site-logo
site-logo
site-logo

The German NIS 2 Implementation Act: A New Era for Cybersecurity Compliance

The German NIS 2 Implementation Act: A New Era for Cybersecurity Compliance

The German NIS 2 Implementation Act: A New Era for Cybersecurity Compliance

The German NIS 2 Implementation Act: A New Era for Cybersecurity Compliance

German NIS 2 Implementation Act
German NIS 2 Implementation Act
German NIS 2 Implementation Act
Shieldworkz-logo

Prayukth KV

27 نوفمبر 2025

The German NIS 2 Implementation Act: A New Era for Cybersecurity Compliance

Germany's recent transposition of the EU's Network and Information Systems 2 (NIS 2) Directive also known as the NIS2 Implementation Act (NIS2-Umsetzungs- und Cybersicherheitsstärkungsgesetz or,NIS2UmsuCG), marks a tectonic shift in the nation's cybersecurity landscape. Moving wll beyond the original focus on Critical Infrastructure (KRITIS), this new legislation significantly expands the scope of obligated entities, elevates governance to the boardroom, and introduces significant levels of cross institution accountability.

With NIS2UmsuCG, for an estimated 29,000 organisations in Germany, compliance has now turned into an immediate and strategic imperative.

In today’s post, we explore the implications of NIS2UmsuCG for the qualifying organisations. Before you move forward, don’t forget to check out our previous post on Incident response lessons from 2025, here.

Who is impacted by the Act? 

The Act introduces two primary categories of obligated entities, that are fundamentally determined by the size (medium-sized and large enterprises) and sector affiliation. This is a shift from strict critical service thresholds. Here is some more information on this bit:

Category (German Term)

EU Term

Criteria & Impact

Besonders wichtige Einrichtungen (wesE)

Essential Entities

Large companies that operate in highly critical sectors (such as Energy, Transport, Health, Banking, Digital Infrastructure). Subject to proactive and stricter supervision and higher fines.

Wichtige Einrichtungen (wE)

Important Entities

Medium-sized companies that are operating in the highly critical sectors, or medium/large companies in other critical sectors (including Postal/Courier services, Waste Management, Food Production, Manufacturing). Subject to ex-post (reactive) supervision and lower, though still substantial, fines.


The affected sectors include (but are not limited to), Energy, Transport, Banking, Financial Market Infrastructures, Health, Drinking Water/Wastewater, Digital Infrastructure, Public Administration, Space, Digital Services (e.g., Cloud, Managed Services), Manufacturing, Chemical, and Food production.

So what are the core obligations for businesses?

The NIS 2 Implementation Act mandates comprehensive and risk-based cybersecurity measures, that must compulsorily align with the advanced security measures and be documented and regularly reviewed. Here’s some more details:

Risk management measures (AKA the "all-hazards" approach)

Obligated entities must implement a minimum set of technical and organisational measures (TOMs) covering:

  • Risk analysis: Conducting regular, comprehensive cyber risk assessments.

  • Incident management: Procedures for incident detection, management, and response (including crisis management and recovery).

  • Business continuity planning and execution: Maintaining up-to-date backups, recovery plans, and ensuring continuous operation.

  • Supply chain security: Integrating cybersecurity requirements into contracts and managing risks with direct suppliers and service providers.

  • Secure development and maintenance: Policies for software development, maintenance, and vulnerability management.

  • Access control: Implementing strong access controls, asset management, and, crucially, Multi-Factor Authentication (MFA).

  • Cryptography and encryption: Use of encryption for sensitive data both at rest and in transit.

  • Cybersecurity training: Mandatory training for all employees.

Strict Incident Reporting

A new, multi-tiered reporting regime is enforced for significant security incidents (those causing serious operational disruption or financial loss):

  • Initial alert: Within 24 hours of becoming aware of a significant incident.

  • Detailed incident report: Within 72 hours, including an initial assessment of the incident's severity, cause, and impact.

  • Final report: Within one month, detailing the root cause, remedial actions, and any cross-border impact.

Registration and Contact Point

Entities must register with the Federal Office for Information Security (BSI) and establish a 24/7 reachable contact point to receive and act on BSI alerts and official communications.

Obligations for management and employees

The Act fundamentally shifts cybersecurity from an IT issue to a strategic management responsibility.

For Management (Executive Board / Managing Directors)

  • Personal accountability: Senior management is directly and personally obliged to approve, implement, and monitor the required cybersecurity risk management measures.

  • Training mandate: Management bodies must regularly participate in cybersecurity training to gain sufficient knowledge to assess and oversee compliance.

  • Liability: Violations of these duties can lead to substantial fines, with maximum penalties of up to €10 million or 2 percent of the total global annual turnover for Essential Entities, and up to €7 million or 1.4 percent for Important Entities. This significantly increases the personal liability risk for company executives.

For employees and others

  • Mandatory training: All employees must receive regular, sector-specific cybersecurity and "cyber hygiene" training to minimise the risk of human error, which is a key factor in many cyber incidents.

  • Adherence to policies: Employees must adhere to the secure policies and procedures established by management, covering areas like access control, communication security, and secure software use.

  • Supplier obligations: Suppliers and service providers to obligated German entities are indirectly affected. They must support their customers' compliance by adhering to stricter contractual security requirements, providing necessary documentation, and potentially allowing audit rights.

The compliance roadmap: Looking ahead to 2026

The Act will come into effect immediately on  publication in the Federal Law Gazette. There are no transition periods planned and thus the Act becomes an immediate action point for all enterprises that fall within its purview.

A roadmap for compliance is given below:

Phase

Key Steps

Deliverables

Phase 1: Assessment (Immediate)

1. Scope Determination: Accurately determine if your entity is Essential or Important based on size and sector. 2. Gap Analysis: Perform a detailed assessment comparing current security measures (technical and organisational) against the NIS 2 Implementation Act's mandatory catalogue ($\S$ 30 BSIG-E).

Classification Report, NIS 2 Gap Analysis, Preliminary Risk Assessment.

Phase 2: Governance & Strategy

3. Secure Board Buy-in: Educate management, establish a clear oversight structure, and allocate necessary resources. 4. Formalise ISMS: Establish or adapt an Information Security Management System (ISMS), e.g., based on ISO/IEC 27001 or BSI IT-Grundschutz, to meet the new legal requirements.

Board Approval & Training Plan, NIS 2 Governance Structure, Updated ISMS Scope.

Phase 3: Implementation & Operationalisation

5. Implement Measures: Address the gaps, focusing on MFA, robust encryption, supply chain risk assessment, and business continuity/disaster recovery. 6. Operationalise Reporting: Establish the 24/7 BSI contact point and implement the three-stage incident reporting process (24/72 hours/1 month). 7. Employee & Management Training: Roll out mandatory training programs.

Updated TOMs Documentation, Incident Response Plan, Proof of Registration, Employee Training Records.

Phase 4: Validation & Continuous Improvement

8. Documentation & Audits: Ensure all measures are documented, and conduct internal/external security audits and penetration tests to verify effectiveness. 9. Continuous Monitoring: Establish processes for ongoing risk management, threat monitoring, and regular review of policies to maintain compliance with the "state of the art."

Audit Reports, Effectiveness Metrics, Continuous Monitoring Framework.

 

Here is a detailed check list on NIS2UmsuCG compliance for German enterprises

Category

Requirement Area

Measure / Action Point

Key Deliverable

Risk Management and Policy

Risk Analysis

Conduct and regularly update a comprehensive, documented risk assessment methodology to identify, analyse, and treat risks.

Risk Assessment Methodology, Risk Register, Risk Treatment Plan

Risk Management and Policy

Security Policy

Establish formal policies on the security of network and information systems, including a commitment from management.

Information Security Policy (approved by management)

Risk Management & Policy

Effectiveness

Define policies and procedures for assessing the effectiveness of all cybersecurity risk-management measures.

