Skip to content

Compliance Matrix

Complete mapping of all NIS2 requirements to documentation, implementation and synergies.

Effectiveness Review

The Last Effectiveness Review column documents the evidence required under §30(2) No. 6 BSIG. Measures without a documented review in the current year are considered not effectively reviewed. The next scheduled effectiveness review is due 12 months after the last documented review.

§30 BSIG – Risk Management Measures

No.MeasureDocumentationStatusLast Effectiveness ReviewNext Review
1Risk analysis and IT security conceptsRisk Management✅ Implemented2026-032027-03
2Incident handlingIncident Management✅ Implemented2026-032027-03
3Business continuity / BCMBusiness Continuity✅ Implemented2026-032027-03
4Supply chain securitySupply Chain Security✅ Implemented2026-032027-03
5Secure acquisition, development, maintenanceVulnerability Management✅ Implemented2026-032027-03
6Effectiveness reviewEffectiveness Review✅ Implemented2026-032027-03
7Training & awarenessTraining & Awareness✅ Implemented2026-032027-03
8CryptographyCryptography✅ Implemented2026-032027-03
9Access control & personnel securityAccess Control✅ Implemented2026-032027-03
10MFA & secure communicationAccess Control✅ Implemented2026-032027-03

Additional BSIG Obligations

SectionObligationDocumentationStatusLast Effectiveness ReviewNext Review
§32Reporting obligationsIncident Management✅ Implemented2026-032027-03
§33Registration obligationOrganizationally implemented✅ Implemented2026-032027-03
§38Management dutiesGovernance✅ Implemented2026-032027-03

Status Legend

SymbolMeaning
✅ ImplementedMeasure documented, deployed and last effectiveness review successful
🟡 In progressMeasure adopted, rollout ongoing, effectiveness review pending
🔴 OpenMeasure required but not yet deployed
⏸️ ExcludedMeasure not applicable (justification documented)

CRA Synergies

NIS2 MeasureCRA DocumentationSynergy
No. 2 – IncidentsCRA Incident ResponseProduct incidents via CRA, operational incidents via NIS2
No. 4 – Supply chainCRA Supply ChainSoftware supply chain via CRA, service providers via NIS2
No. 5 – VulnerabilitiesCRA Vulnerability ManagementProduct CVEs via CRA, infra CVEs via NIS2
No. 5 – SBOMCRA SBOM & SigningSBOM generation and signing via CRA

AI Act Synergies

NIS2 MeasureAI Act ReferenceSynergy
No. 1 – Risk managementArt. 9 AI Act (risk management)NIS2 ISMS as foundation for AI risk management
No. 8 – CryptographyArt. 15 AI Act (cybersecurity)Cryptography standards also apply to AI systems
No. 9 – Access controlArt. 14 AI Act (human oversight)Access control as foundation for AI oversight

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT