This document is under active development and has not been finalized.
Skip to content

Compliance Matrix

Complete mapping of all NIS2 requirements to documentation, implementation and synergies.

§30 BSIG – Risk Management Measures

No.MeasureDocumentationStatus
1Risk analysis and IT security conceptsRisk Management✅ Implemented
2Incident handlingIncident Management✅ Implemented
3Business continuity / BCMBusiness Continuity✅ Implemented
4Supply chain securitySupply Chain Security✅ Implemented
5Secure acquisition, development, maintenanceVulnerability Management✅ Implemented
6Effectiveness reviewEffectiveness Review✅ Implemented
7Training & awarenessTraining & Awareness✅ Implemented
8CryptographyCryptography✅ Implemented
9Access control & personnel securityAccess Control✅ Implemented
10MFA & secure communicationAccess Control✅ Implemented

Additional BSIG Obligations

SectionObligationDocumentationStatus
§32Reporting obligationsIncident Management✅ Implemented
§33Registration obligationOrganizationally implemented✅ Implemented
§38Management dutiesGovernance✅ Implemented

CRA Synergies

NIS2 MeasureCRA DocumentationSynergy
No. 2 – IncidentsCRA Incident ResponseProduct incidents via CRA, operational incidents via NIS2
No. 4 – Supply chainCRA Supply ChainSoftware supply chain via CRA, service providers via NIS2
No. 5 – VulnerabilitiesCRA Vulnerability ManagementProduct CVEs via CRA, infra CVEs via NIS2
No. 5 – SBOMCRA SBOM & SigningSBOM generation and signing via CRA

AI Act Synergies

NIS2 MeasureAI Act ReferenceSynergy
No. 1 – Risk managementArt. 9 AI Act (risk management)NIS2 ISMS as foundation for AI risk management
No. 8 – CryptographyArt. 15 AI Act (cybersecurity)Cryptography standards also apply to AI systems
No. 9 – Access controlArt. 14 AI Act (human oversight)Access control as foundation for AI oversight

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT