SaaSFort
NIS2 Article 23 BSI Meldeportal incident-notification field-map CSIRT

NIS2 Article 23 Field Map: Scan vs Template Split

Article 23 demands 16 evidence fields. A SaaSFort scan covers 5%; the template covers 95%. Honest field-by-field split, mapped to BSI Meldeportal.

ST
SaaSFort Team
· 9 min di lettura

A SaaSFort scan covers about 5 percent of what NIS2 Article 23 actually demands when you submit an incident notification. The other 95 percent has to be written by a human under time pressure — usually with the BSI Meldeportal open in one window and a Slack channel screaming on the other side.

This article is the honest field map. Every Article 23 evidence field, what the scanner can supply, what the incident-readiness template covers, and how each maps to the German BSI Meldeportal structure.

If you maintain a different position internally — that scans somehow auto-generate incident reports — your first auditor reading the output will catch it. Better to know now.

The Honest Split: 5% Scanner, 95% Template

Article 21 (preventive controls) and Article 23 (incident reporting) answer different questions for different readers. They share NIS2 vocabulary; they do not share evidence.

QuestionArticle 21Article 23
What does this answer?Controls in place, point-in-timeWhat happened, when, who was hit, what you did
ReaderAuditor pre-eventRegulator post-event
Evidence typePreventiveReactive
Generated by scan?Yes (60 of 60 mapped checks)No (0 of 60 mapped checks)

Our Article 23 gap analysis walks the underlying technical reasoning. The conclusion is structural: scans observe outside-in posture; incidents are detected via logs, EDR, SIEM, and customer reports — inside-out signals the scanner has no access to. The 24-hour clock starts on internal awareness, not on a scheduled check.

That structural split is exactly what the incident-readiness template is built to fill.

The Article 23 Field Map

NIS2 Article 23 (combined with the BSI Meldeportal implementation) requires 16 evidence fields across the three submission stages. Here is each one, with honest sourcing.

#Article 23 fieldScan supplies?Template supplies?Notes
1Date/time of awarenessNoYesHighest-stakes field. Nobody computes it correctly under stress. Fillable in the awareness-clock worksheet.
2Incident classification (ENISA RSI taxonomy)NoYes7 categories, dropdown in template.
3Severity / impact levelNoYesOperational, financial, reputational dimensions.
4Affected services & assetsNoYesScan sees one external domain — does not know your internal asset graph.
5Number of users affectedNoYesZero user-telemetry signal in scan.
6Duration of disruptionNoYesScan timestamp ