejowanych,<\/p>\n<\/li>\n<li>\n<p>SIEM i SOAR dla monitoringu i automatyzacji,<\/p>\n<\/li>\n<li>\n<p>EDR\/XDR dla ochrony endpoint\u00f3w,<\/p>\n<\/li>\n<li>\n<p>segmentacj\u0119 sieci i model zero trust,<\/p>\n<\/li>\n<li>\n<p>kopie 3-2-1-1-0,<\/p>\n<\/li>\n<li>\n<p>regularne testy odtworzeniowe.<\/p>\n<\/li>\n<\/ul>\n<p>Strategia 3-2-1-1-0 oznacza: 3 kopie danych, 2 r\u00f3\u017cne no\u015bniki, 1 kopi\u0119 offsite, 1 kopi\u0119 immutable\/offline i 0 b\u0142\u0119d\u00f3w po testach odtwarzania. Jednym z krytyczniejszych element\u00f3w kontroli technicznych jest bezpieczne i audytowalne zarz\u0105dzanie to\u017csamo\u015bciami w firmie.\u00a0<\/p>\n\n<style>.kb-row-layout-id24807_d37e26-75 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id24807_d37e26-75 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id24807_d37e26-75 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id24807_d37e26-75{border-top-left-radius:15px;border-top-right-radius:15px;border-bottom-right-radius:15px;border-bottom-left-radius:15px;overflow:clip;isolation:isolate;}.kb-row-layout-id24807_d37e26-75 > .kt-row-layout-overlay{border-top-left-radius:15px;border-top-right-radius:15px;border-bottom-right-radius:15px;border-bottom-left-radius:15px;}.kb-row-layout-id24807_d37e26-75{box-shadow:0px 0px 4px 0px rgba(0, 0, 0, 0.2);}.kb-row-layout-id24807_d37e26-75 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id24807_d37e26-75 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id24807_d37e26-75 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id24807_d37e26-75 alignnone has-theme-palette8-background-color kt-row-has-bg wp-block-kadence-rowlayout\" id=\"harmonogram\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kt-inner-column-height-full\">\n<style>.kadence-column24807_b2ea14-09 > .kt-inside-inner-col,.kadence-column24807_b2ea14-09 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column24807_b2ea14-09 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column24807_b2ea14-09 > .kt-inside-inner-col{flex-direction:column;}.kadence-column24807_b2ea14-09 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column24807_b2ea14-09 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column24807_b2ea14-09{position:relative;}.kadence-column24807_b2ea14-09, .kt-inside-inner-col > .kadence-column24807_b2ea14-09:not(.specificity){margin-top:0px;margin-bottom:0px;}@media all and (max-width: 1024px){.kadence-column24807_b2ea14-09 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column24807_b2ea14-09 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column24807_b2ea14-09\"><div class=\"kt-inside-inner-col\">\n<!DOCTYPE html>\n<html lang=\"pl\">\n<head>\n  <meta charset=\"UTF-8\">\n  <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n  <title>Mapa IAM dla NIS2 | Inteca<\/title>\n  <link rel=\"preconnect\" href=\"https:\/\/fonts.googleapis.com\">\n  <link rel=\"preconnect\" href=\"https:\/\/fonts.gstatic.com\" crossorigin>\n  <link href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins:wght@300;400;500;600;700&#038;display=swap\" rel=\"stylesheet\">\n  <style>\n    :root {\n      --primary-dark: #19242f;\n      --primary-blue: #3e7c93;\n      --primary-blue-light: #4a8fa3;\n      --accent-orange: #d35400;\n      --accent-orange-dark: #b84700;\n      --text-dark: #1a1a2e;\n      --text-muted: #6b7280;\n      --bg-light: #f8f9fb;\n      --bg-white: #ffffff;\n      --border-light: rgba(127,140,141,0.12);\n      --success-green: #10b981;\n      --warning-yellow: #f59e0b;\n    }\n\n    *, *::before, *::after { box-sizing: border-box; margin: 0; padding: 0; }\n\n    body {\n      font-family: 'Poppins', -apple-system, BlinkMacSystemFont, sans-serif;\n      background: var(--bg-white);\n      color: var(--text-dark);\n      line-height: 1.7;\n      font-weight: 300;\n      font-size: 16px;\n      -webkit-font-smoothing: antialiased;\n    }\n\n    \/* \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\n       IAM MAP TOOL\n       \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 *\/\n\n    .iam-map {\n      max-width: 920px;\n      margin: 48px auto;\n      padding: 0 24px;\n    }\n\n    \/* \u2500\u2500 HEADER \u2500\u2500 *\/\n    .im-header { margin-bottom: 40px; }\n\n    .im-label {\n      font-size: 11px;\n      text-transform: uppercase;\n      letter-spacing: 1.5px;\n      color: var(--primary-blue);\n      font-weight: 600;\n      margin-bottom: 12px;\n    }\n\n    .im-title {\n      font-size: 32px;\n      font-weight: 500;\n      line-height: 1.25;\n      letter-spacing: -0.3px;\n      color: var(--text-dark);\n      margin-bottom: 12px;\n    }\n\n    .im-title em { font-style: normal; color: var(--primary-blue); }\n\n    .im-desc {\n      font-size: 15px;\n      color: var(--text-muted);\n      line-height: 1.8;\n      max-width: 640px;\n    }\n\n    \/* \u2500\u2500 LEGEND \u2500\u2500 *\/\n    .im-legend {\n      display: flex;\n      gap: 24px;\n      margin-bottom: 32px;\n      flex-wrap: wrap;\n    }\n\n    .im-legend-item {\n      display: flex;\n      align-items: center;\n      gap: 8px;\n      font-size: 12px;\n      font-weight: 500;\n      color: var(--text-muted);\n    }\n\n    .im-legend-dot {\n      width: 10px;\n      height: 10px;\n      border-radius: 50%;\n    }\n\n    .im-legend-dot.native { background: var(--success-green); box-shadow: 0 0 8px rgba(16,185,129,0.4); }\n    .im-legend-dot.extended { background: var(--primary-blue); box-shadow: 0 0 8px rgba(62,124,147,0.4); }\n\n    \/* \u2500\u2500 GRID \u2500\u2500 *\/\n    .im-grid {\n      display: grid;\n      grid-template-columns: repeat(2, 1fr);\n      gap: 16px;\n    }\n\n    \/* \u2500\u2500 TILE \u2500\u2500 *\/\n    .im-tile {\n      background: var(--primary-dark);\n      border: 1px solid rgba(255,255,255,0.08);\n      border-radius: 14px;\n      overflow: hidden;\n      transition: all 0.3s ease;\n    }\n\n    .im-tile:hover {\n      border-color: rgba(62,124,147,0.3);\n      box-shadow: 0 4px 24px rgba(0,0,0,0.15);\n    }\n\n    .im-tile.open {\n      border-color: rgba(62,124,147,0.4);\n      box-shadow: 0 8px 32px rgba(0,0,0,0.2);\n    }\n\n    \/* Glow based on status *\/\n    .im-tile.native { border-left: 3px solid var(--success-green); }\n    .im-tile.extended { border-left: 3px solid var(--primary-blue); }\n\n    \/* \u2500\u2500 TILE HEADER \u2500\u2500 *\/\n    .im-tile-header {\n      display: flex;\n      align-items: center;\n      gap: 14px;\n      padding: 20px 22px;\n      cursor: pointer;\n      user-select: none;\n      transition: background 0.2s;\n    }\n\n    .im-tile-header:hover {\n      background: rgba(255,255,255,0.03);\n    }\n\n    .im-tile-icon {\n      flex-shrink: 0;\n      width: 44px;\n      height: 44px;\n      border-radius: 10px;\n      display: flex;\n      align-items: center;\n      justify-content: center;\n      font-size: 20px;\n      transition: all 0.3s;\n    }\n\n    .im-tile.native .im-tile-icon {\n      background: rgba(16,185,129,0.12);\n      border: 1px solid rgba(16,185,129,0.25);\n    }\n\n    .im-tile.extended .im-tile-icon {\n      background: rgba(62,124,147,0.12);\n      border: 1px solid rgba(62,124,147,0.25);\n    }\n\n    .im-tile:hover .im-tile-icon,\n    .im-tile.open .im-tile-icon {\n      transform: scale(1.05);\n    }\n\n    .im-tile-info { flex: 1; min-width: 0; }\n\n    .im-tile-name {\n      font-size: 14px;\n      font-weight: 600;\n      color: white;\n      line-height: 1.3;\n      margin-bottom: 3px;\n    }\n\n    .im-tile-req {\n      font-size: 11px;\n      color: rgba(255,255,255,0.5);\n      line-height: 1.5;\n      font-weight: 300;\n    }\n\n    .im-tile-status {\n      flex-shrink: 0;\n      display: flex;\n      align-items: center;\n      gap: 8px;\n    }\n\n    .im-status-tag {\n      font-size: 10px;\n      font-weight: 600;\n      text-transform: uppercase;\n      letter-spacing: 0.6px;\n      padding: 3px 10px;\n      border-radius: 4px;\n    }\n\n    .im-status-tag.native {\n      background: rgba(16,185,129,0.15);\n      color: var(--success-green);\n    }\n\n    .im-status-tag.extended {\n      background: rgba(62,124,147,0.15);\n      color: var(--primary-blue-light);\n    }\n\n    .im-tile-chevron {\n      flex-shrink: 0;\n      color: rgba(255,255,255,0.3);\n      font-size: 12px;\n      transition: transform 0.3s;\n    }\n\n    .im-tile.open .im-tile-chevron {\n      transform: rotate(180deg);\n      color: var(--primary-blue);\n    }\n\n    \/* \u2500\u2500 TILE BODY (accordion) \u2500\u2500 *\/\n    .im-tile-body {\n      max-height: 0;\n      overflow: hidden;\n      transition: max-height 0.4s ease;\n    }\n\n    .im-tile.open .im-tile-body {\n      max-height: 600px;\n    }\n\n    .im-tile-content {\n      padding: 0 22px 22px;\n      display: flex;\n      flex-direction: column;\n      gap: 16px;\n    }\n\n    .im-tile-divider {\n      height: 1px;\n      background: rgba(255,255,255,0.06);\n    }\n\n    .im-detail {\n      display: flex;\n      gap: 12px;\n      align-items: flex-start;\n    }\n\n    .im-detail-marker {\n      flex-shrink: 0;\n      width: 24px;\n      height: 24px;\n      border-radius: 6px;\n      display: flex;\n      align-items: center;\n      justify-content: center;\n      font-size: 11px;\n      font-weight: 700;\n      margin-top: 1px;\n    }\n\n    .im-detail-marker.reg {\n      background: rgba(211,84,0,0.15);\n      color: var(--accent-orange);\n    }\n\n    .im-detail-marker.prac {\n      background: rgba(245,158,11,0.15);\n      color: var(--warning-yellow);\n    }\n\n    .im-detail-marker.kc {\n      background: rgba(62,124,147,0.15);\n      color: var(--primary-blue-light);\n    }\n\n    .im-detail-label {\n      font-size: 10px;\n      font-weight: 600;\n      text-transform: uppercase;\n      letter-spacing: 0.6px;\n      margin-bottom: 3px;\n    }\n\n    .im-detail-label.reg { color: var(--accent-orange); }\n    .im-detail-label.prac { color: var(--warning-yellow); }\n    .im-detail-label.kc { color: var(--primary-blue-light); }\n\n    .im-detail-text {\n      font-size: 13px;\n      color: rgba(255,255,255,0.7);\n      line-height: 1.6;\n      font-weight: 300;\n    }\n\n    \/* \u2500\u2500 SUMMARY BAR \u2500\u2500 *\/\n    .im-summary {\n      margin-top: 32px;\n      padding: 24px 28px;\n      background: var(--primary-dark);\n      border: 1px solid rgba(255,255,255,0.08);\n      border-radius: 14px;\n      display: flex;\n      align-items: center;\n      justify-content: space-between;\n      gap: 24px;\n      flex-wrap: wrap;\n    }\n\n    .im-summary-stat {\n      display: flex;\n      align-items: center;\n      gap: 12px;\n    }\n\n    .im-summary-num {\n      font-size: 36px;\n      font-weight: 600;\n      color: white;\n      line-height: 1;\n    }\n\n    .im-summary-num span { color: var(--primary-blue); }\n\n    .im-summary-label {\n      font-size: 13px;\n      color: rgba(255,255,255,0.6);\n      line-height: 1.4;\n    }\n\n    .im-summary-cta {\n      display: inline-flex;\n      align-items: center;\n      gap: 8px;\n      background: var(--accent-orange);\n      color: white;\n      padding: 14px 28px;\n      border-radius: 8px;\n      font-size: 14px;\n      font-weight: 500;\n      text-decoration: none;\n      font-family: 'Poppins', sans-serif;\n      box-shadow: 0 4px 20px rgba(211,84,0,0.3);\n      transition: all 0.3s ease;\n    }\n\n    .im-summary-cta:hover {\n      background: var(--accent-orange-dark);\n      transform: translateY(-2px);\n      box-shadow: 0 8px 30px rgba(211,84,0,0.4);\n    }\n\n    \/* \u2500\u2500 RESPONSIVE \u2500\u2500 *\/\n    @media (max-width: 768px) {\n      .im-title { font-size: 26px; }\n      .im-grid { grid-template-columns: 1fr; }\n      .im-summary { flex-direction: column; text-align: center; }\n      .im-summary-cta { width: 100%; justify-content: center; }\n      .im-legend { gap: 16px; }\n      .im-tile-status { display: none; }\n    }\n  <\/style>\n<\/head>\n<body>\n\n<div class=\"iam-map\">\n\n  <!-- HEADER -->\n  <div class=\"im-header\">\n    <div class=\"im-label\">Mapa wymog\u00f3w zarz\u0105dzania to\u017csamo\u015bci\u0105 w NIS2<\/div>\n    <h2 class=\"im-title\">Jakie funkcjonalno\u015bci zarz\u0105dzania to\u017csamo\u015bci\u0105 <em>musisz wdro\u017cy\u0107 pod NIS2\/KSC<\/em><\/h2>\n    <p class=\"im-desc\">Kliknij w kafelek, aby zobaczy\u0107 co wymaga regulator, co to oznacza w praktyce i jak Keycloak to adresuje.<\/p>\n  <\/div>\n\n  <!-- LEGEND -->\n  <div class=\"im-legend\">\n    <div class=\"im-legend-item\"><div class=\"im-legend-dot native\"><\/div> Keycloak \u2014 wsparcie natywne<\/div>\n    <div class=\"im-legend-item\"><div class=\"im-legend-dot extended\"><\/div> Keycloak \u2014 z rozszerzeniami \/ integracj\u0105<\/div>\n  <\/div>\n\n  <!-- GRID -->\n  <div class=\"im-grid\" id=\"im-grid\"><\/div>\n\n  <!-- SUMMARY -->\n  <div class=\"im-summary\">\n    <div class=\"im-summary-stat\">\n      <div class=\"im-summary-num\">8<span>\/8<\/span><\/div>\n      <div class=\"im-summary-label\">funkcjonalno\u015bci IAM wymaganych<br>przez NIS2\/KSC pokrytych Keycloak<\/div>\n    <\/div>\n    <a href=\"https:\/\/inteca.com\/pl\/kontakt\/\" class=\"im-summary-cta\">Analiza luk w zarz\u0105dzaniu to\u017csamo\u015bci\u0105 \u2192<\/a>\n  <\/div>\n\n<\/div>\n\n<script>\n(function() {\n\n  const tiles = [\n    {\n      icon: '\ud83d\udd10',\n      name: 'Enterprise SSO',\n      req: 'Centralna kontrola dost\u0119pu do system\u00f3w',\n      status: 'native',\n      statusLabel: 'Natywne',\n      reg: { ref: 'Art. 8 lit. c, d, m, n KSC \u00b7 ENISA \u00a711.1\u201311.4', text: 'Ustawa wymaga wdro\u017cenia polityk kontroli dost\u0119pu opartych na zasadach need-to-know i need-to-use. Organizacja musi mie\u0107 jedno, centralne \u017ar\u00f3d\u0142o prawdy dla to\u017csamo\u015bci \u2014 nie rozproszone silosy.' },\n      prac: { text: 'Pracownicy loguj\u0105 si\u0119 raz i maj\u0105 kontrolowany dost\u0119p do ERP, CRM, aplikacji wewn\u0119trznych i chmury. Eliminacja shadow IT, niekontrolowanych hase\u0142 i duplikacji kont mi\u0119dzy systemami.' },\n      kc: { text: 'Natywne SSO przez SAML 2.0, OIDC i OAuth 2.0. Federacja z Active Directory i LDAP. Architektura multi-realm dla grup sp\u00f3\u0142ek \u2014 izolacja domen bezpiecze\u0144stwa z centralnym zarz\u0105dzaniem.' }\n    },\n    {\n      icon: '\ud83d\udee1\ufe0f',\n      name: 'MFA \u2014 uwierzytelnianie wielosk\u0142adnikowe',\n      req: 'Silne uwierzytelnianie proporcjonalne do ryzyka',\n      status: 'native',\n      statusLabel: 'Natywne',\n      reg: { ref: 'Art. 21(2)(j) NIS2 \u00b7 Art. 8 lit. l KSC \u00b7 ENISA \u00a711.7', text: 'Dyrektywa wprost wymaga MFA \u201ew stosownych przypadkach\". ENISA klasyfikuje FIDO2\/WebAuthn jako \u201enajsilniejsze\", a SMS OTP jako \u201elast resort\" \u2014 niewystarczaj\u0105cy dla system\u00f3w krytycznych.' },\n      prac: { text: 'R\u00f3\u017cne poziomy MFA dla r\u00f3\u017cnych grup: FIDO2 dla admin\u00f3w i dost\u0119pu zdalnego, TOTP dla u\u017cytkownik\u00f3w wewn\u0119trznych, step-up MFA przy operacjach wysokiego ryzyka. Audytor sprawdzi konfiguracj\u0119 \u2014 nie fakt istnienia polityki.' },\n      kc: { text: 'Natywne adaptive MFA: FIDO2\/WebAuthn, TOTP\/HOTP, Passkeys. Conditional Authentication Flows \u2014 r\u00f3\u017cny poziom assurance per rola, aplikacja, sie\u0107 i urz\u0105dzenie. Brute-force protection z auto-lockout.' }\n    },\n    {\n      icon: '\ud83d\udd11',\n      name: 'Dost\u0119p uprzywilejowany (PAM)',\n      req: 'Separacja i nadz\u00f3r kont administracyjnych',\n      status: 'extended',\n      statusLabel: 'Rozszerzenia',\n      reg: { ref: 'ENISA \u00a711.3\u201311.4', text: 'Konto administratora nie mo\u017ce s\u0142u\u017cy\u0107 do codziennej pracy. ENISA klasyfikuje konta uprzywilejowane jako obszar \u201ewysokiego ryzyka\" wymagaj\u0105cy dedykowanych kontroli: separacji, nagrywania i czasowego dost\u0119pu.' },\n      prac: { text: 'Ka\u017cdy admin ma oddzielne konto do zada\u0144 administracyjnych. Dost\u0119p jest przyznawany Just-in-Time \u2014 tylko na czas zadania. Bez nagra\u0144 sesji PAM nie odtworzysz w 72h co zrobi\u0142 skompromitowany admin.' },\n      kc: { text: 'Dedykowane realm roles dla kont admin (natywne). JIT access z czasowym przypisaniem r\u00f3l (z rozszerzeniami). Session recording przez integracj\u0119 z PAM proxy (np. Apache Guacamole). Admin REST API do automatyzacji.' }\n    },\n    {\n      icon: '\ud83d\udd04',\n      name: 'Cykl \u017cycia to\u017csamo\u015bci (IGA)',\n      req: 'Automatyczne zarz\u0105dzanie uprawnieniami pracownik\u00f3w',\n      status: 'extended',\n      statusLabel: 'Rozszerzenia',\n      reg: { ref: 'Art. 21(2)(i) NIS2 \u00b7 Art. 21(2)(f) NIS2 \u00b7 ENISA \u00a711.5.4', text: 'Ustawa wymaga kontroli dost\u0119pu w powi\u0105zaniu z HR \u2014 zatrudnienie, zmiana roli, odej\u015bcie. Statyczne polityki dost\u0119pu s\u0105 niewystarczaj\u0105ce. Audytor sprawdzi, czy ex-pracownicy zostali odci\u0119ci natychmiast.' },\n      prac: { text: 'Automatyczny onboarding przy zatrudnieniu, zmiana uprawnie\u0144 przy przeniesieniu, natychmiastowy offboarding przy odej\u015bciu. Kwartalne przegl\u0105dy uprawnie\u0144 \u2014 certyfikacja dost\u0119pu z podpisem mened\u017cera.' },\n      kc: { text: 'SCIM provisioning i integracja z systemem HR (natywne). Natychmiastowe cofanie sesji, token\u00f3w i r\u00f3l przez Admin API. Kampanie access certification wymagaj\u0105 rozszerzenia\/nadbudowy nad Keycloak.' }\n    },\n    {\n      icon: '\ud83d\udd17',\n      name: 'Federacja B2B \u2014 \u0142a\u0144cuch dostaw',\n      req: 'Kontrola dost\u0119pu dostawc\u00f3w i partner\u00f3w',\n      status: 'native',\n      statusLabel: 'Natywne',\n      reg: { ref: 'Art. 21(2)(d) NIS2 \u00b7 Art. 8 lit. e KSC', text: 'Ustawa wymaga bezpiecze\u0144stwa \u0142a\u0144cucha dostaw ICT. Sta\u0142y dost\u0119p VPN dla dostawc\u00f3w to naruszenie \u2014 ka\u017cdy partner musi mie\u0107 kontrolowany, ograniczony czasowo dost\u0119p z pe\u0142n\u0105 rozliczalno\u015bci\u0105.' },\n      prac: { text: 'Dostawca \u0142\u0105czy si\u0119 przez federacj\u0119 to\u017csamo\u015bci ze swoim IdP \u2014 bez konta lokalnego w Twojej organizacji. Dost\u0119p Just-in-Time: tylko na czas zadania, automatyczne wyga\u015bni\u0119cie. Pe\u0142ne logi sesji dostawc\u00f3w.' },\n      kc: { text: 'Identity Brokering \u2014 federacja z IdP partner\u00f3w przez SAML\/OIDC bez lokalnych kont (natywne). Dedykowane realmy i client scopes per partner. First Broker Login flows z kontrol\u0105 onboardingu. Pe\u0142ny audit trail sesji federowanych.' }\n    },\n    {\n      icon: '\ud83e\udd16',\n      name: 'To\u017csamo\u015bci nieludzkie (NHI)',\n      req: 'Zarz\u0105dzanie kontami serwisowymi i API',\n      status: 'native',\n      statusLabel: 'Natywne',\n      reg: { ref: 'ENISA \u00a711.5.3', text: 'Zero tolerancji dla niezarz\u0105dzanych wsp\u00f3\u0142dzielonych to\u017csamo\u015bci. Audytor oczekuje formalnego rejestru NHI: w\u0142a\u015bciciel, cel, zakres dost\u0119pu, typ credentials, polityka rotacji, data ostatniego przegl\u0105du.' },\n      prac: { text: 'Ka\u017cde konto serwisowe, API i skrypt automatyzacji musi mie\u0107 w\u0142a\u015bciciela, ograniczony scope i automatyczn\u0105 rotacj\u0119 credentials. Wsp\u00f3\u0142dzielone konta wymagaj\u0105 udokumentowanej zgody i uzasadnienia.' },\n      kc: { text: 'Client credentials z rotacj\u0105 \u2014 OAuth2 client_credentials grant (natywne). Service account management z dedykowanymi realm roles. Keycloak client registry jako centralny rejestr NHI. mTLS i signed JWT dla M2M. Token expiry policies.' }\n    },\n    {\n      icon: '\ud83d\udd12',\n      name: 'Kryptografia i zarz\u0105dzanie kluczami',\n      req: 'Polityki kryptograficzne i crypto-agility',\n      status: 'native',\n      statusLabel: 'Natywne',\n      reg: { ref: 'Art. 21(2)(h) NIS2 \u00b7 Art. 8 lit. k KSC', text: 'Ustawa wymaga formalnej polityki kryptograficznej. Si\u0142a szyfrowania musi by\u0107 proporcjonalna do klasyfikacji aktyw\u00f3w. ENISA wymaga crypto-agility \u2014 zdolno\u015bci szybkiej podmiany algorytm\u00f3w bez przebudowy infrastruktury.' },\n      prac: { text: 'Algorytmy podpisywania token\u00f3w, szyfrowanie komunikacji, hashowanie hase\u0142 \u2014 wszystko musi by\u0107 konfigurowalne i gotowe na wymian\u0119. Przygotowanie na zagro\u017cenia kwantowe to nie teoria \u2014 to wym\u00f3g ENISA.' },\n      kc: { text: 'Token signing: RS256, ES256, PS256 (konfigurowalne). Automatyczna rotacja kluczy z zachowaniem ci\u0105g\u0142o\u015bci. Algorithm agility \u2014 zmiana algorytmu bez przestoju. TLS enforcement. Password hashing: Bcrypt\/Argon2 (natywne).' }\n    },\n    {\n      icon: '\ud83d\udccb',\n      name: 'Audit logging i raportowanie',\n      req: 'Logi to\u017csamo\u015bciowe dla SIEM i raportowania 24h\/72h',\n      status: 'native',\n      statusLabel: 'Natywne',\n      reg: { ref: 'Art. 21(2)(b) NIS2 \u00b7 Art. 8 lit. m, n KSC \u00b7 ENISA \u00a73.2', text: 'Audytor za\u017c\u0105da nieprzerwanego \u0142a\u0144cucha dowod\u00f3w operacyjnych z timestampami. Logi musz\u0105 obejmowa\u0107 uwierzytelnianie, zmiany uprawnie\u0144 i dzia\u0142ania administracyjne. Retencja i integralno\u015b\u0107 log\u00f3w musz\u0105 by\u0107 wykazane.' },\n      prac: { text: '24h na wczesne ostrze\u017cenie, 72h na raport do CSIRT. Bez log\u00f3w z systemu IAM nie odtworzysz kto, kiedy i jak uzyska\u0142 dost\u0119p. Logi to\u017csamo\u015bciowe to fundament detekcji incydent\u00f3w i raportowania regulacyjnego.' },\n      kc: { text: 'Event Listeners eksportuj\u0105ce logi w czasie rzeczywistym do Splunk, ELK, QRadar (natywne). Trzy kategorie zdarze\u0144: uwierzytelnianie (success\/fail\/MFA\/lockout), zmiany to\u017csamo\u015bci (role\/grupy\/deprovisioning), dzia\u0142ania admin (konfiguracja\/polityki).' }\n    }\n  ];\n\n  const grid = document.getElementById('im-grid');\n\n  grid.innerHTML = tiles.map((tile, i) => `\n    <div class=\"im-tile ${tile.status}\" data-idx=\"${i}\">\n      <div class=\"im-tile-header\">\n        <div class=\"im-tile-icon\">${tile.icon}<\/div>\n        <div class=\"im-tile-info\">\n          <div class=\"im-tile-name\">${tile.name}<\/div>\n          <div class=\"im-tile-req\">${tile.req}<\/div>\n        <\/div>\n        <div class=\"im-tile-status\">\n          <span class=\"im-status-tag ${tile.status}\">${tile.statusLabel}<\/span>\n        <\/div>\n        <div class=\"im-tile-chevron\">\u25bc<\/div>\n      <\/div>\n      <div class=\"im-tile-body\">\n        <div class=\"im-tile-content\">\n          <div class=\"im-tile-divider\"><\/div>\n          <div class=\"im-detail\">\n            <div class=\"im-detail-marker reg\">\u00a7<\/div>\n            <div>\n              <div class=\"im-detail-label reg\">Wym\u00f3g regulatora<\/div>\n              <div class=\"im-detail-text\">${tile.reg.text}<\/div>\n              <div style=\"margin-top:6px;font-size:11px;color:rgba(255,255,255,0.35);font-weight:500;\">${tile.reg.ref}<\/div>\n            <\/div>\n          <\/div>\n          <div class=\"im-detail\">\n            <div class=\"im-detail-marker prac\">!<\/div>\n            <div>\n              <div class=\"im-detail-label prac\">Co to oznacza w praktyce<\/div>\n              <div class=\"im-detail-text\">${tile.prac.text}<\/div>\n            <\/div>\n          <\/div>\n          <div class=\"im-detail\">\n            <div class=\"im-detail-marker kc\">K<\/div>\n            <div>\n              <div class=\"im-detail-label kc\">Jak Keycloak to adresuje<\/div>\n              <div class=\"im-detail-text\">${tile.kc.text}<\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  `).join('');\n\n  \/\/ Accordion\n  document.querySelectorAll('.im-tile-header').forEach(header => {\n    header.addEventListener('click', () => {\n      const tile = header.parentElement;\n      const wasOpen = tile.classList.contains('open');\n      document.querySelectorAll('.im-tile').forEach(t => t.classList.remove('open'));\n      if (!wasOpen) tile.classList.add('open');\n    });\n  });\n\n})();\n<\/script>\n\n<\/body>\n<\/html>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<h2 data-heading=\"Jakie wymagania dotycz\u0105ce zarz\u0105dzania to\u017csamo\u015bci\u0105 musi spe\u0142ni\u0107 organizacja w NIS2?\">Jakie wymagania dotycz\u0105ce zarz\u0105dzania to\u017csamo\u015bci\u0105 musi spe\u0142ni\u0107 organizacja w NIS2?<\/h2>\n<p>Wdro\u017cenie NIS2 wymaga, aby organizacja wdro\u017cy\u0142a sp\u00f3jny model zarz\u0105dzania to\u017csamo\u015bci\u0105 i kontrol\u0105 dost\u0119pu dla u\u017cytkownik\u00f3w, administrator\u00f3w, dostawc\u00f3w oraz to\u017csamo\u015bci nieludzkich. Ten obszar \u0142\u0105czy \u015brodki techniczne i organizacyjne z wymaganiami audytowalnej zgodno\u015bci.<\/p>\n<p>Kluczowe wymagania IAM obejmuj\u0105:<\/p>\n<ol>\n<li><strong>SSO &#8211; centralna kontrola dost\u0119pu<\/strong>\u00a0 &#8211; Jeden punkt uwierzytelnienia i autoryzacji dla system\u00f3w krytycznych, us\u0142ug cyfrowych oraz aplikacji biznesowych.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>MFA \/ uwierzytelnianie wielosk\u0142adnikowe &#8211; phishing-resistant auth<\/strong> &#8211; Wymuszenie MFA dla dost\u0119pu do system\u00f3w informatycznych, szczeg\u00f3lnie dla kont o podwy\u017cszonym ryzyku i dost\u0119pu zdalnego.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong>Dost\u0119p uprzywilejowany (PAM) &#8211; separacja kont admin, session recording<\/strong>\u00a0 &#8211; Rozdzielenie kont administracyjnych od kont u\u017cytkownika, zasada least privilege, rejestrowanie sesji i mechanizmy just-in-time.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><strong>Cykl \u017cycia to\u017csamo\u015bci (IGA) &#8211; onboarding\/offboarding, przegl\u0105dy uprawnie\u0144<\/strong> &#8211; Formalne procesy nadawania i odbierania uprawnie\u0144, okresowe recertyfikacje dost\u0119pu i kontrola konflikt\u00f3w r\u00f3l.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li><strong>Federacja B2B \/ \u0142a\u0144cuch dostaw -kontrola dost\u0119pu dostawc\u00f3w<\/strong> &#8211; Bezpieczna federacja to\u017csamo\u015bci partner\u00f3w i dostawc\u00f3w oraz egzekwowanie polityk dost\u0119pu w relacjach B2B.<\/li>\n<\/ol>\n<ol start=\"6\">\n<li><strong>To\u017csamo\u015bci nieludzkie (NHI) &#8211; konta serwisowe, API, rotacja credentials<\/strong> &#8211; Inwentaryzacja i ochrona kont serwisowych, sekret\u00f3w API, token\u00f3w oraz wymuszenie rotacji po\u015bwiadcze\u0144.<\/li>\n<\/ol>\n<ol start=\"7\">\n<li><strong>Kryptografia i zarz\u0105dzanie kluczami &#8211; token signing, rotacja kluczy, crypto-agility &#8211; <\/strong>Bezpieczne podpisywanie token\u00f3w, cykliczna rotacja kluczy i gotowo\u015b\u0107 do zmiany algorytm\u00f3w kryptograficznych.<\/li>\n<\/ol>\n<ol start=\"8\">\n<li><strong>Audit logging i raportowanie &#8211; logi to\u017csamo\u015bciowe dla SIEM, gotowo\u015b\u0107 24h\/72h<\/strong>\u00a0 &#8211; Pe\u0142ne logowanie zdarze\u0144 to\u017csamo\u015bciowych, integracja z SIEM i utrzymanie gotowo\u015bci raportowej pod re\u017cim zg\u0142aszania incydent\u00f3w.<\/li>\n<\/ol>\n<p>Te wymagania \u0142\u0105cz\u0105 bezpiecze\u0144stwo dost\u0119pu z obowi\u0105zkami raportowania i audytu, dlatego naturalnym kolejnym krokiem jest zbudowanie procesu wsp\u00f3\u0142pracy z CSIRT.<\/p>\n<h2 data-heading=\"Jak wdro\u017cenie NIS2 reguluje zg\u0142aszanie incydent\u00f3w i wsp\u00f3\u0142prac\u0119 z CSIRT?\">Jak wdro\u017cenie NIS2 reguluje zg\u0142aszanie incydent\u00f3w i wsp\u00f3\u0142prac\u0119 z CSIRT?<\/h2>\n<p>Wdro\u017cenie NIS2 wymaga formalnego procesu reagowania na incydenty bezpiecze\u0144stwa komputerowego i wsp\u00f3\u0142pracy z CSIRT. Proces musi obejmowa\u0107 role, \u015bcie\u017cki eskalacji i komplet danych raportowych.<\/p>\n<p>Standard raportowania incydent\u00f3w wygl\u0105da nast\u0119puj\u0105co:<\/p>\n<table style=\"border-collapse: collapse; border-color: #B45F06; border-style: solid;\" border=\"1\">\n<thead>\n<tr>\n<th style=\"border-color: #b45f06;\">Etap<\/th>\n<th style=\"border-color: #b45f06;\">Termin<\/th>\n<th style=\"border-color: #b45f06;\">Zakres<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"border-color: #b45f06;\">Wczesne ostrze\u017cenie<\/td>\n<td style=\"border-color: #b45f06;\">do 24h<\/td>\n<td style=\"border-color: #b45f06;\">sygna\u0142 o incydencie, wst\u0119pna ocena wp\u0142ywu<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #b45f06;\">Zg\u0142oszenie incydentu<\/td>\n<td style=\"border-color: #b45f06;\">do 72h<\/td>\n<td style=\"border-color: #b45f06;\">przyczyny, skutki, dzia\u0142ania ograniczaj\u0105ce<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #b45f06;\">Raport ko\u0144cowy<\/td>\n<td style=\"border-color: #b45f06;\">do 1 miesi\u0105ca<\/td>\n<td style=\"border-color: #b45f06;\">opis \u017ar\u00f3d\u0142a incydentu, remediacja, wnioski<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>CSIRT pe\u0142ni rol\u0119 operacyjnego punktu kontaktu i koordynacji. Brak gotowo\u015bci procesowej zwi\u0119ksza ryzyko naruszenia wymog\u00f3w dyrektywy i na\u0142o\u017cenia sankcji.\u00a0<\/p>\n<figure id=\"attachment_24829\" aria-describedby=\"caption-attachment-24829\" style=\"width: 1280px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-24829 size-full\" src=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-zglaszania-incydentow-do-CSIRT.png\" alt=\"O\u015b czasu zg\u0142aszania incydent\u00f3w powa\u017cnych wed\u0142ug ustawy o KSC \u2014 trzy etapy: wczesne ostrze\u017cenie do 24 godzin od wykrycia, zg\u0142oszenie incydentu do 72 godzin od wykrycia, sprawozdanie ko\u0144cowe do 30 dni od zg\u0142oszenia.\" width=\"1280\" height=\"720\" srcset=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-zglaszania-incydentow-do-CSIRT.png 1920w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-zglaszania-incydentow-do-CSIRT-300x169.png 300w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-zglaszania-incydentow-do-CSIRT-1024x576.png 1024w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-zglaszania-incydentow-do-CSIRT-768x432.png 768w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Harmonogram-zglaszania-incydentow-do-CSIRT-1536x864.png 1536w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><figcaption id=\"caption-attachment-24829\" class=\"wp-caption-text\"><em>Harmonogram zegarowy raportowania incydent\u00f3w powa\u017cnych do CSIRT &#8211; terminy obowi\u0105zuj\u0105ce od 2 kwietnia 2026.<\/em><\/figcaption><\/figure>\n<h2 data-heading=\"Jakie s\u0105 sankcje i kary finansowe za brak wdro\u017cenia NIS2?\">Jakie s\u0105 sankcje i kary finansowe za brak wdro\u017cenia NIS2?<\/h2>\n<p>Nowe przepisy przewiduj\u0105 wysokie kary finansowe za niewykonanie obowi\u0105zk\u00f3w. Dla podmiot\u00f3w kluczowych maksymalna kara mo\u017ce wynosi\u0107 do 10 mln EUR lub 2% rocznego globalnego obrotu, a dla podmiot\u00f3w wa\u017cnych do 7 mln EUR lub 1,4% obrotu.<\/p>\n<p>Poza karami pieni\u0119\u017cnymi organ w\u0142a\u015bciwy mo\u017ce stosowa\u0107 \u015brodki nadzorcze, w tym kontrol\u0119, decyzje naprawcze i okresowe egzekwowanie wykonania obowi\u0105zk\u00f3w. Sankcje nale\u017cy ka\u017cdorazowo odnosi\u0107 do aktualnego stanu prawnego i finalnego brzmienia przepis\u00f3w krajowych.<\/p>\n<p>Aby ograniczy\u0107 ryzyko sankcji, mo\u017cna mapowa\u0107 wymagania NIS2 na uznane standardy wdro\u017ceniowe. Warto jednak podkre\u015bli\u0107, \u017ce NIS2 nie ogranicza si\u0119 do wymaga\u0144 znanych z ISO 27001<\/p>\n<h2 data-heading=\"Jak po\u0142\u0105czy\u0107 wdro\u017cenie NIS2 z ISO 27001 i NIST?\">Jak po\u0142\u0105czy\u0107 wdro\u017cenie NIS2 z ISO 27001 i NIST?<\/h2>\n<p>Wdro\u017cenie NIS2 mo\u017cna przyspieszy\u0107 przez mapowanie obowi\u0105zk\u00f3w na ISO\/IEC 27001 i NIST CSF. Takie mapowanie porz\u0105dkuje zarz\u0105dzanie i u\u0142atwia <a href=\"\/pl\/insighty-biznesowe\/audyt-ksc-nis2\/\">audyt zgodno\u015bci z dyrektyw\u0105 NIS2<\/a>.<\/p>\n<table style=\"border-collapse: collapse; border-color: #B45F06; border-style: solid;\" border=\"1\">\n<thead>\n<tr>\n<th style=\"border-color: #b45f06;\">Wymaganie NIS2\/KSC<\/th>\n<th style=\"border-color: #b45f06;\">Kontrola operacyjna<\/th>\n<th style=\"border-color: #b45f06;\">ISO\/NIST<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"border-color: #b45f06;\">Zarz\u0105dzania ryzykiem<\/td>\n<td style=\"border-color: #b45f06;\">rejestr ryzyk, cykliczna ocena<\/td>\n<td style=\"border-color: #b45f06;\">ISO A.5\/A.8, NIST GV.RM<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #b45f06;\">Raportowania incydent\u00f3w<\/td>\n<td style=\"border-color: #b45f06;\">playbooki IR, workflow CSIRT<\/td>\n<td style=\"border-color: #b45f06;\">ISO A.5.24\u2013A.5.28, NIST RS\/RC<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #b45f06;\">Bezpiecze\u0144stwo \u0142a\u0144cucha dostaw<\/td>\n<td style=\"border-color: #b45f06;\">TPRM, due diligence, klauzule<\/td>\n<td style=\"border-color: #b45f06;\">ISO A.5.19\u2013A.5.22, NIST GV.SC<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #b45f06;\">Kontrola dost\u0119pu<\/td>\n<td style=\"border-color: #b45f06;\">MFA, PAM, recertyfikacja<\/td>\n<td style=\"border-color: #b45f06;\">ISO A.5.15\u2013A.5.18, NIST PR.AA<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #b45f06;\">Ci\u0105g\u0142o\u015b\u0107 dzia\u0142ania<\/td>\n<td style=\"border-color: #b45f06;\">backup immutable, testy DR<\/td>\n<td style=\"border-color: #b45f06;\">ISO A.5.29\u2013A.5.30, NIST RC.RP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Po mapowaniu standard\u00f3w organizacja powinna monitorowa\u0107 skuteczno\u015b\u0107 wdro\u017cenia za pomoc\u0105 wska\u017anik\u00f3w KPI i KRI.<\/p>\n<h2 data-heading=\"Jakie KPI mierzy\u0107, aby oceni\u0107 skuteczno\u015b\u0107 wdro\u017cenia NIS2?\">Jakie KPI mierzy\u0107, aby oceni\u0107 skuteczno\u015b\u0107 wdro\u017cenia NIS2?<\/h2>\n<p>Skuteczne wdro\u017cenie NIS2 wymaga mierzalno\u015bci technicznej i biznesowej. KPI pokazuj\u0105, czy \u015brodki bezpiecze\u0144stwa dzia\u0142aj\u0105, a KRI wskazuj\u0105 ryzyko narusze\u0144.<\/p>\n<p>Najcz\u0119\u015bciej stosowane metryki to:<\/p>\n<ul>\n<li>\n<p>MTTD i MTTR dla incydent\u00f3w krytycznych,<\/p>\n<\/li>\n<li>\n<p>procent system\u00f3w raportuj\u0105cych logi do SIEM,<\/p>\n<\/li>\n<li>\n<p>procent endpoint\u00f3w z aktywnym EDR,<\/p>\n<\/li>\n<li>\n<p>procent krytycznych podatno\u015bci zamkni\u0119tych w SLA,<\/p>\n<\/li>\n<li>\n<p>procent dostawc\u00f3w wysokiego ryzyka po pe\u0142nej ocenie,<\/p>\n<\/li>\n<li>\n<p>czas eskalacji do CSIRT,<\/p>\n<\/li>\n<li>\n<p>status realizacji dzia\u0142a\u0144 poaudytowych.<\/p>\n<\/li>\n<\/ul>\n<p>Te metryki zamykaj\u0105 p\u0119tl\u0119 zarz\u0105dzania: od ryzyka, przez kontrol\u0119, po dow\u00f3d zgodno\u015bci.<\/p>\n<h2 data-heading=\"Jak podsumowa\u0107 skuteczne wdro\u017cenie NIS2?\">Jak podsumowa\u0107 skuteczne wdro\u017cenie NIS2?<\/h2>\n<p><a href=\"\/pl\/ustawa-o-krajowym-systemie-cyberbezpieczenstwa\/\">Wdro\u017cenie NIS2 to program ci\u0105g\u0142y, kt\u00f3ry \u0142\u0105czy wymagania dyrektywy, KSC i operacyjny model bezpiecze\u0144stwa<\/a>. Skuteczne wdro\u017cenia opieraj\u0105 si\u0119 na podej\u015bciu risk-based oraz evidence-based.<\/p>\n<p>Podmiot, kt\u00f3ry potrafi wykaza\u0107 decyzje zarz\u0105dcze, dzia\u0142aj\u0105ce kontrole, poprawne zg\u0142aszania incydent\u00f3w, audytowalne artefakty i stabilne KPI, spe\u0142nia wymaganiami dyrektywy oraz realnie wzmacnia odporno\u015b\u0107 organizacji.<\/p>\n<h2 data-heading=\"\u0179r\u00f3d\u0142a i podstawa merytoryczna\">\u0179r\u00f3d\u0142a i podstawa merytoryczna<\/h2>\n<ul>\n<li>\n<p>Dyrektywa NIS2 (UE 2022\/2555).<\/p>\n<\/li>\n<li>\n<p>Rozporz\u0105dzenie wykonawcze Komisji (UE) 2024\/2690.<\/p>\n<\/li>\n<li>\n<p>Materia\u0142y ENISA dotycz\u0105ce wdro\u017cenia NIS2.<\/p>\n<\/li>\n<li>\n<p>Kontekst krajowy: ustawa o KSC i projekt nowelizacji ustawy.<\/p>\n<\/li>\n<\/ul>\n\n<style>.kb-row-layout-id24807_29fa9b-dc > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id24807_29fa9b-dc > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id24807_29fa9b-dc > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1350px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:46px;padding-right:0px;padding-bottom:49px;padding-left:0px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id24807_29fa9b-dc > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id24807_29fa9b-dc > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id24807_29fa9b-dc > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id24807_29fa9b-dc alignfull wp-block-kadence-rowlayout\" id=\"faq\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kt-inner-column-height-full kb-theme-content-width\">\n<style>.kadence-column24807_44e32f-86 > .kt-inside-inner-col,.kadence-column24807_44e32f-86 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column24807_44e32f-86 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column24807_44e32f-86 > .kt-inside-inner-col{flex-direction:column;}.kadence-column24807_44e32f-86 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column24807_44e32f-86 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column24807_44e32f-86{position:relative;}@media all and (max-width: 1024px){.kadence-column24807_44e32f-86 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column24807_44e32f-86 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column24807_44e32f-86\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading24807_7e69e4-1d, .wp-block-kadence-advancedheading.kt-adv-heading24807_7e69e4-1d[data-kb-block=\"kb-adv-heading24807_7e69e4-1d\"]{padding-bottom:0px;margin-bottom:12px;text-align:left;font-size:11px;font-weight:600;font-style:normal;font-family:Poppins;text-transform:uppercase;letter-spacing:1.5px;color:#3e7c93;}.wp-block-kadence-advancedheading.kt-adv-heading24807_7e69e4-1d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading24807_7e69e4-1d[data-kb-block=\"kb-adv-heading24807_7e69e4-1d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading24807_7e69e4-1d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading24807_7e69e4-1d[data-kb-block=\"kb-adv-heading24807_7e69e4-1d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading24807_7e69e4-1d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading24807_7e69e4-1d\">FAQ<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d, .wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d[data-kb-block=\"kb-adv-heading24807_ea80c2-8d\"]{padding-top:0px;margin-top:0px;margin-bottom:56px;text-align:left;font-size:40px;font-weight:500;font-style:normal;font-family:Poppins;letter-spacing:-0.5px;color:#1a1a2e;}.wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d[data-kb-block=\"kb-adv-heading24807_ea80c2-8d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d[data-kb-block=\"kb-adv-heading24807_ea80c2-8d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d, .wp-block-kadence-advancedheading.kt-adv-heading24807_ea80c2-8d[data-kb-block=\"kb-adv-heading24807_ea80c2-8d\"]{font-size:var(--global-kb-font-size-lg, 2rem);}}<\/style>\n<h2 class=\"kt-adv-heading24807_ea80c2-8d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading24807_ea80c2-8d\">Najwa\u017cniejsze pytania o <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-theme-palette-1-color\">wdro\u017cenie NIS2<\/mark> <\/h2>\n\n\n<style>.kt-accordion-id24807_395f97-68 .kt-accordion-inner-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:0px;}.kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner{border-top:0px solid var(--global-palette7, #EDF2F7);border-right:0px solid var(--global-palette7, #EDF2F7);border-bottom:0px solid var(--global-palette7, #EDF2F7);border-left:0px solid var(--global-palette7, #EDF2F7);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-sm, 1.5rem);}.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header{border-top:1px solid rgba(127,140,141,0.12);border-right:0px solid var(--global-palette7, #EDF2F7);border-bottom:1px solid rgba(127,140,141,0.12);border-left:0px solid var(--global-palette7, #EDF2F7);border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;background:rgba(242,242,242,0);font-size:16px;line-height:1.2;font-family:Poppins;font-weight:500;color:#1a1a2e;padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-sm, 1.5rem);}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap .kt-blocks-accordion-icon-trigger:before{background:#6b7280;}.kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner, .kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner h1, .kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner h2, .kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner h3, .kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner h4, .kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner h5, .kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner h6{color:#6b7280;}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-icon-trigger{background:#6b7280;}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-icon-trigger:before{background:rgba(242,242,242,0);}.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header:hover, \n\t\t\t\tbody:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68 .kt-blocks-accordion-header:focus-visible{color:var(--global-palette1, #3182CE);background:rgba(238,238,238,0);border-top-color:var(--global-palette7, #EDF2F7);border-top-style:solid;border-right-color:var(--global-palette7, #EDF2F7);border-right-style:solid;border-bottom:1px solid var(--global-palette7, #EDF2F7);border-left-color:var(--global-palette7, #EDF2F7);border-left-style:solid;}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:before, body:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-blocks-accordion--visible .kt-blocks-accordion-icon-trigger:after, body:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger:before{background:#3e7c93;}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger, body:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger{background:#3e7c93;}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:before, body:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger:after, body:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger:before{background:rgba(238,238,238,0);}.kt-accordion-id24807_395f97-68 .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible,\n\t\t\t\t.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active{color:var(--global-palette1, #3182CE);background:rgba(68,68,68,0);border-top-color:var(--global-palette7, #EDF2F7);border-top-style:solid;border-right-color:var(--global-palette7, #EDF2F7);border-right-style:solid;border-bottom:1px solid var(--global-palette7, #EDF2F7);border-left-color:var(--global-palette7, #EDF2F7);border-left-style:solid;}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:before{background:var(--global-palette1, #3182CE);}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger{background:var(--global-palette1, #3182CE);}.kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id24807_395f97-68:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:before{background:rgba(68,68,68,0);}@media all and (max-width: 1024px){.kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner{border-top:0px solid var(--global-palette7, #EDF2F7);border-right:0px solid var(--global-palette7, #EDF2F7);border-bottom:0px solid var(--global-palette7, #EDF2F7);border-left:0px solid var(--global-palette7, #EDF2F7);}}@media all and (max-width: 1024px){.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header{border-top:1px solid rgba(127,140,141,0.12);border-right:0px solid var(--global-palette7, #EDF2F7);border-bottom:1px solid rgba(127,140,141,0.12);border-left:0px solid var(--global-palette7, #EDF2F7);}}@media all and (max-width: 1024px){.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header:hover, \n\t\t\t\tbody:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68 .kt-blocks-accordion-header:focus-visible{border-top-color:var(--global-palette7, #EDF2F7);border-top-style:solid;border-right-color:var(--global-palette7, #EDF2F7);border-right-style:solid;border-bottom:1px solid var(--global-palette7, #EDF2F7);border-left-color:var(--global-palette7, #EDF2F7);border-left-style:solid;}}@media all and (max-width: 1024px){.kt-accordion-id24807_395f97-68 .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible,\n\t\t\t\t.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active{border-top-color:var(--global-palette7, #EDF2F7);border-top-style:solid;border-right-color:var(--global-palette7, #EDF2F7);border-right-style:solid;border-bottom:1px solid var(--global-palette7, #EDF2F7);border-left-color:var(--global-palette7, #EDF2F7);border-left-style:solid;}}@media all and (max-width: 767px){.kt-accordion-id24807_395f97-68 .kt-accordion-inner-wrap{display:block;}.kt-accordion-id24807_395f97-68 .kt-accordion-inner-wrap .kt-accordion-pane:not(:first-child){margin-top:0px;}.kt-accordion-id24807_395f97-68 .kt-accordion-panel-inner{border-top:0px solid var(--global-palette7, #EDF2F7);border-right:0px solid var(--global-palette7, #EDF2F7);border-bottom:0px solid var(--global-palette7, #EDF2F7);border-left:0px solid var(--global-palette7, #EDF2F7);}.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header{border-top:1px solid rgba(127,140,141,0.12);border-right:0px solid var(--global-palette7, #EDF2F7);border-bottom:1px solid rgba(127,140,141,0.12);border-left:0px solid var(--global-palette7, #EDF2F7);}.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header:hover, \n\t\t\t\tbody:not(.hide-focus-outline) .kt-accordion-id24807_395f97-68 .kt-blocks-accordion-header:focus-visible{border-top-color:var(--global-palette7, #EDF2F7);border-top-style:solid;border-right-color:var(--global-palette7, #EDF2F7);border-right-style:solid;border-bottom:1px solid var(--global-palette7, #EDF2F7);border-left-color:var(--global-palette7, #EDF2F7);border-left-style:solid;}.kt-accordion-id24807_395f97-68 .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible,\n\t\t\t\t.kt-accordion-id24807_395f97-68 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active{border-top-color:var(--global-palette7, #EDF2F7);border-top-style:solid;border-right-color:var(--global-palette7, #EDF2F7);border-right-style:solid;border-bottom:1px solid var(--global-palette7, #EDF2F7);border-left-color:var(--global-palette7, #EDF2F7);border-left-style:solid;}}<\/style>\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id24807_395f97-68 kt-accordion-has-16-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:none\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"false\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-1 kt-pane24807_3272f7-74\"><h2 class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\" type=\"button\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Czy wdro\u017cenie NIS2 dotyczy sp\u00f3\u0142ek zale\u017cnych grup kapita\u0142owych?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/h2><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p class=\"has-theme-palette-5-color has-text-color\">Tak, mo\u017ce dotyczy\u0107. O kwalifikacji decyduj\u0105 sektor, skala i rola podmiotu w \u015bwiadczeniu us\u0142ug, a nie wy\u0142\u0105cznie struktura w\u0142a\u015bcicielska.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-2 kt-pane24807_baf4cf-57\"><h2 class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\" type=\"button\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Jak spe\u0142ni\u0107 wymagania NIS2 w obszarze zarz\u0105dzania to\u017csamo\u015bci\u0105 i dost\u0119pem?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/h2><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p class=\"has-theme-palette-4-color has-text-color\">Wymagania NIS2 w obszarze zarz\u0105dzania to\u017csamo\u015bci\u0105 i dost\u0119pem mo\u017cna realizowa\u0107 przez uporz\u0105dkowanie proces\u00f3w IAM, wdro\u017cenie MFA, kontrol\u0119 kont uprzywilejowanych oraz sta\u0142y nadz\u00f3r nad uprawnieniami. W praktyce wiele organizacji przyspiesza ten obszar dzi\u0119ki us\u0142udze zarz\u0105dzania to\u017csamo\u015bci\u0105 z Inteca, kt\u00f3ra wspiera kompleksowo proces dostosowania system\u00f3w organizacji do NIS2.&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane24807_181cde-bb\"><h2 class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\" type=\"button\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Czy outsourcing SOC pomaga spe\u0142ni\u0107 wymagania NIS2?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/h2><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p class=\"has-theme-palette-4-color has-text-color\">Tak, ale odpowiedzialno\u015b\u0107 pozostaje po stronie organizacji. Outsourcing mo\u017ce wzmocni\u0107 model operacyjny, jednak podmiot nadal odpowiada za zgodno\u015b\u0107 z NIS2.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-4 kt-pane24807_aec425-9e\"><h2 class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\" type=\"button\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Kto odpowiada w organizacji za zgodno\u015b\u0107 z NIS2?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/h2><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p class=\"has-theme-palette-4-color has-text-color\">Odpowiedzialno\u015b\u0107 ponosi kierownictwo i kadra zarz\u0105dzaj\u0105ca. Zarz\u0105d musi zatwierdza\u0107 \u015brodki zarz\u0105dzania ryzykiem i nadzorowa\u0107 ich wdro\u017cenia.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-6 kt-pane24807_280f0c-09\"><h2 class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\" type=\"button\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Do kogo zg\u0142asza si\u0119 incydent?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/h2><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Incydent zg\u0142asza si\u0119 do w\u0142a\u015bciwego CSIRT (CSIRT NASK, CSIRT GOV lub CSIRT MON), a operacyjnie mo\u017ce to odbywa\u0107 si\u0119 przez system S46.<br><\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane24807_3ef25d-96\"><h2 class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\" type=\"button\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Czy audyt bezpiecze\u0144stwa jest obowi\u0105zkowy?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/h2><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Audyt bezpiecze\u0144stwa jest obowi\u0105zkowy dla cz\u0119\u015bci podmiot\u00f3w, a jego cykl zale\u017cy od kategorii podmiotu i wymog\u00f3w ustawy.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-16 kt-pane24807_07fe38-f5\"><h2 class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\" type=\"button\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Jak przygotowa\u0107 organizacj\u0119 do pierwszego audytu NIS2?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/h2><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Nale\u017cy przeprowadzi\u0107 analiz\u0119 luk, uzupe\u0142ni\u0107 dokumentacj\u0119, uruchomi\u0107 raportowania incydent\u00f3w i zbudowa\u0107 pakiet dowodowy obejmuj\u0105cy logi, rejestry i wyniki test\u00f3w.<\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kadence-column24807_6502d2-58 > .kt-inside-inner-col,.kadence-column24807_6502d2-58 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column24807_6502d2-58 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column24807_6502d2-58 > .kt-inside-inner-col{flex-direction:column;}.kadence-column24807_6502d2-58 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column24807_6502d2-58 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column24807_6502d2-58{position:relative;}.kadence-column24807_6502d2-58, .kt-inside-inner-col > .kadence-column24807_6502d2-58:not(.specificity){margin-bottom:20px;}@media all and (max-width: 1024px){.kadence-column24807_6502d2-58 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column24807_6502d2-58 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column24807_6502d2-58\"><div class=\"kt-inside-inner-col\"><style>.kadence-column24807_980e1f-2f{max-width:1300px;margin-left:auto;margin-right:auto;}.wp-block-kadence-column.kb-section-dir-horizontal:not(.kb-section-md-dir-vertical)>.kt-inside-inner-col>.kadence-column24807_980e1f-2f{-webkit-flex:0 1 1300px;flex:0 1 1300px;max-width:unset;margin-left:unset;margin-right:unset;}.kadence-column24807_980e1f-2f > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kadence-column24807_980e1f-2f > .kt-inside-inner-col,.kadence-column24807_980e1f-2f > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column24807_980e1f-2f > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column24807_980e1f-2f > .kt-inside-inner-col{flex-direction:column;}.kadence-column24807_980e1f-2f > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column24807_980e1f-2f > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column24807_980e1f-2f{position:relative;}@media all and (min-width: 1025px){.wp-block-kadence-column.kb-section-dir-horizontal>.kt-inside-inner-col>.kadence-column24807_980e1f-2f{-webkit-flex:0 1 1300px;flex:0 1 1300px;max-width:unset;margin-left:unset;margin-right:unset;}}@media all and (max-width: 1024px){.kadence-column24807_980e1f-2f > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.wp-block-kadence-column.kb-section-sm-dir-vertical:not(.kb-section-sm-dir-horizontal):not(.kb-section-sm-dir-specificity)>.kt-inside-inner-col>.kadence-column24807_980e1f-2f{max-width:1300px;-webkit-flex:1;flex:1;margin-left:auto;margin-right:auto;}.kadence-column24807_980e1f-2f > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column24807_980e1f-2f\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-id24807_e8ed78-77 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id24807_e8ed78-77 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id24807_e8ed78-77 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1350px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-md, 2rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id24807_e8ed78-77{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;overflow:clip;isolation:isolate;}.kb-row-layout-id24807_e8ed78-77 > .kt-row-layout-overlay{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;}.kb-row-layout-id24807_e8ed78-77{background-image:linear-gradient(135deg,var(--global-palette4) 0%,var(--global-palette1) 100%);}.kb-row-layout-id24807_e8ed78-77 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id24807_e8ed78-77 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id24807_e8ed78-77 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id24807_e8ed78-77 alignfull kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kt-inner-column-height-full kb-theme-content-width\">\n<style>.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{display:flex;}.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-md, 2rem);}.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col,.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column24807_c6d8b6-c6{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column24807_c6d8b6-c6{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column24807_c6d8b6-c6{position:relative;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column24807_c6d8b6-c6{align-self:center;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column24807_c6d8b6-c6{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 1024px){.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column24807_c6d8b6-c6{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column24807_c6d8b6-c6{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column24807_c6d8b6-c6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column24807_c6d8b6-c6\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading24807_8520fe-d5, .wp-block-kadence-advancedheading.kt-adv-heading24807_8520fe-d5[data-kb-block=\"kb-adv-heading24807_8520fe-d5\"]{text-align:left;font-size:var(--global-kb-font-size-lg, 2rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading24807_8520fe-d5 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading24807_8520fe-d5[data-kb-block=\"kb-adv-heading24807_8520fe-d5\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading24807_8520fe-d5 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading24807_8520fe-d5[data-kb-block=\"kb-adv-heading24807_8520fe-d5\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading24807_8520fe-d5 wp-block-kadence-advancedheading has-theme-palette-8-color has-text-color\" data-kb-block=\"kb-adv-heading24807_8520fe-d5\">Nowelizacja ustawy o KSC wdra\u017ca dyrektyw\u0119 NIS2 i <mark true=\"true\" class=\"kt-highlight\">dotyczy Twojej firmy<\/mark><\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns24807_df0777-d2{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns24807_df0777-d2 .kt-button{font-weight:normal;font-style:normal;}.kt-btns24807_df0777-d2 .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns24807_df0777-d2 .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns24807_df0777-d2 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns24807_df0777-d2 .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns24807_df0777-d2 .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns24807_df0777-d2 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns24807_df0777-d2 .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns24807_df0777-d2\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn24807_df4257-98.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn24807_df4257-98.kb-button{background:var(--global-palette2, #2B6CB0);}<\/style><a class=\"kb-button kt-button button kb-btn24807_df4257-98 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-kadence-singlebtn\" href=\"\/pl\/ustawa-o-krajowym-systemie-cyberbezpieczenstwa\/\"><span class=\"kt-btn-inner-text\">Sprawd\u017a jak Inteca zapewnia zgodno\u015b\u0107 z KSC<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<style>.kb-row-layout-id24807_5658dc-95 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id24807_5658dc-95 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id24807_5658dc-95 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1350px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-5xl, 10rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id24807_5658dc-95 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id24807_5658dc-95 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id24807_5658dc-95 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id24807_5658dc-95 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column24807_a4031f-4a > .kt-inside-inner-col,.kadence-column24807_a4031f-4a > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column24807_a4031f-4a > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column24807_a4031f-4a > .kt-inside-inner-col{flex-direction:column;}.kadence-column24807_a4031f-4a > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column24807_a4031f-4a > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column24807_a4031f-4a{position:relative;}@media all and (max-width: 1024px){.kadence-column24807_a4031f-4a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column24807_a4031f-4a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column24807_a4031f-4a\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading24807_7f5459-29, .wp-block-kadence-advancedheading.kt-adv-heading24807_7f5459-29[data-kb-block=\"kb-adv-heading24807_7f5459-29\"]{padding-bottom:var(--global-kb-spacing-sm, 1.5rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading24807_7f5459-29 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading24807_7f5459-29[data-kb-block=\"kb-adv-heading24807_7f5459-29\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading24807_7f5459-29 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading24807_7f5459-29[data-kb-block=\"kb-adv-heading24807_7f5459-29\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading24807_7f5459-29 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading24807_7f5459-29\">Dowiedz si\u0119 wi\u0119cej o nowelizacji ustawy KSC<\/h2>\n\n\n<style>.kt-post-loop24807_71e429-84 .kadence-post-image{padding-top:0px;padding-right:30px;padding-bottom:10px;padding-left:0px;}.kt-post-loop24807_71e429-84 .kt-feat-image-align-left{grid-template-columns:25% auto;}.kadence-post-image img{border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;}.kt-post-loop24807_71e429-84 .kt-post-grid-wrap{gap:30px 30px;}.kt-post-loop24807_71e429-84 .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;overflow:hidden;}.kt-post-loop24807_71e429-84 .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop24807_71e429-84 .kt-blocks-post-grid-item header{padding-top:0px;padding-right:0px;padding-bottom:10px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop24807_71e429-84 .kt-blocks-post-grid-item .kt-blocks-above-categories{font-size:13px;line-height:20px;text-transform:uppercase;}.kt-post-loop24807_71e429-84 .kt-blocks-post-grid-item .entry-title{padding-top:5px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:24px;line-height:30px;}.kt-post-loop24807_71e429-84 .entry-content{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:14px;line-height:24px;}.kt-post-loop24807_71e429-84 .kt-blocks-post-footer{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:12px;line-height:20px;text-transform:uppercase;}.kt-post-loop24807_71e429-84 .entry-content:after{height:0px;}.kt-post-loop24807_71e429-84 .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop24807_71e429-84 kt-post-grid-layout-grid \"><div class=\"kt-post-grid-layout-grid-wrap kt-post-grid-wrap\" data-columns-xxl=\"1\" data-columns-xl=\"1\" data-columns-md=\"1\" data-columns-sm=\"1\" data-columns-xs=\"1\" data-columns-ss=\"1\"data-item-selector=\".kt-post-masonry-item\" aria-label=\"Post Carousel\"><article class=\"kt-blocks-post-grid-item post-25348 business-insights type-business-insights status-publish format-standard has-post-thumbnail hentry category-zarzadzanie-dostepem-do-tozsamosci tag-nis2 tag-ustawa-ksc\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-left kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/kogo-dotyczy-ksc\/\" aria-label=\"Krajowy System Cyberbezpiecze\u0144stwa \u2013 kogo dotyczy KSC i co trzeba wdro\u017cy\u0107?\" class=\"kadence-post-image-inner-wrap\"><img decoding=\"async\" width=\"1000\" height=\"523\" src=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Kogo-dotyczy-KSC.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Kogo-dotyczy-KSC.png 1000w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Kogo-dotyczy-KSC-300x157.png 300w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Kogo-dotyczy-KSC-768x402.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/kogo-dotyczy-ksc\/\">Krajowy System Cyberbezpiecze\u0144stwa \u2013 kogo dotyczy KSC i co trzeba wdro\u017cy\u0107?<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><span class=\"kt-blocks-date-pretext\">Posted on <\/span><time datetime=\"2026-04-09T15:31:56+02:00\" class=\"kt-blocks-post-date\">2026-04-09<\/time><\/div><\/div><\/header><div class=\"entry-content\"><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-25338 business-insights type-business-insights status-publish format-standard has-post-thumbnail hentry category-zarzadzanie-dostepem-do-tozsamosci tag-nis2 tag-ustawa-ksc\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-left kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/analiza-ryzyka-w-cyberbezpieczenstwie\/\" aria-label=\"Analiza ryzyka w cyberbezpiecze\u0144stwie &#8211; metody i wymagania KSC \/ NIS2\" class=\"kadence-post-image-inner-wrap\"><img decoding=\"async\" width=\"1000\" height=\"523\" src=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Analiza-ryzyka-w-cyberbezpieczenstwie.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Analiza-ryzyka-w-cyberbezpieczenstwie.png 1000w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Analiza-ryzyka-w-cyberbezpieczenstwie-300x157.png 300w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/Analiza-ryzyka-w-cyberbezpieczenstwie-768x402.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/analiza-ryzyka-w-cyberbezpieczenstwie\/\">Analiza ryzyka w cyberbezpiecze\u0144stwie &#8211; metody i wymagania KSC \/ NIS2<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><span class=\"kt-blocks-date-pretext\">Posted on <\/span><time datetime=\"2026-04-08T16:19:48+02:00\" class=\"kt-blocks-post-date\">2026-04-08<\/time><\/div><\/div><\/header><div class=\"entry-content\"><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-25320 business-insights type-business-insights status-publish format-standard has-post-thumbnail hentry category-zarzadzanie-dostepem-do-tozsamosci tag-nis2 tag-transformacja-cyfrowa tag-ustawa-ksc\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-left kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/system-zarzadzania-bezpieczenstwem-informacji\/\" aria-label=\"System zarz\u0105dzania bezpiecze\u0144stwem informacji (SZBI) a KSC \u2013 wymagania i wdro\u017cenie\" class=\"kadence-post-image-inner-wrap\"><img decoding=\"async\" width=\"1000\" height=\"523\" src=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/System-Bezpieczenstwa-Informacji.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/System-Bezpieczenstwa-Informacji.png 1000w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/System-Bezpieczenstwa-Informacji-300x157.png 300w, https:\/\/inteca.com\/wp-content\/uploads\/2026\/04\/System-Bezpieczenstwa-Informacji-768x402.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/system-zarzadzania-bezpieczenstwem-informacji\/\">System zarz\u0105dzania bezpiecze\u0144stwem informacji (SZBI) a KSC \u2013 wymagania i wdro\u017cenie<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><span class=\"kt-blocks-date-pretext\">Posted on <\/span><time datetime=\"2026-04-08T15:06:35+02:00\" class=\"kt-blocks-post-date\">2026-04-08<\/time><\/div><\/div><\/header><div class=\"entry-content\"><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><\/div><!-- .wp-block-kadence-postgrid --><\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Czym jest wdro\u017cenie NIS2? Wdro\u017cenie NIS2 to proces dostosowania organizacji do wymaga\u0144 dyrektywy NIS2 i polskich przepis\u00f3w wdra\u017caj\u0105cych, czyli do nowelizacji ustawy o krajowym systemie cyberbezpiecze\u0144stwa. Oznacza to systemowe zarz\u0105dzanie ryzykiem, ci\u0105g\u0142e cyberbezpiecze\u0144stwo oraz formaln\u0105 zgodno\u015b\u0107 potwierdzan\u0105 dowodami. Wdro\u017cenie NIS2 nie jest jednorazowym projektem technicznym. To program obejmuj\u0105cy zarz\u0105dzanie, \u015brodki techniczne i organizacyjne, reagowanie na&#8230;<\/p>\n","protected":false},"author":21,"featured_media":24808,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"qubely_global_settings":"","qubely_interactions":"","_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[336],"tags":[399,398],"class_list":["post-24807","business-insights","type-business-insights","status-publish","format-standard","has-post-thumbnail","hentry","category-zarzadzanie-dostepem-do-tozsamosci","tag-nis2","tag-ustawa-ksc"],"acf":[],"aioseo_notices":[],"qubely_featured_image_url":{"full":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png",1000,523,false],"landscape":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png",1000,523,false],"portraits":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2-540x320.png",540,320,true],"thumbnail":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2-150x150.png",150,150,true],"medium":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2-300x157.png",300,157,true],"medium_large":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2-768x402.png",768,402,true],"large":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png",1000,523,false],"1536x1536":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png",1000,523,false],"2048x2048":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png",1000,523,false],"qubely_landscape":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png",1000,523,false],"qubely_portrait":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2-540x320.png",540,320,true],"qubely_thumbnail":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2-140x100.png",140,100,true]},"qubely_author":{"display_name":"Aleksandra Malesa","author_link":"https:\/\/inteca.com\/pl\/blog\/author\/aleksandramalesaa\/"},"qubely_comment":0,"qubely_category":" <a href=\"https:\/\/inteca.com\/pl\/blog\/category\/zarzadzanie-dostepem-do-tozsamosci\/\" rel=\"tag\">Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci<\/a>","qubely_excerpt":"Czym jest wdro\u017cenie NIS2? Wdro\u017cenie NIS2 to proces dostosowania organizacji do wymaga\u0144 dyrektywy NIS2 i polskich przepis\u00f3w wdra\u017caj\u0105cych, czyli do nowelizacji ustawy o krajowym systemie cyberbezpiecze\u0144stwa. Oznacza to systemowe zarz\u0105dzanie ryzykiem, ci\u0105g\u0142e cyberbezpiecze\u0144stwo oraz formaln\u0105 zgodno\u015b\u0107 potwierdzan\u0105 dowodami. Wdro\u017cenie NIS2 nie jest jednorazowym projektem technicznym. To program obejmuj\u0105cy zarz\u0105dzanie, \u015brodki techniczne i organizacyjne, reagowanie na...","taxonomy_info":{"category":[{"value":336,"label":"Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci"}],"post_tag":[{"value":399,"label":"NIS2"},{"value":398,"label":"Ustawa KSC"}]},"featured_image_src_large":["https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png",1000,523,false],"author_info":{"display_name":"Aleksandra Malesa","author_link":"https:\/\/inteca.com\/pl\/blog\/author\/aleksandramalesaa\/"},"comment_info":0,"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Aleksandra Malesa\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"pl_PL\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Inteca \u00bb IT&#039;s about business\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa\" \/>\n\t\t<meta property=\"og:description\" content=\"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t\t<meta property=\"og:image:height\" content=\"523\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2026-03-20T10:45:33+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-03-20T13:38:31+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#blogposting\",\"name\":\"NIS2 w 2026: Wdro\\u017cenia, Wymagania Techniczne i Nowe Obowi\\u0105zki Cyberbezpiecze\\u0144stwa\",\"headline\":\"Wdro\\u017cenie NIS2 w Polsce: jak osi\\u0105gn\\u0105\\u0107 zgodno\\u015b\\u0107 z KSC i przygotowa\\u0107 organizacj\\u0119 na audyt\",\"author\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/author\\\/aleksandramalesaa\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/inteca.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Wdrozenie-NIS2.png\",\"width\":1000,\"height\":523},\"datePublished\":\"2026-03-20T12:45:33+02:00\",\"dateModified\":\"2026-03-20T15:38:31+02:00\",\"inLanguage\":\"pl-PL\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#webpage\"},\"articleSection\":\"Zarz\\u0105dzanie dost\\u0119pem do to\\u017csamo\\u015bci, NIS2, Ustawa KSC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/inteca.com\\\/pl\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/#listItem\",\"name\":\"Business insights\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/#listItem\",\"position\":2,\"name\":\"Business insights\",\"item\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/category\\\/zarzadzanie-dostepem-do-tozsamosci\\\/#listItem\",\"name\":\"Zarz\\u0105dzanie dost\\u0119pem do to\\u017csamo\\u015bci\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/category\\\/zarzadzanie-dostepem-do-tozsamosci\\\/#listItem\",\"position\":3,\"name\":\"Zarz\\u0105dzanie dost\\u0119pem do to\\u017csamo\\u015bci\",\"item\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/category\\\/zarzadzanie-dostepem-do-tozsamosci\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#listItem\",\"name\":\"Wdro\\u017cenie NIS2 w Polsce: jak osi\\u0105gn\\u0105\\u0107 zgodno\\u015b\\u0107 z KSC i przygotowa\\u0107 organizacj\\u0119 na audyt\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/#listItem\",\"name\":\"Business insights\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#listItem\",\"position\":4,\"name\":\"Wdro\\u017cenie NIS2 w Polsce: jak osi\\u0105gn\\u0105\\u0107 zgodno\\u015b\\u0107 z KSC i przygotowa\\u0107 organizacj\\u0119 na audyt\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/category\\\/zarzadzanie-dostepem-do-tozsamosci\\\/#listItem\",\"name\":\"Zarz\\u0105dzanie dost\\u0119pem do to\\u017csamo\\u015bci\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/#organization\",\"name\":\"Inteca Sp. z o.o.\",\"description\":\"Inteca is a specialized enterprise platform provider and Red Hat Advanced Partner. We design, implement, and operate mission-critical platforms based on Keycloak, Kafka, OpenShift, and Nuxeo enhanced with AI automation. We work in banking, insurance, and government sectors across the EU and the US.\",\"url\":\"https:\\\/\\\/inteca.com\\\/pl\\\/\",\"email\":\"contact@inteca.com\",\"telephone\":\"+48717156091\",\"foundingDate\":\"2011-04-01\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"value\":50},\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/inteca.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Inteca_logo_pion_tagline_JasneTlo.png\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#organizationLogo\",\"width\":288,\"height\":344},\"image\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/pl.linkedin.com\\\/company\\\/inteca\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/author\\\/aleksandramalesaa\\\/#author\",\"url\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/author\\\/aleksandramalesaa\\\/\",\"name\":\"Aleksandra Malesa\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/inteca.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Aleksandra.jpg\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/aleksandramalesa\\\/\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#webpage\",\"url\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/\",\"name\":\"NIS2 w 2026: Wdro\\u017cenia, Wymagania Techniczne i Nowe Obowi\\u0105zki Cyberbezpiecze\\u0144stwa\",\"description\":\"Wdro\\u017cenia dyrektywy NIS2. Poznaj nowe obowi\\u0105zki cyberbezpiecze\\u0144stwa, wymagania techniczne i ustaw\\u0119 dla organizacji w Polsce.\",\"inLanguage\":\"pl-PL\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/author\\\/aleksandramalesaa\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/blog\\\/author\\\/aleksandramalesaa\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/inteca.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Wdrozenie-NIS2.png\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#mainImage\",\"width\":1000,\"height\":523},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/insighty-biznesowe\\\/wdrozenie-nis2-wymagania-techniczne\\\/#mainImage\"},\"datePublished\":\"2026-03-20T12:45:33+02:00\",\"dateModified\":\"2026-03-20T15:38:31+02:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/#website\",\"url\":\"https:\\\/\\\/inteca.com\\\/pl\\\/\",\"name\":\"Inteca\",\"alternateName\":\"Inteca\",\"description\":\"IT's about business\",\"inLanguage\":\"pl-PL\",\"publisher\":{\"@id\":\"https:\\\/\\\/inteca.com\\\/pl\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa<\/title>\n\n","aioseo_head_json":{"title":"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa","description":"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.","canonical_url":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#blogposting","name":"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa","headline":"Wdro\u017cenie NIS2 w Polsce: jak osi\u0105gn\u0105\u0107 zgodno\u015b\u0107 z KSC i przygotowa\u0107 organizacj\u0119 na audyt","author":{"@id":"https:\/\/inteca.com\/pl\/blog\/author\/aleksandramalesaa\/#author"},"publisher":{"@id":"https:\/\/inteca.com\/pl\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png","width":1000,"height":523},"datePublished":"2026-03-20T12:45:33+02:00","dateModified":"2026-03-20T15:38:31+02:00","inLanguage":"pl-PL","mainEntityOfPage":{"@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#webpage"},"isPartOf":{"@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#webpage"},"articleSection":"Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci, NIS2, Ustawa KSC"},{"@type":"BreadcrumbList","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/#listItem","position":1,"name":"Home","item":"https:\/\/inteca.com\/pl\/","nextItem":{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/#listItem","name":"Business insights"}},{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/#listItem","position":2,"name":"Business insights","item":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/","nextItem":{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/blog\/category\/zarzadzanie-dostepem-do-tozsamosci\/#listItem","name":"Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci"},"previousItem":{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/blog\/category\/zarzadzanie-dostepem-do-tozsamosci\/#listItem","position":3,"name":"Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci","item":"https:\/\/inteca.com\/pl\/blog\/category\/zarzadzanie-dostepem-do-tozsamosci\/","nextItem":{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#listItem","name":"Wdro\u017cenie NIS2 w Polsce: jak osi\u0105gn\u0105\u0107 zgodno\u015b\u0107 z KSC i przygotowa\u0107 organizacj\u0119 na audyt"},"previousItem":{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/#listItem","name":"Business insights"}},{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#listItem","position":4,"name":"Wdro\u017cenie NIS2 w Polsce: jak osi\u0105gn\u0105\u0107 zgodno\u015b\u0107 z KSC i przygotowa\u0107 organizacj\u0119 na audyt","previousItem":{"@type":"ListItem","@id":"https:\/\/inteca.com\/pl\/blog\/category\/zarzadzanie-dostepem-do-tozsamosci\/#listItem","name":"Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci"}}]},{"@type":"Organization","@id":"https:\/\/inteca.com\/pl\/#organization","name":"Inteca Sp. z o.o.","description":"Inteca is a specialized enterprise platform provider and Red Hat Advanced Partner. We design, implement, and operate mission-critical platforms based on Keycloak, Kafka, OpenShift, and Nuxeo enhanced with AI automation. We work in banking, insurance, and government sectors across the EU and the US.","url":"https:\/\/inteca.com\/pl\/","email":"contact@inteca.com","telephone":"+48717156091","foundingDate":"2011-04-01","numberOfEmployees":{"@type":"QuantitativeValue","value":50},"logo":{"@type":"ImageObject","url":"https:\/\/inteca.com\/wp-content\/uploads\/2022\/01\/Inteca_logo_pion_tagline_JasneTlo.png","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#organizationLogo","width":288,"height":344},"image":{"@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#organizationLogo"},"sameAs":["https:\/\/pl.linkedin.com\/company\/inteca"]},{"@type":"Person","@id":"https:\/\/inteca.com\/pl\/blog\/author\/aleksandramalesaa\/#author","url":"https:\/\/inteca.com\/pl\/blog\/author\/aleksandramalesaa\/","name":"Aleksandra Malesa","image":{"@type":"ImageObject","url":"https:\/\/inteca.com\/wp-content\/uploads\/2026\/02\/Aleksandra.jpg"},"sameAs":["https:\/\/www.linkedin.com\/in\/aleksandramalesa\/"]},{"@type":"WebPage","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#webpage","url":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/","name":"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa","description":"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.","inLanguage":"pl-PL","isPartOf":{"@id":"https:\/\/inteca.com\/pl\/#website"},"breadcrumb":{"@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#breadcrumblist"},"author":{"@id":"https:\/\/inteca.com\/pl\/blog\/author\/aleksandramalesaa\/#author"},"creator":{"@id":"https:\/\/inteca.com\/pl\/blog\/author\/aleksandramalesaa\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png","@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#mainImage","width":1000,"height":523},"primaryImageOfPage":{"@id":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/#mainImage"},"datePublished":"2026-03-20T12:45:33+02:00","dateModified":"2026-03-20T15:38:31+02:00"},{"@type":"WebSite","@id":"https:\/\/inteca.com\/pl\/#website","url":"https:\/\/inteca.com\/pl\/","name":"Inteca","alternateName":"Inteca","description":"IT's about business","inLanguage":"pl-PL","publisher":{"@id":"https:\/\/inteca.com\/pl\/#organization"}}]},"og:locale":"pl_PL","og:site_name":"Inteca \u00bb IT's about business","og:type":"article","og:title":"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa","og:description":"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.","og:url":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/","og:image":"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png","og:image:secure_url":"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png","og:image:width":1000,"og:image:height":523,"article:published_time":"2026-03-20T10:45:33+00:00","article:modified_time":"2026-03-20T13:38:31+00:00","twitter:card":"summary_large_image","twitter:title":"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa","twitter:description":"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.","twitter:image":"https:\/\/inteca.com\/wp-content\/uploads\/2026\/03\/Wdrozenie-NIS2.png"},"aioseo_meta_data":{"post_id":"24807","title":"NIS2 w 2026: Wdro\u017cenia, Wymagania Techniczne i Nowe Obowi\u0105zki Cyberbezpiecze\u0144stwa","description":"Wdro\u017cenia dyrektywy NIS2. Poznaj nowe obowi\u0105zki cyberbezpiecze\u0144stwa, wymagania techniczne i ustaw\u0119 dla organizacji w Polsce.","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":null,"breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":"0","open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2026-03-19 14:44:42","updated":"2026-03-20 13:39:59"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/inteca.com\/pl\/\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/inteca.com\/pl\/insighty-biznesowe\/\" title=\"Business insights\">Business insights<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/inteca.com\/pl\/blog\/category\/zarzadzanie-dostepem-do-tozsamosci\/\" title=\"Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci\">Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tWdro\u017cenie NIS2 w Polsce: jak osi\u0105gn\u0105\u0107 zgodno\u015b\u0107 z KSC i przygotowa\u0107 organizacj\u0119 na audyt\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/inteca.com\/pl\/"},{"label":"Business insights","link":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/"},{"label":"Zarz\u0105dzanie dost\u0119pem do to\u017csamo\u015bci","link":"https:\/\/inteca.com\/pl\/blog\/category\/zarzadzanie-dostepem-do-tozsamosci\/"},{"label":"Wdro\u017cenie NIS2 w Polsce: jak osi\u0105gn\u0105\u0107 zgodno\u015b\u0107 z KSC i przygotowa\u0107 organizacj\u0119 na audyt","link":"https:\/\/inteca.com\/pl\/insighty-biznesowe\/wdrozenie-nis2-wymagania-techniczne\/"}],"_links":{"self":[{"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/business-insights\/24807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/business-insights"}],"about":[{"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/types\/business-insights"}],"author":[{"embeddable":true,"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/comments?post=24807"}],"version-history":[{"count":0,"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/business-insights\/24807\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/media\/24808"}],"wp:attachment":[{"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/media?parent=24807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/categories?post=24807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inteca.com\/pl\/wp-json\/wp\/v2\/tags?post=24807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}