NIS-2 Directive: Implementing requirements in a legally compliant manner
Protect your company against cyber threats and comply with the legal requirements of the NIS-2 Directive in Germany on a permanent basis.
Definition: What is the NIS 2 Directive?
The NIS-2 Directive is an EU-wide regulation aimed at raising cybersecurity standards for critical sectors and companies. It requires organizations to implement strict risk management and rapid reporting obligations in order to protect European infrastructure against cyberattacks.
An overview of the most important NIS 2 requirements for companies
-
Who is affected? Companies with 50 or more employees or €10 million in turnover in 18 sectors.
-
What needs to be done? Implement cybersecurity risk management, secure supply chains, and use certified IT products.
-
Reporting deadlines: Security incidents must be reported within 24 hours.
-
Penalties: Violations can result in fines amounting to millions of dollars and damage to reputation.
-
Status in Germany: The directive is regulated nationally by the NIS-2 Implementation Act (NIS-2UmsuCG).
By when must the NIS 2 Directive be implemented in Germany?
Companies in Germany are currently in a phase of regulatory transition. Although the official EU deadline ended on October 17, 2024, the national adoption of the NIS 2 Implementation Act (NIS-2UmsuCG) remains open due to political delays following the end of the traffic light coalition.
Status of NIS 2 implementation (as of 2026):
-
EU legal situation: The directive has been in force since January 16, 2023.
-
Delay in Germany: The draft bill of July 24, 2024 has not yet been finally passed by the Bundestag.
-
Consequence: The EU Commission has initiated infringement proceedings against Germany.
-
Recommended action: Despite pending national adoption, the current draft law already provides a binding framework for cybersecurity risk management.
NIS-2 compliance with MaibornWolff: Your advantages
Holistic risk management
We strategically identify your risks and minimize them in a sustainable manner. This ensures your long-term security, compliance with all NIS 2 requirements, and effective protection of your critical business processes against threats.
Practical compliance solution
Our experts support you in implementing the requirements directly in practice. We ensure that you not only comply with the directive on paper, but also achieve genuine cyber resilience.
Stable business continuity
We ensure your business continuity during the NIS 2 transition. Through targeted measures, we minimize downtime risks and permanently strengthen the resilience of your network and information systems.
Active awareness training
We raise awareness among your employees through targeted training. This enables you to build a strong security culture that reduces the risk of human error and firmly anchors the requirements of the NIS 2 Directive.
With MaibornWolff, you can rely on a partner who does not view compliance as a chore, but as an opportunity for genuine cybersecurity.
Crucial to the success of the project: the team did not try to bring security into the development teams from outside in a 'police role'. Instead, it empowered our teams themselves to systematically assess security.
Who must comply with the NIS 2 requirements?
Three key criteria determine whether your company falls under the NIS 2 Directive: your location, your size, and your sector. It does not matter whether your headquarters are located in the EU—the decisive factor is whether you provide your services in an EU member state.
The EU divides affected organizations into two categories: "essential" and "important" institutions. The technical requirements for IT security are the same for both, but there are massive differences in terms of regulatory control and fines.
1. Essential facilities: Strict controls for key sectors
They are considered essential if you operate in a highly critical sector and have more than 250 employees or €50 million in annual revenue.
-
The sectors: Energy (electricity, gas, hydrogen), transportation (air, rail, shipping, road), banking & financial markets, healthcare, drinking water & wastewater, digital infrastructure, public administration, ICT management (B2B), and space.
-
The consequence: They are subject to proactive supervision (regular audits).
-
The risk: Violations of the NIS 2 requirements are punishable by fines of up to €10 million or 2% of global annual turnover.
2. Important institutions: Reactive supervision in cases of suspicion
Companies from other critical sectors with 50 or more employees or €10 million in revenue are considered important.
-
The sectors: Postal and courier services, waste management, chemicals (manufacturing/trade), food (production/distribution), manufacturing (manufacturing of goods), digital service providers, and research.
-
The consequence: Reactive supervision usually only takes place in the event of specific incidents or suspicions.
-
The risk: Fines of up to €7 million or 1.4% of annual turnover may be imposed.
Authorities can upgrade you regardless of size if your activity is strategically important. Remember: as a manager, you are personally liable for NIS 2 violations with up to 2% of global annual revenue.
You must meet these NIS 2 requirements
To comply with the NIS 2 Directive, you need to make several adjustments at the same time. Here is your operational checklist for implementation:
-
Responsibility of managers: Management must actively monitor safety measures and participate in training courses. Important: You are personally liable for any violations.
-
Risk management & IT standards: Emergency plans, encryption, and backups are mandatory. In addition, you must comprehensively record risks and use certified IT products where necessary.
-
Secure supply chains: The security requirements also apply to your service providers and suppliers. Coordinated assessments help to identify weaknesses in the chain at an early stage.
-
Strict reporting deadlines: When incidents occur, the clock is ticking: early warning after 24 hours, analysis after 72 hours, and a final report after no more than one month.
-
Human factor: Regular training on cyber hygiene is essential to minimize the risk of human error within the team.
-
Registration: You must officially register your business with the relevant national authority.
Our refererences & projects
-
To the BMW referenceVirtualization of software testing for control units in the AWS cloudCloudEmbedded Systems & RoboticsQuality EngineeringTo the BMW referenceDigital twin for control unit development & testing in cars
To the BMW referenceVirtualization of control units & AWS cloud integration
To the BMW referenceSetup of virtual cars & control units without expensive hardware setups, worldwide & distributed testing
-
To the STARTRAIFF referenceSTARTRAIFF: Business Intelligence for the sales forceCloudData/Data PlatformsAppsTo the STARTRAIFF referenceAggregation of internal customer data & external data in a single web application
To the STARTRAIFF referenceData bundling & analysis with Amazon Bedrock
To the STARTRAIFF referenceIntuitive user interface for sales, 88% reduced preparation time before customer visits
-
To the MAN referenceMAN - ATLAS L4. Control Center for the autonomous truckCloudData/Data PlatformsAppsTo the MAN referenceControl center for the technical monitoring of driverless trucks
To the MAN referenceUX design, product strategy, data structure, vehicle data visualization
To the MAN referenceMonitoring, remote support, mission management, reports for commercial autonomous transport solutions
-
To the NOW referenceNOW: National Organization for Change in Mobility: development of a data warehouse systemCloudData/Data PlatformsIT Consulting & StrategyTo the NOW referenceData foundation for nationwide charging infrastructure in Germany
To the NOW referenceCloud data warehouse for integration & analysis of many diverse data sources (AWS)
To the NOW referenceSolid architecture, single point of truth ensures data-based evaluation of charging station demand
-
To the NETZSCH referenceNETZSCH: Development of an IoT platformCloudData/Data PlatformsIoTTo the NETZSCH referenceUnified IoT platform for 3 business units, harmonization of existing IoT solutions
To the NETZSCH referenceIoT device connectivity, visualization software for data analysis, cloud infrastructure, operations
To the NETZSCH referenceQuick testing in the cloud infrastructure, fast integration of use cases such as predictive maintenance, process optimizations, etc.
-
To the OroraTech referenceOroraTech - Security & Compliance SupportCloudCybersecurityIT Consulting & StrategyTo the OroraTech referenceRisk threat analyses for satellite startup
To the OroraTech referenceSecurity process definition, IT security risk register, action plan
To the OroraTech referenceFuture-proof IT security for successful growth
-
To the TKE referenceTK Elevator: Health Check Connectivity for the IoT gateway of elevatorsCybersecurityIoTEmbedded Systems & RoboticsTo the TKE referenceIoT gateway (MAX Box) for data connection between elevator & IoT platform
To the TKE referenceExamination of code quality, architecture, operations & organization
To the TKE referenceOptimization of IoT gateway connectivity & digitalization of elevators
-
To inCTRL referenceinCTRL Solutions: Modernization of the IoT platform for water treatment plantsCloudIoTIT ModernizationTo inCTRL referenceIoT & software modernization, integration of new functions
To inCTRL referenceData warehouse setup, integration of microservices, automated quality assurance, Continuous Integration & Continuous Deployment (CI/CD)
To inCTRL referenceImproved resilience, maintainability & further development capability of the platform
-
To the Health.exe referenceHealth.exe: AI-supported platform creates training plans for patientsCloudData/Data PlatformsAppsTo the Health.exe referenceAI-supported service for orthopedic & sports medicine practices
To the Health.exe referenceCloud-based web application for doctors for the automated, evidence-based creation of individually tailored patient training plans
To the Health.exe referenceNew revenue source without fixed costs, higher patient retention, AI-supported & guideline-based
-
See MAN referenceMAN: Efficient threat analysis for control unitsCybersecurityIoTEmbedded Systems & RoboticsSee MAN referenceProtection of digitalized trucks against virtual attacks
See MAN referenceRisk analysis based on 4x6 methodology, ThreatSea, ISO21434
See MAN referenceQuick identification of relevant threats for immediately effective security measures
-
See Siemens referenceSiemens: AI demand prediction platform for industrial production planningCloudData/Data PlatformsIndustry 4.0See Siemens referenceMachine learning for time series forecasting
See Siemens referenceAutoML for automated adaptation of models to different data
See Siemens referenceUnified, scalable solution, optimized inventory costs, efficiency gains
-
See Miele referenceMiele domestic appliances are networked worldwideCloudIoTEmbedded Systems & RoboticsSee Miele referenceFurther development of the IoT platform for connected home appliances
See Miele referenceContainer-based architecture, open standards, modular design
See Miele referenceQuick availability & scalability of digital services, high added value for users
-
See STIHL referenceSTIHL: Control iMOW robotic mower via appCloudAppsIoTSee STIHL referenceControl and configuration of the robotic mower via smartphone
See STIHL referenceDevelopment of app, web, cloud platform and direct Bluetooth communication
See STIHL referenceDigital benefits for users, app controllability, remote software updates
-
See ifm services referenceifm services: Remote maintenance of systems and machinesCloudIoTEmbedded Systems & RoboticsSee ifm services referenceFully integrated remote access in the IoT platform
See ifm services referenceFull stack cloud application, RUST-based clients, UX design
See ifm services referenceAnalysis of sensor data from production as a basis for sustainable decisions for customers
-
See DER Touristik referenceDER Touristik Online: Development and migration of a multi-client capable travel booking platformCloudWeb & Portal PlatformsIT ScalingSee DER Touristik referenceConsolidation of websites onto a scalable travel booking platform
See DER Touristik referenceMulti-tenant platform in microservice architecture, cloud infrastructure & migration (AWS), digital design, testing
See DER Touristik referenceModern user experience, forward-looking travel experience platform
-
See MAN referenceMAN: Secure Software Development Life CycleCybersecurityIT Consulting & StrategyQuality EngineeringSee MAN referenceProtection of digitalized vehicles against virtual attacks & digital threats
See MAN referenceSSDLC in vehicle backend systems (UNECE R155), cybersecurity management system
See MAN referenceGuidelines, methodologies & tools for independent risk identification, assessment & treatment by employees
-
See Bayernwerk referenceBayernwerk: Knowledge management via teamsCloudIT Consulting & StrategyIT ModernizationSee Bayernwerk referenceTeams app for service technicians
See Bayernwerk referenceUser-centered, intuitive UX/UI design
See Bayernwerk referenceIdentification & utilization of implicit knowledge within the company
-
See Es geht LOS referenceEs geht LOS: Development of a cloud-based application for citizen participationCloudAppsWeb & Portal PlatformsSee Es geht LOS referenceApp for digitalizing lottery-based participation processes for municipalities
See Es geht LOS referenceDigital Garage, AWS Amplify & Google Maps integration, MVP in just 5 weeks
See Es geht LOS referenceSelection, contact & user management via the app: data-secure, efficient, user-friendly
-
See referenceMonitoring alarms in industrial plantsCybersecurityIoTEmbedded Systems & RoboticsSee referenceLive monitoring platform for visualizing connected warning devices
See referenceAutomation & cloud services (MS Azure), API management
See referenceAlarms visible worldwide within seconds, multi-tenant system
-
See referenceGlobal workforce planning systemCloudData/Data PlatformsPublic/AdministrationSee referenceCentralized web-based IT system to replace individual isolated solutions
See referenceEvent sourcing for planning & analytics, domain-driven design, cloud migration
See referenceEasy updates, expansion, maintenance, optimized security
-
See DER Touristik referenceDER Touristik: Become a digital travel companion in 7 monthsCloudAppsWeb & Portal PlatformsSee DER Touristik referenceApp for digital customer support before, during & after the trip
See DER Touristik referenceCross-platform app with Flutter, UX/UI design, requirements engineering
See DER Touristik referenceArchitecture flexibly integrates and extends to many languages, countries & brands
-
See DEKRA referenceDEKRA: Modern enterprise architecture thanks to co-creationCloudIT Consulting & StrategyIT ModernizationSee DEKRA referenceOperational & technical harmonization of the legacy IT landscape
See DEKRA referenceEnterprise architecture as co-creation by the lead architects of all IT business units
See DEKRA referenceEA community worldwide for all operational units
-
See BMW Group referenceBMW Group: Remote software upgrade for vehiclesCloudCybersecurityIoTSee BMW Group referenceSoftware upgrades without the need to visit a service center
See BMW Group referenceBackend system for over-the-air communication with the vehicle, 24/7 support
See BMW Group referenceIT security, more comfort, on-demand provision of new features
-
See digikoo referencedigikoo: A data platform for the Azure CloudCloudData/Data PlatformsIT Consulting & StrategySee digikoo referenceData-based information for planning & implementing the climate transition for the public sector & energy providers
See digikoo referenceScalable foundation data platform on MS Azure for migrating & automating differently formatted geo-data into a structured data schema
See digikoo referenceQuality-checked data, provision in the form of the target data model, robust, scalable database & infrastructure
-
See Creditreform referenceCreditreform: Secure proof of identity on the webCybersecurityWeb & Portal PlatformsBanking/Insurance/FSISee Creditreform referenceFast, customer-friendly & fraud-proof digital identity verification
See Creditreform referencePilot for the forgery-proof storage & management of identity & company information in a Decentralized Identity (DID)
See Creditreform referenceVerified data reusable across different providers
-
See Weidmüller referenceWeidmüller: Progression of the Industrial Service PlatformCloudIoTWeb & Portal PlatformsSee Weidmüller referenceCreation of a centralized, intuitive, expandable portal as the foundation for industrial applications (remote access, data visualization, ML)
See Weidmüller referenceExploration, setup & further development of the base platform for industrial services
See Weidmüller referenceInnovative portal for end-to-end solutions, MVP in just 7 months
-
To the FinOps referenceTravel information systems: 25 percent savings in cloud costs and stable operation thanks to FinOpsCloudIT Consulting & StrategyWeb & Portal PlatformsTo the FinOps referenceAlignment of the distributed travel information system with many data sources & target groups on the AWS cloud
To the FinOps referenceFinOps: cost transparency, cloud strategy, system & architecture design, usage-based operating times, early anomaly detection
To the FinOps referenceCost transparency at team level, lean operating processes, robust observability
-
To the FinOps referenceSupply chain management: Reducing cloud operating costs by 50 percent with FinOpsCloudData/Data PlatformsIT Consulting & StrategyTo the FinOps referenceReduction of costs caused by over-dimensioning & manual processes, establishment of transparency
To the FinOps referenceTargeted process modernization, automation & rightsizing
To the FinOps referenceAnnual cloud operating cost reduction: 400,000 EUR, scalability, reliability
NIS-2 violations: What companies risk if they fail to comply
A violation of the NIS 2 Directive is not a trivial offense. Anyone who ignores the requirements not only risks IT security, but must also expect serious consequences:
-
Hefty Price Tags (Fines): Essential entities risk penalties of up to €10 million or 2% of global annual revenue. For important entities, fines can reach up to €7 million or 1.4% of revenue.
-
Management Responsibility (Liability): Senior management must not only approve measures but also actively oversee their implementation. In the event of failures, personal liability of executives is at risk.
-
Market exclusion (reputation & supply chain): Failure to comply can lead to exclusion from supply chains. This is compounded by massive reputational damage and business losses.
NIS-2 without stress: Your upgrade for true cyber resilience
Our experts provide comprehensive support in implementing complex requirements, from strategic risk assessment to sustainable minimization. We bring security directly into your practice instead of just managing it on paper. With MaibornWolff, you remain secure in the long term and confidently comply with all legal requirements.
Contact us for a no-obligation consultation and secure your company against cyber threats in the long term.
Frequently asked questions about NIS-2
What is the difference between NIS and NIS-2?
The NIS-2 Directive replaces the NIS Directive (2016/1148) that has been in force since 2016 and raises the cybersecurity level in the EU to a new standard. While NIS laid the foundation for the protection of critical infrastructures (KRITIS), a uniform security level across all member states could not be achieved at that time.
NIS-2 tightens three key aspects:
- Requirements: The NIS-2 Directive creates the conditions for a Europe-wide, uniform security level.
- Scope: NIS-2 significantly expands the scope, meaning that well over 100,000 companies are now affected.
- Responsibility: Senior management is held to a higher standard of accountability in consistently implementing cybersecurity measures.
What happens if my company is not based in the EU?
Companies based outside the EU must also comply with NIS-2 if they wish to provide services within the EU or collaborate with companies based in the EU. They must appoint a representative who is established in an EU member state and responsible for compliance with the regulations.