Internal Audit Procedure, Effectiveness Measurement Report

 

Incident Handling

Handling

Establish clear, documented policies and procedures for incident detection, management, and response.

Incident Response Plan (IRP), Incident Management Procedures

Incident Handling

Logging & Monitoring

Implement continuous monitoring and logging of critical systems for timely detection and forensic analysis.

Logging Policy, SIEM/Detection System Deployment

Incident Handling

Reporting

Ensure the three-stage reporting process to the BSI is operational and regularly tested (24/72 hours/1 month).

Incident Reporting Procedure (aligned with BSI timelines)

 

Business Continuity

Backups

Implement and regularly test a robust backup management system, ensuring data and systems are restorable (ideally immutable backups).

Backup Policy, Test Results of Data Recovery

Business Continuity

Disaster Recovery

Develop and maintain a Disaster Recovery Plan (DRP) and a Business Continuity Plan (BCP).

Disaster Recovery Plan, Business Continuity Plan

Business Continuity

Crisis Management

Establish a formal Crisis Management capability and procedures to handle large-scale security incidents.

Crisis Communication Plan, List of Emergency Contacts

 

Supply Chain Security

Risk Assessment

Implement a policy for identifying, assessing, and addressing cybersecurity risks from the ICT supply chain and direct suppliers.

Supply Chain Risk Management Policy

Supply Chain Security

Contractual Requirements

Integrate robust contractual security clauses that mandate compliance, reporting, and audit rights for critical suppliers.

Supplier Security Agreement Template

Supply Chain Security

Vulnerability Focus

Consider the specific vulnerabilities of each direct supplier/service provider and the quality of their cybersecurity practices.

Supplier Risk Inventory and Rating

 

System Security

Vulnerability Handling

Establish processes for timely vulnerability handling and disclosure, including patch management.

Vulnerability Management Policy, Patch Management Procedure

System Security

Secure Development

Implement a Secure Development Life Cycle (SDLC) to ensure security is built-in by design.

Secure Coding Guidelines, Configuration Management Policy

System Security

System Hardening

Ensure all systems (IT, OT/ICS) are securely configured and hardened according to best practices.

System Hardening Guidelines

Access Control

Access Control

Implement strict access control policies based on the principle of least privilege and need-to-know.

Access Control Policy, Role-Based Access Management

Access Control

Authentication

Mandate the use of Multi-Factor Authentication (MFA) for remote access and critical systems.

Authentication Policy, MFA Implementation Records

Access Control

Cryptography

Establish policies and procedures for the use of cryptography and encryption to protect sensitive data.

Cryptography and Encryption Policy

 

Personnel Security

Personnel Security

Implement concepts for human resources security, covering processes like background checks and termination procedures.

HR Security Procedures

Personnel Security

Secure Comms

Ensure the use of secured voice, video, and text communications, and secure emergency communication systems.

Secure Communication Policy

Training and Hygiene

Cyber Hygiene

Implement and enforce basic cyber hygiene practices (e.g., strong passwords, timely patching).

Cyber Hygiene Guidelines

Training and Hygiene

Employee Training

Implement mandatory, regular cybersecurity training for all employees, contractors, and the management body.

Annual Training Plan, Management Training Documentation

 

To learn more about NIS2 compliance, talk to our NIS2 expert, here.

Download a detailed NIS2 checklist (with evidence required) that you can use to initiate and track your NIS2 efforts, here.

 

احصل على تحديثات أسبوعية

الموارد والأخبار

You may also like

BG image

ابدأ الآن

عزز موقفك الأمني لنظام CPS

تواصل مع خبرائنا في أمن CPS للحصول على استشارة مجانية.

BG image

ابدأ الآن

عزز موقفك الأمني لنظام CPS

تواصل مع خبرائنا في أمن CPS للحصول على استشارة مجانية.

BG image

ابدأ الآن

عزز موقفك الأمني لنظام CPS

تواصل مع خبرائنا في أمن CPS للحصول على استشارة مجانية.