<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>NIS2 Compliance – BAUER GROUP (English)</title>
        <link>https://nis2.docs.bauer-group.com/</link>
        <description>NIS2 Directive – Compliance Documentation Updates</description>
        <lastBuildDate>Thu, 26 Mar 2026 15:51:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <copyright>© 2026 BAUER GROUP</copyright>
        <item>
            <title><![CDATA[Governance]]></title>
            <link>https://nis2.docs.bauer-group.com/en/governance/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/governance/</guid>
            <pubDate>Tue, 24 Mar 2026 00:10:02 GMT</pubDate>
            <description><![CDATA[# Governance

::: info LEGAL BASIS
**§38(1) BSIG** – Management of essential and important entities is obligated to approve the risk management measures taken by these entities per §30 and to supervise their implementation.

**§38(3) BSIG** – Management must regularly participate in training to acquire sufficient knowledge and skills for identifying and assessing risks and risk management practices.
:::

## Management Duties

The German NIS2 implementation establishes **personal obligations** of management for cybersecurity:

| Duty | Description | Evidence |
|]]></description>
            <content:encoded><![CDATA[<h1 id="governance" tabindex="-1">Governance <a class="header-anchor" href="#governance" aria-label="Permalink to &quot;Governance&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§38(1) BSIG</strong> – Management of essential and important entities is obligated to approve the risk management measures taken by these entities per §30 and to supervise their implementation.</p>
<p><strong>§38(3) BSIG</strong> – Management must regularly participate in training to acquire sufficient knowledge and skills for identifying and assessing risks and risk management practices.</p>
</div>
<h2 id="management-duties" tabindex="-1">Management Duties <a class="header-anchor" href="#management-duties" aria-label="Permalink to &quot;Management Duties&quot;"></a></h2>
<p>The German NIS2 implementation establishes <strong>personal obligations</strong> of management for cybersecurity:</p>
<table tabindex="0">
<thead>
<tr>
<th>Duty</th>
<th>Description</th>
<th>Evidence</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Approval</strong></td>
<td>Formal approval of risk management measures</td>
<td>Documented sign-off</td>
</tr>
<tr>
<td><strong>Supervision</strong></td>
<td>Ongoing control of implementation</td>
<td>Regular reports</td>
</tr>
<tr>
<td><strong>Training</strong></td>
<td>Personal participation in cybersecurity training</td>
<td>Attendance record</td>
</tr>
<tr>
<td><strong>Liability</strong></td>
<td>Personal liability for breach of duty (§38(2) BSIG)</td>
<td>—</td>
</tr>
</tbody>
</table>
<div class="warning custom-block"><p class="custom-block-title">LIABILITY</p>
<p>Under §38(2) BSIG, management is personally liable for damages resulting from breach of their approval and supervision duties. Waiver agreements and settlements are void.</p>
</div>
<h2 id="governance-structure" tabindex="-1">Governance Structure <a class="header-anchor" href="#governance-structure" aria-label="Permalink to &quot;Governance Structure&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Role</th>
<th>Responsibility</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Management</strong></td>
<td>Approval of measures, resource allocation, personal training</td>
</tr>
<tr>
<td><strong>Information Security Officer (ISO)</strong></td>
<td>Operational control, risk analysis, incident coordination, BSI contact</td>
</tr>
<tr>
<td><strong>IT Lead</strong></td>
<td>Technical implementation, system security, patch management</td>
</tr>
<tr>
<td><strong>Department Heads</strong></td>
<td>Compliance with security policies in their area</td>
</tr>
</tbody>
</table>
<h2 id="reporting" tabindex="-1">Reporting <a class="header-anchor" href="#reporting" aria-label="Permalink to &quot;Reporting&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Report</th>
<th>Recipient</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td>Security status</td>
<td>Management</td>
<td>Quarterly</td>
</tr>
<tr>
<td>Incident reports</td>
<td>Management</td>
<td>Event-driven (high/critical immediately)</td>
</tr>
<tr>
<td>Annual security report</td>
<td>Management</td>
<td>Annually</td>
</tr>
<tr>
<td>KPI report</td>
<td>ISO / Management</td>
<td>Monthly</td>
</tr>
</tbody>
</table>
<h2 id="management-training-obligation" tabindex="-1">Management Training Obligation <a class="header-anchor" href="#management-training-obligation" aria-label="Permalink to &quot;Management Training Obligation&quot;"></a></h2>
<p>Management participates at least annually in cybersecurity training covering:</p>
<ul>
<li>Current threat landscape and relevant incidents</li>
<li>NIS2/BSIG obligations and liability</li>
<li>Risk management and measure assessment</li>
<li>Incident response process and escalation</li>
</ul>
<div class="tip custom-block"><p class="custom-block-title">AI Act Synergy</p>
<p>The AI Act governance framework complements NIS2 governance requirements for AI-powered systems. Details in the <a href="https://ai-act.docs.bauer-group.com/en/governance/" target="_blank" rel="noreferrer">AI Act Governance Documentation</a>.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Training & Awareness]]></title>
            <link>https://nis2.docs.bauer-group.com/en/training/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/training/</guid>
            <pubDate>Tue, 24 Mar 2026 00:10:02 GMT</pubDate>
            <description><![CDATA[# Training & Awareness

::: info LEGAL BASIS
**§30(2) No. 7 BSIG** – Basic cyber hygiene practices and information security training

**§38(3) BSIG** – Management must regularly participate in training.
:::

## Training Program

### Basic Training (all employees)

| Topic | Content | Interval |
|]]></description>
            <content:encoded><![CDATA[<h1 id="training-awareness" tabindex="-1">Training &amp; Awareness <a class="header-anchor" href="#training-awareness" aria-label="Permalink to &quot;Training &amp; Awareness&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 7 BSIG</strong> – Basic cyber hygiene practices and information security training</p>
<p><strong>§38(3) BSIG</strong> – Management must regularly participate in training.</p>
</div>
<h2 id="training-program" tabindex="-1">Training Program <a class="header-anchor" href="#training-program" aria-label="Permalink to &quot;Training Program&quot;"></a></h2>
<h3 id="basic-training-all-employees" tabindex="-1">Basic Training (all employees) <a class="header-anchor" href="#basic-training-all-employees" aria-label="Permalink to &quot;Basic Training (all employees)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Topic</th>
<th>Content</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td>Phishing &amp; social engineering</td>
<td>Recognition, reporting channels, practical examples</td>
<td>Annually</td>
</tr>
<tr>
<td>Password &amp; access security</td>
<td>Strong passwords, MFA, password managers</td>
<td>Annually</td>
</tr>
<tr>
<td>Secure communication</td>
<td>Email security, encrypted channels</td>
<td>Annually</td>
</tr>
<tr>
<td>Incident reporting</td>
<td>Reporting obligation, channels, contacts</td>
<td>Annually</td>
</tr>
<tr>
<td>Data protection basics</td>
<td>Personal data, GDPR basics</td>
<td>Annually</td>
</tr>
</tbody>
</table>
<h3 id="role-specific-training" tabindex="-1">Role-Specific Training <a class="header-anchor" href="#role-specific-training" aria-label="Permalink to &quot;Role-Specific Training&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Target Group</th>
<th>Additional Content</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Management</strong></td>
<td>NIS2 obligations per §38, liability, governance (mandatory)</td>
</tr>
<tr>
<td><strong>IT administration</strong></td>
<td>Secure system operation, patch management, logging</td>
</tr>
<tr>
<td><strong>Software development</strong></td>
<td>Secure coding, OWASP Top 10, supply chain security</td>
</tr>
<tr>
<td><strong>Project management</strong></td>
<td>Security requirements in projects, risk assessment</td>
</tr>
</tbody>
</table>
<h2 id="onboarding" tabindex="-1">Onboarding <a class="header-anchor" href="#onboarding" aria-label="Permalink to &quot;Onboarding&quot;"></a></h2>
<p>New employees receive before system access:</p>
<ul>
<li>Introduction to information security policy</li>
<li>Basic cyber hygiene training</li>
<li>Acknowledgment of security policies</li>
</ul>
<h2 id="documentation" tabindex="-1">Documentation <a class="header-anchor" href="#documentation" aria-label="Permalink to &quot;Documentation&quot;"></a></h2>
<ul>
<li>Attendance records maintained centrally</li>
<li>Training completion is a prerequisite for system access rights</li>
<li>Annual evaluation of completion rates as KPI</li>
</ul>
<div class="tip custom-block"><p class="custom-block-title">AI Act Synergy</p>
<p>The AI competence program (Art. 4 AI Act) complements NIS2 training obligations. Details in the <a href="https://ai-act.docs.bauer-group.com/en/governance/" target="_blank" rel="noreferrer">AI Act Compliance Documentation</a>.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Authentication & MFA]]></title>
            <link>https://nis2.docs.bauer-group.com/en/access-control/authentication</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/access-control/authentication</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Authentication & MFA

## Multi-Factor Authentication

### MFA Requirements

| Access Type | MFA Required | Preferred Method |
|]]></description>
            <content:encoded><![CDATA[<h1 id="authentication-mfa" tabindex="-1">Authentication &amp; MFA <a class="header-anchor" href="#authentication-mfa" aria-label="Permalink to &quot;Authentication &amp; MFA&quot;"></a></h1>
<h2 id="multi-factor-authentication" tabindex="-1">Multi-Factor Authentication <a class="header-anchor" href="#multi-factor-authentication" aria-label="Permalink to &quot;Multi-Factor Authentication&quot;"></a></h2>
<h3 id="mfa-requirements" tabindex="-1">MFA Requirements <a class="header-anchor" href="#mfa-requirements" aria-label="Permalink to &quot;MFA Requirements&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Access Type</th>
<th>MFA Required</th>
<th>Preferred Method</th>
</tr>
</thead>
<tbody>
<tr>
<td>External access (VPN, portals)</td>
<td>Yes -- mandatory</td>
<td>FIDO2 / WebAuthn</td>
</tr>
<tr>
<td>Administrative system access</td>
<td>Yes -- mandatory</td>
<td>FIDO2 / TOTP</td>
</tr>
<tr>
<td>Cloud services / SaaS</td>
<td>Yes -- mandatory</td>
<td>TOTP / FIDO2</td>
</tr>
<tr>
<td>Email access</td>
<td>Yes -- mandatory</td>
<td>TOTP / FIDO2</td>
</tr>
<tr>
<td>Internal applications (LAN)</td>
<td>Risk-based</td>
<td>TOTP (if required)</td>
</tr>
</tbody>
</table>
<h3 id="mfa-methods-ranking" tabindex="-1">MFA Methods (Ranking) <a class="header-anchor" href="#mfa-methods-ranking" aria-label="Permalink to &quot;MFA Methods (Ranking)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Method</th>
<th>Security Level</th>
<th>Application</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>FIDO2 / WebAuthn</strong></td>
<td>Highest (phishing-resistant)</td>
<td>Preferred for all access</td>
</tr>
<tr>
<td><strong>TOTP (Authenticator app)</strong></td>
<td>High</td>
<td>Standard alternative</td>
</tr>
<tr>
<td><strong>Push notification</strong></td>
<td>Medium</td>
<td>Only with number matching</td>
</tr>
<tr>
<td><strong>SMS OTP</strong></td>
<td>Low -- <strong>not permitted</strong></td>
<td>Not allowed (SIM swapping risk)</td>
</tr>
</tbody>
</table>
<h3 id="mfa-exceptions" tabindex="-1">MFA Exceptions <a class="header-anchor" href="#mfa-exceptions" aria-label="Permalink to &quot;MFA Exceptions&quot;"></a></h3>
<p>Exceptions to the MFA requirement are only possible in justified cases:</p>
<ul>
<li>Documented justification required</li>
<li>ISO approval mandatory</li>
<li>Compensating controls defined</li>
<li>Time-limited with scheduled review</li>
<li>Service accounts: IP allowlisting + API key instead of MFA</li>
</ul>
<h2 id="password-policy" tabindex="-1">Password Policy <a class="header-anchor" href="#password-policy" aria-label="Permalink to &quot;Password Policy&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Requirement</th>
<th>Standard</th>
</tr>
</thead>
<tbody>
<tr>
<td>Minimum length</td>
<td>16 characters</td>
</tr>
<tr>
<td>Recommendation</td>
<td>Passphrase (4+ words)</td>
</tr>
<tr>
<td>Complexity</td>
<td>No forced special characters (length &gt; complexity)</td>
</tr>
<tr>
<td>Password manager</td>
<td>Mandatory for all employees</td>
</tr>
<tr>
<td>Reuse</td>
<td>Prohibited (unique password per service)</td>
</tr>
<tr>
<td>Breach check</td>
<td>Automatic verification against HaveIBeenPwned / known-breach lists</td>
</tr>
<tr>
<td>Expiry</td>
<td>No forced expiry (per NIST 800-63B), rotation only upon suspected compromise</td>
</tr>
</tbody>
</table>
<h2 id="service-accounts" tabindex="-1">Service Accounts <a class="header-anchor" href="#service-accounts" aria-label="Permalink to &quot;Service Accounts&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Requirement</th>
<th>Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td>No shared accounts</td>
<td>Every service account has a documented owner</td>
</tr>
<tr>
<td>Minimal privileges</td>
<td>Least privilege, only required API scopes</td>
</tr>
<tr>
<td>Rotation</td>
<td>API keys rotated at least annually</td>
</tr>
<tr>
<td>Monitoring</td>
<td>Anomaly detection for service account usage</td>
</tr>
<tr>
<td>Documentation</td>
<td>Purpose, owner, permissions, creation date</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Authorization & Permission Management]]></title>
            <link>https://nis2.docs.bauer-group.com/en/access-control/authorization</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/access-control/authorization</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Authorization & Permission Management

## Access Control Model

BAUER GROUP employs a role-based access control (RBAC) model:

| Principle | Implementation |
|]]></description>
            <content:encoded><![CDATA[<h1 id="authorization-permission-management" tabindex="-1">Authorization &amp; Permission Management <a class="header-anchor" href="#authorization-permission-management" aria-label="Permalink to &quot;Authorization &amp; Permission Management&quot;"></a></h1>
<h2 id="access-control-model" tabindex="-1">Access Control Model <a class="header-anchor" href="#access-control-model" aria-label="Permalink to &quot;Access Control Model&quot;"></a></h2>
<p>BAUER GROUP employs a role-based access control (RBAC) model:</p>
<table tabindex="0">
<thead>
<tr>
<th>Principle</th>
<th>Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Least Privilege</strong></td>
<td>Every account receives only the minimum necessary permissions</td>
</tr>
<tr>
<td><strong>Need-to-Know</strong></td>
<td>Data access only on business necessity</td>
</tr>
<tr>
<td><strong>Separation of Duties</strong></td>
<td>Critical operations require multiple persons</td>
</tr>
<tr>
<td><strong>Default Deny</strong></td>
<td>No access without explicit authorization</td>
</tr>
</tbody>
</table>
<h2 id="role-definitions" tabindex="-1">Role Definitions <a class="header-anchor" href="#role-definitions" aria-label="Permalink to &quot;Role Definitions&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Role</th>
<th>Permissions</th>
<th>Granted by</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>User</strong></td>
<td>Access to assigned applications and data</td>
<td>Supervisor + IT</td>
</tr>
<tr>
<td><strong>Developer</strong></td>
<td>Code repositories, staging environments, CI/CD</td>
<td>Team lead + IT</td>
</tr>
<tr>
<td><strong>Administrator</strong></td>
<td>System configuration, user management, monitoring</td>
<td>ISO + IT Lead</td>
</tr>
<tr>
<td><strong>Root / Superadmin</strong></td>
<td>Full access to infrastructure</td>
<td>IT Lead only, four-eyes principle</td>
</tr>
</tbody>
</table>
<h2 id="permission-lifecycle" tabindex="-1">Permission Lifecycle <a class="header-anchor" href="#permission-lifecycle" aria-label="Permalink to &quot;Permission Lifecycle&quot;"></a></h2>
<h3 id="grant" tabindex="-1">Grant <a class="header-anchor" href="#grant" aria-label="Permalink to &quot;Grant&quot;"></a></h3>
<ol>
<li>Request by employee or supervisor</li>
<li>Approval by responsible data/system owner</li>
<li>Implementation by IT</li>
<li>Documentation in the permission inventory</li>
</ol>
<h3 id="change" tabindex="-1">Change <a class="header-anchor" href="#change" aria-label="Permalink to &quot;Change&quot;"></a></h3>
<ol>
<li>On role change: revoke old permissions, grant new permissions</li>
<li>Deadline: within 5 business days of role change</li>
<li>Review of old permissions by supervisor</li>
</ol>
<h3 id="revocation-offboarding" tabindex="-1">Revocation (Offboarding) <a class="header-anchor" href="#revocation-offboarding" aria-label="Permalink to &quot;Revocation (Offboarding)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Step</th>
<th>Deadline</th>
<th>Responsible</th>
</tr>
</thead>
<tbody>
<tr>
<td>Account deactivation</td>
<td>On last working day, before end of work</td>
<td>IT</td>
</tr>
<tr>
<td>Email forwarding</td>
<td>Set up to delegate (time-limited)</td>
<td>IT</td>
</tr>
<tr>
<td>Shared credentials</td>
<td>Rotation of all shared access credentials</td>
<td>IT + Department</td>
</tr>
<tr>
<td>Hardware return</td>
<td>On last working day</td>
<td>Supervisor</td>
</tr>
<tr>
<td>VPN / remote access</td>
<td>Immediate deactivation</td>
<td>IT</td>
</tr>
</tbody>
</table>
<h2 id="authorization-audit" tabindex="-1">Authorization Audit <a class="header-anchor" href="#authorization-audit" aria-label="Permalink to &quot;Authorization Audit&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Review</th>
<th>Interval</th>
<th>Action</th>
</tr>
</thead>
<tbody>
<tr>
<td>Full permission review</td>
<td>Semi-annually</td>
<td>Each system owner reviews permissions for their systems</td>
</tr>
<tr>
<td>Orphaned accounts</td>
<td>Monthly (automated)</td>
<td>Deactivation of accounts without a corresponding active employee</td>
</tr>
<tr>
<td>Privileged accounts</td>
<td>Quarterly</td>
<td>Review of all admin permissions for necessity</td>
</tr>
<tr>
<td>Service accounts</td>
<td>Semi-annually</td>
<td>Owner confirms necessity and scope</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Secure Communication]]></title>
            <link>https://nis2.docs.bauer-group.com/en/access-control/secure-communication</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/access-control/secure-communication</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Secure Communication

::: info LEGAL BASIS
**§30(2) No. 10 BSIG** -- Secured voice, video and text communication, and secured emergency communication systems where appropriate within the entity
:::

## Communication Channels

| Channel | Encryption | Authentication | Use |
|]]></description>
            <content:encoded><![CDATA[<h1 id="secure-communication" tabindex="-1">Secure Communication <a class="header-anchor" href="#secure-communication" aria-label="Permalink to &quot;Secure Communication&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 10 BSIG</strong> -- Secured voice, video and text communication, and secured emergency communication systems where appropriate within the entity</p>
</div>
<h2 id="communication-channels" tabindex="-1">Communication Channels <a class="header-anchor" href="#communication-channels" aria-label="Permalink to &quot;Communication Channels&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Channel</th>
<th>Encryption</th>
<th>Authentication</th>
<th>Use</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Email</strong></td>
<td>TLS in transit, optional S/MIME</td>
<td>SPF/DKIM/DMARC</td>
<td>Standard business communication</td>
</tr>
<tr>
<td><strong>Encrypted messenger</strong></td>
<td>End-to-end (E2E)</td>
<td>Account-based + MFA</td>
<td>Sensitive internal communication, incident response</td>
</tr>
<tr>
<td><strong>Video conferencing</strong></td>
<td>TLS, transport encryption</td>
<td>Meeting codes + waiting room</td>
<td>Meetings, customer communication</td>
</tr>
<tr>
<td><strong>VPN</strong></td>
<td>IPsec / WireGuard</td>
<td>Certificate + MFA</td>
<td>Remote access to internal systems</td>
</tr>
<tr>
<td><strong>Telephone</strong></td>
<td>Standard network (unencrypted)</td>
<td>Caller ID</td>
<td>Not for confidential information</td>
</tr>
</tbody>
</table>
<h2 id="email-security-in-detail" tabindex="-1">Email Security in Detail <a class="header-anchor" href="#email-security-in-detail" aria-label="Permalink to &quot;Email Security in Detail&quot;"></a></h2>
<h3 id="dns-based-authentication" tabindex="-1">DNS-Based Authentication <a class="header-anchor" href="#dns-based-authentication" aria-label="Permalink to &quot;DNS-Based Authentication&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Mechanism</th>
<th>Configuration</th>
<th>Purpose</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>SPF</strong></td>
<td>TXT record with authorized mail servers</td>
<td>Prevents sender spoofing</td>
</tr>
<tr>
<td><strong>DKIM</strong></td>
<td>Signing of outgoing emails (≥ 2048 bit)</td>
<td>Integrity verification</td>
</tr>
<tr>
<td><strong>DMARC</strong></td>
<td>Policy: <code>reject</code>, reporting to ISO</td>
<td>Enforces SPF+DKIM, reports violations</td>
</tr>
<tr>
<td><strong>MTA-STS</strong></td>
<td>Enforced TLS for incoming emails</td>
<td>Prevents downgrade attacks</td>
</tr>
<tr>
<td><strong>DANE/TLSA</strong></td>
<td>DNS-based certificate binding</td>
<td>Additional TLS verification</td>
</tr>
</tbody>
</table>
<h3 id="handling-classified-data-via-email" tabindex="-1">Handling Classified Data via Email <a class="header-anchor" href="#handling-classified-data-via-email" aria-label="Permalink to &quot;Handling Classified Data via Email&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Classification</th>
<th>Permitted via email?</th>
<th>Additional measures</th>
</tr>
</thead>
<tbody>
<tr>
<td>Public</td>
<td>Yes</td>
<td>None</td>
</tr>
<tr>
<td>Internal</td>
<td>Yes</td>
<td>Standard TLS</td>
</tr>
<tr>
<td>Confidential</td>
<td>Only if necessary</td>
<td>Encrypted attachment or secure exchange platform</td>
</tr>
<tr>
<td>Strictly confidential</td>
<td>No</td>
<td>Only via E2E-encrypted channels</td>
</tr>
</tbody>
</table>
<h2 id="emergency-communication" tabindex="-1">Emergency Communication <a class="header-anchor" href="#emergency-communication" aria-label="Permalink to &quot;Emergency Communication&quot;"></a></h2>
<h3 id="fallback-channels" tabindex="-1">Fallback Channels <a class="header-anchor" href="#fallback-channels" aria-label="Permalink to &quot;Fallback Channels&quot;"></a></h3>
<p>In the event that primary communication channels are compromised or unavailable:</p>
<table tabindex="0">
<thead>
<tr>
<th>Priority</th>
<th>Channel</th>
<th>Availability</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Mobile phone (personal)</td>
<td>24/7</td>
</tr>
<tr>
<td>2</td>
<td>Alternative messenger (predefined)</td>
<td>24/7</td>
</tr>
<tr>
<td>3</td>
<td>Landline telephone</td>
<td>Business hours</td>
</tr>
</tbody>
</table>
<h3 id="preparation-measures" tabindex="-1">Preparation Measures <a class="header-anchor" href="#preparation-measures" aria-label="Permalink to &quot;Preparation Measures&quot;"></a></h3>
<ul>
<li>Current contact lists of key personnel available offline (printed or on a separate device)</li>
<li>Predefined code words for identity verification during telephone communication</li>
<li>Annual reachability exercise with all crisis team members</li>
<li>Backup communication plan is part of the crisis management documentation</li>
</ul>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Backup Strategy]]></title>
            <link>https://nis2.docs.bauer-group.com/en/business-continuity/backup-strategy</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/business-continuity/backup-strategy</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Backup Strategy

## 3-2-1 Rule in Detail

### Backup Types

| Type | Description | Interval | Storage Requirement |
|]]></description>
            <content:encoded><![CDATA[<h1 id="backup-strategy" tabindex="-1">Backup Strategy <a class="header-anchor" href="#backup-strategy" aria-label="Permalink to &quot;Backup Strategy&quot;"></a></h1>
<h2 id="_3-2-1-rule-in-detail" tabindex="-1">3-2-1 Rule in Detail <a class="header-anchor" href="#_3-2-1-rule-in-detail" aria-label="Permalink to &quot;3-2-1 Rule in Detail&quot;"></a></h2>
<h3 id="backup-types" tabindex="-1">Backup Types <a class="header-anchor" href="#backup-types" aria-label="Permalink to &quot;Backup Types&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Type</th>
<th>Description</th>
<th>Interval</th>
<th>Storage Requirement</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Full backup</strong></td>
<td>Complete backup of all data</td>
<td>Weekly (Sunday)</td>
<td>100%</td>
</tr>
<tr>
<td><strong>Incremental</strong></td>
<td>Only data changed since last backup</td>
<td>Daily</td>
<td>~5-15%</td>
</tr>
<tr>
<td><strong>Configuration backup</strong></td>
<td>Git-based versioning of all configs</td>
<td>Upon every change</td>
<td>Minimal</td>
</tr>
</tbody>
</table>
<h3 id="backup-targets-by-data-type" tabindex="-1">Backup Targets by Data Type <a class="header-anchor" href="#backup-targets-by-data-type" aria-label="Permalink to &quot;Backup Targets by Data Type&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Data Type</th>
<th>Primary Backup</th>
<th>Secondary Backup</th>
<th>Offsite</th>
<th>Encryption</th>
<th>Retention</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Databases</strong></td>
<td>Local storage</td>
<td>Object storage (cloud)</td>
<td>Yes</td>
<td>AES-256</td>
<td>90 days</td>
</tr>
<tr>
<td><strong>Customer data</strong></td>
<td>Local storage</td>
<td>Object storage (cloud)</td>
<td>Yes</td>
<td>AES-256</td>
<td>Per contract, min. 30d</td>
</tr>
<tr>
<td><strong>Server configurations</strong></td>
<td>Git repository</td>
<td>Remote repository</td>
<td>Yes</td>
<td>Repository-level</td>
<td>Indefinite</td>
</tr>
<tr>
<td><strong>Email archive</strong></td>
<td>Local storage</td>
<td>Object storage</td>
<td>Yes</td>
<td>AES-256</td>
<td>90 days</td>
</tr>
<tr>
<td><strong>Key material</strong></td>
<td>Encrypted vault</td>
<td>Offline copy</td>
<td>Yes (physically separated)</td>
<td>AES-256 + passphrase</td>
<td>Lifetime of the key</td>
</tr>
</tbody>
</table>
<div class="tip custom-block"><p class="custom-block-title">3-2-1 RULE</p>
<p>Maintain at least <strong>3</strong> copies of data, on <strong>2</strong> different media types, with <strong>1</strong> copy stored offsite. This principle is the foundation for resilient data protection per §30(2) No. 3 BSIG.</p>
</div>
<h2 id="restore-verification" tabindex="-1">Restore Verification <a class="header-anchor" href="#restore-verification" aria-label="Permalink to &quot;Restore Verification&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Test</th>
<th>Interval</th>
<th>Scope</th>
<th>Acceptance Criterion</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Automated integrity check</strong></td>
<td>With every backup</td>
<td>Checksum</td>
<td>Checksum matches</td>
</tr>
<tr>
<td><strong>Restore test (sample)</strong></td>
<td>Monthly</td>
<td>Individual files / databases</td>
<td>Data correct and complete</td>
</tr>
<tr>
<td><strong>Full restore test</strong></td>
<td>Quarterly</td>
<td>Complete system</td>
<td>RTO met, data consistent</td>
</tr>
<tr>
<td><strong>DR simulation</strong></td>
<td>Annually</td>
<td>Entire infrastructure</td>
<td>All RTO/RPO targets achieved</td>
</tr>
</tbody>
</table>
<h2 id="monitoring" tabindex="-1">Monitoring <a class="header-anchor" href="#monitoring" aria-label="Permalink to &quot;Monitoring&quot;"></a></h2>
<ul>
<li>Backup success/failure is monitored automatically</li>
<li>Failed backups generate immediate alerts</li>
<li>Storage capacity and retention periods are monitored</li>
<li>Monthly backup report to CISO</li>
</ul>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Crisis Management]]></title>
            <link>https://nis2.docs.bauer-group.com/en/business-continuity/crisis-management</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/business-continuity/crisis-management</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Crisis Management

## Crisis Definition

A crisis exists when a security incident:

- Threatens the operational capability of the organization
- Affects multiple systems or locations simultaneously
- Requires external communication with customers, authorities or media
- Exceeds the capacity of regular escalation channels

## Crisis Team

| Role | Person | Task |
|]]></description>
            <content:encoded><![CDATA[<h1 id="crisis-management" tabindex="-1">Crisis Management <a class="header-anchor" href="#crisis-management" aria-label="Permalink to &quot;Crisis Management&quot;"></a></h1>
<h2 id="crisis-definition" tabindex="-1">Crisis Definition <a class="header-anchor" href="#crisis-definition" aria-label="Permalink to &quot;Crisis Definition&quot;"></a></h2>
<p>A crisis exists when a security incident:</p>
<ul>
<li>Threatens the operational capability of the organization</li>
<li>Affects multiple systems or locations simultaneously</li>
<li>Requires external communication with customers, authorities or media</li>
<li>Exceeds the capacity of regular escalation channels</li>
</ul>
<h2 id="crisis-team" tabindex="-1">Crisis Team <a class="header-anchor" href="#crisis-team" aria-label="Permalink to &quot;Crisis Team&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Role</th>
<th>Person</th>
<th>Task</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Crisis team lead</strong></td>
<td>Executive Management</td>
<td>Decision-making, resource allocation, external communication</td>
</tr>
<tr>
<td><strong>Technical lead</strong></td>
<td>CISO</td>
<td>Situational awareness, technical coordination of measures</td>
</tr>
<tr>
<td><strong>IT Operations</strong></td>
<td>IT Management</td>
<td>Recovery, system management</td>
</tr>
<tr>
<td><strong>Communications</strong></td>
<td>Executive Management / PR</td>
<td>Customer, authority and media communication (if applicable)</td>
</tr>
<tr>
<td><strong>Legal / Data Protection</strong></td>
<td>DPO / external counsel</td>
<td>GDPR reporting, criminal complaint, liability matters</td>
</tr>
</tbody>
</table>
<h2 id="crisis-process" tabindex="-1">Crisis Process <a class="header-anchor" href="#crisis-process" aria-label="Permalink to &quot;Crisis Process&quot;"></a></h2>
<h3 id="phase-1-alerting-1-hour" tabindex="-1">Phase 1: Alerting (&lt; 1 hour) <a class="header-anchor" href="#phase-1-alerting-1-hour" aria-label="Permalink to &quot;Phase 1: Alerting (&lt; 1 hour)&quot;"></a></h3>
<ul>
<li>CISO alerts crisis team via mobile phone (no email if systems are compromised)</li>
<li>Initial situation report: What is known, what is affected, what is the immediate threat?</li>
<li>Crisis team meeting (on-site or conference call via backup channel)</li>
</ul>
<h3 id="phase-2-situational-awareness-4-hours" tabindex="-1">Phase 2: Situational Awareness (&lt; 4 hours) <a class="header-anchor" href="#phase-2-situational-awareness-4-hours" aria-label="Permalink to &quot;Phase 2: Situational Awareness (&lt; 4 hours)&quot;"></a></h3>
<ul>
<li>Complete impact analysis</li>
<li>Decision on communication strategy</li>
<li>Prepare BSI report (if reportable incident)</li>
<li>Prepare customer notification (if affected)</li>
</ul>
<h3 id="phase-3-response-days-to-weeks" tabindex="-1">Phase 3: Response (days to weeks) <a class="header-anchor" href="#phase-3-response-days-to-weeks" aria-label="Permalink to &quot;Phase 3: Response (days to weeks)&quot;"></a></h3>
<ul>
<li>Coordinated recovery per DR plan</li>
<li>Regular crisis team updates (at least daily)</li>
<li>Ongoing BSI communication</li>
<li>Customer communication (status updates)</li>
</ul>
<h3 id="phase-4-return-to-normal-operations" tabindex="-1">Phase 4: Return to Normal Operations <a class="header-anchor" href="#phase-4-return-to-normal-operations" aria-label="Permalink to &quot;Phase 4: Return to Normal Operations&quot;"></a></h3>
<ul>
<li>Verification of all restored systems</li>
<li>Formal end of crisis mode by executive management</li>
<li>Handover to regular operations</li>
</ul>
<h3 id="phase-5-post-incident-review-30-days" tabindex="-1">Phase 5: Post-Incident Review (&lt; 30 days) <a class="header-anchor" href="#phase-5-post-incident-review-30-days" aria-label="Permalink to &quot;Phase 5: Post-Incident Review (&lt; 30 days)&quot;"></a></h3>
<ul>
<li>Comprehensive post-mortem analysis</li>
<li>BSI final report</li>
<li>Lessons learned and action plan</li>
<li>Update of DR plan, playbooks and risk analysis</li>
</ul>
<h2 id="exercise-types" tabindex="-1">Exercise Types <a class="header-anchor" href="#exercise-types" aria-label="Permalink to &quot;Exercise Types&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Exercise Type</th>
<th>Interval</th>
<th>Participants</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Tabletop exercise</strong></td>
<td>Annually</td>
<td>Crisis team + IT</td>
</tr>
<tr>
<td><strong>Communication exercise</strong></td>
<td>Annually</td>
<td>Crisis team</td>
</tr>
<tr>
<td><strong>Technical DR simulation</strong></td>
<td>Annually</td>
<td>IT team</td>
</tr>
</tbody>
</table>
<div class="tip custom-block"><p class="custom-block-title">EXERCISE PLANNING</p>
<p>Crisis exercises should cover a variety of scenarios over time, including ransomware, data center outage, supply chain compromise and data breach. Each exercise should be documented with findings and improvement actions.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Disaster Recovery]]></title>
            <link>https://nis2.docs.bauer-group.com/en/business-continuity/disaster-recovery</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/business-continuity/disaster-recovery</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Disaster Recovery

## Recovery Objectives

| Service Category | RTO | RPO | Priority |
|]]></description>
            <content:encoded><![CDATA[<h1 id="disaster-recovery" tabindex="-1">Disaster Recovery <a class="header-anchor" href="#disaster-recovery" aria-label="Permalink to &quot;Disaster Recovery&quot;"></a></h1>
<h2 id="recovery-objectives" tabindex="-1">Recovery Objectives <a class="header-anchor" href="#recovery-objectives" aria-label="Permalink to &quot;Recovery Objectives&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Service Category</th>
<th>RTO</th>
<th>RPO</th>
<th>Priority</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Critical production systems</strong></td>
<td>&lt; 4 hours</td>
<td>&lt; 1 hour</td>
<td>1 – Immediate recovery</td>
</tr>
<tr>
<td><strong>Customer-facing services</strong></td>
<td>&lt; 8 hours</td>
<td>&lt; 4 hours</td>
<td>2 – High priority</td>
</tr>
<tr>
<td><strong>Internal systems</strong></td>
<td>&lt; 24 hours</td>
<td>&lt; 24 hours</td>
<td>3 – Normal</td>
</tr>
<tr>
<td><strong>Archive / documentation</strong></td>
<td>&lt; 72 hours</td>
<td>&lt; 1 week</td>
<td>4 – Low</td>
</tr>
</tbody>
</table>
<h2 id="recovery-procedures" tabindex="-1">Recovery Procedures <a class="header-anchor" href="#recovery-procedures" aria-label="Permalink to &quot;Recovery Procedures&quot;"></a></h2>
<h3 id="scenario-single-system-failure" tabindex="-1">Scenario: Single System Failure <a class="header-anchor" href="#scenario-single-system-failure" aria-label="Permalink to &quot;Scenario: Single System Failure&quot;"></a></h3>
<ol>
<li>Identify root cause (hardware, software, configuration)</li>
<li>Activate failover (if available)</li>
<li>Restore system from backup or rebuild</li>
<li>Apply configuration from Git repository</li>
<li>Verify integrity before returning to production</li>
<li>Enhance monitoring for 24 hours</li>
</ol>
<h3 id="scenario-ransomware" tabindex="-1">Scenario: Ransomware <a class="header-anchor" href="#scenario-ransomware" aria-label="Permalink to &quot;Scenario: Ransomware&quot;"></a></h3>
<ol>
<li><strong>Immediately:</strong> Isolate all affected systems from the network</li>
<li>Determine scope of encryption</li>
<li>Verify backup integrity (identify clean backups)</li>
<li>Restore systems from verified backups</li>
<li>Rotate all credentials</li>
<li>Close attack vector before bringing systems back online</li>
</ol>
<div class="danger custom-block"><p class="custom-block-title">NO RANSOM PAYMENTS</p>
<p>The BAUER GROUP does not pay ransom under any circumstances. Payment finances criminal organizations and provides no guarantee of data recovery.</p>
</div>
<h3 id="scenario-data-center-outage" tabindex="-1">Scenario: Data Center Outage <a class="header-anchor" href="#scenario-data-center-outage" aria-label="Permalink to &quot;Scenario: Data Center Outage&quot;"></a></h3>
<ol>
<li>Activate crisis team</li>
<li>Failover to secondary site (if available)</li>
<li>Prioritized recovery by service category</li>
<li>Activate customer communication</li>
<li>Ensure provisional operations</li>
<li>Complete recovery after primary site availability</li>
</ol>
<h2 id="failover-systems" tabindex="-1">Failover Systems <a class="header-anchor" href="#failover-systems" aria-label="Permalink to &quot;Failover Systems&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>System</th>
<th>Failover Type</th>
<th>Switchover Time</th>
</tr>
</thead>
<tbody>
<tr>
<td>DNS</td>
<td>Automatic (Anycast / health check)</td>
<td>&lt; 5 minutes</td>
</tr>
<tr>
<td>Web applications</td>
<td>Manual (backup deployment)</td>
<td>&lt; 1 hour</td>
</tr>
<tr>
<td>Databases</td>
<td>Replication (for critical systems)</td>
<td>&lt; 15 minutes</td>
</tr>
<tr>
<td>Email</td>
<td>Secondary MX record</td>
<td>Automatic</td>
</tr>
</tbody>
</table>
<h2 id="dr-test-schedule" tabindex="-1">DR Test Schedule <a class="header-anchor" href="#dr-test-schedule" aria-label="Permalink to &quot;DR Test Schedule&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Test</th>
<th>Interval</th>
<th>Scope</th>
</tr>
</thead>
<tbody>
<tr>
<td>Tabletop exercise</td>
<td>Semi-annually</td>
<td>Walk through a scenario without actual system changes</td>
</tr>
<tr>
<td>Restore test</td>
<td>Quarterly</td>
<td>Actual restoration of individual systems</td>
</tr>
<tr>
<td>Full DR simulation</td>
<td>Annually</td>
<td>Complete failover scenario with time measurement</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[CRA & AI Act Synergies (Detail)]]></title>
            <link>https://nis2.docs.bauer-group.com/en/compliance-matrix/synergies</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/compliance-matrix/synergies</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# CRA & AI Act Synergies (Detail)

## Detailed Requirement Mapping

### §30 No. 2 -- Incident Management vs. CRA Art. 14

| Aspect | NIS2 (§32 BSIG) | CRA (Art. 14) | Synergy |
|]]></description>
            <content:encoded><![CDATA[<h1 id="cra-ai-act-synergies-detail" tabindex="-1">CRA &amp; AI Act Synergies (Detail) <a class="header-anchor" href="#cra-ai-act-synergies-detail" aria-label="Permalink to &quot;CRA &amp; AI Act Synergies (Detail)&quot;"></a></h1>
<h2 id="detailed-requirement-mapping" tabindex="-1">Detailed Requirement Mapping <a class="header-anchor" href="#detailed-requirement-mapping" aria-label="Permalink to &quot;Detailed Requirement Mapping&quot;"></a></h2>
<h3 id="§30-no-2-incident-management-vs-cra-art-14" tabindex="-1">§30 No. 2 -- Incident Management vs. CRA Art. 14 <a class="header-anchor" href="#§30-no-2-incident-management-vs-cra-art-14" aria-label="Permalink to &quot;§30 No. 2 -- Incident Management vs. CRA Art. 14&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>NIS2 (§32 BSIG)</th>
<th>CRA (Art. 14)</th>
<th>Synergy</th>
</tr>
</thead>
<tbody>
<tr>
<td>Trigger</td>
<td>Significant operational incident</td>
<td>Product vulnerability / incident</td>
<td>Shared initial assessment process</td>
</tr>
<tr>
<td>Early warning</td>
<td>24h to BSI</td>
<td>24h to ENISA</td>
<td>Parallel notification using shared template</td>
</tr>
<tr>
<td>Detailed report</td>
<td>72h</td>
<td>72h</td>
<td>Data reusable</td>
</tr>
<tr>
<td>Final report</td>
<td>1 month</td>
<td>14 days</td>
<td>Separate reports, shared root cause analysis</td>
</tr>
<tr>
<td>Templates</td>
<td><a href="/en/incident-management/reporting">NIS2 Reporting Obligations</a></td>
<td><a href="https://cra.docs.bauer-group.com/en/incident-response/enisa-reporting" target="_blank" rel="noreferrer">CRA ENISA Reporting</a></td>
<td>Designed for compatibility</td>
</tr>
</tbody>
</table>
<h3 id="§30-no-4-supply-chain-vs-cra-annex-i-part-ii-no-1" tabindex="-1">§30 No. 4 -- Supply Chain vs. CRA Annex I Part II No. 1 <a class="header-anchor" href="#§30-no-4-supply-chain-vs-cra-annex-i-part-ii-no-1" aria-label="Permalink to &quot;§30 No. 4 -- Supply Chain vs. CRA Annex I Part II No. 1&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>NIS2</th>
<th>CRA</th>
<th>Synergy</th>
</tr>
</thead>
<tbody>
<tr>
<td>Software dependencies</td>
<td>-- (NIS2 references CRA)</td>
<td><a href="https://cra.docs.bauer-group.com/en/supply-chain/" target="_blank" rel="noreferrer">SBOM + Dependency Policy</a></td>
<td>CRA leading</td>
</tr>
<tr>
<td>IT service providers</td>
<td><a href="/en/supply-chain/vendor-assessment">Vendor Assessment</a></td>
<td>--</td>
<td>NIS2 leading</td>
</tr>
<tr>
<td>Contractual requirements</td>
<td><a href="/en/supply-chain/contractual-requirements">Security Clauses</a></td>
<td>Annex I Part II No. 1</td>
<td>Shared contractual standards</td>
</tr>
</tbody>
</table>
<h3 id="§30-no-5-vulnerabilities-vs-cra-art-10-11" tabindex="-1">§30 No. 5 -- Vulnerabilities vs. CRA Art. 10/11 <a class="header-anchor" href="#§30-no-5-vulnerabilities-vs-cra-art-10-11" aria-label="Permalink to &quot;§30 No. 5 -- Vulnerabilities vs. CRA Art. 10/11&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>NIS2</th>
<th>CRA</th>
<th>Synergy</th>
</tr>
</thead>
<tbody>
<tr>
<td>CVE monitoring (products)</td>
<td>-- (NIS2 references CRA)</td>
<td><a href="https://cra.docs.bauer-group.com/en/vulnerability-management/" target="_blank" rel="noreferrer">CRA Vulnerability Management</a></td>
<td>CRA leading</td>
</tr>
<tr>
<td>CVE monitoring (infrastructure)</td>
<td><a href="/en/vulnerability-management/scanning">Scanning</a></td>
<td>--</td>
<td>NIS2 leading</td>
</tr>
<tr>
<td>Patch management</td>
<td><a href="/en/vulnerability-management/patch-management">Patch Management</a></td>
<td>CRA: Product updates</td>
<td>Shared timelines</td>
</tr>
<tr>
<td>Secure development</td>
<td><a href="/en/vulnerability-management/secure-development">Secure Development</a></td>
<td>CRA: Security by design</td>
<td>Shared development standards</td>
</tr>
</tbody>
</table>
<h3 id="ai-act-synergies" tabindex="-1">AI Act Synergies <a class="header-anchor" href="#ai-act-synergies" aria-label="Permalink to &quot;AI Act Synergies&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>NIS2 Measure</th>
<th>AI Act Article</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>No. 1 -- Risk management</td>
<td>Art. 9 (Risk management system)</td>
<td>NIS2 ISMS provides the methodological foundation for AI risk management</td>
</tr>
<tr>
<td>No. 7 -- Training</td>
<td>Art. 4 (AI Literacy)</td>
<td><a href="https://ai-act.docs.bauer-group.com/en/governance/" target="_blank" rel="noreferrer">AI Act Training Program</a> as extension</td>
</tr>
<tr>
<td>No. 8 -- Cryptography</td>
<td>Art. 15 (Cybersecurity)</td>
<td>Cryptography standards also apply to AI systems</td>
</tr>
<tr>
<td>No. 9 -- Access control</td>
<td>Art. 14 (Human oversight)</td>
<td>Access control concepts as foundation for AI oversight</td>
</tr>
</tbody>
</table>
<h2 id="overall-architecture" tabindex="-1">Overall Architecture <a class="header-anchor" href="#overall-architecture" aria-label="Permalink to &quot;Overall Architecture&quot;"></a></h2>
<div class="language- vp-adaptive-theme"><button title="Copy Code" class="copy"></button><span class="lang"></span><pre class="shiki shiki-themes github-light github-dark vp-code" tabindex="0" v-pre=""><code><span class="line"><span>NIS2 (Organization &#x26; Operations)</span></span>
<span class="line"><span>  +-- Risk Management &#x3C;---- AI Act (AI Risk Management, Art. 9)</span></span>
<span class="line"><span>  +-- Incident Management &#x3C;---- CRA (Product Incidents, Art. 14)</span></span>
<span class="line"><span>  +-- Supply Chain &#x3C;---- CRA (Software SBOM, Annex I)</span></span>
<span class="line"><span>  +-- Vulnerabilities &#x3C;---- CRA (Product CVEs, Art. 10/11)</span></span>
<span class="line"><span>  +-- Training &#x3C;---- AI Act (AI Literacy, Art. 4)</span></span>
<span class="line"><span>  +-- Cryptography &#x3C;---- AI Act (Cybersecurity, Art. 15)</span></span>
<span class="line"><span>                    &#x3C;---- CRA (Product Encryption, Annex I)</span></span></code></pre>
</div>]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Encryption Standards]]></title>
            <link>https://nis2.docs.bauer-group.com/en/cryptography/encryption-standards</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/cryptography/encryption-standards</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Encryption Standards

## Protocol Requirements

### TLS (Transport Layer Security)

| Requirement | Standard |
|]]></description>
            <content:encoded><![CDATA[<h1 id="encryption-standards" tabindex="-1">Encryption Standards <a class="header-anchor" href="#encryption-standards" aria-label="Permalink to &quot;Encryption Standards&quot;"></a></h1>
<h2 id="protocol-requirements" tabindex="-1">Protocol Requirements <a class="header-anchor" href="#protocol-requirements" aria-label="Permalink to &quot;Protocol Requirements&quot;"></a></h2>
<h3 id="tls-transport-layer-security" tabindex="-1">TLS (Transport Layer Security) <a class="header-anchor" href="#tls-transport-layer-security" aria-label="Permalink to &quot;TLS (Transport Layer Security)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Requirement</th>
<th>Standard</th>
</tr>
</thead>
<tbody>
<tr>
<td>Minimum version</td>
<td>TLS 1.2</td>
</tr>
<tr>
<td>Recommended version</td>
<td>TLS 1.3</td>
</tr>
<tr>
<td>Prohibited versions</td>
<td>SSL 3.0, TLS 1.0, TLS 1.1</td>
</tr>
<tr>
<td>Cipher suites (TLS 1.3)</td>
<td>TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_AES_128_GCM_SHA256</td>
</tr>
<tr>
<td>HSTS</td>
<td>Enabled with min. 1 year, includeSubDomains</td>
</tr>
</tbody>
</table>
<h3 id="ssh" tabindex="-1">SSH <a class="header-anchor" href="#ssh" aria-label="Permalink to &quot;SSH&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Requirement</th>
<th>Standard</th>
</tr>
</thead>
<tbody>
<tr>
<td>Key type</td>
<td>Ed25519 (preferred), RSA-4096 (fallback)</td>
</tr>
<tr>
<td>Password login</td>
<td>Disabled</td>
</tr>
<tr>
<td>Root login</td>
<td>Disabled</td>
</tr>
<tr>
<td>Protocol version</td>
<td>SSH-2 exclusively</td>
</tr>
</tbody>
</table>
<h3 id="email-smtp" tabindex="-1">Email (SMTP) <a class="header-anchor" href="#email-smtp" aria-label="Permalink to &quot;Email (SMTP)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Requirement</th>
<th>Standard</th>
</tr>
</thead>
<tbody>
<tr>
<td>Transport encryption</td>
<td>STARTTLS (opportunistic), MTA-STS (enforced)</td>
</tr>
<tr>
<td>SPF</td>
<td>Configured for all domains</td>
</tr>
<tr>
<td>DKIM</td>
<td>Signing active, key length ≥ 2048 bit</td>
</tr>
<tr>
<td>DMARC</td>
<td>Policy: reject, reporting active</td>
</tr>
</tbody>
</table>
<h2 id="database-encryption" tabindex="-1">Database Encryption <a class="header-anchor" href="#database-encryption" aria-label="Permalink to &quot;Database Encryption&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Type</th>
<th>Method</th>
<th>Application</th>
</tr>
</thead>
<tbody>
<tr>
<td>Transparent Data Encryption (TDE)</td>
<td>AES-256</td>
<td>Entire database at rest</td>
</tr>
<tr>
<td>Column-level encryption</td>
<td>AES-256</td>
<td>Highly sensitive fields (credentials, PII)</td>
</tr>
<tr>
<td>Connection encryption</td>
<td>TLS 1.2+</td>
<td>All database connections</td>
</tr>
</tbody>
</table>
<h2 id="backup-encryption" tabindex="-1">Backup Encryption <a class="header-anchor" href="#backup-encryption" aria-label="Permalink to &quot;Backup Encryption&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>Standard</th>
</tr>
</thead>
<tbody>
<tr>
<td>Algorithm</td>
<td>AES-256</td>
</tr>
<tr>
<td>Key management</td>
<td>Separate key per backup set</td>
</tr>
<tr>
<td>Key rotation</td>
<td>On every full backup</td>
</tr>
<tr>
<td>Key storage</td>
<td>Separate from backup, encrypted vault</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Key Management & Certificate Management]]></title>
            <link>https://nis2.docs.bauer-group.com/en/cryptography/key-management</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/cryptography/key-management</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Key Management & Certificate Management

## Key Lifecycle

| Phase | Requirements |
|]]></description>
            <content:encoded><![CDATA[<h1 id="key-management-certificate-management" tabindex="-1">Key Management &amp; Certificate Management <a class="header-anchor" href="#key-management-certificate-management" aria-label="Permalink to &quot;Key Management &amp; Certificate Management&quot;"></a></h1>
<h2 id="key-lifecycle" tabindex="-1">Key Lifecycle <a class="header-anchor" href="#key-lifecycle" aria-label="Permalink to &quot;Key Lifecycle&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Phase</th>
<th>Requirements</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Generation</strong></td>
<td>Cryptographically secure random number generators (CSPRNG), minimum key lengths per BSI TR-02102</td>
</tr>
<tr>
<td><strong>Distribution</strong></td>
<td>Encrypted channel, personalized handover, no plaintext transmission</td>
</tr>
<tr>
<td><strong>Storage</strong></td>
<td>Encrypted storage, need-to-know access control, audit trail</td>
</tr>
<tr>
<td><strong>Usage</strong></td>
<td>Only for defined purpose, no repurposing</td>
</tr>
<tr>
<td><strong>Rotation</strong></td>
<td>Scheduled per rotation intervals, unscheduled upon suspected compromise</td>
</tr>
<tr>
<td><strong>Archival</strong></td>
<td>Encrypted, time-limited, only for decryption of legacy data</td>
</tr>
<tr>
<td><strong>Destruction</strong></td>
<td>Secure deletion (cryptographic erasure or physical destruction), documented</td>
</tr>
</tbody>
</table>
<h2 id="rotation-intervals" tabindex="-1">Rotation Intervals <a class="header-anchor" href="#rotation-intervals" aria-label="Permalink to &quot;Rotation Intervals&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Key Type</th>
<th>Rotation</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>TLS certificates</td>
<td>90 days (Let's Encrypt automated)</td>
<td>Automated renewal</td>
</tr>
<tr>
<td>SSH keys</td>
<td>Annually or upon personnel change</td>
<td>Personalized keys</td>
</tr>
<tr>
<td>API keys</td>
<td>Annually or upon suspected compromise</td>
<td>Automated where possible</td>
</tr>
<tr>
<td>Backup keys</td>
<td>On every full backup</td>
<td>Archive old key for restore</td>
</tr>
<tr>
<td>Database keys</td>
<td>Annually</td>
<td>Planned rotation during maintenance window</td>
</tr>
</tbody>
</table>
<h2 id="certificate-management" tabindex="-1">Certificate Management <a class="header-anchor" href="#certificate-management" aria-label="Permalink to &quot;Certificate Management&quot;"></a></h2>
<h3 id="inventory" tabindex="-1">Inventory <a class="header-anchor" href="#inventory" aria-label="Permalink to &quot;Inventory&quot;"></a></h3>
<p>All certificates are tracked centrally:</p>
<table tabindex="0">
<thead>
<tr>
<th>Attribute</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Domain / Common Name</td>
<td>Which domain the certificate covers</td>
</tr>
<tr>
<td>Issuer</td>
<td>CA (Let's Encrypt, internal CA)</td>
</tr>
<tr>
<td>Expiry date</td>
<td>Automatic monitoring</td>
</tr>
<tr>
<td>Renewal process</td>
<td>Automatic / Manual</td>
</tr>
<tr>
<td>Responsible party</td>
<td>Assigned administrator</td>
</tr>
</tbody>
</table>
<h3 id="monitoring" tabindex="-1">Monitoring <a class="header-anchor" href="#monitoring" aria-label="Permalink to &quot;Monitoring&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Check</th>
<th>Interval</th>
<th>Action on Finding</th>
</tr>
</thead>
<tbody>
<tr>
<td>Expiry date check</td>
<td>Daily (automated)</td>
<td>Alert 30 days before expiry, escalation 7 days before expiry</td>
</tr>
<tr>
<td>Certificate chain validation</td>
<td>Weekly</td>
<td>Alert on invalid chain</td>
</tr>
<tr>
<td>Revocation status (OCSP/CRL)</td>
<td>On every connection (client)</td>
<td>Reject connection for revoked certificate</td>
</tr>
</tbody>
</table>
<h3 id="revocation-process" tabindex="-1">Revocation Process <a class="header-anchor" href="#revocation-process" aria-label="Permalink to &quot;Revocation Process&quot;"></a></h3>
<p>Upon compromise of a certificate:</p>
<ol>
<li>Immediate revocation at the CA</li>
<li>Issue and deploy a new certificate</li>
<li>Verify whether the compromised key was used elsewhere</li>
<li>Document the incident and incorporate into risk analysis</li>
</ol>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Audit Program]]></title>
            <link>https://nis2.docs.bauer-group.com/en/effectiveness-review/audit-program</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/effectiveness-review/audit-program</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Audit Program

## Audit Types

| Type | Description | Interval | Conducted by |
|]]></description>
            <content:encoded><![CDATA[<h1 id="audit-program" tabindex="-1">Audit Program <a class="header-anchor" href="#audit-program" aria-label="Permalink to &quot;Audit Program&quot;"></a></h1>
<h2 id="audit-types" tabindex="-1">Audit Types <a class="header-anchor" href="#audit-types" aria-label="Permalink to &quot;Audit Types&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Type</th>
<th>Description</th>
<th>Interval</th>
<th>Conducted by</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Internal Audit</strong></td>
<td>Review of ISMS conformity and measure implementation</td>
<td>Annually</td>
<td>ISO</td>
</tr>
<tr>
<td><strong>Technical Audit</strong></td>
<td>Configuration review, hardening check, vulnerability assessment</td>
<td>Semi-annually</td>
<td>IT + ISO</td>
</tr>
<tr>
<td><strong>Penetration Test</strong></td>
<td>Simulated attack on infrastructure and applications</td>
<td>Annually</td>
<td>External provider</td>
</tr>
<tr>
<td><strong>Authorization Audit</strong></td>
<td>Review of all access rights for currency and necessity</td>
<td>Semi-annually</td>
<td>ISO</td>
</tr>
<tr>
<td><strong>Backup Audit</strong></td>
<td>Restore tests and backup integrity verification</td>
<td>Quarterly</td>
<td>IT Operations</td>
</tr>
<tr>
<td><strong>Vendor Audit</strong></td>
<td>Review of critical vendors for contractual compliance</td>
<td>Annually</td>
<td>ISO + Procurement</td>
</tr>
</tbody>
</table>
<h2 id="audit-scope" tabindex="-1">Audit Scope <a class="header-anchor" href="#audit-scope" aria-label="Permalink to &quot;Audit Scope&quot;"></a></h2>
<h3 id="internal-isms-audit" tabindex="-1">Internal ISMS Audit <a class="header-anchor" href="#internal-isms-audit" aria-label="Permalink to &quot;Internal ISMS Audit&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Review Area</th>
<th>Audit Points</th>
</tr>
</thead>
<tbody>
<tr>
<td>Information security policy</td>
<td>Currency, management sign-off, dissemination</td>
</tr>
<tr>
<td>Risk analysis</td>
<td>Completeness, currency, risk treatment plans</td>
</tr>
<tr>
<td>Incident management</td>
<td>Process documentation, exercises, reporting deadlines</td>
</tr>
<tr>
<td>Access control</td>
<td>MFA enforcement, permissions, on-/offboarding</td>
</tr>
<tr>
<td>Training</td>
<td>Completion rates, content currency</td>
</tr>
<tr>
<td>Business continuity</td>
<td>Backup tests, DR plan, crisis exercises</td>
</tr>
</tbody>
</table>
<h3 id="penetration-test-scope" tabindex="-1">Penetration Test Scope <a class="header-anchor" href="#penetration-test-scope" aria-label="Permalink to &quot;Penetration Test Scope&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Scope</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>External attack surface</strong></td>
<td>Publicly reachable services, web applications, APIs</td>
</tr>
<tr>
<td><strong>Internal infrastructure</strong></td>
<td>Network segmentation, lateral movement, privilege escalation</td>
</tr>
<tr>
<td><strong>Social engineering</strong></td>
<td>Phishing simulation (optional, by arrangement)</td>
</tr>
<tr>
<td><strong>Excluded</strong></td>
<td>Denial-of-service tests against production systems</td>
</tr>
</tbody>
</table>
<h2 id="audit-documentation" tabindex="-1">Audit Documentation <a class="header-anchor" href="#audit-documentation" aria-label="Permalink to &quot;Audit Documentation&quot;"></a></h2>
<p>Every audit is documented with:</p>
<ul>
<li>Audit scope and timeframe</li>
<li>Audit methodology</li>
<li>Findings with severity rating (Critical / High / Medium / Low / Informational)</li>
<li>Recommended remediation measures</li>
<li>Responsible party and remediation deadline</li>
<li>Follow-up date</li>
</ul>
<h2 id="finding-management" tabindex="-1">Finding Management <a class="header-anchor" href="#finding-management" aria-label="Permalink to &quot;Finding Management&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Severity</th>
<th>Remediation Deadline</th>
<th>Escalation</th>
</tr>
</thead>
<tbody>
<tr>
<td>Critical</td>
<td>48 hours</td>
<td>Immediate escalation to management</td>
</tr>
<tr>
<td>High</td>
<td>30 days</td>
<td>To ISO in next regular report</td>
</tr>
<tr>
<td>Medium</td>
<td>90 days</td>
<td>Quarterly report</td>
</tr>
<tr>
<td>Low</td>
<td>Next audit cycle</td>
<td>None</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[KPIs & Metrics]]></title>
            <link>https://nis2.docs.bauer-group.com/en/effectiveness-review/kpis</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/effectiveness-review/kpis</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# KPIs & Metrics

## Security KPIs

### Vulnerability Management

| KPI | Definition | Target | Measurement |
|]]></description>
            <content:encoded><![CDATA[<h1 id="kpis-metrics" tabindex="-1">KPIs &amp; Metrics <a class="header-anchor" href="#kpis-metrics" aria-label="Permalink to &quot;KPIs &amp; Metrics&quot;"></a></h1>
<h2 id="security-kpis" tabindex="-1">Security KPIs <a class="header-anchor" href="#security-kpis" aria-label="Permalink to &quot;Security KPIs&quot;"></a></h2>
<h3 id="vulnerability-management" tabindex="-1">Vulnerability Management <a class="header-anchor" href="#vulnerability-management" aria-label="Permalink to &quot;Vulnerability Management&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>KPI</th>
<th>Definition</th>
<th>Target</th>
<th>Measurement</th>
</tr>
</thead>
<tbody>
<tr>
<td>Patch compliance</td>
<td>% of vulnerabilities patched within defined deadlines</td>
<td>≥ 95%</td>
<td>Monthly</td>
</tr>
<tr>
<td>Open critical vulnerabilities</td>
<td>Count of unpatched CVSS ≥ 9.0 vulnerabilities</td>
<td>0</td>
<td>Weekly</td>
</tr>
<tr>
<td>Mean Time to Patch (MTTP)</td>
<td>Average days until patch deployment</td>
<td>Critical: &lt; 2d, High: &lt; 7d</td>
<td>Monthly</td>
</tr>
</tbody>
</table>
<h3 id="incident-management" tabindex="-1">Incident Management <a class="header-anchor" href="#incident-management" aria-label="Permalink to &quot;Incident Management&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>KPI</th>
<th>Definition</th>
<th>Target</th>
<th>Measurement</th>
</tr>
</thead>
<tbody>
<tr>
<td>Mean Time to Detect (MTTD)</td>
<td>Time from attack onset to detection</td>
<td>&lt; 24 hours</td>
<td>Per incident</td>
</tr>
<tr>
<td>Mean Time to Respond (MTTR)</td>
<td>Time from detection to containment</td>
<td>Critical: &lt; 4h, High: &lt; 24h</td>
<td>Per incident</td>
</tr>
<tr>
<td>Reporting compliance</td>
<td>% of incidents reported to BSI within required deadlines</td>
<td>100%</td>
<td>Per incident</td>
</tr>
</tbody>
</table>
<h3 id="access-control" tabindex="-1">Access Control <a class="header-anchor" href="#access-control" aria-label="Permalink to &quot;Access Control&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>KPI</th>
<th>Definition</th>
<th>Target</th>
<th>Measurement</th>
</tr>
</thead>
<tbody>
<tr>
<td>MFA coverage</td>
<td>% of accounts with active MFA</td>
<td>100% (external access)</td>
<td>Monthly</td>
</tr>
<tr>
<td>Orphaned accounts</td>
<td>Count of active accounts without a corresponding employee</td>
<td>0</td>
<td>Monthly</td>
</tr>
<tr>
<td>Offboarding compliance</td>
<td>% of accounts deactivated within 24h of departure</td>
<td>100%</td>
<td>Per event</td>
</tr>
</tbody>
</table>
<h3 id="business-continuity" tabindex="-1">Business Continuity <a class="header-anchor" href="#business-continuity" aria-label="Permalink to &quot;Business Continuity&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>KPI</th>
<th>Definition</th>
<th>Target</th>
<th>Measurement</th>
</tr>
</thead>
<tbody>
<tr>
<td>Backup success rate</td>
<td>% of successful backup jobs</td>
<td>≥ 99%</td>
<td>Daily</td>
</tr>
<tr>
<td>Restore success rate</td>
<td>% of successful restore tests</td>
<td>100%</td>
<td>Quarterly</td>
</tr>
<tr>
<td>RTO compliance</td>
<td>Recovery time within defined target</td>
<td>100%</td>
<td>Per test / incident</td>
</tr>
</tbody>
</table>
<h3 id="training" tabindex="-1">Training <a class="header-anchor" href="#training" aria-label="Permalink to &quot;Training&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>KPI</th>
<th>Definition</th>
<th>Target</th>
<th>Measurement</th>
</tr>
</thead>
<tbody>
<tr>
<td>Training completion</td>
<td>% of employees who completed mandatory training</td>
<td>100%</td>
<td>Annually</td>
</tr>
<tr>
<td>Management training</td>
<td>Management has completed cybersecurity training</td>
<td>Yes</td>
<td>Annually</td>
</tr>
<tr>
<td>Phishing click rate</td>
<td>% of employees clicking on simulated phishing</td>
<td>&lt; 5%</td>
<td>Semi-annually</td>
</tr>
</tbody>
</table>
<h2 id="reporting-structure" tabindex="-1">Reporting Structure <a class="header-anchor" href="#reporting-structure" aria-label="Permalink to &quot;Reporting Structure&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Report</th>
<th>Content</th>
<th>Recipient</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td>Security Dashboard</td>
<td>All KPIs at a glance</td>
<td>ISO</td>
<td>Continuous</td>
</tr>
<tr>
<td>Monthly Security Report</td>
<td>KPI trends, open findings, incidents</td>
<td>ISO + IT Lead</td>
<td>Monthly</td>
</tr>
<tr>
<td>Quarterly Management Report</td>
<td>KPI summary, risk status, measures</td>
<td>Management</td>
<td>Quarterly</td>
</tr>
<tr>
<td>Annual Security Report</td>
<td>Overall assessment, audit results, improvement plan</td>
<td>Management</td>
<td>Annually</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Management Duties per §38 BSIG]]></title>
            <link>https://nis2.docs.bauer-group.com/en/governance/management-duties</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/governance/management-duties</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Management Duties per §38 BSIG

## Legal Obligations

### §38(1) -- Approval and Supervision

Management is **personally obligated**:

| Duty | Description | Evidence |
|]]></description>
            <content:encoded><![CDATA[<h1 id="management-duties-per-§38-bsig" tabindex="-1">Management Duties per §38 BSIG <a class="header-anchor" href="#management-duties-per-§38-bsig" aria-label="Permalink to &quot;Management Duties per §38 BSIG&quot;"></a></h1>
<h2 id="legal-obligations" tabindex="-1">Legal Obligations <a class="header-anchor" href="#legal-obligations" aria-label="Permalink to &quot;Legal Obligations&quot;"></a></h2>
<h3 id="§38-1-approval-and-supervision" tabindex="-1">§38(1) -- Approval and Supervision <a class="header-anchor" href="#§38-1-approval-and-supervision" aria-label="Permalink to &quot;§38(1) -- Approval and Supervision&quot;"></a></h3>
<p>Management is <strong>personally obligated</strong>:</p>
<table tabindex="0">
<thead>
<tr>
<th>Duty</th>
<th>Description</th>
<th>Evidence</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Approval</strong></td>
<td>Formal approval of all risk management measures per §30</td>
<td>Signed approval document</td>
</tr>
<tr>
<td><strong>Supervision</strong></td>
<td>Ongoing control of proper implementation</td>
<td>Regular security reports, KPI reviews</td>
</tr>
</tbody>
</table>
<h3 id="§38-2-personal-liability" tabindex="-1">§38(2) -- Personal Liability <a class="header-anchor" href="#§38-2-personal-liability" aria-label="Permalink to &quot;§38(2) -- Personal Liability&quot;"></a></h3>
<ul>
<li>Management is personally liable for damages resulting from breach of their duties under paragraph 1</li>
<li><strong>Waiver agreements are void</strong></li>
<li><strong>Settlements on compensation claims are void</strong></li>
<li>Compensation claims of the entity against management cannot be excluded</li>
</ul>
<h3 id="§38-3-training-obligation" tabindex="-1">§38(3) -- Training Obligation <a class="header-anchor" href="#§38-3-training-obligation" aria-label="Permalink to &quot;§38(3) -- Training Obligation&quot;"></a></h3>
<ul>
<li>Management must <strong>regularly</strong> participate in training</li>
<li>Purpose: Sufficient knowledge for identifying and assessing risks</li>
<li>Content: Risk management practices and their impact on the entity's services</li>
</ul>
<h2 id="implementation-at-bauer-group" tabindex="-1">Implementation at BAUER GROUP <a class="header-anchor" href="#implementation-at-bauer-group" aria-label="Permalink to &quot;Implementation at BAUER GROUP&quot;"></a></h2>
<h3 id="approval-process" tabindex="-1">Approval Process <a class="header-anchor" href="#approval-process" aria-label="Permalink to &quot;Approval Process&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Step</th>
<th>Description</th>
<th>Documentation</th>
</tr>
</thead>
<tbody>
<tr>
<td>1. ISO prepares measure proposal</td>
<td>Based on risk analysis and §30 requirements</td>
<td>Measure plan</td>
</tr>
<tr>
<td>2. Presentation to management</td>
<td>Explanation of risks and proposed measures</td>
<td>Presentation materials</td>
</tr>
<tr>
<td>3. Discussion and adjustment</td>
<td>Management may request changes</td>
<td>Meeting minutes</td>
</tr>
<tr>
<td>4. Formal approval</td>
<td>Management signature</td>
<td>Approval document with date and signature</td>
</tr>
<tr>
<td>5. Implementation mandate</td>
<td>Resource allocation and responsibility assignment</td>
<td>Documented mandate</td>
</tr>
</tbody>
</table>
<h3 id="supervision-mechanisms" tabindex="-1">Supervision Mechanisms <a class="header-anchor" href="#supervision-mechanisms" aria-label="Permalink to &quot;Supervision Mechanisms&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Mechanism</th>
<th>Interval</th>
<th>Format</th>
</tr>
</thead>
<tbody>
<tr>
<td>KPI dashboard</td>
<td>Monthly</td>
<td>Digital report</td>
</tr>
<tr>
<td>Quarterly management report</td>
<td>Quarterly</td>
<td>Presentation + discussion</td>
</tr>
<tr>
<td>Annual security report</td>
<td>Annually</td>
<td>Written report with action plan</td>
</tr>
<tr>
<td>Event-driven escalation</td>
<td>On High/Critical level</td>
<td>Immediate notification</td>
</tr>
</tbody>
</table>
<h3 id="training-evidence" tabindex="-1">Training Evidence <a class="header-anchor" href="#training-evidence" aria-label="Permalink to &quot;Training Evidence&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td>Frequency</td>
<td>At least annually</td>
</tr>
<tr>
<td>Format</td>
<td>In-person training or qualified webinar</td>
</tr>
<tr>
<td>Trainer</td>
<td>ISO or external cybersecurity expert</td>
</tr>
<tr>
<td>Evidence</td>
<td>Attendance confirmation with date, content, duration</td>
</tr>
<tr>
<td>Archival</td>
<td>Minimum 3 years</td>
</tr>
</tbody>
</table>
<h2 id="liability-minimization" tabindex="-1">Liability Minimization <a class="header-anchor" href="#liability-minimization" aria-label="Permalink to &quot;Liability Minimization&quot;"></a></h2>
<p>To minimize the personal liability risk of management:</p>
<table tabindex="0">
<thead>
<tr>
<th>Measure</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Documented approval</td>
<td>Approve and archive every measure in writing</td>
</tr>
<tr>
<td>Regular reports</td>
<td>Demonstrable supervision through acknowledgment and discussion of reports</td>
</tr>
<tr>
<td>Documented training</td>
<td>Retain attendance records</td>
</tr>
<tr>
<td>Adequate resources</td>
<td>Allocate budget and personnel for information security</td>
</tr>
<tr>
<td>Timely response</td>
<td>Take prompt action when risks become known</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Reporting & Governance Structure]]></title>
            <link>https://nis2.docs.bauer-group.com/en/governance/reporting-structure</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/governance/reporting-structure</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Reporting & Governance Structure

## Organizational Structure

```
Management
  +-- Information Security Officer (ISO)
  |     +-- Risk Analysis & ISMS
  |     +-- Incident Management & BSI Contact
  |     +-- Audit & Compliance
  |     +-- Training & Awareness
  +-- IT Lead
  |     +-- IT Operations (Server, Network, Cloud)
  |     +-- Software Development
  |     +-- Helpdesk / Support
  +-- Data Protection Officer (DPO)
        +-- GDPR Compliance
```

## ISO -- Role and Authority

| Aspect | Description |
|]]></description>
            <content:encoded><![CDATA[<h1 id="reporting-governance-structure" tabindex="-1">Reporting &amp; Governance Structure <a class="header-anchor" href="#reporting-governance-structure" aria-label="Permalink to &quot;Reporting &amp; Governance Structure&quot;"></a></h1>
<h2 id="organizational-structure" tabindex="-1">Organizational Structure <a class="header-anchor" href="#organizational-structure" aria-label="Permalink to &quot;Organizational Structure&quot;"></a></h2>
<div class="language- vp-adaptive-theme"><button title="Copy Code" class="copy"></button><span class="lang"></span><pre class="shiki shiki-themes github-light github-dark vp-code" tabindex="0" v-pre=""><code><span class="line"><span>Management</span></span>
<span class="line"><span>  +-- Information Security Officer (ISO)</span></span>
<span class="line"><span>  |     +-- Risk Analysis &#x26; ISMS</span></span>
<span class="line"><span>  |     +-- Incident Management &#x26; BSI Contact</span></span>
<span class="line"><span>  |     +-- Audit &#x26; Compliance</span></span>
<span class="line"><span>  |     +-- Training &#x26; Awareness</span></span>
<span class="line"><span>  +-- IT Lead</span></span>
<span class="line"><span>  |     +-- IT Operations (Server, Network, Cloud)</span></span>
<span class="line"><span>  |     +-- Software Development</span></span>
<span class="line"><span>  |     +-- Helpdesk / Support</span></span>
<span class="line"><span>  +-- Data Protection Officer (DPO)</span></span>
<span class="line"><span>        +-- GDPR Compliance</span></span></code></pre>
</div><h2 id="iso-role-and-authority" tabindex="-1">ISO -- Role and Authority <a class="header-anchor" href="#iso-role-and-authority" aria-label="Permalink to &quot;ISO -- Role and Authority&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Reporting line</strong></td>
<td>Directly to management (independent of IT Lead)</td>
</tr>
<tr>
<td><strong>Responsibilities</strong></td>
<td>ISMS operation, risk analysis, incident coordination, BSI reporting, audit coordination</td>
</tr>
<tr>
<td><strong>Authority</strong></td>
<td>Authority to order immediate measures during security incidents, escalation to management</td>
</tr>
<tr>
<td><strong>Independence</strong></td>
<td>ISO must not be simultaneously responsible for operational management of the systems under review</td>
</tr>
</tbody>
</table>
<h2 id="reporting-structure" tabindex="-1">Reporting Structure <a class="header-anchor" href="#reporting-structure" aria-label="Permalink to &quot;Reporting Structure&quot;"></a></h2>
<h3 id="regular-reports" tabindex="-1">Regular Reports <a class="header-anchor" href="#regular-reports" aria-label="Permalink to &quot;Regular Reports&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Report</th>
<th>Content</th>
<th>Recipient</th>
<th>Interval</th>
<th>Format</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Security KPI Dashboard</strong></td>
<td>Patch compliance, MTTD/MTTR, MFA coverage, open findings</td>
<td>ISO</td>
<td>Continuous</td>
<td>Dashboard</td>
</tr>
<tr>
<td><strong>Monthly Report</strong></td>
<td>KPI trends, new vulnerabilities, incident overview, measure status</td>
<td>ISO + IT Lead</td>
<td>Monthly</td>
<td>Summary report</td>
</tr>
<tr>
<td><strong>Quarterly Report</strong></td>
<td>Summary, risk status, audit results, budget</td>
<td>Management</td>
<td>Quarterly</td>
<td>Presentation</td>
</tr>
<tr>
<td><strong>Annual Report</strong></td>
<td>Overall assessment, audit results, year-over-year comparison, improvement plan</td>
<td>Management</td>
<td>Annually</td>
<td>Written report</td>
</tr>
</tbody>
</table>
<h3 id="event-driven-reports" tabindex="-1">Event-Driven Reports <a class="header-anchor" href="#event-driven-reports" aria-label="Permalink to &quot;Event-Driven Reports&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Trigger</th>
<th>Recipient</th>
<th>Deadline</th>
<th>Format</th>
</tr>
</thead>
<tbody>
<tr>
<td>Critical security incident</td>
<td>Management + ISO</td>
<td>Immediately</td>
<td>Verbal + written follow-up</td>
</tr>
<tr>
<td>BSI notification per §32</td>
<td>Management</td>
<td>In parallel with notification</td>
<td>Written</td>
</tr>
<tr>
<td>Critical audit finding</td>
<td>Management</td>
<td>Within 48h</td>
<td>Written</td>
</tr>
<tr>
<td>Material change in threat landscape</td>
<td>Management + IT</td>
<td>Without delay</td>
<td>Brief notification</td>
</tr>
</tbody>
</table>
<h2 id="documentation-obligations" tabindex="-1">Documentation Obligations <a class="header-anchor" href="#documentation-obligations" aria-label="Permalink to &quot;Documentation Obligations&quot;"></a></h2>
<p>The following documents are maintained and available at all times:</p>
<table tabindex="0">
<thead>
<tr>
<th>Document</th>
<th>Responsible</th>
<th>Review Cycle</th>
</tr>
</thead>
<tbody>
<tr>
<td>Information security policy</td>
<td>ISO, approved by management</td>
<td>Annually</td>
</tr>
<tr>
<td>Risk analysis and risk treatment plan</td>
<td>ISO</td>
<td>Annually + event-driven</td>
</tr>
<tr>
<td>Asset inventory</td>
<td>IT + ISO</td>
<td>Continuous</td>
</tr>
<tr>
<td>Incident response playbooks</td>
<td>ISO + IT</td>
<td>Annually + after incidents</td>
</tr>
<tr>
<td>Backup and DR documentation</td>
<td>IT Operations</td>
<td>Annually + after changes</td>
</tr>
<tr>
<td>Permission matrix</td>
<td>IT + Departments</td>
<td>Semi-annually</td>
</tr>
<tr>
<td>Training records</td>
<td>HR + ISO</td>
<td>Continuous</td>
</tr>
<tr>
<td>Audit reports and finding tracker</td>
<td>ISO</td>
<td>After each audit</td>
</tr>
<tr>
<td>BSI reporting documentation</td>
<td>ISO</td>
<td>Per incident</td>
</tr>
<tr>
<td>Vendor assessments</td>
<td>ISO + Procurement</td>
<td>Annually</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Escalation & Communication]]></title>
            <link>https://nis2.docs.bauer-group.com/en/incident-management/escalation</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/incident-management/escalation</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Escalation & Communication

## Escalation Matrix

| Severity | Initial Notification | Escalation to Exec. Mgmt. | BSI Report | Customer Notification |
|]]></description>
            <content:encoded><![CDATA[<h1 id="escalation-communication" tabindex="-1">Escalation &amp; Communication <a class="header-anchor" href="#escalation-communication" aria-label="Permalink to &quot;Escalation &amp; Communication&quot;"></a></h1>
<h2 id="escalation-matrix" tabindex="-1">Escalation Matrix <a class="header-anchor" href="#escalation-matrix" aria-label="Permalink to &quot;Escalation Matrix&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Severity</th>
<th>Initial Notification</th>
<th>Escalation to Exec. Mgmt.</th>
<th>BSI Report</th>
<th>Customer Notification</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Critical</strong></td>
<td>CISO + Exec. Mgmt. immediately</td>
<td>Immediately</td>
<td>Assessment within 4h</td>
<td>Without delay if affected</td>
</tr>
<tr>
<td><strong>High</strong></td>
<td>CISO within 1h</td>
<td>Within 4h</td>
<td>Assessment within 24h</td>
<td>If services are affected</td>
</tr>
<tr>
<td><strong>Medium</strong></td>
<td>CISO within 24h</td>
<td>Next regular report</td>
<td>No (standard case)</td>
<td>Only if directly impacted</td>
</tr>
<tr>
<td><strong>Low</strong></td>
<td>IT team</td>
<td>No</td>
<td>No</td>
<td>No</td>
</tr>
</tbody>
</table>
<h2 id="communication-plan" tabindex="-1">Communication Plan <a class="header-anchor" href="#communication-plan" aria-label="Permalink to &quot;Communication Plan&quot;"></a></h2>
<h3 id="internal-communication" tabindex="-1">Internal Communication <a class="header-anchor" href="#internal-communication" aria-label="Permalink to &quot;Internal Communication&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Recipient</th>
<th>Channel</th>
<th>Content</th>
<th>Timing</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Incident response team</strong></td>
<td>Encrypted messenger / conference call</td>
<td>Technical details, measures</td>
<td>Immediately upon detection</td>
</tr>
<tr>
<td><strong>Executive management</strong></td>
<td>Direct conversation or encrypted email</td>
<td>Situation summary, impact, measures</td>
<td>Per escalation matrix</td>
</tr>
<tr>
<td><strong>Affected departments</strong></td>
<td>Email + meeting</td>
<td>Impact on their area, expected duration</td>
<td>After initial assessment</td>
</tr>
<tr>
<td><strong>All employees</strong></td>
<td>Only if necessary (e.g., phishing wave)</td>
<td>Warning + instructions for action</td>
<td>After exec. management approval</td>
</tr>
</tbody>
</table>
<h3 id="external-communication" tabindex="-1">External Communication <a class="header-anchor" href="#external-communication" aria-label="Permalink to &quot;External Communication&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Recipient</th>
<th>Channel</th>
<th>Content</th>
<th>Timing</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>BSI</strong></td>
<td>Reporting platform</td>
<td>Per §32 reporting model</td>
<td>24h / 72h / 1 month</td>
</tr>
<tr>
<td><strong>Affected customers</strong></td>
<td>Direct notification (email + phone)</td>
<td>Nature, scope, measures, recommendations</td>
<td>Without delay if affected</td>
</tr>
<tr>
<td><strong>Data protection authority</strong></td>
<td>Reporting portal</td>
<td>GDPR Art. 33/34 if personal data affected</td>
<td>72 hours</td>
</tr>
<tr>
<td><strong>Law enforcement</strong></td>
<td>Formal report</td>
<td>If a criminal offense is suspected</td>
<td>After exec. management decision</td>
</tr>
</tbody>
</table>
<h3 id="customer-notification-in-case-of-incidents" tabindex="-1">Customer Notification in Case of Incidents <a class="header-anchor" href="#customer-notification-in-case-of-incidents" aria-label="Permalink to &quot;Customer Notification in Case of Incidents&quot;"></a></h3>
<p>When a security incident affects customer data or services, the notification includes:</p>
<ul>
<li>Nature and scope of the incident</li>
<li>Affected data or services</li>
<li>Countermeasures taken</li>
<li>Recommended actions for the customer</li>
<li>Contact person for inquiries</li>
<li>Expected duration of the disruption</li>
</ul>
<div class="warning custom-block"><p class="custom-block-title">NIS2-REGULATED CUSTOMERS</p>
<p>Customers who are themselves subject to NIS2 regulation must report significant security incidents to the BSI within 24 hours. Prompt and complete information from the BAUER GROUP enables these customers to meet their own reporting obligations.</p>
</div>
<h2 id="emergency-contacts" tabindex="-1">Emergency Contacts <a class="header-anchor" href="#emergency-contacts" aria-label="Permalink to &quot;Emergency Contacts&quot;"></a></h2>
<p>The following contacts are available at all times (including outside business hours):</p>
<table tabindex="0">
<thead>
<tr>
<th>Role</th>
<th>Availability</th>
</tr>
</thead>
<tbody>
<tr>
<td>CISO</td>
<td>24/7 via mobile phone</td>
</tr>
<tr>
<td>IT on-call</td>
<td>24/7 via on-call duty</td>
</tr>
<tr>
<td>Executive management</td>
<td>Reachable via mobile phone</td>
</tr>
<tr>
<td>BSI reporting platform</td>
<td>Online portal (24/7)</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Reporting Obligations per §32 BSIG]]></title>
            <link>https://nis2.docs.bauer-group.com/en/incident-management/reporting</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/incident-management/reporting</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Reporting Obligations per §32 BSIG

## Three-Tier Reporting Model

### Tier 1: Early Warning (24 Hours)

| Field | Content |
|]]></description>
            <content:encoded><![CDATA[<h1 id="reporting-obligations-per-§32-bsig" tabindex="-1">Reporting Obligations per §32 BSIG <a class="header-anchor" href="#reporting-obligations-per-§32-bsig" aria-label="Permalink to &quot;Reporting Obligations per §32 BSIG&quot;"></a></h1>
<h2 id="three-tier-reporting-model" tabindex="-1">Three-Tier Reporting Model <a class="header-anchor" href="#three-tier-reporting-model" aria-label="Permalink to &quot;Three-Tier Reporting Model&quot;"></a></h2>
<h3 id="tier-1-early-warning-24-hours" tabindex="-1">Tier 1: Early Warning (24 Hours) <a class="header-anchor" href="#tier-1-early-warning-24-hours" aria-label="Permalink to &quot;Tier 1: Early Warning (24 Hours)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Field</th>
<th>Content</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Deadline</strong></td>
<td>24 hours after becoming aware of the significant incident</td>
</tr>
<tr>
<td><strong>Recipient</strong></td>
<td>BSI via reporting platform</td>
</tr>
<tr>
<td><strong>Content</strong></td>
<td>Nature of the incident, initial suspicion of cause</td>
</tr>
<tr>
<td><strong>Specifics</strong></td>
<td>Indicate whether an unlawful or malicious act is suspected; whether cross-border impact is possible</td>
</tr>
</tbody>
</table>
<h3 id="tier-2-update-report-72-hours" tabindex="-1">Tier 2: Update Report (72 Hours) <a class="header-anchor" href="#tier-2-update-report-72-hours" aria-label="Permalink to &quot;Tier 2: Update Report (72 Hours)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Field</th>
<th>Content</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Deadline</strong></td>
<td>72 hours after becoming aware</td>
</tr>
<tr>
<td><strong>Recipient</strong></td>
<td>BSI via reporting platform</td>
</tr>
<tr>
<td><strong>Content</strong></td>
<td>Initial assessment of the incident: severity, impact</td>
</tr>
<tr>
<td><strong>Specifics</strong></td>
<td>Indicators of compromise (IoC) where available; update of initial assessment</td>
</tr>
</tbody>
</table>
<h3 id="tier-3-final-report-1-month" tabindex="-1">Tier 3: Final Report (1 Month) <a class="header-anchor" href="#tier-3-final-report-1-month" aria-label="Permalink to &quot;Tier 3: Final Report (1 Month)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Field</th>
<th>Content</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Deadline</strong></td>
<td>1 month after becoming aware (extension upon request possible)</td>
</tr>
<tr>
<td><strong>Recipient</strong></td>
<td>BSI via reporting platform</td>
</tr>
<tr>
<td><strong>Content</strong></td>
<td>Detailed description: root cause, measures taken, cross-border impact</td>
</tr>
<tr>
<td><strong>Specifics</strong></td>
<td>If the incident is still ongoing: interim report instead of final report; final report after resolution</td>
</tr>
</tbody>
</table>
<div class="info custom-block"><p class="custom-block-title">REPORTING DEADLINES</p>
<p>All deadlines run from the moment the entity becomes aware of the significant incident. &quot;Awareness&quot; means the point at which the CISO or a member of the incident response team has confirmed that the event constitutes a significant incident per the criteria below.</p>
</div>
<h2 id="criteria-for-significant-security-incidents" tabindex="-1">Criteria for Significant Security Incidents <a class="header-anchor" href="#criteria-for-significant-security-incidents" aria-label="Permalink to &quot;Criteria for Significant Security Incidents&quot;"></a></h2>
<p>An incident is considered significant if at least one of the following criteria is met:</p>
<table tabindex="0">
<thead>
<tr>
<th>Criterion</th>
<th>Threshold</th>
</tr>
</thead>
<tbody>
<tr>
<td>Serious operational disruption</td>
<td>Services to customers are restricted or unavailable</td>
</tr>
<tr>
<td>Financial losses</td>
<td>Direct or indirect losses above the materiality threshold</td>
</tr>
<tr>
<td>Harm to third parties</td>
<td>Other persons or entities are significantly affected</td>
</tr>
<tr>
<td>Data loss</td>
<td>Personal or business-critical data compromised</td>
</tr>
</tbody>
</table>
<h2 id="internal-reporting-flow" tabindex="-1">Internal Reporting Flow <a class="header-anchor" href="#internal-reporting-flow" aria-label="Permalink to &quot;Internal Reporting Flow&quot;"></a></h2>
<div class="language- vp-adaptive-theme"><button title="Copy Code" class="copy"></button><span class="lang"></span><pre class="shiki shiki-themes github-light github-dark vp-code" tabindex="0" v-pre=""><code><span class="line"><span>Incident detected</span></span>
<span class="line"><span>  → CISO informed (&#x3C; 1h)</span></span>
<span class="line"><span>    → Initial assessment: Significant yes/no? (&#x3C; 4h)</span></span>
<span class="line"><span>      → If yes: Prepare BSI early warning (&#x3C; 24h)</span></span>
<span class="line"><span>        → Inform executive management</span></span>
<span class="line"><span>          → Assess GDPR reporting (Art. 33: 72h to supervisory authority)</span></span>
<span class="line"><span>            → Assess CRA reporting (Art. 14: 24h to ENISA)</span></span></code></pre>
</div><h2 id="parallel-reporting-obligations" tabindex="-1">Parallel Reporting Obligations <a class="header-anchor" href="#parallel-reporting-obligations" aria-label="Permalink to &quot;Parallel Reporting Obligations&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Regulation</th>
<th>Trigger</th>
<th>Deadline</th>
<th>Recipient</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>NIS2 / §32 BSIG</strong></td>
<td>Significant security incident</td>
<td>24h / 72h / 1 month</td>
<td>BSI</td>
</tr>
<tr>
<td><strong>GDPR Art. 33</strong></td>
<td>Personal data breach</td>
<td>72 hours</td>
<td>Competent supervisory authority</td>
</tr>
<tr>
<td><strong>CRA Art. 14</strong></td>
<td>Actively exploited product vulnerability</td>
<td>24h / 72h / 14d</td>
<td>ENISA + national CSIRT</td>
</tr>
</tbody>
</table>
<div class="warning custom-block"><p class="custom-block-title">PARALLEL REPORTING OBLIGATIONS</p>
<p>A single incident may trigger reporting obligations under multiple regulations simultaneously. The initial assessment process evaluates all applicable frameworks. Templates are designed to be compatible to ensure efficient parallel reporting. See also <a href="/en/overview/synergies">CRA &amp; AI Act Synergies</a>.</p>
</div>
<h2 id="documentation-requirements" tabindex="-1">Documentation Requirements <a class="header-anchor" href="#documentation-requirements" aria-label="Permalink to &quot;Documentation Requirements&quot;"></a></h2>
<p>Every reportable incident must be fully documented:</p>
<ul>
<li>Chronological sequence of events with timestamps</li>
<li>All decisions with rationale</li>
<li>Communication with BSI (report IDs, correspondence)</li>
<li>Measures taken and their effectiveness</li>
<li>Lessons learned and follow-up actions</li>
</ul>
<p><strong>Retention period:</strong> At least 3 years after closure of the incident.</p>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Incident Response Process]]></title>
            <link>https://nis2.docs.bauer-group.com/en/incident-management/response-process</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/incident-management/response-process</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Incident Response Process

## 5-Phase Model

The incident response process of the BAUER GROUP follows the established NIST SP 800-61 framework, adapted to the requirements of §30(2) No. 2 BSIG.

### Phase 1: Preparation

| Measure | Description |
|]]></description>
            <content:encoded><![CDATA[<h1 id="incident-response-process" tabindex="-1">Incident Response Process <a class="header-anchor" href="#incident-response-process" aria-label="Permalink to &quot;Incident Response Process&quot;"></a></h1>
<h2 id="_5-phase-model" tabindex="-1">5-Phase Model <a class="header-anchor" href="#_5-phase-model" aria-label="Permalink to &quot;5-Phase Model&quot;"></a></h2>
<p>The incident response process of the BAUER GROUP follows the established NIST SP 800-61 framework, adapted to the requirements of §30(2) No. 2 BSIG.</p>
<h3 id="phase-1-preparation" tabindex="-1">Phase 1: Preparation <a class="header-anchor" href="#phase-1-preparation" aria-label="Permalink to &quot;Phase 1: Preparation&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Measure</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Incident response team</td>
<td>Defined roles: CISO (lead), IT Ops, Development, Communications</td>
</tr>
<tr>
<td>Tooling</td>
<td>Log aggregation, monitoring dashboards, ticketing system</td>
</tr>
<tr>
<td>Documentation</td>
<td>Response playbooks for the most common scenarios</td>
</tr>
<tr>
<td>Communication</td>
<td>Predefined contact lists, escalation paths, templates</td>
</tr>
<tr>
<td>Exercises</td>
<td>At least annually tabletop exercise or simulation</td>
</tr>
</tbody>
</table>
<h3 id="phase-2-detection-and-analysis" tabindex="-1">Phase 2: Detection and Analysis <a class="header-anchor" href="#phase-2-detection-and-analysis" aria-label="Permalink to &quot;Phase 2: Detection and Analysis&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Detection Method</th>
<th>Description</th>
<th>Response Time</th>
</tr>
</thead>
<tbody>
<tr>
<td>Automated monitoring</td>
<td>Log-based anomaly detection, threshold alerts</td>
<td>Real-time</td>
</tr>
<tr>
<td>Vulnerability alerts</td>
<td>CVE feeds, dependency monitoring, vendor advisories</td>
<td>&lt; 4 hours</td>
</tr>
<tr>
<td>Employee reports</td>
<td>Phishing suspicion, unusual behavior</td>
<td>Immediately upon detection</td>
</tr>
<tr>
<td>External reports</td>
<td>Customers, partners, security researchers, BSI</td>
<td>Immediately upon receipt</td>
</tr>
</tbody>
</table>
<p><strong>Analysis steps:</strong></p>
<ol>
<li>Initial assessment: Is the incident real? (Triage)</li>
<li>Classification by severity (Critical / High / Medium / Low)</li>
<li>Impact analysis: Which systems, data and customers are affected?</li>
<li>Reporting obligation check: Does the incident constitute a significant incident per §32 BSIG?</li>
<li>Initial forensic assessment: Attack vector, timeframe, indicators of compromise (IoC)</li>
</ol>
<h3 id="phase-3-containment" tabindex="-1">Phase 3: Containment <a class="header-anchor" href="#phase-3-containment" aria-label="Permalink to &quot;Phase 3: Containment&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Strategy</th>
<th>Application</th>
<th>Example</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Short-term</strong></td>
<td>Immediate damage limitation</td>
<td>Isolate network segment, lock account</td>
</tr>
<tr>
<td><strong>Long-term</strong></td>
<td>Sustained containment</td>
<td>Take affected system offline, firewall rule</td>
</tr>
<tr>
<td><strong>Evidence preservation</strong></td>
<td>Before any remediation</td>
<td>Memory dump, log export, disk image</td>
</tr>
</tbody>
</table>
<div class="warning custom-block"><p class="custom-block-title">EVIDENCE PRESERVATION</p>
<p>Always secure forensic evidence before initiating any cleanup or remediation measures. Evidence is critical for root cause analysis, regulatory reporting and potential law enforcement involvement.</p>
</div>
<h3 id="phase-4-eradication-and-recovery" tabindex="-1">Phase 4: Eradication and Recovery <a class="header-anchor" href="#phase-4-eradication-and-recovery" aria-label="Permalink to &quot;Phase 4: Eradication and Recovery&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Step</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Eliminate root cause</td>
<td>Remove malware, deactivate compromised accounts, patch vulnerability</td>
</tr>
<tr>
<td>Clean systems</td>
<td>Reinstall or verified restore from clean backup</td>
</tr>
<tr>
<td>Rotate credentials</td>
<td>All potentially compromised passwords, API keys, certificates</td>
</tr>
<tr>
<td>Verify integrity</td>
<td>Confirm system integrity before returning to production</td>
</tr>
<tr>
<td>Enhance monitoring</td>
<td>Increased surveillance for 30 days after recovery</td>
</tr>
</tbody>
</table>
<h3 id="phase-5-post-incident" tabindex="-1">Phase 5: Post-Incident <a class="header-anchor" href="#phase-5-post-incident" aria-label="Permalink to &quot;Phase 5: Post-Incident&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Activity</th>
<th>Deadline</th>
<th>Responsible</th>
</tr>
</thead>
<tbody>
<tr>
<td>Post-mortem meeting</td>
<td>Within 5 business days</td>
<td>CISO</td>
</tr>
<tr>
<td>Root cause analysis</td>
<td>Within 10 business days</td>
<td>CISO + IT</td>
</tr>
<tr>
<td>Lessons learned document</td>
<td>Within 15 business days</td>
<td>CISO</td>
</tr>
<tr>
<td>Action plan</td>
<td>Within 20 business days</td>
<td>CISO + Executive Management</td>
</tr>
<tr>
<td>Risk analysis update</td>
<td>Within 30 days</td>
<td>CISO</td>
</tr>
</tbody>
</table>
<h2 id="playbooks" tabindex="-1">Playbooks <a class="header-anchor" href="#playbooks" aria-label="Permalink to &quot;Playbooks&quot;"></a></h2>
<p>Predefined response playbooks exist for the most common scenarios:</p>
<table tabindex="0">
<thead>
<tr>
<th>Scenario</th>
<th>Immediate Actions</th>
<th>Escalation</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Ransomware</strong></td>
<td>Network isolation, verify backup integrity, DO NOT pay ransom</td>
<td>Immediately: CISO + Exec. Management + law enforcement if applicable</td>
</tr>
<tr>
<td><strong>Data leak</strong></td>
<td>Close access path, determine scope, assess GDPR reporting</td>
<td>Immediately: CISO + Exec. Management + DPO</td>
</tr>
<tr>
<td><strong>Phishing (successful)</strong></td>
<td>Lock account, reset password, verify MFA</td>
<td>&lt; 1h: CISO</td>
</tr>
<tr>
<td><strong>DDoS</strong></td>
<td>Activate CDN/WAF, contact upstream provider</td>
<td>Immediately: IT Ops + CISO</td>
</tr>
<tr>
<td><strong>Supply chain compromise</strong></td>
<td>Isolate affected component, review SBOM</td>
<td>Immediately: CISO + Development</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[CRA & AI Act Synergies]]></title>
            <link>https://nis2.docs.bauer-group.com/en/overview/synergies</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/overview/synergies</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# CRA & AI Act Synergies

## Fundamental Principle

The BAUER GROUP is subject to three complementary EU cybersecurity regulations. To avoid duplication of effort and minimize internal compliance overhead, synergies are leveraged systematically: existing processes from CRA and AI Act compliance are referenced for NIS2 purposes, not duplicated.

## Synergy Overview

| NIS2 Measure (§30) | CRA Coverage | AI Act Coverage | NIS2-Specific |
|]]></description>
            <content:encoded><![CDATA[<h1 id="cra-ai-act-synergies" tabindex="-1">CRA &amp; AI Act Synergies <a class="header-anchor" href="#cra-ai-act-synergies" aria-label="Permalink to &quot;CRA &amp; AI Act Synergies&quot;"></a></h1>
<h2 id="fundamental-principle" tabindex="-1">Fundamental Principle <a class="header-anchor" href="#fundamental-principle" aria-label="Permalink to &quot;Fundamental Principle&quot;"></a></h2>
<p>The BAUER GROUP is subject to three complementary EU cybersecurity regulations. To avoid duplication of effort and minimize internal compliance overhead, synergies are leveraged systematically: existing processes from CRA and AI Act compliance are referenced for NIS2 purposes, not duplicated.</p>
<h2 id="synergy-overview" tabindex="-1">Synergy Overview <a class="header-anchor" href="#synergy-overview" aria-label="Permalink to &quot;Synergy Overview&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>NIS2 Measure (§30)</th>
<th>CRA Coverage</th>
<th>AI Act Coverage</th>
<th>NIS2-Specific</th>
</tr>
</thead>
<tbody>
<tr>
<td>No. 1 – Risk management</td>
<td>Partial (product-related, Art. 10)</td>
<td>Art. 9 (AI risk management)</td>
<td>ISMS, organizational risk analysis</td>
</tr>
<tr>
<td>No. 2 – Incident management</td>
<td>Art. 14 (product vulnerabilities)</td>
<td>—</td>
<td>Operational incidents, §32 reporting</td>
</tr>
<tr>
<td>No. 3 – Business continuity</td>
<td>—</td>
<td>—</td>
<td>Entirely NIS2-specific</td>
</tr>
<tr>
<td>No. 4 – Supply chain</td>
<td>Art. 10(4), Annex I Part II No. 1</td>
<td>—</td>
<td>Vendor assessment</td>
</tr>
<tr>
<td>No. 5 – Vulnerabilities</td>
<td>Art. 10(6), Art. 11 (product CVEs)</td>
<td>—</td>
<td>Infrastructure CVEs</td>
</tr>
<tr>
<td>No. 6 – Effectiveness</td>
<td>—</td>
<td>—</td>
<td>Entirely NIS2-specific</td>
</tr>
<tr>
<td>No. 7 – Training</td>
<td>—</td>
<td>Art. 4 (AI Literacy)</td>
<td>Cyber hygiene, BSIG-specific</td>
</tr>
<tr>
<td>No. 8 – Cryptography</td>
<td>Annex I Part II (product encryption)</td>
<td>Art. 15 (AI cybersecurity)</td>
<td>Infrastructure encryption</td>
</tr>
<tr>
<td>No. 9 – Access control</td>
<td>—</td>
<td>Art. 14 (human oversight)</td>
<td>Personnel security, MFA</td>
</tr>
<tr>
<td>No. 10 – Secure communication</td>
<td>—</td>
<td>—</td>
<td>Entirely NIS2-specific</td>
</tr>
</tbody>
</table>
<h2 id="detailed-synergies" tabindex="-1">Detailed Synergies <a class="header-anchor" href="#detailed-synergies" aria-label="Permalink to &quot;Detailed Synergies&quot;"></a></h2>
<h3 id="vulnerability-management-no-5" tabindex="-1">Vulnerability Management (No. 5) <a class="header-anchor" href="#vulnerability-management-no-5" aria-label="Permalink to &quot;Vulnerability Management (No. 5)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>CRA Process</th>
<th>NIS2 Supplement</th>
</tr>
</thead>
<tbody>
<tr>
<td>CVE monitoring</td>
<td><a href="https://cra.docs.bauer-group.com/en/vulnerability-management/" target="_blank" rel="noreferrer">CRA: Trivy + Grype + OSV-Scanner</a></td>
<td>Infrastructure scanners (network, servers)</td>
</tr>
<tr>
<td>SBOM</td>
<td><a href="https://cra.docs.bauer-group.com/en/sbom-signing/" target="_blank" rel="noreferrer">CRA: CycloneDX generation + Cosign signing</a></td>
<td>Reference to CRA SBOM</td>
</tr>
<tr>
<td>Patch management</td>
<td>CRA: product updates</td>
<td>NIS2: infrastructure patches (OS, firmware)</td>
</tr>
<tr>
<td>Disclosure</td>
<td><a href="https://cra.docs.bauer-group.com/en/incident-response/enisa-reporting" target="_blank" rel="noreferrer">CRA: ENISA reporting</a></td>
<td>NIS2: BSI reporting</td>
</tr>
</tbody>
</table>
<h3 id="reporting-obligations-no-2-§32" tabindex="-1">Reporting Obligations (No. 2 / §32) <a class="header-anchor" href="#reporting-obligations-no-2-§32" aria-label="Permalink to &quot;Reporting Obligations (No. 2 / §32)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>CRA (Art. 14)</th>
<th>NIS2 (§32 BSIG)</th>
</tr>
</thead>
<tbody>
<tr>
<td>Trigger</td>
<td>Actively exploited vulnerability in products</td>
<td>Significant security incident in operations</td>
</tr>
<tr>
<td>Early warning</td>
<td>24 hours to ENISA</td>
<td>24 hours to BSI</td>
</tr>
<tr>
<td>Detailed report</td>
<td>72 hours</td>
<td>72 hours</td>
</tr>
<tr>
<td>Final report</td>
<td>14 days</td>
<td>1 month</td>
</tr>
<tr>
<td>Reporting authority</td>
<td>ENISA Single Reporting Platform</td>
<td>BSI reporting platform</td>
</tr>
</tbody>
</table>
<div class="warning custom-block"><p class="custom-block-title">PARALLEL REPORTING OBLIGATIONS</p>
<p>An incident may trigger <strong>both</strong> reporting obligations. The shared initial assessment process automatically determines whether a CRA and/or NIS2 report is required. The templates are designed to be compatible.</p>
</div>
<h3 id="supply-chain-no-4" tabindex="-1">Supply Chain (No. 4) <a class="header-anchor" href="#supply-chain-no-4" aria-label="Permalink to &quot;Supply Chain (No. 4)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>CRA Process</th>
<th>NIS2 Supplement</th>
</tr>
</thead>
<tbody>
<tr>
<td>Software dependencies</td>
<td><a href="https://cra.docs.bauer-group.com/en/supply-chain/" target="_blank" rel="noreferrer">CRA: Dependency Policy + SBOM</a></td>
<td>Reference to CRA</td>
</tr>
<tr>
<td>Service providers</td>
<td>—</td>
<td>NIS2: hosting, cloud, support partners</td>
</tr>
<tr>
<td>Audit rights</td>
<td>CRA: supplier audits</td>
<td>NIS2: service provider audits</td>
</tr>
</tbody>
</table>
<h2 id="effort-optimization" tabindex="-1">Effort Optimization <a class="header-anchor" href="#effort-optimization" aria-label="Permalink to &quot;Effort Optimization&quot;"></a></h2>
<p>Through consistent use of existing CRA groundwork, the NIS2-specific additional effort is reduced to:</p>
<table tabindex="0">
<thead>
<tr>
<th>Area</th>
<th>Effort without Synergies</th>
<th>Effort with Synergies</th>
<th>Savings</th>
</tr>
</thead>
<tbody>
<tr>
<td>Vulnerability management</td>
<td>Full build-out</td>
<td>Infrastructure supplement only</td>
<td>~60%</td>
</tr>
<tr>
<td>Incident response</td>
<td>Full build-out</td>
<td>Operational incidents + §32 only</td>
<td>~40%</td>
</tr>
<tr>
<td>Supply chain</td>
<td>Full build-out</td>
<td>Vendor assessment only</td>
<td>~50%</td>
</tr>
<tr>
<td>Training</td>
<td>Full build-out</td>
<td>Reference AI Literacy (Art. 4)</td>
<td>~20%</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Asset Inventory]]></title>
            <link>https://nis2.docs.bauer-group.com/en/risk-management/asset-inventory</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/risk-management/asset-inventory</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Asset Inventory

## Purpose

The asset inventory records all information technology systems, components and processes of the BAUER GROUP. It provides the foundation for risk analysis and enables the assignment of protective measures to specific assets.

## Asset Categories

### Server Systems

| Attribute | Description |
|]]></description>
            <content:encoded><![CDATA[<h1 id="asset-inventory" tabindex="-1">Asset Inventory <a class="header-anchor" href="#asset-inventory" aria-label="Permalink to &quot;Asset Inventory&quot;"></a></h1>
<h2 id="purpose" tabindex="-1">Purpose <a class="header-anchor" href="#purpose" aria-label="Permalink to &quot;Purpose&quot;"></a></h2>
<p>The asset inventory records all information technology systems, components and processes of the BAUER GROUP. It provides the foundation for risk analysis and enables the assignment of protective measures to specific assets.</p>
<h2 id="asset-categories" tabindex="-1">Asset Categories <a class="header-anchor" href="#asset-categories" aria-label="Permalink to &quot;Asset Categories&quot;"></a></h2>
<h3 id="server-systems" tabindex="-1">Server Systems <a class="header-anchor" href="#server-systems" aria-label="Permalink to &quot;Server Systems&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Attribute</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Hostname / ID</td>
<td>Unique identification</td>
</tr>
<tr>
<td>Type</td>
<td>Physical / Virtual / Container</td>
</tr>
<tr>
<td>Location</td>
<td>Data center, provider</td>
</tr>
<tr>
<td>Operating system</td>
<td>Including version and patch level</td>
</tr>
<tr>
<td>Purpose</td>
<td>Production, staging, backup</td>
</tr>
<tr>
<td>Responsible</td>
<td>Assigned administrator</td>
</tr>
<tr>
<td>Protection requirement</td>
<td>Normal / High / Very High</td>
</tr>
</tbody>
</table>
<h3 id="network-components" tabindex="-1">Network Components <a class="header-anchor" href="#network-components" aria-label="Permalink to &quot;Network Components&quot;"></a></h3>
<ul>
<li>Firewalls with ruleset version and last review date</li>
<li>Switches and routers with firmware version</li>
<li>VPN gateways and access points</li>
<li>DNS servers and load balancers</li>
</ul>
<h3 id="applications" tabindex="-1">Applications <a class="header-anchor" href="#applications" aria-label="Permalink to &quot;Applications&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Attribute</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Name / Version</td>
<td>Application with current version</td>
</tr>
<tr>
<td>Type</td>
<td>In-house development / Third-party / SaaS</td>
</tr>
<tr>
<td>License</td>
<td>License type and expiry date</td>
</tr>
<tr>
<td>Support</td>
<td>Support status and contact</td>
</tr>
<tr>
<td>Data classification</td>
<td>Which data classes are processed</td>
</tr>
<tr>
<td>Dependencies</td>
<td>Other systems, libraries, APIs</td>
</tr>
</tbody>
</table>
<h3 id="cloud-services" tabindex="-1">Cloud Services <a class="header-anchor" href="#cloud-services" aria-label="Permalink to &quot;Cloud Services&quot;"></a></h3>
<ul>
<li>Provider with location and legal jurisdiction</li>
<li>Contract term and SLAs</li>
<li>Data classification of stored data</li>
<li>Exit strategy and data portability</li>
</ul>
<h3 id="data-assets" tabindex="-1">Data Assets <a class="header-anchor" href="#data-assets" aria-label="Permalink to &quot;Data Assets&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Classification</th>
<th>Storage Location</th>
<th>Backup</th>
<th>Encryption</th>
</tr>
</thead>
<tbody>
<tr>
<td>Public</td>
<td>Any</td>
<td>Optional</td>
<td>Optional</td>
</tr>
<tr>
<td>Internal</td>
<td>Access-controlled</td>
<td>Yes</td>
<td>In transit</td>
</tr>
<tr>
<td>Confidential</td>
<td>Access-controlled + encrypted</td>
<td>Yes + encrypted</td>
<td>At rest + in transit</td>
</tr>
<tr>
<td>Strictly Confidential</td>
<td>Isolated + encrypted</td>
<td>Yes + encrypted + offsite</td>
<td>At rest + in transit + audit</td>
</tr>
</tbody>
</table>
<h2 id="maintenance-schedule" tabindex="-1">Maintenance Schedule <a class="header-anchor" href="#maintenance-schedule" aria-label="Permalink to &quot;Maintenance Schedule&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Activity</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td>Inventory update</td>
<td>Upon every change (deployment, decommissioning)</td>
</tr>
<tr>
<td>Completeness check</td>
<td>Semi-annually</td>
</tr>
<tr>
<td>Protection requirement assessment</td>
<td>Annually or upon change</td>
</tr>
<tr>
<td>Responsibility review</td>
<td>Upon personnel change</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Information Security Policy]]></title>
            <link>https://nis2.docs.bauer-group.com/en/risk-management/isms-policy</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/risk-management/isms-policy</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Information Security Policy

## Purpose

The Information Security Policy defines the framework for protecting all information technology systems, components and processes of the BAUER GROUP. It serves as the overarching directive of the ISMS and is approved by executive management.

## Protection Goals

| Protection Goal | Definition | Measures |
|]]></description>
            <content:encoded><![CDATA[<h1 id="information-security-policy" tabindex="-1">Information Security Policy <a class="header-anchor" href="#information-security-policy" aria-label="Permalink to &quot;Information Security Policy&quot;"></a></h1>
<h2 id="purpose" tabindex="-1">Purpose <a class="header-anchor" href="#purpose" aria-label="Permalink to &quot;Purpose&quot;"></a></h2>
<p>The Information Security Policy defines the framework for protecting all information technology systems, components and processes of the BAUER GROUP. It serves as the overarching directive of the ISMS and is approved by executive management.</p>
<h2 id="protection-goals" tabindex="-1">Protection Goals <a class="header-anchor" href="#protection-goals" aria-label="Permalink to &quot;Protection Goals&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Protection Goal</th>
<th>Definition</th>
<th>Measures</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Confidentiality</strong></td>
<td>Information is accessible only to authorized persons</td>
<td>Access control, encryption, classification</td>
</tr>
<tr>
<td><strong>Integrity</strong></td>
<td>Information is complete and unaltered</td>
<td>Hash verification, versioning, change control</td>
</tr>
<tr>
<td><strong>Availability</strong></td>
<td>Systems and data are accessible when needed</td>
<td>Redundancy, backup, monitoring</td>
</tr>
<tr>
<td><strong>Authenticity</strong></td>
<td>Identity of users and systems is verified</td>
<td>MFA, certificates, digital signatures</td>
</tr>
</tbody>
</table>
<h2 id="scope" tabindex="-1">Scope <a class="header-anchor" href="#scope" aria-label="Permalink to &quot;Scope&quot;"></a></h2>
<p>The Information Security Policy applies to:</p>
<ul>
<li>All employees, executive management and external service providers with system access</li>
<li>All information technology systems operated in-house and by third parties</li>
<li>All locations and remote workplaces</li>
<li>All phases of the information lifecycle (creation, processing, storage, deletion)</li>
</ul>
<h2 id="responsibilities" tabindex="-1">Responsibilities <a class="header-anchor" href="#responsibilities" aria-label="Permalink to &quot;Responsibilities&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Role</th>
<th>Responsibility</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Executive Management</strong></td>
<td>Approval of the policy, provision of resources (§38 BSIG)</td>
</tr>
<tr>
<td><strong>CISO</strong></td>
<td>Development, maintenance and monitoring of compliance</td>
</tr>
<tr>
<td><strong>IT Management</strong></td>
<td>Technical implementation of requirements</td>
</tr>
<tr>
<td><strong>All Employees</strong></td>
<td>Adherence to policies, reporting of violations</td>
</tr>
</tbody>
</table>
<div class="info custom-block"><p class="custom-block-title">§38 BSIG – MANAGEMENT OBLIGATIONS</p>
<p>Executive management must approve cybersecurity risk management measures and oversee their implementation. They are personally liable for breaches and are required to undergo regular cybersecurity training.</p>
</div>
<h2 id="review-cycle" tabindex="-1">Review Cycle <a class="header-anchor" href="#review-cycle" aria-label="Permalink to &quot;Review Cycle&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Activity</th>
<th>Interval</th>
<th>Responsible</th>
</tr>
</thead>
<tbody>
<tr>
<td>Policy review</td>
<td>Annually</td>
<td>CISO + Executive Management</td>
</tr>
<tr>
<td>Event-driven review</td>
<td>Upon significant changes or incidents</td>
<td>CISO</td>
</tr>
<tr>
<td>Approval</td>
<td>After each review</td>
<td>Executive Management</td>
</tr>
<tr>
<td>Communication</td>
<td>After approval to all employees</td>
<td>CISO</td>
</tr>
</tbody>
</table>
<h2 id="classification-schema" tabindex="-1">Classification Schema <a class="header-anchor" href="#classification-schema" aria-label="Permalink to &quot;Classification Schema&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Level</th>
<th>Description</th>
<th>Examples</th>
<th>Measures</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Public</strong></td>
<td>No restrictions</td>
<td>Marketing materials, published documentation</td>
<td>No special measures</td>
</tr>
<tr>
<td><strong>Internal</strong></td>
<td>For BAUER GROUP employees only</td>
<td>Internal processes, organization charts</td>
<td>Access control</td>
</tr>
<tr>
<td><strong>Confidential</strong></td>
<td>Business-critical, restricted access</td>
<td>Customer data, contracts, credentials</td>
<td>Encryption + access control</td>
</tr>
<tr>
<td><strong>Strictly Confidential</strong></td>
<td>Highest protection level</td>
<td>Key material, security architecture</td>
<td>Encryption + need-to-know + audit trail</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Risk Analysis]]></title>
            <link>https://nis2.docs.bauer-group.com/en/risk-management/risk-analysis</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/risk-management/risk-analysis</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Risk Analysis

## Methodology

The risk analysis follows a structured process, aligned with ISO 27005 and BSI IT-Grundschutz:

```
Establish context → Identify risks → Analyze risks → Evaluate risks → Treat risks
```

## Threat Catalog

| Category | Threats | Relevance |
|]]></description>
            <content:encoded><![CDATA[<h1 id="risk-analysis" tabindex="-1">Risk Analysis <a class="header-anchor" href="#risk-analysis" aria-label="Permalink to &quot;Risk Analysis&quot;"></a></h1>
<h2 id="methodology" tabindex="-1">Methodology <a class="header-anchor" href="#methodology" aria-label="Permalink to &quot;Methodology&quot;"></a></h2>
<p>The risk analysis follows a structured process, aligned with ISO 27005 and BSI IT-Grundschutz:</p>
<div class="language- vp-adaptive-theme"><button title="Copy Code" class="copy"></button><span class="lang"></span><pre class="shiki shiki-themes github-light github-dark vp-code" tabindex="0" v-pre=""><code><span class="line"><span>Establish context → Identify risks → Analyze risks → Evaluate risks → Treat risks</span></span></code></pre>
</div><h2 id="threat-catalog" tabindex="-1">Threat Catalog <a class="header-anchor" href="#threat-catalog" aria-label="Permalink to &quot;Threat Catalog&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Category</th>
<th>Threats</th>
<th>Relevance</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Cyberattacks</strong></td>
<td>Ransomware, phishing, DDoS, APT, supply chain attack</td>
<td>High</td>
</tr>
<tr>
<td><strong>Insider threats</strong></td>
<td>Intentional data theft, negligent misuse</td>
<td>Medium</td>
</tr>
<tr>
<td><strong>Technical failure</strong></td>
<td>Hardware failure, software defect, network outage</td>
<td>Medium</td>
</tr>
<tr>
<td><strong>Natural events</strong></td>
<td>Power outage, flooding, fire</td>
<td>Low</td>
</tr>
<tr>
<td><strong>Third parties</strong></td>
<td>Compromise of a service provider, SaaS outage</td>
<td>Medium</td>
</tr>
</tbody>
</table>
<h2 id="risk-assessment-matrix" tabindex="-1">Risk Assessment Matrix <a class="header-anchor" href="#risk-assessment-matrix" aria-label="Permalink to &quot;Risk Assessment Matrix&quot;"></a></h2>
<p>Risks are evaluated by likelihood and impact:</p>
<table tabindex="0">
<thead>
<tr>
<th></th>
<th>Low Impact</th>
<th>Medium Impact</th>
<th>High Impact</th>
<th>Very High Impact</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Very likely</strong></td>
<td>Medium</td>
<td>High</td>
<td>Critical</td>
<td>Critical</td>
</tr>
<tr>
<td><strong>Likely</strong></td>
<td>Low</td>
<td>Medium</td>
<td>High</td>
<td>Critical</td>
</tr>
<tr>
<td><strong>Possible</strong></td>
<td>Low</td>
<td>Low</td>
<td>Medium</td>
<td>High</td>
</tr>
<tr>
<td><strong>Unlikely</strong></td>
<td>Low</td>
<td>Low</td>
<td>Low</td>
<td>Medium</td>
</tr>
</tbody>
</table>
<div class="info custom-block"><p class="custom-block-title">RISK APPETITE</p>
<p>Risks rated <strong>Critical</strong> or <strong>High</strong> require immediate treatment. Medium risks must be addressed within the next review cycle. Low risks are monitored and documented.</p>
</div>
<h2 id="risk-treatment-plan" tabindex="-1">Risk Treatment Plan <a class="header-anchor" href="#risk-treatment-plan" aria-label="Permalink to &quot;Risk Treatment Plan&quot;"></a></h2>
<p>For each identified risk, the following fields are documented:</p>
<table tabindex="0">
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Risk ID</td>
<td>Unique identifier</td>
</tr>
<tr>
<td>Description</td>
<td>Nature of the risk and affected assets</td>
</tr>
<tr>
<td>Assessment</td>
<td>Likelihood x Impact</td>
</tr>
<tr>
<td>Treatment option</td>
<td>Avoid / Mitigate / Transfer / Accept</td>
</tr>
<tr>
<td>Measure</td>
<td>Specific technical or organizational measure</td>
</tr>
<tr>
<td>Responsible</td>
<td>Assigned owner</td>
</tr>
<tr>
<td>Deadline</td>
<td>Implementation date</td>
</tr>
<tr>
<td>Residual risk</td>
<td>Risk level after implementation of measures</td>
</tr>
<tr>
<td>Approval</td>
<td>Executive management approval for risk acceptance</td>
</tr>
</tbody>
</table>
<h2 id="process-integration" tabindex="-1">Process Integration <a class="header-anchor" href="#process-integration" aria-label="Permalink to &quot;Process Integration&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Trigger</th>
<th>Action</th>
</tr>
</thead>
<tbody>
<tr>
<td>Annual review cycle</td>
<td>Complete review of all risks</td>
</tr>
<tr>
<td>New system / service provider</td>
<td>Risk analysis prior to go-live</td>
</tr>
<tr>
<td>Security incident</td>
<td>Event-driven reassessment of affected risks</td>
</tr>
<tr>
<td>Significant change</td>
<td>Risk analysis for architectural or process changes</td>
</tr>
<tr>
<td>External threat landscape</td>
<td>Reassessment upon relevant CVEs or advisories</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Contractual Security Requirements]]></title>
            <link>https://nis2.docs.bauer-group.com/en/supply-chain/contractual-requirements</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/supply-chain/contractual-requirements</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Contractual Security Requirements

## Mandatory Clauses

Contracts with service providers that have access to BAUER GROUP systems or data must contain the following minimum requirements:

### Information Security

| Clause | Description |
|]]></description>
            <content:encoded><![CDATA[<h1 id="contractual-security-requirements" tabindex="-1">Contractual Security Requirements <a class="header-anchor" href="#contractual-security-requirements" aria-label="Permalink to &quot;Contractual Security Requirements&quot;"></a></h1>
<h2 id="mandatory-clauses" tabindex="-1">Mandatory Clauses <a class="header-anchor" href="#mandatory-clauses" aria-label="Permalink to &quot;Mandatory Clauses&quot;"></a></h2>
<p>Contracts with service providers that have access to BAUER GROUP systems or data must contain the following minimum requirements:</p>
<h3 id="information-security" tabindex="-1">Information Security <a class="header-anchor" href="#information-security" aria-label="Permalink to &quot;Information Security&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Clause</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Security standards</strong></td>
<td>Adherence to appropriate technical and organizational measures (state of the art)</td>
</tr>
<tr>
<td><strong>Encryption</strong></td>
<td>Encryption of sensitive data at rest and in transit</td>
</tr>
<tr>
<td><strong>Access control</strong></td>
<td>Personalized accounts, least-privilege principle, MFA for administrative access</td>
</tr>
<tr>
<td><strong>Patch management</strong></td>
<td>Timely remediation of known vulnerabilities</td>
</tr>
</tbody>
</table>
<h3 id="incident-management" tabindex="-1">Incident Management <a class="header-anchor" href="#incident-management" aria-label="Permalink to &quot;Incident Management&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Clause</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Reporting obligation</strong></td>
<td>Immediate notification of security incidents (max. 24h)</td>
</tr>
<tr>
<td><strong>Cooperation obligation</strong></td>
<td>Support during analysis and remediation</td>
</tr>
<tr>
<td><strong>Disclosure obligation</strong></td>
<td>Complete information on scope and impact</td>
</tr>
</tbody>
</table>
<div class="warning custom-block"><p class="custom-block-title">§30(2) NO. 4 BSIG – SUPPLY CHAIN SECURITY</p>
<p>NIS2 explicitly requires that security measures in the supply chain are addressed, including security-related aspects concerning the relationship between the entity and its direct suppliers or service providers.</p>
</div>
<h3 id="audit-and-inspection-rights" tabindex="-1">Audit and Inspection Rights <a class="header-anchor" href="#audit-and-inspection-rights" aria-label="Permalink to &quot;Audit and Inspection Rights&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Clause</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Audit right</strong></td>
<td>Right to audit security measures (in-house or through third parties)</td>
</tr>
<tr>
<td><strong>Certificate submission</strong></td>
<td>Obligation to present current security certifications</td>
</tr>
<tr>
<td><strong>Compliance evidence</strong></td>
<td>Annual evidence of adherence to contractual security requirements</td>
</tr>
</tbody>
</table>
<h3 id="data-handling" tabindex="-1">Data Handling <a class="header-anchor" href="#data-handling" aria-label="Permalink to &quot;Data Handling&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Clause</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Data storage</strong></td>
<td>Storage location and legal jurisdiction documented</td>
</tr>
<tr>
<td><strong>Data deletion</strong></td>
<td>Secure deletion after contract termination, with evidence</td>
</tr>
<tr>
<td><strong>Data return</strong></td>
<td>Return of all data in machine-readable format</td>
</tr>
<tr>
<td><strong>Subcontractors</strong></td>
<td>Approval required for subcontractors, same security requirements apply</td>
</tr>
</tbody>
</table>
<h3 id="exit-strategy" tabindex="-1">Exit Strategy <a class="header-anchor" href="#exit-strategy" aria-label="Permalink to &quot;Exit Strategy&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Clause</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Transition period</strong></td>
<td>Minimum 90 days of migration support</td>
</tr>
<tr>
<td><strong>Data export</strong></td>
<td>Complete data export in open formats</td>
</tr>
<tr>
<td><strong>Knowledge transfer</strong></td>
<td>Documentation of all relevant configurations and processes</td>
</tr>
<tr>
<td><strong>Deletion confirmation</strong></td>
<td>Written confirmation of complete data deletion</td>
</tr>
</tbody>
</table>
<h2 id="contract-management-schedule" tabindex="-1">Contract Management Schedule <a class="header-anchor" href="#contract-management-schedule" aria-label="Permalink to &quot;Contract Management Schedule&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Activity</th>
<th>Interval</th>
<th>Responsible</th>
</tr>
</thead>
<tbody>
<tr>
<td>Contract review</td>
<td>Upon conclusion / renewal</td>
<td>CISO + Procurement</td>
</tr>
<tr>
<td>SLA monitoring</td>
<td>Ongoing</td>
<td>IT Operations</td>
</tr>
<tr>
<td>Security clause review</td>
<td>Annually for critical service providers</td>
<td>CISO</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Vendor Assessment]]></title>
            <link>https://nis2.docs.bauer-group.com/en/supply-chain/vendor-assessment</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/supply-chain/vendor-assessment</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Vendor Assessment

## Assessment Process

### Initial Assessment (Prior to Engagement)

| Step | Description | Responsible |
|]]></description>
            <content:encoded><![CDATA[<h1 id="vendor-assessment" tabindex="-1">Vendor Assessment <a class="header-anchor" href="#vendor-assessment" aria-label="Permalink to &quot;Vendor Assessment&quot;"></a></h1>
<h2 id="assessment-process" tabindex="-1">Assessment Process <a class="header-anchor" href="#assessment-process" aria-label="Permalink to &quot;Assessment Process&quot;"></a></h2>
<h3 id="initial-assessment-prior-to-engagement" tabindex="-1">Initial Assessment (Prior to Engagement) <a class="header-anchor" href="#initial-assessment-prior-to-engagement" aria-label="Permalink to &quot;Initial Assessment (Prior to Engagement)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Step</th>
<th>Description</th>
<th>Responsible</th>
</tr>
</thead>
<tbody>
<tr>
<td>1. Requirements profile</td>
<td>Define security requirements based on protection needs</td>
<td>Business unit + CISO</td>
</tr>
<tr>
<td>2. Information gathering</td>
<td>Obtain security documentation, certifications, references</td>
<td>Procurement</td>
</tr>
<tr>
<td>3. Evaluation</td>
<td>Review against scoring criteria</td>
<td>CISO</td>
</tr>
<tr>
<td>4. Risk assessment</td>
<td>Determine residual risk, define measures</td>
<td>CISO</td>
</tr>
<tr>
<td>5. Decision</td>
<td>Approval or rejection</td>
<td>CISO + Executive Management (for critical vendors)</td>
</tr>
</tbody>
</table>
<h3 id="scoring-criteria" tabindex="-1">Scoring Criteria <a class="header-anchor" href="#scoring-criteria" aria-label="Permalink to &quot;Scoring Criteria&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Criterion</th>
<th>Weight</th>
<th>Scoring Scale</th>
</tr>
</thead>
<tbody>
<tr>
<td>Security certifications (ISO 27001, SOC 2, BSI C5)</td>
<td>25%</td>
<td>0-3 (none / in progress / available / current)</td>
</tr>
<tr>
<td>Incident response capability</td>
<td>20%</td>
<td>0-3 (no process / basic / documented / tested)</td>
</tr>
<tr>
<td>Location / legal jurisdiction</td>
<td>15%</td>
<td>0-3 (insecure / third country with safeguards / EU / DE)</td>
</tr>
<tr>
<td>Contract design</td>
<td>15%</td>
<td>0-3 (standard / customized / audit rights / comprehensive)</td>
</tr>
<tr>
<td>Subcontractor transparency</td>
<td>10%</td>
<td>0-3 (no info / list / approval required / contractual)</td>
</tr>
<tr>
<td>Track record</td>
<td>15%</td>
<td>0-3 (unknown / &lt; 1 year / 1-3 years / &gt; 3 years)</td>
</tr>
</tbody>
</table>
<p><strong>Minimum scores:</strong> 12/18 for standard vendors, 15/18 for critical vendors.</p>
<div class="info custom-block"><p class="custom-block-title">SCORING METHODOLOGY</p>
<p>Each criterion is scored from 0 to 3. The weighted total determines the overall score. Vendors below the minimum threshold must either improve their security posture or be rejected. Exceptions require CISO and executive management approval with documented risk acceptance.</p>
</div>
<h3 id="reassessment-intervals" tabindex="-1">Reassessment Intervals <a class="header-anchor" href="#reassessment-intervals" aria-label="Permalink to &quot;Reassessment Intervals&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Vendor Category</th>
<th>Assessment Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td>Critical infrastructure providers</td>
<td>Annually</td>
</tr>
<tr>
<td>Cloud and SaaS providers</td>
<td>Annually</td>
</tr>
<tr>
<td>Software suppliers</td>
<td>Upon contract renewal</td>
</tr>
<tr>
<td>Support partners</td>
<td>Every 2 years</td>
</tr>
<tr>
<td>Event-driven</td>
<td>Upon security incident or significant change at the vendor</td>
</tr>
</tbody>
</table>
<h2 id="vendor-categorization" tabindex="-1">Vendor Categorization <a class="header-anchor" href="#vendor-categorization" aria-label="Permalink to &quot;Vendor Categorization&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Category</th>
<th>Definition</th>
<th>Examples</th>
<th>Requirements</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Critical</strong></td>
<td>Outage impacts core business</td>
<td>Hosting, primary cloud services</td>
<td>Highest security requirements, annual audit right</td>
</tr>
<tr>
<td><strong>Important</strong></td>
<td>Outage impacts individual services</td>
<td>SaaS tools, DNS provider</td>
<td>High requirements, incident reporting obligation</td>
</tr>
<tr>
<td><strong>Standard</strong></td>
<td>Outage has low impact</td>
<td>Consulting, maintenance</td>
<td>Basic requirements</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Awareness & Cyber Hygiene]]></title>
            <link>https://nis2.docs.bauer-group.com/en/training/awareness</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/training/awareness</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Awareness & Cyber Hygiene

## Awareness Program

### Ongoing Measures

| Measure | Description | Interval |
|]]></description>
            <content:encoded><![CDATA[<h1 id="awareness-cyber-hygiene" tabindex="-1">Awareness &amp; Cyber Hygiene <a class="header-anchor" href="#awareness-cyber-hygiene" aria-label="Permalink to &quot;Awareness &amp; Cyber Hygiene&quot;"></a></h1>
<h2 id="awareness-program" tabindex="-1">Awareness Program <a class="header-anchor" href="#awareness-program" aria-label="Permalink to &quot;Awareness Program&quot;"></a></h2>
<h3 id="ongoing-measures" tabindex="-1">Ongoing Measures <a class="header-anchor" href="#ongoing-measures" aria-label="Permalink to &quot;Ongoing Measures&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Measure</th>
<th>Description</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Phishing simulation</strong></td>
<td>Realistic phishing emails sent to all employees</td>
<td>Semi-annually</td>
</tr>
<tr>
<td><strong>Security advisories</strong></td>
<td>Current warnings for relevant threats (e.g., new phishing wave)</td>
<td>Event-driven</td>
</tr>
<tr>
<td><strong>Onboarding briefing</strong></td>
<td>Security induction for new employees</td>
<td>Upon joining</td>
</tr>
<tr>
<td><strong>Annual mandatory training</strong></td>
<td>Refresher on all basic topics</td>
<td>Annually</td>
</tr>
</tbody>
</table>
<h3 id="phishing-simulation" tabindex="-1">Phishing Simulation <a class="header-anchor" href="#phishing-simulation" aria-label="Permalink to &quot;Phishing Simulation&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Frequency</td>
<td>2x per year</td>
</tr>
<tr>
<td>Difficulty level</td>
<td>Varies (basic to advanced)</td>
</tr>
<tr>
<td>Evaluation</td>
<td>Click rate, report rate, department comparison</td>
</tr>
<tr>
<td>Remedial training</td>
<td>Automatic for employees who clicked</td>
</tr>
<tr>
<td>Target click rate</td>
<td>&lt; 5%</td>
</tr>
</tbody>
</table>
<h2 id="cyber-hygiene-rules" tabindex="-1">Cyber Hygiene Rules <a class="header-anchor" href="#cyber-hygiene-rules" aria-label="Permalink to &quot;Cyber Hygiene Rules&quot;"></a></h2>
<h3 id="workplace" tabindex="-1">Workplace <a class="header-anchor" href="#workplace" aria-label="Permalink to &quot;Workplace&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Rule</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Screen lock</td>
<td>Automatic after 5 minutes of inactivity</td>
</tr>
<tr>
<td>Clean desk</td>
<td>No confidential documents left in the open</td>
</tr>
<tr>
<td>Removable media</td>
<td>USB drives only with IT approval</td>
</tr>
<tr>
<td>Personal devices</td>
<td>No access to corporate data from personal devices without MDM</td>
</tr>
</tbody>
</table>
<h3 id="passwords-authentication" tabindex="-1">Passwords &amp; Authentication <a class="header-anchor" href="#passwords-authentication" aria-label="Permalink to &quot;Passwords &amp; Authentication&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Rule</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Password manager</td>
<td>Mandatory for all employees</td>
</tr>
<tr>
<td>Unique passwords</td>
<td>Each service receives its own password</td>
</tr>
<tr>
<td>MFA</td>
<td>Enabled for all external services and admin access</td>
</tr>
<tr>
<td>Password sharing</td>
<td>Prohibited -- access only via personalized accounts</td>
</tr>
</tbody>
</table>
<h3 id="communication" tabindex="-1">Communication <a class="header-anchor" href="#communication" aria-label="Permalink to &quot;Communication&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Rule</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Suspicious emails</td>
<td>Do not open, do not forward, report to ISO</td>
</tr>
<tr>
<td>Confidential data</td>
<td>Transmit only via encrypted channels</td>
</tr>
<tr>
<td>Public networks</td>
<td>Use only with VPN</td>
</tr>
<tr>
<td>Unknown callers</td>
<td>Never disclose credentials or internal information</td>
</tr>
</tbody>
</table>
<h2 id="documentation" tabindex="-1">Documentation <a class="header-anchor" href="#documentation" aria-label="Permalink to &quot;Documentation&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Evidence</th>
<th>Description</th>
<th>Retention</th>
</tr>
</thead>
<tbody>
<tr>
<td>Training completion</td>
<td>Attendance confirmation per module</td>
<td>Minimum 3 years</td>
</tr>
<tr>
<td>Phishing results</td>
<td>Aggregated statistics per campaign</td>
<td>2 years</td>
</tr>
<tr>
<td>Onboarding confirmation</td>
<td>Signed security policy acknowledgment</td>
<td>Duration of employment</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Training Program]]></title>
            <link>https://nis2.docs.bauer-group.com/en/training/training-program</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/training/training-program</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Training Program

## Mandatory Training

### Basic Training -- All Employees

| Module | Content | Duration | Interval |
|]]></description>
            <content:encoded><![CDATA[<h1 id="training-program" tabindex="-1">Training Program <a class="header-anchor" href="#training-program" aria-label="Permalink to &quot;Training Program&quot;"></a></h1>
<h2 id="mandatory-training" tabindex="-1">Mandatory Training <a class="header-anchor" href="#mandatory-training" aria-label="Permalink to &quot;Mandatory Training&quot;"></a></h2>
<h3 id="basic-training-all-employees" tabindex="-1">Basic Training -- All Employees <a class="header-anchor" href="#basic-training-all-employees" aria-label="Permalink to &quot;Basic Training -- All Employees&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Module</th>
<th>Content</th>
<th>Duration</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Information Security Fundamentals</strong></td>
<td>Protection goals, data classification, responsibilities</td>
<td>30 min</td>
<td>Annually</td>
</tr>
<tr>
<td><strong>Phishing &amp; Social Engineering</strong></td>
<td>Recognition, current attack patterns, reporting channels</td>
<td>30 min</td>
<td>Annually</td>
</tr>
<tr>
<td><strong>Password &amp; Access Security</strong></td>
<td>Password managers, MFA, screen locking</td>
<td>20 min</td>
<td>Annually</td>
</tr>
<tr>
<td><strong>Incident Reporting</strong></td>
<td>Reporting obligation, channels, contacts, examples</td>
<td>15 min</td>
<td>Annually</td>
</tr>
<tr>
<td><strong>Data Protection</strong></td>
<td>Personal data, GDPR fundamentals, data subject rights</td>
<td>20 min</td>
<td>Annually</td>
</tr>
</tbody>
</table>
<p><strong>Total duration:</strong> ~2 hours per year</p>
<h3 id="management-training-§38-3-bsig" tabindex="-1">Management Training (§38(3) BSIG) <a class="header-anchor" href="#management-training-§38-3-bsig" aria-label="Permalink to &quot;Management Training (§38(3) BSIG)&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Content</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Current threat landscape</td>
<td>Relevant attacks, trends, industry-specific risks</td>
</tr>
<tr>
<td>NIS2/BSIG obligations</td>
<td>§30 measures, §32 reporting obligations, §38 liability</td>
</tr>
<tr>
<td>Risk management</td>
<td>Reading and assessing risk analyses, approving measures</td>
</tr>
<tr>
<td>Incident escalation</td>
<td>Role of management during incidents, communication decisions</td>
</tr>
</tbody>
</table>
<p><strong>Duration:</strong> 2--3 hours per year, delivered by ISO or external trainer</p>
<h3 id="role-specific-training" tabindex="-1">Role-Specific Training <a class="header-anchor" href="#role-specific-training" aria-label="Permalink to &quot;Role-Specific Training&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Target Group</th>
<th>Modules</th>
<th>Duration</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>IT Administration</strong></td>
<td>Secure configuration, patch processes, log management, hardening</td>
<td>4h</td>
<td>Annually</td>
</tr>
<tr>
<td><strong>Software Development</strong></td>
<td>Secure coding, OWASP Top 10, dependency management, code review</td>
<td>4h</td>
<td>Annually</td>
</tr>
<tr>
<td><strong>Project Management</strong></td>
<td>Security requirements, risk assessment in projects</td>
<td>2h</td>
<td>Annually</td>
</tr>
<tr>
<td><strong>Helpdesk / Support</strong></td>
<td>Social engineering recognition, escalation, data protection</td>
<td>2h</td>
<td>Annually</td>
</tr>
</tbody>
</table>
<h2 id="training-methods" tabindex="-1">Training Methods <a class="header-anchor" href="#training-methods" aria-label="Permalink to &quot;Training Methods&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Method</th>
<th>Application</th>
</tr>
</thead>
<tbody>
<tr>
<td>E-learning</td>
<td>Basic and mandatory training, self-paced</td>
</tr>
<tr>
<td>In-person training</td>
<td>Management training, role-specific workshops</td>
</tr>
<tr>
<td>Phishing simulation</td>
<td>Practical awareness testing, semi-annually</td>
</tr>
<tr>
<td>Security advisories</td>
<td>Current warnings via email during acute threats</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Patch Management]]></title>
            <link>https://nis2.docs.bauer-group.com/en/vulnerability-management/patch-management</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/vulnerability-management/patch-management</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Patch Management

## Patch Deadlines by Severity

| Severity | CVSS | Deadline | Escalation upon Overdue |
|]]></description>
            <content:encoded><![CDATA[<h1 id="patch-management" tabindex="-1">Patch Management <a class="header-anchor" href="#patch-management" aria-label="Permalink to &quot;Patch Management&quot;"></a></h1>
<h2 id="patch-deadlines-by-severity" tabindex="-1">Patch Deadlines by Severity <a class="header-anchor" href="#patch-deadlines-by-severity" aria-label="Permalink to &quot;Patch Deadlines by Severity&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Severity</th>
<th>CVSS</th>
<th>Deadline</th>
<th>Escalation upon Overdue</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Critical</strong></td>
<td>&gt;= 9.0</td>
<td>48 hours</td>
<td>Immediately to CISO + Executive Management</td>
</tr>
<tr>
<td><strong>High</strong></td>
<td>7.0-8.9</td>
<td>7 days</td>
<td>After 5 days to CISO</td>
</tr>
<tr>
<td><strong>Medium</strong></td>
<td>4.0-6.9</td>
<td>30 days</td>
<td>Monthly report</td>
</tr>
<tr>
<td><strong>Low</strong></td>
<td>&lt; 4.0</td>
<td>Next release cycle</td>
<td>Quarterly report</td>
</tr>
</tbody>
</table>
<h2 id="patch-process" tabindex="-1">Patch Process <a class="header-anchor" href="#patch-process" aria-label="Permalink to &quot;Patch Process&quot;"></a></h2>
<h3 id="standard-process-medium-low" tabindex="-1">Standard Process (Medium / Low) <a class="header-anchor" href="#standard-process-medium-low" aria-label="Permalink to &quot;Standard Process (Medium / Low)&quot;"></a></h3>
<ol>
<li>Vulnerability identified through scanning or CVE monitoring</li>
<li>Assessment and prioritization</li>
<li>Test patch in staging environment</li>
<li>Deploy to production within the deadline</li>
<li>Verification: scan confirms remediation</li>
</ol>
<h3 id="emergency-process-critical-high" tabindex="-1">Emergency Process (Critical / High) <a class="header-anchor" href="#emergency-process-critical-high" aria-label="Permalink to &quot;Emergency Process (Critical / High)&quot;"></a></h3>
<ol>
<li>Immediate assessment by IT Ops + CISO</li>
<li>Implement workaround if patch is not immediately available (e.g., WAF rule, network isolation)</li>
<li>Test patch (shortened test phase, parallel if necessary)</li>
<li>Emergency deployment (outside regular maintenance windows permitted)</li>
<li>Verification and documentation</li>
</ol>
<div class="warning custom-block"><p class="custom-block-title">EMERGENCY PATCHING</p>
<p>Critical vulnerabilities (CVSS &gt;= 9.0) must be addressed within 48 hours. If a patch is not available, compensating controls must be implemented immediately and documented. The CISO must approve all emergency patches.</p>
</div>
<h2 id="exception-handling" tabindex="-1">Exception Handling <a class="header-anchor" href="#exception-handling" aria-label="Permalink to &quot;Exception Handling&quot;"></a></h2>
<p>When a patch cannot be applied within the deadline:</p>
<table tabindex="0">
<thead>
<tr>
<th>Step</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Justification</td>
<td>Documented rationale (technical incompatibility, patch unavailability)</td>
</tr>
<tr>
<td>Compensating measure</td>
<td>Workaround, network isolation, enhanced monitoring</td>
</tr>
<tr>
<td>Approval</td>
<td>CISO approval required; executive management approval for critical systems</td>
</tr>
<tr>
<td>Time limit</td>
<td>Maximum exception duration defined, with review date</td>
</tr>
</tbody>
</table>
<h2 id="patch-tracking-metrics" tabindex="-1">Patch Tracking Metrics <a class="header-anchor" href="#patch-tracking-metrics" aria-label="Permalink to &quot;Patch Tracking Metrics&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Metric</th>
<th>Measurement</th>
<th>Target</th>
</tr>
</thead>
<tbody>
<tr>
<td>Patch compliance rate</td>
<td>Percentage of vulnerabilities patched within deadline</td>
<td>&gt;= 95%</td>
</tr>
<tr>
<td>Mean Time to Patch (MTTP)</td>
<td>Average time from CVE publication to patch deployment</td>
<td>Critical: &lt; 48h, High: &lt; 7d</td>
</tr>
<tr>
<td>Open critical vulnerabilities</td>
<td>Number of unpatched CVSS &gt;= 9.0 vulnerabilities</td>
<td>0</td>
</tr>
<tr>
<td>Exceptions</td>
<td>Number of active patch exceptions</td>
<td>Minimize</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Vulnerability Detection & CVE Monitoring]]></title>
            <link>https://nis2.docs.bauer-group.com/en/vulnerability-management/scanning</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/vulnerability-management/scanning</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Vulnerability Detection & CVE Monitoring

## Scanning Program

### Infrastructure Scanning

| Method | Tool Category | Interval | Scope |
|]]></description>
            <content:encoded><![CDATA[<h1 id="vulnerability-detection-cve-monitoring" tabindex="-1">Vulnerability Detection &amp; CVE Monitoring <a class="header-anchor" href="#vulnerability-detection-cve-monitoring" aria-label="Permalink to &quot;Vulnerability Detection &amp; CVE Monitoring&quot;"></a></h1>
<h2 id="scanning-program" tabindex="-1">Scanning Program <a class="header-anchor" href="#scanning-program" aria-label="Permalink to &quot;Scanning Program&quot;"></a></h2>
<h3 id="infrastructure-scanning" tabindex="-1">Infrastructure Scanning <a class="header-anchor" href="#infrastructure-scanning" aria-label="Permalink to &quot;Infrastructure Scanning&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Method</th>
<th>Tool Category</th>
<th>Interval</th>
<th>Scope</th>
</tr>
</thead>
<tbody>
<tr>
<td>Network scan</td>
<td>Port scanner, service detection</td>
<td>Weekly</td>
<td>All reachable IP ranges</td>
</tr>
<tr>
<td>Vulnerability scan</td>
<td>Trivy, OpenVAS or equivalent</td>
<td>Weekly</td>
<td>Servers, containers, network devices</td>
</tr>
<tr>
<td>Compliance scan</td>
<td>Configuration audit</td>
<td>Monthly</td>
<td>Hardening guidelines, CIS Benchmarks</td>
</tr>
</tbody>
</table>
<h3 id="application-scanning" tabindex="-1">Application Scanning <a class="header-anchor" href="#application-scanning" aria-label="Permalink to &quot;Application Scanning&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Method</th>
<th>Tool Category</th>
<th>Interval</th>
<th>Scope</th>
</tr>
</thead>
<tbody>
<tr>
<td>SAST (Static Analysis)</td>
<td>Code analysis in CI/CD</td>
<td>On every commit</td>
<td>In-house developments</td>
</tr>
<tr>
<td>Dependency scan</td>
<td>Dependabot, Trivy</td>
<td>Continuous (automated)</td>
<td>All software dependencies</td>
</tr>
<tr>
<td>Container scan</td>
<td>Trivy</td>
<td>On every build</td>
<td>Docker images</td>
</tr>
</tbody>
</table>
<div class="tip custom-block"><p class="custom-block-title">CRA SYNERGY</p>
<p>Product-related vulnerability scanning (SBOM generation, multi-engine scanning with Trivy + Grype + OSV-Scanner) is documented in the <a href="https://cra.docs.bauer-group.com/en/vulnerability-management/" target="_blank" rel="noreferrer">CRA Compliance Documentation</a>. NIS2 scanning focuses on infrastructure and operational systems.</p>
</div>
<h2 id="cve-monitoring" tabindex="-1">CVE Monitoring <a class="header-anchor" href="#cve-monitoring" aria-label="Permalink to &quot;CVE Monitoring&quot;"></a></h2>
<h3 id="sources" tabindex="-1">Sources <a class="header-anchor" href="#sources" aria-label="Permalink to &quot;Sources&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Source</th>
<th>Type</th>
<th>Relevance</th>
</tr>
</thead>
<tbody>
<tr>
<td>NVD (National Vulnerability Database)</td>
<td>CVE database</td>
<td>All deployed products</td>
</tr>
<tr>
<td>BSI advisories</td>
<td>Advisories, security notices</td>
<td>Infrastructure and standard software</td>
</tr>
<tr>
<td>Vendor advisories</td>
<td>Manufacturer notifications</td>
<td>Deployed products</td>
</tr>
<tr>
<td>GitHub Security Advisories</td>
<td>Dependency alerts</td>
<td>Open-source dependencies</td>
</tr>
<tr>
<td>CERT-Bund</td>
<td>Warning notices</td>
<td>Critical infrastructure</td>
</tr>
</tbody>
</table>
<h3 id="assessment-flowchart" tabindex="-1">Assessment Flowchart <a class="header-anchor" href="#assessment-flowchart" aria-label="Permalink to &quot;Assessment Flowchart&quot;"></a></h3>
<div class="language- vp-adaptive-theme"><button title="Copy Code" class="copy"></button><span class="lang"></span><pre class="shiki shiki-themes github-light github-dark vp-code" tabindex="0" v-pre=""><code><span class="line"><span>CVE published</span></span>
<span class="line"><span>  → Relevance check: Is the affected product deployed in our environment?</span></span>
<span class="line"><span>    → Yes: CVSS score + contextual assessment</span></span>
<span class="line"><span>      → Critical/High: Immediate escalation to IT Ops</span></span>
<span class="line"><span>      → Medium: Include in patch cycle</span></span>
<span class="line"><span>      → Low: Next release cycle</span></span>
<span class="line"><span>    → No: Archive</span></span></code></pre>
</div><h2 id="vulnerability-tracking" tabindex="-1">Vulnerability Tracking <a class="header-anchor" href="#vulnerability-tracking" aria-label="Permalink to &quot;Vulnerability Tracking&quot;"></a></h2>
<p>Each identified vulnerability is documented with the following fields:</p>
<table tabindex="0">
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>ID</td>
<td>CVE number or internal ID</td>
</tr>
<tr>
<td>Affected system</td>
<td>Hostname, application, component</td>
</tr>
<tr>
<td>CVSS score</td>
<td>Original assessment</td>
</tr>
<tr>
<td>Contextual assessment</td>
<td>Adjustment for our environment (reachable? exploitable?)</td>
</tr>
<tr>
<td>Status</td>
<td>Open / In Progress / Resolved / Accepted</td>
</tr>
<tr>
<td>Measure</td>
<td>Patch, workaround, configuration change</td>
</tr>
<tr>
<td>Deadline</td>
<td>Per <a href="/en/vulnerability-management/patch-management">patch management</a> deadlines</td>
</tr>
<tr>
<td>Responsible</td>
<td>Assigned administrator or developer</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Secure Development]]></title>
            <link>https://nis2.docs.bauer-group.com/en/vulnerability-management/secure-development</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/vulnerability-management/secure-development</guid>
            <pubDate>Mon, 23 Mar 2026 23:52:26 GMT</pubDate>
            <description><![CDATA[# Secure Development

## Security in SDLC Phases

| Phase | Security Measure | Description |
|]]></description>
            <content:encoded><![CDATA[<h1 id="secure-development" tabindex="-1">Secure Development <a class="header-anchor" href="#secure-development" aria-label="Permalink to &quot;Secure Development&quot;"></a></h1>
<h2 id="security-in-sdlc-phases" tabindex="-1">Security in SDLC Phases <a class="header-anchor" href="#security-in-sdlc-phases" aria-label="Permalink to &quot;Security in SDLC Phases&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Phase</th>
<th>Security Measure</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Design</strong></td>
<td>Threat modeling</td>
<td>Identification of attack vectors before implementation</td>
</tr>
<tr>
<td><strong>Implementation</strong></td>
<td>Secure coding guidelines</td>
<td>OWASP Top 10, input validation, parameterized queries</td>
</tr>
<tr>
<td><strong>Code review</strong></td>
<td>Four-eyes principle</td>
<td>Security-relevant changes require peer review</td>
</tr>
<tr>
<td><strong>Test</strong></td>
<td>Automated security tests</td>
<td>SAST, dependency scan in CI/CD</td>
</tr>
<tr>
<td><strong>Deployment</strong></td>
<td>Hardening</td>
<td>Least privilege, secure configuration, secrets management</td>
</tr>
<tr>
<td><strong>Operations</strong></td>
<td>Monitoring + patching</td>
<td>Log analysis, vulnerability scanning, <a href="/en/vulnerability-management/patch-management">patch management</a></td>
</tr>
</tbody>
</table>
<h2 id="ci-cd-security-pipeline" tabindex="-1">CI/CD Security Pipeline <a class="header-anchor" href="#ci-cd-security-pipeline" aria-label="Permalink to &quot;CI/CD Security Pipeline&quot;"></a></h2>
<p>Every commit passes through the following automated checks:</p>
<table tabindex="0">
<thead>
<tr>
<th>Step</th>
<th>Tool Category</th>
<th>Blocks on Failure</th>
</tr>
</thead>
<tbody>
<tr>
<td>Markdown lint / Code lint</td>
<td>markdownlint, ESLint</td>
<td>Yes</td>
</tr>
<tr>
<td>Build</td>
<td>Framework-specific</td>
<td>Yes</td>
</tr>
<tr>
<td>Dependency audit</td>
<td>npm audit, Trivy</td>
<td>On high/critical</td>
</tr>
<tr>
<td>SAST (if applicable)</td>
<td>Code analysis</td>
<td>On critical</td>
</tr>
</tbody>
</table>
<h2 id="dependency-management" tabindex="-1">Dependency Management <a class="header-anchor" href="#dependency-management" aria-label="Permalink to &quot;Dependency Management&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Measure</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Lockfile</strong></td>
<td>All dependencies are versioned and locked (package-lock.json)</td>
</tr>
<tr>
<td><strong>Automated updates</strong></td>
<td>Dependabot checks weekly for new versions</td>
</tr>
<tr>
<td><strong>Audit</strong></td>
<td><code>npm audit</code> in CI pipeline, blocks on high/critical</td>
</tr>
<tr>
<td><strong>Review</strong></td>
<td>New dependencies require justification and review</td>
</tr>
<tr>
<td><strong>Minimization</strong></td>
<td>As few dependencies as possible, preferring actively maintained ones</td>
</tr>
</tbody>
</table>
<h2 id="secrets-management" tabindex="-1">Secrets Management <a class="header-anchor" href="#secrets-management" aria-label="Permalink to &quot;Secrets Management&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Requirement</th>
<th>Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td>No secrets in code</td>
<td>Pre-commit hook checks for patterns (API keys, passwords)</td>
</tr>
<tr>
<td>Environment variables</td>
<td>Secrets via environment variables, not in files</td>
</tr>
<tr>
<td>CI/CD secrets</td>
<td>Via GitHub Actions Secrets, not in the repository</td>
</tr>
<tr>
<td>Rotation</td>
<td>Regular rotation of API keys and service accounts</td>
</tr>
</tbody>
</table>
<div class="tip custom-block"><p class="custom-block-title">CRA SYNERGY</p>
<p>The product-related secure development pipeline (SBOM generation, Cosign signing, multi-engine vulnerability scanning) is documented in the <a href="https://cra.docs.bauer-group.com/en/vulnerability-management/" target="_blank" rel="noreferrer">CRA Compliance Documentation</a>. NIS2 secure development standards complement CRA requirements by covering infrastructure and operational codebases.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Access Control & Secure Communication]]></title>
            <link>https://nis2.docs.bauer-group.com/en/access-control/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/access-control/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Access Control & Secure Communication

::: info LEGAL BASIS
**§30(2) No. 9 BSIG** – Personnel security, access control concepts and asset management

**§30(2) No. 10 BSIG** – Use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communication, and secured emergency communication systems where appropriate
:::

## Access Control Principles

| Principle | Implementation |
|]]></description>
            <content:encoded><![CDATA[<h1 id="access-control-secure-communication" tabindex="-1">Access Control &amp; Secure Communication <a class="header-anchor" href="#access-control-secure-communication" aria-label="Permalink to &quot;Access Control &amp; Secure Communication&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 9 BSIG</strong> – Personnel security, access control concepts and asset management</p>
<p><strong>§30(2) No. 10 BSIG</strong> – Use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communication, and secured emergency communication systems where appropriate</p>
</div>
<h2 id="access-control-principles" tabindex="-1">Access Control Principles <a class="header-anchor" href="#access-control-principles" aria-label="Permalink to &quot;Access Control Principles&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Principle</th>
<th>Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Least privilege</strong></td>
<td>Minimum rights per task requirement</td>
</tr>
<tr>
<td><strong>Need-to-know</strong></td>
<td>Data access only on business necessity</td>
</tr>
<tr>
<td><strong>Separation of duties</strong></td>
<td>Critical operations require multiple persons</td>
</tr>
<tr>
<td><strong>Four-eyes principle</strong></td>
<td>Security-relevant changes with review</td>
</tr>
</tbody>
</table>
<h2 id="authentication" tabindex="-1">Authentication <a class="header-anchor" href="#authentication" aria-label="Permalink to &quot;Authentication&quot;"></a></h2>
<h3 id="multi-factor-authentication-mfa" tabindex="-1">Multi-Factor Authentication (MFA) <a class="header-anchor" href="#multi-factor-authentication-mfa" aria-label="Permalink to &quot;Multi-Factor Authentication (MFA)&quot;"></a></h3>
<p>MFA is mandatory for:</p>
<ul>
<li>All external access (VPN, web portals)</li>
<li>Administrative system access</li>
<li>Cloud services and SaaS applications</li>
<li>Email access</li>
</ul>
<p>Preferred MFA methods: hardware tokens (FIDO2/WebAuthn), authenticator app (TOTP). SMS-based MFA is not permitted.</p>
<h3 id="server-access" tabindex="-1">Server Access <a class="header-anchor" href="#server-access" aria-label="Permalink to &quot;Server Access&quot;"></a></h3>
<ul>
<li>SSH with key-based authentication (Ed25519)</li>
<li>Password-based SSH login disabled</li>
<li>Root login disabled, access only via personalized accounts</li>
</ul>
<h2 id="password-management" tabindex="-1">Password Management <a class="header-anchor" href="#password-management" aria-label="Permalink to &quot;Password Management&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Requirement</th>
<th>Minimum Standard</th>
</tr>
</thead>
<tbody>
<tr>
<td>Minimum length</td>
<td>16 characters (passphrase recommended)</td>
</tr>
<tr>
<td>Password manager</td>
<td>Mandatory for all employees</td>
</tr>
<tr>
<td>Password reuse</td>
<td>Prohibited</td>
</tr>
<tr>
<td>Compromised passwords</td>
<td>Automatic check against known-breach lists</td>
</tr>
</tbody>
</table>
<h2 id="on-offboarding" tabindex="-1">On-/Offboarding <a class="header-anchor" href="#on-offboarding" aria-label="Permalink to &quot;On-/Offboarding&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Process</th>
<th>Measure</th>
<th>Deadline</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Onboarding</strong></td>
<td>Set up personalized accounts, MFA setup, basic training</td>
<td>Before first working day</td>
</tr>
<tr>
<td><strong>Role change</strong></td>
<td>Adjust permissions, review old rights</td>
<td>Within 5 business days</td>
</tr>
<tr>
<td><strong>Offboarding</strong></td>
<td>Deactivate all access, return hardware, key rotation</td>
<td>On last working day</td>
</tr>
</tbody>
</table>
<h2 id="secure-communication" tabindex="-1">Secure Communication <a class="header-anchor" href="#secure-communication" aria-label="Permalink to &quot;Secure Communication&quot;"></a></h2>
<h3 id="communication-channels" tabindex="-1">Communication Channels <a class="header-anchor" href="#communication-channels" aria-label="Permalink to &quot;Communication Channels&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Channel</th>
<th>Security</th>
<th>Use</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Email</strong></td>
<td>TLS transport encryption, SPF/DKIM/DMARC</td>
<td>Standard business communication</td>
</tr>
<tr>
<td><strong>Encrypted messenger</strong></td>
<td>End-to-end encryption</td>
<td>Sensitive internal communication</td>
</tr>
<tr>
<td><strong>Video conferencing</strong></td>
<td>TLS-encrypted, access controls</td>
<td>Meetings, customer calls</td>
</tr>
<tr>
<td><strong>VPN</strong></td>
<td>IPsec/WireGuard</td>
<td>Remote access to internal systems</td>
</tr>
</tbody>
</table>
<h3 id="email-security" tabindex="-1">Email Security <a class="header-anchor" href="#email-security" aria-label="Permalink to &quot;Email Security&quot;"></a></h3>
<ul>
<li><strong>SPF</strong> – Sender Policy Framework configured for all domains</li>
<li><strong>DKIM</strong> – DomainKeys Identified Mail for signature verification</li>
<li><strong>DMARC</strong> – Domain-based Message Authentication, Reporting and Conformance (policy: reject)</li>
</ul>
<h3 id="emergency-communication" tabindex="-1">Emergency Communication <a class="header-anchor" href="#emergency-communication" aria-label="Permalink to &quot;Emergency Communication&quot;"></a></h3>
<ul>
<li>Predefined fallback communication channels (phone, alternative messenger)</li>
<li>Current contact lists of key personnel available offline</li>
<li>Regular verification of reachability</li>
</ul>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Business Continuity]]></title>
            <link>https://nis2.docs.bauer-group.com/en/business-continuity/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/business-continuity/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Business Continuity

::: info LEGAL BASIS
**§30(2) No. 3 BSIG** – Business continuity, including backup management and disaster recovery, and crisis management
:::

## Backup Strategy

BAUER GROUP applies the **3-2-1 rule**:

| Principle | Implementation |
|]]></description>
            <content:encoded><![CDATA[<h1 id="business-continuity" tabindex="-1">Business Continuity <a class="header-anchor" href="#business-continuity" aria-label="Permalink to &quot;Business Continuity&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 3 BSIG</strong> – Business continuity, including backup management and disaster recovery, and crisis management</p>
</div>
<h2 id="backup-strategy" tabindex="-1">Backup Strategy <a class="header-anchor" href="#backup-strategy" aria-label="Permalink to &quot;Backup Strategy&quot;"></a></h2>
<p>BAUER GROUP applies the <strong>3-2-1 rule</strong>:</p>
<table tabindex="0">
<thead>
<tr>
<th>Principle</th>
<th>Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>3</strong> copies</td>
<td>Production data + 2 backups</td>
</tr>
<tr>
<td><strong>2</strong> different media</td>
<td>Local storage + cloud/offsite</td>
</tr>
<tr>
<td><strong>1</strong> offsite copy</td>
<td>Geographically separated location</td>
</tr>
</tbody>
</table>
<h3 id="backup-intervals" tabindex="-1">Backup Intervals <a class="header-anchor" href="#backup-intervals" aria-label="Permalink to &quot;Backup Intervals&quot;"></a></h3>
<table tabindex="0">
<thead>
<tr>
<th>Data Type</th>
<th>Interval</th>
<th>Retention</th>
<th>Encryption</th>
</tr>
</thead>
<tbody>
<tr>
<td>Databases</td>
<td>Daily (incremental), weekly (full)</td>
<td>90 days</td>
<td>AES-256</td>
</tr>
<tr>
<td>Configurations</td>
<td>On change (Git-based)</td>
<td>Unlimited (versioning)</td>
<td>Repository-level</td>
</tr>
<tr>
<td>Customer data</td>
<td>Daily</td>
<td>Per contract, min. 30 days</td>
<td>AES-256</td>
</tr>
<tr>
<td>Email</td>
<td>Daily</td>
<td>90 days</td>
<td>AES-256</td>
</tr>
</tbody>
</table>
<h2 id="recovery-objectives" tabindex="-1">Recovery Objectives <a class="header-anchor" href="#recovery-objectives" aria-label="Permalink to &quot;Recovery Objectives&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Service</th>
<th>RTO (Recovery Time)</th>
<th>RPO (Recovery Point)</th>
</tr>
</thead>
<tbody>
<tr>
<td>Critical production systems</td>
<td>&lt; 4 hours</td>
<td>&lt; 1 hour</td>
</tr>
<tr>
<td>Internal systems</td>
<td>&lt; 24 hours</td>
<td>&lt; 24 hours</td>
</tr>
<tr>
<td>Archive / documentation</td>
<td>&lt; 72 hours</td>
<td>&lt; 1 week</td>
</tr>
</tbody>
</table>
<h2 id="disaster-recovery" tabindex="-1">Disaster Recovery <a class="header-anchor" href="#disaster-recovery" aria-label="Permalink to &quot;Disaster Recovery&quot;"></a></h2>
<ul>
<li><strong>Regular restore tests</strong> – Quarterly verification of recoverability</li>
<li><strong>Documented recovery procedures</strong> per system</li>
<li><strong>Failover systems</strong> for business-critical services</li>
<li><strong>Escalation plan</strong> with clear responsibilities and communication channels</li>
</ul>
<h2 id="crisis-management" tabindex="-1">Crisis Management <a class="header-anchor" href="#crisis-management" aria-label="Permalink to &quot;Crisis Management&quot;"></a></h2>
<p>In the event of a crisis (e.g. ransomware, total outage):</p>
<ol>
<li><strong>Activate crisis team</strong> (ISO, management, IT lead)</li>
<li><strong>Establish situational awareness</strong> and document</li>
<li><strong>Activate communication plan</strong> (internal, customers, authorities)</li>
<li><strong>Restore</strong> per documented DR plan</li>
<li><strong>Post-incident review</strong> with lessons learned and plan adjustment</li>
</ol>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Compliance Matrix]]></title>
            <link>https://nis2.docs.bauer-group.com/en/compliance-matrix/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/compliance-matrix/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Compliance Matrix

Complete mapping of all NIS2 requirements to documentation, implementation and synergies.

## §30 BSIG – Risk Management Measures

| No. | Measure | Documentation | Status |
|]]></description>
            <content:encoded><![CDATA[<h1 id="compliance-matrix" tabindex="-1">Compliance Matrix <a class="header-anchor" href="#compliance-matrix" aria-label="Permalink to &quot;Compliance Matrix&quot;"></a></h1>
<p>Complete mapping of all NIS2 requirements to documentation, implementation and synergies.</p>
<h2 id="§30-bsig-–-risk-management-measures" tabindex="-1">§30 BSIG – Risk Management Measures <a class="header-anchor" href="#§30-bsig-–-risk-management-measures" aria-label="Permalink to &quot;§30 BSIG – Risk Management Measures&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>No.</th>
<th>Measure</th>
<th>Documentation</th>
<th>Status</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Risk analysis and IT security concepts</td>
<td><a href="/en/risk-management/">Risk Management</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>2</td>
<td>Incident handling</td>
<td><a href="/en/incident-management/">Incident Management</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>3</td>
<td>Business continuity / BCM</td>
<td><a href="/en/business-continuity/">Business Continuity</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>4</td>
<td>Supply chain security</td>
<td><a href="/en/supply-chain/">Supply Chain Security</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>5</td>
<td>Secure acquisition, development, maintenance</td>
<td><a href="/en/vulnerability-management/">Vulnerability Management</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>6</td>
<td>Effectiveness review</td>
<td><a href="/en/effectiveness-review/">Effectiveness Review</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>7</td>
<td>Training &amp; awareness</td>
<td><a href="/en/training/">Training &amp; Awareness</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>8</td>
<td>Cryptography</td>
<td><a href="/en/cryptography/">Cryptography</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>9</td>
<td>Access control &amp; personnel security</td>
<td><a href="/en/access-control/">Access Control</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>10</td>
<td>MFA &amp; secure communication</td>
<td><a href="/en/access-control/">Access Control</a></td>
<td>✅ Implemented</td>
</tr>
</tbody>
</table>
<h2 id="additional-bsig-obligations" tabindex="-1">Additional BSIG Obligations <a class="header-anchor" href="#additional-bsig-obligations" aria-label="Permalink to &quot;Additional BSIG Obligations&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Section</th>
<th>Obligation</th>
<th>Documentation</th>
<th>Status</th>
</tr>
</thead>
<tbody>
<tr>
<td>§32</td>
<td>Reporting obligations</td>
<td><a href="/en/incident-management/">Incident Management</a></td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>§33</td>
<td>Registration obligation</td>
<td>Organizationally implemented</td>
<td>✅ Implemented</td>
</tr>
<tr>
<td>§38</td>
<td>Management duties</td>
<td><a href="/en/governance/">Governance</a></td>
<td>✅ Implemented</td>
</tr>
</tbody>
</table>
<h2 id="cra-synergies" tabindex="-1">CRA Synergies <a class="header-anchor" href="#cra-synergies" aria-label="Permalink to &quot;CRA Synergies&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>NIS2 Measure</th>
<th>CRA Documentation</th>
<th>Synergy</th>
</tr>
</thead>
<tbody>
<tr>
<td>No. 2 – Incidents</td>
<td><a href="https://cra.docs.bauer-group.com/en/incident-response/" target="_blank" rel="noreferrer">CRA Incident Response</a></td>
<td>Product incidents via CRA, operational incidents via NIS2</td>
</tr>
<tr>
<td>No. 4 – Supply chain</td>
<td><a href="https://cra.docs.bauer-group.com/en/supply-chain/" target="_blank" rel="noreferrer">CRA Supply Chain</a></td>
<td>Software supply chain via CRA, service providers via NIS2</td>
</tr>
<tr>
<td>No. 5 – Vulnerabilities</td>
<td><a href="https://cra.docs.bauer-group.com/en/vulnerability-management/" target="_blank" rel="noreferrer">CRA Vulnerability Management</a></td>
<td>Product CVEs via CRA, infra CVEs via NIS2</td>
</tr>
<tr>
<td>No. 5 – SBOM</td>
<td><a href="https://cra.docs.bauer-group.com/en/sbom-signing/" target="_blank" rel="noreferrer">CRA SBOM &amp; Signing</a></td>
<td>SBOM generation and signing via CRA</td>
</tr>
</tbody>
</table>
<h2 id="ai-act-synergies" tabindex="-1">AI Act Synergies <a class="header-anchor" href="#ai-act-synergies" aria-label="Permalink to &quot;AI Act Synergies&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>NIS2 Measure</th>
<th>AI Act Reference</th>
<th>Synergy</th>
</tr>
</thead>
<tbody>
<tr>
<td>No. 1 – Risk management</td>
<td>Art. 9 AI Act (risk management)</td>
<td>NIS2 ISMS as foundation for AI risk management</td>
</tr>
<tr>
<td>No. 8 – Cryptography</td>
<td>Art. 15 AI Act (cybersecurity)</td>
<td>Cryptography standards also apply to AI systems</td>
</tr>
<tr>
<td>No. 9 – Access control</td>
<td>Art. 14 AI Act (human oversight)</td>
<td>Access control as foundation for AI oversight</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Cryptography]]></title>
            <link>https://nis2.docs.bauer-group.com/en/cryptography/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/cryptography/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Cryptography

::: info LEGAL BASIS
**§30(2) No. 8 BSIG** – Concepts and procedures for the use of cryptography and, where appropriate, encryption
:::

## Standards

BAUER GROUP follows BSI (TR-02102) and ISO/IEC 27001 Annex A.10 recommendations:

| Area | Standard | Minimum Requirement |
|]]></description>
            <content:encoded><![CDATA[<h1 id="cryptography" tabindex="-1">Cryptography <a class="header-anchor" href="#cryptography" aria-label="Permalink to &quot;Cryptography&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 8 BSIG</strong> – Concepts and procedures for the use of cryptography and, where appropriate, encryption</p>
</div>
<h2 id="standards" tabindex="-1">Standards <a class="header-anchor" href="#standards" aria-label="Permalink to &quot;Standards&quot;"></a></h2>
<p>BAUER GROUP follows BSI (TR-02102) and ISO/IEC 27001 Annex A.10 recommendations:</p>
<table tabindex="0">
<thead>
<tr>
<th>Area</th>
<th>Standard</th>
<th>Minimum Requirement</th>
</tr>
</thead>
<tbody>
<tr>
<td>Symmetric encryption</td>
<td>AES</td>
<td>AES-256</td>
</tr>
<tr>
<td>Asymmetric encryption</td>
<td>RSA / ECDSA</td>
<td>RSA-4096 / ECDSA P-384</td>
</tr>
<tr>
<td>Hash functions</td>
<td>SHA-2 / SHA-3</td>
<td>SHA-256+</td>
</tr>
<tr>
<td>TLS</td>
<td>TLS 1.2+</td>
<td>TLS 1.3 preferred</td>
</tr>
<tr>
<td>Key derivation</td>
<td>PBKDF2 / Argon2</td>
<td>Argon2id preferred</td>
</tr>
</tbody>
</table>
<h2 id="encryption" tabindex="-1">Encryption <a class="header-anchor" href="#encryption" aria-label="Permalink to &quot;Encryption&quot;"></a></h2>
<h3 id="data-at-rest" tabindex="-1">Data at Rest <a class="header-anchor" href="#data-at-rest" aria-label="Permalink to &quot;Data at Rest&quot;"></a></h3>
<ul>
<li>Full disk encryption on all server systems</li>
<li>Database encryption for sensitive data</li>
<li>Backup encryption (AES-256)</li>
</ul>
<h3 id="data-in-transit" tabindex="-1">Data in Transit <a class="header-anchor" href="#data-in-transit" aria-label="Permalink to &quot;Data in Transit&quot;"></a></h3>
<ul>
<li>TLS 1.2+ for all external connections, TLS 1.3 preferred</li>
<li>SSH for server administration (Ed25519 keys)</li>
<li>VPN for remote access to internal systems</li>
</ul>
<h2 id="key-management" tabindex="-1">Key Management <a class="header-anchor" href="#key-management" aria-label="Permalink to &quot;Key Management&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Aspect</th>
<th>Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td>Key generation</td>
<td>Cryptographically secure random generators</td>
</tr>
<tr>
<td>Key storage</td>
<td>Encrypted storage, access control</td>
</tr>
<tr>
<td>Key rotation</td>
<td>At least annually for long-term keys</td>
</tr>
<tr>
<td>Key destruction</td>
<td>Secure deletion on decommissioning</td>
</tr>
</tbody>
</table>
<h2 id="certificate-management" tabindex="-1">Certificate Management <a class="header-anchor" href="#certificate-management" aria-label="Permalink to &quot;Certificate Management&quot;"></a></h2>
<ul>
<li><strong>Let's Encrypt</strong> for public TLS certificates (automated renewal)</li>
<li>Certificate expiry monitoring</li>
<li>Documented processes for certificate renewal and revocation</li>
</ul>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Effectiveness Review]]></title>
            <link>https://nis2.docs.bauer-group.com/en/effectiveness-review/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/effectiveness-review/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Effectiveness Review

::: info LEGAL BASIS
**§30(2) No. 6 BSIG** – Concepts and procedures for assessing the effectiveness of risk management measures in information technology security
:::

## Annual Security Review

| Review Area | Method | Responsible |
|]]></description>
            <content:encoded><![CDATA[<h1 id="effectiveness-review" tabindex="-1">Effectiveness Review <a class="header-anchor" href="#effectiveness-review" aria-label="Permalink to &quot;Effectiveness Review&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 6 BSIG</strong> – Concepts and procedures for assessing the effectiveness of risk management measures in information technology security</p>
</div>
<h2 id="annual-security-review" tabindex="-1">Annual Security Review <a class="header-anchor" href="#annual-security-review" aria-label="Permalink to &quot;Annual Security Review&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Review Area</th>
<th>Method</th>
<th>Responsible</th>
</tr>
</thead>
<tbody>
<tr>
<td>Risk analysis</td>
<td>Update of risk assessment</td>
<td>ISO</td>
</tr>
<tr>
<td>Incident response</td>
<td>Tabletop exercise / simulation</td>
<td>ISO + IT team</td>
</tr>
<tr>
<td>Backup &amp; recovery</td>
<td>Restore test</td>
<td>IT operations</td>
</tr>
<tr>
<td>Access control</td>
<td>Authorization audit</td>
<td>ISO</td>
</tr>
<tr>
<td>Training</td>
<td>Completion rates and knowledge testing</td>
<td>HR / ISO</td>
</tr>
</tbody>
</table>
<h2 id="kpis" tabindex="-1">KPIs <a class="header-anchor" href="#kpis" aria-label="Permalink to &quot;KPIs&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>KPI</th>
<th>Target</th>
<th>Measurement</th>
</tr>
</thead>
<tbody>
<tr>
<td>Patch compliance</td>
<td>≥ 95% within defined deadlines</td>
<td>Monthly</td>
</tr>
<tr>
<td>Mean Time to Detect (MTTD)</td>
<td>&lt; 24 hours</td>
<td>Per incident</td>
</tr>
<tr>
<td>Mean Time to Respond (MTTR)</td>
<td>&lt; 4 hours (critical)</td>
<td>Per incident</td>
</tr>
<tr>
<td>Training completion</td>
<td>100% mandatory training</td>
<td>Annually</td>
</tr>
<tr>
<td>Backup restore success rate</td>
<td>100%</td>
<td>Quarterly test</td>
</tr>
</tbody>
</table>
<h2 id="penetration-tests" tabindex="-1">Penetration Tests <a class="header-anchor" href="#penetration-tests" aria-label="Permalink to &quot;Penetration Tests&quot;"></a></h2>
<ul>
<li><strong>External tests</strong> – Annually by independent provider</li>
<li><strong>Internal tests</strong> – Event-driven for significant changes</li>
<li><strong>Scope</strong> – Infrastructure, web applications, internal systems</li>
<li><strong>Result utilization</strong> – Findings feed into risk analysis and action planning</li>
</ul>
<h2 id="pdca-cycle" tabindex="-1">PDCA Cycle <a class="header-anchor" href="#pdca-cycle" aria-label="Permalink to &quot;PDCA Cycle&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Phase</th>
<th>Activity</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Plan</strong></td>
<td>Risk analysis, measure planning, training planning</td>
</tr>
<tr>
<td><strong>Do</strong></td>
<td>Implementation of measures, operation of security systems</td>
</tr>
<tr>
<td><strong>Check</strong></td>
<td>KPI measurement, audits, penetration tests, incident evaluation</td>
</tr>
<tr>
<td><strong>Act</strong></td>
<td>Corrective actions, risk analysis adjustment, process improvement</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Incident Management]]></title>
            <link>https://nis2.docs.bauer-group.com/en/incident-management/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/incident-management/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Incident Management

::: info LEGAL BASIS
**§30(2) No. 2 BSIG** – Incident handling

**§32 BSIG** – Reporting obligations for significant security incidents
:::

## Classification

| Level | Criteria | Response Time |
|]]></description>
            <content:encoded><![CDATA[<h1 id="incident-management" tabindex="-1">Incident Management <a class="header-anchor" href="#incident-management" aria-label="Permalink to &quot;Incident Management&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 2 BSIG</strong> – Incident handling</p>
<p><strong>§32 BSIG</strong> – Reporting obligations for significant security incidents</p>
</div>
<h2 id="classification" tabindex="-1">Classification <a class="header-anchor" href="#classification" aria-label="Permalink to &quot;Classification&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Level</th>
<th>Criteria</th>
<th>Response Time</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Critical</strong></td>
<td>Data loss, complete service outage, active compromise</td>
<td>Immediate</td>
</tr>
<tr>
<td><strong>High</strong></td>
<td>Partial outage, access to sensitive data possible, active attack</td>
<td>&lt; 4 hours</td>
</tr>
<tr>
<td><strong>Medium</strong></td>
<td>Limited functionality, failed attacks, vulnerability discovered</td>
<td>&lt; 24 hours</td>
</tr>
<tr>
<td><strong>Low</strong></td>
<td>Anomaly without direct impact, policy violation without damage</td>
<td>Next business day</td>
</tr>
</tbody>
</table>
<h2 id="incident-response-process" tabindex="-1">Incident Response Process <a class="header-anchor" href="#incident-response-process" aria-label="Permalink to &quot;Incident Response Process&quot;"></a></h2>
<h3 id="_1-detection-and-reporting" tabindex="-1">1. Detection and Reporting <a class="header-anchor" href="#_1-detection-and-reporting" aria-label="Permalink to &quot;1. Detection and Reporting&quot;"></a></h3>
<ul>
<li>Monitoring systems, log analysis and manual detection</li>
<li>Every employee is obligated to report suspected incidents immediately</li>
<li>Central reporting to the Information Security Officer (ISO)</li>
</ul>
<h3 id="_2-analysis-and-assessment" tabindex="-1">2. Analysis and Assessment <a class="header-anchor" href="#_2-analysis-and-assessment" aria-label="Permalink to &quot;2. Analysis and Assessment&quot;"></a></h3>
<ul>
<li>Classification by severity</li>
<li>Determination of affected systems, data and customers</li>
<li>Assessment: Is this a reportable incident under §32 BSIG?</li>
</ul>
<h3 id="_3-containment" tabindex="-1">3. Containment <a class="header-anchor" href="#_3-containment" aria-label="Permalink to &quot;3. Containment&quot;"></a></h3>
<ul>
<li>Immediate isolation of compromised systems</li>
<li>Blocking of affected credentials</li>
<li>Activation of failover systems for service outages</li>
<li>Evidence preservation before remediation</li>
</ul>
<h3 id="_4-eradication-and-recovery" tabindex="-1">4. Eradication and Recovery <a class="header-anchor" href="#_4-eradication-and-recovery" aria-label="Permalink to &quot;4. Eradication and Recovery&quot;"></a></h3>
<ul>
<li>Removal of attack cause (malware, compromised accounts)</li>
<li>Restoration from backups for data loss</li>
<li>Verification of system integrity before return to service</li>
<li>Rotation of all potentially compromised credentials</li>
</ul>
<h3 id="_5-post-incident-review" tabindex="-1">5. Post-Incident Review <a class="header-anchor" href="#_5-post-incident-review" aria-label="Permalink to &quot;5. Post-Incident Review&quot;"></a></h3>
<ul>
<li>Post-mortem analysis with root cause determination</li>
<li>Documentation and derivation of improvement measures</li>
<li>Update of risk analysis as needed</li>
</ul>
<h2 id="escalation-matrix" tabindex="-1">Escalation Matrix <a class="header-anchor" href="#escalation-matrix" aria-label="Permalink to &quot;Escalation Matrix&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Level</th>
<th>Initial notification</th>
<th>Escalation</th>
<th>Customer notification</th>
</tr>
</thead>
<tbody>
<tr>
<td>Critical</td>
<td>ISO + Management</td>
<td>Immediate</td>
<td>Without delay</td>
</tr>
<tr>
<td>High</td>
<td>ISO</td>
<td>&lt; 1 hour</td>
<td>If affected</td>
</tr>
<tr>
<td>Medium</td>
<td>ISO</td>
<td>Regular</td>
<td>Only on impact</td>
</tr>
<tr>
<td>Low</td>
<td>IT Team</td>
<td>Next meeting</td>
<td>No</td>
</tr>
</tbody>
</table>
<h2 id="reporting-obligations-per-§32-bsig" tabindex="-1">Reporting Obligations per §32 BSIG <a class="header-anchor" href="#reporting-obligations-per-§32-bsig" aria-label="Permalink to &quot;Reporting Obligations per §32 BSIG&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Tier</th>
<th>Deadline</th>
<th>Content</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Early warning</strong></td>
<td>24 hours</td>
<td>Type of incident, suspicion of unlawful action, cross-border impact</td>
</tr>
<tr>
<td><strong>Update</strong></td>
<td>72 hours</td>
<td>Severity, impact, indicators of compromise (IoC)</td>
</tr>
<tr>
<td><strong>Final report</strong></td>
<td>1 month</td>
<td>Root cause, measures taken, cross-border impacts</td>
</tr>
</tbody>
</table>
<div class="warning custom-block"><p class="custom-block-title">DUAL REPORTING CRA + NIS2</p>
<p>As a CRA manufacturer and NIS2 entity, <strong>two separate reporting obligations</strong> may be triggered: CRA report to ENISA (24h/72h/14d) and NIS2 report to BSI (24h/72h/1 month). Details in the <a href="https://cra.docs.bauer-group.com/en/incident-response/" target="_blank" rel="noreferrer">CRA Documentation</a>.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Introduction]]></title>
            <link>https://nis2.docs.bauer-group.com/en/overview/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/overview/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Introduction

This documentation describes the implementation of the **NIS 2 Directive** (EU) 2022/2555 and the German **NIS2 Implementation Act** (NIS2UmsuCG) at BAUER GROUP. It covers all ten risk management measures per §30(2) BSIG as well as obligations under §32 (reporting), §33 (registration), and §38 (management duties).

