Three months from now, the first wave of mandatory NIS2 compliance audits must be completed across the EU. The original deadline was December 31, 2025. Regulators pushed it to June 30, 2026 — and that extension is now almost gone.
For SaaS vendors, this isn’t abstract regulation. When your enterprise customers get audited, auditors pull the thread on every third-party dependency. Your application. Your infrastructure. Your security posture. If you can’t produce evidence on demand, you become the reason your customer fails their audit.
What Happens on June 30, 2026
The June 30 deadline marks the cutoff for first compliance audits under NIS2 national transposition laws. Essential and important entities that existed before 2025 must have completed their initial cybersecurity audit by this date.
This sits between two other critical dates:
| Milestone | Date | What it means |
|---|---|---|
| BSI registration (Germany) | March 6, 2026 | In-scope entities must register with Germany’s Federal Cyber Security Authority |
| First compliance audit | June 30, 2026 | Regulated entities must complete initial cybersecurity audit |
| Full enforcement | October 2026 | Supervisory authorities begin active enforcement with full penalty powers |
The June 30 audit isn’t a checkbox exercise. Auditors verify that Article 21 security measures are implemented — not just documented. That includes supply chain security (Article 21.2d), which means your customers’ auditors will ask what security controls their SaaS vendors have in place.
Who Gets Audited — and Why SaaS Vendors Should Care
NIS2 applies to roughly 160,000 entities across the EU, spanning 18 regulated sectors including energy, healthcare, finance, manufacturing, digital infrastructure, and public administration. In Germany alone, the BSI estimates 29,000 newly regulated organizations (BSI, NIS2UmsuCG).
These entities must demonstrate supply chain security. Article 21.2(d) of the NIS2 Directive explicitly requires:
- Security policies for direct suppliers and service providers
- Assessment of the overall security level of each supplier
- Documented criteria for selecting and contracting with ICT providers
If your SaaS product handles customer data, processes transactions, or sits in a regulated workflow, you’re a supply chain dependency. Your customer’s auditor will want evidence. Not promises — evidence.
The 90-Day Sprint: What SaaS Vendors Must Prepare
Between now and June 30, regulated entities are scrambling to compile audit evidence — and they’ll turn to their vendors for documentation. Here’s what you need ready:
1. External security assessment with a current score
Enterprise buyers increasingly require an independently verifiable security posture score. A continuous security monitoring setup gives you a score that updates automatically, rather than a point-in-time pen test that’s stale within weeks.
SaaSFort scans 60 checks across 21 categories and produces an A–F grade in under 60 seconds. That grade — plus the detailed findings — maps directly to what NIS2 auditors ask about.
2. Completed NIS2 vendor questionnaire responses
Your customers will send you NIS2-specific DDQ sections. The questions map to Article 21 measures: risk management, incident handling, business continuity, cryptography, access control, and vulnerability management.
Don’t wait for the questionnaire. Pre-build your responses using a NIS2 SaaS vendor compliance checklist and have templated answers ready for the 10 most common questions.
3. Incident response documentation
NIS2 mandates 24-hour initial notification and 72-hour detailed reporting for significant incidents. Your customers’ auditors will ask: does your SaaS vendor have an incident response plan? What are their SLAs for notifying affected customers?
Document your incident response process, notification timelines, and communication channels. If you don’t have a formal IRP, build one this quarter.
4. Evidence of vulnerability management
Auditors want proof that you actively scan for and remediate vulnerabilities. A vendor security assessment covers the 50 most common questions — but for NIS2 specifically, you need to show:
- Regular vulnerability scanning (automated, not annual)
- Defined SLAs for patching (critical: 24h, high: 7 days, medium: 30 days)
- A vulnerability disclosure policy (required under Article 21.2e)
Country-by-Country: Where Enforcement Hits First
NIS2 transposition varies by member state. Some countries are ahead; others are still catching up. Here’s where things stand:
Germany completed transposition with the BSI Act (NIS2UmsuCG) on December 6, 2025. Registration closed March 6, 2026. The BSI now has expanded inspection rights, binding orders, and fines up to €10 million or 2% of global turnover for essential entities.
Italy opened its annual registration window January–February 2026 through ACN (Agenzia per la Cybersicurezza Nazionale). Incident reporting obligations to CSIRT Italy started January 1, 2026. Full enforcement begins October 1, 2026.
Hungary set June 30, 2026 as the explicit first audit deadline. Fines can reach €10 million with personal liability for board members.
19 EU member states received reasoned opinions from the European Commission in May 2025 for failing to fully transpose NIS2 by the October 2024 deadline. They face EU Court proceedings — and daily fines — if they don’t complete transposition. The pressure is real and accelerating.
For SaaS vendors selling across borders, the safest approach: prepare for the strictest interpretation. If you’re compliant with Germany’s BSI requirements, you’ll satisfy most other member states.
The Penalty Math That Makes This Urgent
NIS2 penalties are proportional to revenue, not flat fees:
| Entity type | Maximum fine |
|---|---|
| Essential entities | €10 million or 2% of global annual turnover (whichever is higher) |
| Important entities | €7 million or 1.4% of global annual turnover (whichever is higher) |
For a SaaS company with €5M ARR, that’s up to €100,000 in direct fines. But the real cost is losing enterprise deals. When your customer fails their NIS2 audit because you couldn’t produce security evidence, they don’t pay a fine and move on — they replace you.
According to the 2025 Verizon DBIR, web application attacks remain the #1 breach vector. Enterprise buyers know this. NIS2 gives them regulatory justification to enforce what they already wanted: proof that their SaaS vendors take security seriously.
How to Turn NIS2 Compliance Into a Sales Advantage
Most SaaS vendors treat NIS2 as a burden. The ones winning enterprise deals treat it as a differentiator.
Here’s the playbook: instead of waiting for the DDQ and scrambling, proactively share your security posture during the sales process. Attach your Deal Report to proposals. Include your security score in your pitch deck. Make compliance evidence part of your value proposition, not a procurement bottleneck.
SaaS vendors using SaaSFort report that sharing a branded security report during the first sales call shortens the procurement cycle by weeks. The enterprise buyer’s security team gets what they need upfront, and the deal moves forward without the usual back-and-forth.
Three concrete steps:
- Run a free scan at saasfort.com/scan to see your current grade
- Generate a Deal Report mapping your findings to NIS2 Article 21 requirements
- Pre-fill your DDQ responses using the report data as evidence
FAQ
Does NIS2 apply directly to SaaS vendors?
It depends on your size and sector. If your company has 50+ employees or €10M+ revenue and operates in one of 18 regulated sectors, you may be directly in scope. But even if you’re not, your enterprise customers are — and their supply chain obligations cascade to you. See our NIS2 vendor assessment guide for the full breakdown.
What’s the difference between the June 30 and October 2026 deadlines?
June 30 is the first compliance audit deadline — entities must have completed their initial cybersecurity assessment. October 2026 is when full enforcement powers activate, meaning supervisory authorities begin active inspections, binding orders, and penalty proceedings.
Can SaaS vendors get an extension on audit requirements?
Some member states allow extensions for less critical SMEs with written regulatory relief. But this requires formal approval from sector regulators. All other NIS2 obligations — risk assessment, incident reporting, evidence logging — remain active during any deferral.
How does NIS2 interact with DORA for financial sector SaaS vendors?
DORA (Digital Operational Resilience Act) applies specifically to financial institutions and their ICT providers. It’s stricter than NIS2 for financial services. If you sell to banks or insurers, you need to meet DORA requirements in addition to NIS2. The two frameworks overlap on incident reporting and supply chain security, but DORA adds ICT risk management and resilience testing requirements.
What evidence do auditors actually ask for from SaaS vendors?
Auditors typically request: current vulnerability scan results, incident response plan, encryption policies, access control documentation, business continuity plan, and a completed security questionnaire. Having a continuously updated security posture report eliminates most of the scramble.
Von der Theorie zur Praxis
Scannen Sie Ihre Domain kostenlos. Erste Ergebnisse in unter 10 Sekunden — ohne Registrierung.