This document is under active development and has not been finalized.
Skip to content

Introduction

This documentation describes the implementation of the NIS 2 Directive (EU) 2022/2555 and the German NIS2 Implementation Act (NIS2UmsuCG) at BAUER GROUP. It covers all ten risk management measures per §30(2) BSIG as well as obligations under §32 (reporting), §33 (registration), and §38 (management duties).

LEGAL BASIS

NIS 2 Directive (EU) 2022/2555 – Measures for a high common level of cybersecurity across the Union.

BSIG §30(1): Essential and important entities are obligated to take appropriate, proportionate and effective technical and organizational measures to avoid disruptions to the availability, integrity, authenticity and confidentiality of information technology systems, components and processes.

Scope

AreaDescription
Software DevelopmentCustom B2B software, embedded systems and AI-driven workflows
IT InfrastructureServer operations, network infrastructure and cloud services
Managed ServicesIT services and support for B2B customers
Internal ITSystems and processes for internal operations

Complementary Documentation

DocumentationRegulationFocusURL
NIS2 (this document)(EU) 2022/2555 / BSIGOrganization & Operationsnis2.docs.bauer-group.com
CRA(EU) 2024/2847Products & Softwarecra.docs.bauer-group.com
AI Act(EU) 2024/1689AI Systemsai-act.docs.bauer-group.com

Documentation Structure

No.Chapter§30 BSIGContent
1IntroductionScope, legal framework, structure
2Risk ManagementNo. 1Risk analysis, ISMS, asset inventory
3Incident ManagementNo. 2 + §32Incident response, reporting obligations
4Business ContinuityNo. 3Backup, disaster recovery, crisis management
5Supply Chain SecurityNo. 4Vendor assessment, security requirements
6Vulnerability ManagementNo. 5Scanning, patch management, secure development
7Effectiveness ReviewNo. 6Security audits, KPIs, penetration testing
8Training & AwarenessNo. 7Mandatory training, cyber hygiene
9CryptographyNo. 8Encryption, key management
10Access ControlNo. 9–10Authentication, MFA, secure communication
11Governance§38Management duties, governance structure
12Compliance MatrixAllComplete requirements mapping

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT