NIS2: Cybersecurity for essential and important entities

The NIS2 Directive (EU 2022/2555) obliges operators of essential and important entities across 18 sectors to implement comprehensive cybersecurity risk management. Art. 21(2)(d) makes supply chain security a mandatory measure — including all open source components in your software.

You have just created an SBOM and see 800 open source projects. You are responsible for all of them. Your management body is personally liable (Art. 20 NIS2, Section 38 NIS2UmsuCG). This is not a task you can solve internally: 800 projects mean 15 or more programming languages, hundreds of maintainers without contracts, without SLAs, without any ability to intervene.

Who is affected? #

NIS2 covers 18 sectors in two categories.

Sectors of high criticality (Annex I — 11 sectors) #

Other critical sectors (Annex II — 7 sectors) #

Thresholds in Germany (NIS2UmsuCG) #

CategoryCriterion
Particularly important entities (Annex 1)250+ employees OR over EUR 50 million turnover AND over EUR 43 million balance sheet
Important entities (Annex 1+2)50+ employees OR over EUR 10 million turnover AND over EUR 10 million balance sheet
Operators of critical facilitiesRegardless of size (German special category)

Telecommunications providers qualify as particularly important entities from 50 employees or over EUR 10 million turnover. Hospitals have an extended implementation period of five instead of three years (Section 61(3) NIS2UmsuCG).

What does NIS2 require? #

Supply chain security (Art. 21(2)(d)) #

You must ensure the security of your supply chain. Art. 21(3) expressly requires: the assessment of vulnerabilities of direct suppliers and the assessment of the security of your suppliers' development processes. For open source components, this means: you must assess how securely the projects your software depends on are developed — even when no contract and no SLA exists.

Vulnerability management (Art. 21(2)(e)) #

Management and disclosure of vulnerabilities are mandatory. This includes not only scanning but also the active treatment of discovered vulnerabilities and coordinated disclosure in accordance with Art. 12 NIS2.

Assessment of effectiveness (Art. 21(2)(f)) #

You must establish policies and procedures for assessing the effectiveness of your risk management measures. For your open source supply chain, this means: measurable, documented processes that an auditor can follow.

Reporting obligations (Art. 23) #

In Germany: Section 32(1) Nos. 1-4 NIS2UmsuCG with identical deadlines.

ENISA implementation guidance on FOSS #

ENISA has published specific guidance on the treatment of open source software under NIS2. This defines what "appropriate measures" means for the security of the OSS supply chain. Art. 21(1) requires measures that take account of the "state of the art" and "relevant European and international standards". ISO/IEC 18974 defines this state of the art for open source security assurance.

Training obligation for management bodies (Art. 20(2)) #

Members of the management bodies must undergo training to acquire sufficient knowledge for the identification and assessment of risks.

Consequences of non-compliance #

Fines #

CategoryAmountLegal basis
Essential entitiesEUR 10 million or 2% of worldwide annual turnover (higher)Art. 34(4) NIS2
Important entitiesEUR 7 million or 1.4% of worldwide annual turnover (higher)Art. 34(5) NIS2
Particularly important (DE)EUR 10 million fixed or 2% for turnover above EUR 500 millionSection 65(5+6) NIS2UmsuCG
Important (DE)EUR 7 million or 1.4% for turnover above EUR 500 millionSection 65(5+7) NIS2UmsuCG

Personal management liability #

Public visibility #

Further consequences #

Why existing solutions are not enough #

An SCA scanner shows you registered CVEs. That is a good first step. But:

OTTRIA closes this gap: not just report, but fix. Not just popular projects, but your entire SBOM.

What OTTRIA covers #

NIS2 obligationOTTRIA service
Supply chain security (Art. 21(2)(d))Risk-based assessment of all OSS projects in your SBOM
Assessment of supplier vulnerabilities (Art. 21(3))Project health analysis, maintainer maturity, abandonment risk
Assessment of development processes (Art. 21(3))Analysis of governance, commit activity, security practices
Vulnerability management (Art. 21(2)(e))CVE scanning, silent fix detection, active upstream fixes
Coordinated disclosure (Art. 12)Disclosure management as part of the steward role
State of the art (Art. 21(1))Support in meeting ISO/IEC 18974
Assessment of effectiveness (Art. 21(2)(f))Measurable KPIs and documented remediation history

What OTTRIA does not cover #

What do you present to the auditor? #

OTTRIA delivers #

You add #

Auditor narrative #

When your auditor asks how you ensure the security of your open source supply chain, you can document:

*"For the security of our open source supply chain under Art. 21(2)(d) NIS2, we have engaged OTTRIA as a specialised service provider. OTTRIA monitors all open source components in our SBOM, conducts continuous vulnerability analyses, coordinates upstream fixes, and delivers audit-ready documentation. Decisions on risk acceptance and measure implementation remain with our management body."*

Implementation in Germany #

NIS2UmsuCG and BSI #

NIS2 is a directive, not a regulation. Each member state transposes it nationally. In Germany, transposition is through the NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetz (NIS2UmsuCG), which amends substantial parts of the BSIG (BSI Act). The Federal Office for Information Security (BSI) is the competent authority.

German specificities #

Divergent transposition in other EU countries #

Since NIS2 is a directive, each EU country transposes it differently. Thresholds, supervisory structures, and sanction regimes may diverge. If you operate in multiple EU countries, check the respective national transposition.

800 projects in the SBOM? Let us analyse together where your greatest risks lie. Request a free SBOM analysis.

Request SBOM analysis

How much would it cost to solve this internally? Talk to us about the realistic effort.

Book initial consultation

Further reading