This document is under active development and has not been finalized.
Skip to content

Reporting Obligations per §32 BSIG

Three-Tier Reporting Model

Tier 1: Early Warning (24 Hours)

FieldContent
Deadline24 hours after becoming aware of the significant incident
RecipientBSI via reporting platform
ContentNature of the incident, initial suspicion of cause
SpecificsIndicate whether an unlawful or malicious act is suspected; whether cross-border impact is possible

Tier 2: Update Report (72 Hours)

FieldContent
Deadline72 hours after becoming aware
RecipientBSI via reporting platform
ContentInitial assessment of the incident: severity, impact
SpecificsIndicators of compromise (IoC) where available; update of initial assessment

Tier 3: Final Report (1 Month)

FieldContent
Deadline1 month after becoming aware (extension upon request possible)
RecipientBSI via reporting platform
ContentDetailed description: root cause, measures taken, cross-border impact
SpecificsIf the incident is still ongoing: interim report instead of final report; final report after resolution

REPORTING DEADLINES

All deadlines run from the moment the entity becomes aware of the significant incident. "Awareness" means the point at which the CISO or a member of the incident response team has confirmed that the event constitutes a significant incident per the criteria below.

Criteria for Significant Security Incidents

An incident is considered significant if at least one of the following criteria is met:

CriterionThreshold
Serious operational disruptionServices to customers are restricted or unavailable
Financial lossesDirect or indirect losses above the materiality threshold
Harm to third partiesOther persons or entities are significantly affected
Data lossPersonal or business-critical data compromised

Internal Reporting Flow

Incident detected
  → CISO informed (< 1h)
    → Initial assessment: Significant yes/no? (< 4h)
      → If yes: Prepare BSI early warning (< 24h)
        → Inform executive management
          → Assess GDPR reporting (Art. 33: 72h to supervisory authority)
            → Assess CRA reporting (Art. 14: 24h to ENISA)

Parallel Reporting Obligations

RegulationTriggerDeadlineRecipient
NIS2 / §32 BSIGSignificant security incident24h / 72h / 1 monthBSI
GDPR Art. 33Personal data breach72 hoursCompetent supervisory authority
CRA Art. 14Actively exploited product vulnerability24h / 72h / 14dENISA + national CSIRT

PARALLEL REPORTING OBLIGATIONS

A single incident may trigger reporting obligations under multiple regulations simultaneously. The initial assessment process evaluates all applicable frameworks. Templates are designed to be compatible to ensure efficient parallel reporting. See also CRA & AI Act Synergies.

Documentation Requirements

Every reportable incident must be fully documented:

  • Chronological sequence of events with timestamps
  • All decisions with rationale
  • Communication with BSI (report IDs, correspondence)
  • Measures taken and their effectiveness
  • Lessons learned and follow-up actions

Retention period: At least 3 years after closure of the incident.

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT