The Cybersecurity Act makes NIS2 Swedish law and sets a clear minimum level of cybersecurity within the public sector. In this guide, we go through what the minimum level actually means. From management responsibility and basic technical protection to supplier requirements and OT security, and how municipalities and regions reach this step by step.

Security work does not start with purchasing technology. It begins with management decisions. According to NIS2, the management team is personally responsible for compliance. You should be able to answer the question: what are our biggest cyber risks and what are we doing about them?
Unfortunately, there is no such thing as 100% secure cyber protection. You will experience incidents. The difference lies in how well you handle them. The Cybersecurity Act provides you with a minimum standard to start from:
Incident Management: A living plan that is tested regularly, not a forgotten document.
Reporting. A clear routine for reporting to authorities according to the requirements of NIS2.
Roles. Define who does what when an incident occurs.
Structured processes are important, but of course there are technical measures that are non-negotiable in comprehensive basic protection:
MFA is the single most important measure and ensures that the person logging in is the right person.
But technical protections are still meaningless without conscious users. Attacks often start with an employee clicking on the wrong link. Supplement with continuous training and simulated attacks. And perhaps most importantly, strive for a culture where it is okay to ask questions. Employees who dare to question are your best protection.
But technical protection is still meaningless without conscious users
The next step is to review the supply chain. Many attacks occur via the supply chain. Set clear security requirements in procurements and actively follow up to ensure that critical suppliers meet them.
The public sector also has a unique risk where IT is connected with operational technology (OT) that controls water, ventilation, and energy. These are essential systems where intrusions have physical consequences. Ensure:
Network Segmentation. A digital firewall between IT and OT so that intrusions do not spread further.
Well-planned maintenance windows. Update systems without disrupting vital operations.
Redundancy. So critical functions continue even if a system is taken down.
Cybersecurity is a cyclical process. In addition to ongoing monitoring, you need to practice scenarios that challenge the entire operation: a major cyberattack that disables several systems, loss of internet connection, or elevated national preparedness. Preferably practise together with other public actors and test if your plans hold before you really need them.

Guide for the public sector: What is the minimum level according to the Cybersecurity Act and how do you get there?