::: info LEGAL BASIS
**NIS 2 Directive (EU) 2022/2555** – Measures for a high common level of cybersecurity across the Union.

**BSIG §30(1):** Essential and important entities are obligated to take appropriate, proportionate and effective technical and organizational measures to avoid disruptions to the availability, integrity, authenticity and confidentiality of information technology systems, components and processes.
:::

## Scope

| Area | Description |
|]]></description>
            <content:encoded><![CDATA[<h1 id="introduction" tabindex="-1">Introduction <a class="header-anchor" href="#introduction" aria-label="Permalink to &quot;Introduction&quot;"></a></h1>
<p>This documentation describes the implementation of the <strong>NIS 2 Directive</strong> (EU) 2022/2555 and the German <strong>NIS2 Implementation Act</strong> (NIS2UmsuCG) at BAUER GROUP. It covers all ten risk management measures per §30(2) BSIG as well as obligations under §32 (reporting), §33 (registration), and §38 (management duties).</p>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>NIS 2 Directive (EU) 2022/2555</strong> – Measures for a high common level of cybersecurity across the Union.</p>
<p><strong>BSIG §30(1):</strong> Essential and important entities are obligated to take appropriate, proportionate and effective technical and organizational measures to avoid disruptions to the availability, integrity, authenticity and confidentiality of information technology systems, components and processes.</p>
</div>
<h2 id="scope" tabindex="-1">Scope <a class="header-anchor" href="#scope" aria-label="Permalink to &quot;Scope&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Area</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Software Development</strong></td>
<td>Custom B2B software, embedded systems and AI-driven workflows</td>
</tr>
<tr>
<td><strong>IT Infrastructure</strong></td>
<td>Server operations, network infrastructure and cloud services</td>
</tr>
<tr>
<td><strong>Managed Services</strong></td>
<td>IT services and support for B2B customers</td>
</tr>
<tr>
<td><strong>Internal IT</strong></td>
<td>Systems and processes for internal operations</td>
</tr>
</tbody>
</table>
<h2 id="complementary-documentation" tabindex="-1">Complementary Documentation <a class="header-anchor" href="#complementary-documentation" aria-label="Permalink to &quot;Complementary Documentation&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Documentation</th>
<th>Regulation</th>
<th>Focus</th>
<th>URL</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>NIS2</strong> (this document)</td>
<td>(EU) 2022/2555 / BSIG</td>
<td>Organization &amp; Operations</td>
<td><a href="https://nis2.docs.bauer-group.com" target="_blank" rel="noreferrer">nis2.docs.bauer-group.com</a></td>
</tr>
<tr>
<td><strong>CRA</strong></td>
<td>(EU) 2024/2847</td>
<td>Products &amp; Software</td>
<td><a href="https://cra.docs.bauer-group.com" target="_blank" rel="noreferrer">cra.docs.bauer-group.com</a></td>
</tr>
<tr>
<td><strong>AI Act</strong></td>
<td>(EU) 2024/1689</td>
<td>AI Systems</td>
<td><a href="https://ai-act.docs.bauer-group.com" target="_blank" rel="noreferrer">ai-act.docs.bauer-group.com</a></td>
</tr>
</tbody>
</table>
<h2 id="documentation-structure" tabindex="-1">Documentation Structure <a class="header-anchor" href="#documentation-structure" aria-label="Permalink to &quot;Documentation Structure&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>No.</th>
<th>Chapter</th>
<th>§30 BSIG</th>
<th>Content</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td><a href="/en/overview/">Introduction</a></td>
<td>—</td>
<td>Scope, legal framework, structure</td>
</tr>
<tr>
<td>2</td>
<td><a href="/en/risk-management/">Risk Management</a></td>
<td>No. 1</td>
<td>Risk analysis, ISMS, asset inventory</td>
</tr>
<tr>
<td>3</td>
<td><a href="/en/incident-management/">Incident Management</a></td>
<td>No. 2 + §32</td>
<td>Incident response, reporting obligations</td>
</tr>
<tr>
<td>4</td>
<td><a href="/en/business-continuity/">Business Continuity</a></td>
<td>No. 3</td>
<td>Backup, disaster recovery, crisis management</td>
</tr>
<tr>
<td>5</td>
<td><a href="/en/supply-chain/">Supply Chain Security</a></td>
<td>No. 4</td>
<td>Vendor assessment, security requirements</td>
</tr>
<tr>
<td>6</td>
<td><a href="/en/vulnerability-management/">Vulnerability Management</a></td>
<td>No. 5</td>
<td>Scanning, patch management, secure development</td>
</tr>
<tr>
<td>7</td>
<td><a href="/en/effectiveness-review/">Effectiveness Review</a></td>
<td>No. 6</td>
<td>Security audits, KPIs, penetration testing</td>
</tr>
<tr>
<td>8</td>
<td><a href="/en/training/">Training &amp; Awareness</a></td>
<td>No. 7</td>
<td>Mandatory training, cyber hygiene</td>
</tr>
<tr>
<td>9</td>
<td><a href="/en/cryptography/">Cryptography</a></td>
<td>No. 8</td>
<td>Encryption, key management</td>
</tr>
<tr>
<td>10</td>
<td><a href="/en/access-control/">Access Control</a></td>
<td>No. 9–10</td>
<td>Authentication, MFA, secure communication</td>
</tr>
<tr>
<td>11</td>
<td><a href="/en/governance/">Governance</a></td>
<td>§38</td>
<td>Management duties, governance structure</td>
</tr>
<tr>
<td>12</td>
<td><a href="/en/compliance-matrix/">Compliance Matrix</a></td>
<td>All</td>
<td>Complete requirements mapping</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Regulatory Framework]]></title>
            <link>https://nis2.docs.bauer-group.com/en/overview/regulatory-framework</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/overview/regulatory-framework</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Regulatory Framework

## Legal Sources

| Legal Source | Status | Relevance |
|]]></description>
            <content:encoded><![CDATA[<h1 id="regulatory-framework" tabindex="-1">Regulatory Framework <a class="header-anchor" href="#regulatory-framework" aria-label="Permalink to &quot;Regulatory Framework&quot;"></a></h1>
<h2 id="legal-sources" tabindex="-1">Legal Sources <a class="header-anchor" href="#legal-sources" aria-label="Permalink to &quot;Legal Sources&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Legal Source</th>
<th>Status</th>
<th>Relevance</th>
</tr>
</thead>
<tbody>
<tr>
<td>NIS 2 Directive (EU) 2022/2555</td>
<td>In force since 16.01.2023</td>
<td>EU framework directive</td>
</tr>
<tr>
<td>NIS2UmsuCG (Omnibus Act)</td>
<td>In force since 06.12.2025</td>
<td>German implementation</td>
</tr>
<tr>
<td>BSIG (Revised)</td>
<td>In force since 06.12.2025</td>
<td>Central obligations</td>
</tr>
<tr>
<td>Implementing Regulation (EU) 2024/2690</td>
<td>In force</td>
<td>Detailed technical requirements</td>
</tr>
<tr>
<td>KRITIS Umbrella Act</td>
<td>Adopted 29.01.2026</td>
<td>Physical resilience</td>
</tr>
</tbody>
</table>
<h2 id="applicability" tabindex="-1">Applicability <a class="header-anchor" href="#applicability" aria-label="Permalink to &quot;Applicability&quot;"></a></h2>
<p>The NIS2 Directive distinguishes two categories:</p>
<table tabindex="0">
<thead>
<tr>
<th>Category</th>
<th>Criteria</th>
<th>Sanctions</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Essential entities</strong></td>
<td>Annex I sectors, ≥250 employees or ≥€50M turnover</td>
<td>Up to €10M or 2% of global annual turnover</td>
</tr>
<tr>
<td><strong>Important entities</strong></td>
<td>Annex I/II sectors, ≥50 employees or ≥€10M turnover</td>
<td>Up to €7M or 1.4% of global annual turnover</td>
</tr>
</tbody>
</table>
<h2 id="§30-bsig-–-ten-risk-management-measures" tabindex="-1">§30 BSIG – Ten Risk Management Measures <a class="header-anchor" href="#§30-bsig-–-ten-risk-management-measures" aria-label="Permalink to &quot;§30 BSIG – Ten Risk Management Measures&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>No.</th>
<th>Measure</th>
<th>Documentation</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Risk analysis and information system security concepts</td>
<td><a href="/en/risk-management/">Risk Management</a></td>
</tr>
<tr>
<td>2</td>
<td>Incident handling</td>
<td><a href="/en/incident-management/">Incident Management</a></td>
</tr>
<tr>
<td>3</td>
<td>Business continuity (BCM, backup, disaster recovery, crisis management)</td>
<td><a href="/en/business-continuity/">Business Continuity</a></td>
</tr>
<tr>
<td>4</td>
<td>Supply chain security</td>
<td><a href="/en/supply-chain/">Supply Chain Security</a></td>
</tr>
<tr>
<td>5</td>
<td>Security in acquisition, development and maintenance</td>
<td><a href="/en/vulnerability-management/">Vulnerability Management</a></td>
</tr>
<tr>
<td>6</td>
<td>Effectiveness assessment concepts and procedures</td>
<td><a href="/en/effectiveness-review/">Effectiveness Review</a></td>
</tr>
<tr>
<td>7</td>
<td>Basic cyber hygiene practices and training</td>
<td><a href="/en/training/">Training &amp; Awareness</a></td>
</tr>
<tr>
<td>8</td>
<td>Cryptography concepts and procedures</td>
<td><a href="/en/cryptography/">Cryptography</a></td>
</tr>
<tr>
<td>9</td>
<td>Personnel security, access control concepts</td>
<td><a href="/en/access-control/">Access Control</a></td>
</tr>
<tr>
<td>10</td>
<td>Multi-factor authentication, secured communication</td>
<td><a href="/en/access-control/">Access Control</a></td>
</tr>
</tbody>
</table>
<h2 id="additional-obligations" tabindex="-1">Additional Obligations <a class="header-anchor" href="#additional-obligations" aria-label="Permalink to &quot;Additional Obligations&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Section</th>
<th>Obligation</th>
<th>Documentation</th>
</tr>
</thead>
<tbody>
<tr>
<td>§32 BSIG</td>
<td>Reporting obligations for significant security incidents</td>
<td><a href="/en/incident-management/">Incident Management</a></td>
</tr>
<tr>
<td>§33 BSIG</td>
<td>Registration obligation with BSI</td>
<td>Organizationally implemented</td>
</tr>
<tr>
<td>§38 BSIG</td>
<td>Approval, supervision and training obligations of management</td>
<td><a href="/en/governance/">Governance</a></td>
</tr>
</tbody>
</table>
<div class="tip custom-block"><p class="custom-block-title">CRA Synergy</p>
<p>CRA-compliant processes (vulnerability management, incident response, supply chain) largely fulfil the corresponding NIS2 requirements. Details in the <a href="https://cra.docs.bauer-group.com/en/overview/nis2-integration" target="_blank" rel="noreferrer">CRA Compliance Documentation</a>.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Risk Management]]></title>
            <link>https://nis2.docs.bauer-group.com/en/risk-management/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/risk-management/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Risk Management

::: info LEGAL BASIS
**§30(2) No. 1 BSIG** – Concepts relating to risk analysis and information system security
:::

## Information Security Policy

BAUER GROUP operates an Information Security Management System (ISMS) covering the protection goals of confidentiality, integrity, availability and authenticity. The information security policy is reviewed and approved annually by management.

## Systematic Risk Analysis

| Step | Description | Interval |
|]]></description>
            <content:encoded><![CDATA[<h1 id="risk-management" tabindex="-1">Risk Management <a class="header-anchor" href="#risk-management" aria-label="Permalink to &quot;Risk Management&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 1 BSIG</strong> – Concepts relating to risk analysis and information system security</p>
</div>
<h2 id="information-security-policy" tabindex="-1">Information Security Policy <a class="header-anchor" href="#information-security-policy" aria-label="Permalink to &quot;Information Security Policy&quot;"></a></h2>
<p>BAUER GROUP operates an Information Security Management System (ISMS) covering the protection goals of confidentiality, integrity, availability and authenticity. The information security policy is reviewed and approved annually by management.</p>
<h2 id="systematic-risk-analysis" tabindex="-1">Systematic Risk Analysis <a class="header-anchor" href="#systematic-risk-analysis" aria-label="Permalink to &quot;Systematic Risk Analysis&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Step</th>
<th>Description</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td>Asset identification</td>
<td>Recording of all critical systems, data and processes</td>
<td>Ongoing</td>
</tr>
<tr>
<td>Threat analysis</td>
<td>Identification of relevant threat scenarios</td>
<td>Annually</td>
</tr>
<tr>
<td>Vulnerability assessment</td>
<td>Technical and organizational vulnerabilities</td>
<td>Annually + event-driven</td>
</tr>
<tr>
<td>Risk assessment</td>
<td>Likelihood × impact</td>
<td>Annually</td>
</tr>
<tr>
<td>Risk treatment</td>
<td>Avoid, mitigate, transfer, accept</td>
<td>After assessment</td>
</tr>
</tbody>
</table>
<h2 id="risk-treatment-options" tabindex="-1">Risk Treatment Options <a class="header-anchor" href="#risk-treatment-options" aria-label="Permalink to &quot;Risk Treatment Options&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Option</th>
<th>Description</th>
<th>Application</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Avoid</strong></td>
<td>Eliminate the risk source</td>
<td>When economically justifiable</td>
</tr>
<tr>
<td><strong>Mitigate</strong></td>
<td>Technical/organizational measures</td>
<td>Standard approach</td>
</tr>
<tr>
<td><strong>Transfer</strong></td>
<td>Insurance, outsourcing to qualified provider</td>
<td>For residual risks</td>
</tr>
<tr>
<td><strong>Accept</strong></td>
<td>Conscious acceptance with documentation</td>
<td>Only for low residual risk, management approval</td>
</tr>
</tbody>
</table>
<h2 id="asset-inventory" tabindex="-1">Asset Inventory <a class="header-anchor" href="#asset-inventory" aria-label="Permalink to &quot;Asset Inventory&quot;"></a></h2>
<p>All IT systems, components and processes are recorded in a central inventory:</p>
<ul>
<li><strong>Server systems</strong> – Physical and virtual servers with location, purpose and owner</li>
<li><strong>Network components</strong> – Firewalls, switches, routers with firmware versions</li>
<li><strong>Applications</strong> – Custom and third-party software with license and support status</li>
<li><strong>Data assets</strong> – Classification by protection need (normal, high, very high)</li>
<li><strong>Cloud services</strong> – External services with provider, location and contract status</li>
</ul>
<h2 id="standards-orientation" tabindex="-1">Standards Orientation <a class="header-anchor" href="#standards-orientation" aria-label="Permalink to &quot;Standards Orientation&quot;"></a></h2>
<ul>
<li><strong>ISO/IEC 27001:2022</strong> – Information security management systems</li>
<li><strong>BSI IT-Grundschutz</strong> – Methodological framework for risk analysis</li>
<li><strong>Implementing Regulation (EU) 2024/2690</strong> – Detailed NIS2 technical requirements</li>
</ul>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Supply Chain Security]]></title>
            <link>https://nis2.docs.bauer-group.com/en/supply-chain/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/supply-chain/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Supply Chain Security

::: info LEGAL BASIS
**§30(2) No. 4 BSIG** – Supply chain security including security-related aspects of the relationships between entities and their direct suppliers or service providers
:::

## Vendor Overview

| Category | Examples | Risk Assessment |
|]]></description>
            <content:encoded><![CDATA[<h1 id="supply-chain-security" tabindex="-1">Supply Chain Security <a class="header-anchor" href="#supply-chain-security" aria-label="Permalink to &quot;Supply Chain Security&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 4 BSIG</strong> – Supply chain security including security-related aspects of the relationships between entities and their direct suppliers or service providers</p>
</div>
<h2 id="vendor-overview" tabindex="-1">Vendor Overview <a class="header-anchor" href="#vendor-overview" aria-label="Permalink to &quot;Vendor Overview&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Category</th>
<th>Examples</th>
<th>Risk Assessment</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Infrastructure</strong></td>
<td>Hetzner, Netcup (hosting, servers)</td>
<td>High – availability</td>
</tr>
<tr>
<td><strong>Cloud services</strong></td>
<td>Object storage, DNS</td>
<td>High – confidentiality</td>
</tr>
<tr>
<td><strong>Software suppliers</strong></td>
<td>Third-party libraries, SaaS</td>
<td>Medium – supply chain risk</td>
</tr>
<tr>
<td><strong>Support partners</strong></td>
<td>Maintenance, consulting</td>
<td>Low – limited access</td>
</tr>
</tbody>
</table>
<h2 id="assessment-criteria" tabindex="-1">Assessment Criteria <a class="header-anchor" href="#assessment-criteria" aria-label="Permalink to &quot;Assessment Criteria&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Criterion</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Security certifications</strong></td>
<td>ISO 27001, SOC 2, BSI C5 or equivalent</td>
</tr>
<tr>
<td><strong>Location / jurisdiction</strong></td>
<td>EU jurisdiction preferred, third-country transfers only with guarantees</td>
</tr>
<tr>
<td><strong>Incident response capability</strong></td>
<td>Documented process, reporting timelines compatible with §32 BSIG</td>
</tr>
<tr>
<td><strong>Contract design</strong></td>
<td>Security requirements, audit rights, termination clauses</td>
</tr>
<tr>
<td><strong>Subcontractors</strong></td>
<td>Transparency regarding further subcontractors</td>
</tr>
</tbody>
</table>
<h2 id="contractual-security-requirements" tabindex="-1">Contractual Security Requirements <a class="header-anchor" href="#contractual-security-requirements" aria-label="Permalink to &quot;Contractual Security Requirements&quot;"></a></h2>
<p>Contracts with service providers include:</p>
<ul>
<li>Minimum information security requirements</li>
<li>Obligation to immediately report security incidents</li>
<li>Audit and inspection rights</li>
<li>Data retention and deletion provisions</li>
<li>Exit strategy and data repatriation</li>
</ul>
<h2 id="review-cycle" tabindex="-1">Review Cycle <a class="header-anchor" href="#review-cycle" aria-label="Permalink to &quot;Review Cycle&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Activity</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td>Re-assessment of critical providers</td>
<td>Annually</td>
</tr>
<tr>
<td>Contract review</td>
<td>On renewal / change</td>
</tr>
<tr>
<td>Event-driven review</td>
<td>On security incident or material change</td>
</tr>
</tbody>
</table>
<div class="tip custom-block"><p class="custom-block-title">CRA Synergy</p>
<p>Software supply chain management (SBOM, signing, dependency policy) is described in the <a href="https://cra.docs.bauer-group.com/en/supply-chain/" target="_blank" rel="noreferrer">CRA Supply Chain Documentation</a>. NIS2 supplements this with IT service provider and infrastructure vendor assessment.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
        <item>
            <title><![CDATA[Vulnerability Management]]></title>
            <link>https://nis2.docs.bauer-group.com/en/vulnerability-management/</link>
            <guid isPermaLink="false">https://nis2.docs.bauer-group.com/en/vulnerability-management/</guid>
            <pubDate>Mon, 23 Mar 2026 23:10:16 GMT</pubDate>
            <description><![CDATA[# Vulnerability Management

::: info LEGAL BASIS
**§30(2) No. 5 BSIG** – Security measures in acquisition, development and maintenance of IT systems, components and processes, including vulnerability management and disclosure
:::

## Vulnerability Detection

| Method | Description | Interval |
|]]></description>
            <content:encoded><![CDATA[<h1 id="vulnerability-management" tabindex="-1">Vulnerability Management <a class="header-anchor" href="#vulnerability-management" aria-label="Permalink to &quot;Vulnerability Management&quot;"></a></h1>
<div class="info custom-block"><p class="custom-block-title">LEGAL BASIS</p>
<p><strong>§30(2) No. 5 BSIG</strong> – Security measures in acquisition, development and maintenance of IT systems, components and processes, including vulnerability management and disclosure</p>
</div>
<h2 id="vulnerability-detection" tabindex="-1">Vulnerability Detection <a class="header-anchor" href="#vulnerability-detection" aria-label="Permalink to &quot;Vulnerability Detection&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Method</th>
<th>Description</th>
<th>Interval</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Automated scanning</strong></td>
<td>Infrastructure and application scans</td>
<td>Weekly</td>
</tr>
<tr>
<td><strong>CVE monitoring</strong></td>
<td>Monitoring of relevant CVE feeds and advisories</td>
<td>Ongoing</td>
</tr>
<tr>
<td><strong>Dependency monitoring</strong></td>
<td>Automated checking of software dependencies (Dependabot, Trivy)</td>
<td>Ongoing</td>
</tr>
<tr>
<td><strong>Penetration tests</strong></td>
<td>External and internal tests by qualified testers</td>
<td>Annually</td>
</tr>
</tbody>
</table>
<h2 id="patch-management" tabindex="-1">Patch Management <a class="header-anchor" href="#patch-management" aria-label="Permalink to &quot;Patch Management&quot;"></a></h2>
<table tabindex="0">
<thead>
<tr>
<th>Severity</th>
<th>Deadline</th>
<th>Example</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Critical</strong> (CVSS ≥ 9.0)</td>
<td>48 hours</td>
<td>Remote code execution, actively exploited</td>
</tr>
<tr>
<td><strong>High</strong> (CVSS 7.0–8.9)</td>
<td>7 days</td>
<td>Privilege escalation, data leak</td>
</tr>
<tr>
<td><strong>Medium</strong> (CVSS 4.0–6.9)</td>
<td>30 days</td>
<td>Denial of service, information disclosure</td>
</tr>
<tr>
<td><strong>Low</strong> (CVSS &lt; 4.0)</td>
<td>Next release cycle</td>
<td>Cosmetic issues, low impact</td>
</tr>
</tbody>
</table>
<h2 id="secure-development" tabindex="-1">Secure Development <a class="header-anchor" href="#secure-development" aria-label="Permalink to &quot;Secure Development&quot;"></a></h2>
<p>For custom software:</p>
<ul>
<li><strong>Security by design</strong> – Security requirements from the design phase</li>
<li><strong>Code review</strong> – Four-eyes principle for security-relevant changes</li>
<li><strong>Automated tests</strong> – Lint, build, security scan in CI/CD pipeline</li>
<li><strong>Dependency pinning</strong> – Versioned and verified dependencies</li>
</ul>
<h2 id="coordinated-vulnerability-disclosure" tabindex="-1">Coordinated Vulnerability Disclosure <a class="header-anchor" href="#coordinated-vulnerability-disclosure" aria-label="Permalink to &quot;Coordinated Vulnerability Disclosure&quot;"></a></h2>
<ul>
<li>Reporting channels for external security researchers documented</li>
<li>Processing timelines for reported vulnerabilities defined</li>
<li>Coordination with discoverers before publication</li>
</ul>
<div class="tip custom-block"><p class="custom-block-title">CRA Synergy</p>
<p>Product-related vulnerability management (SBOM-based CVE monitoring, CycloneDX, Trivy scanning) is described in the <a href="https://cra.docs.bauer-group.com/en/vulnerability-management/" target="_blank" rel="noreferrer">CRA Vulnerability Management Documentation</a>. NIS2 supplements this with infrastructure and operational vulnerability management.</p>
</div>
]]></content:encoded>
            <author>BAUER GROUP</author>
        </item>
    </channel>
</rss>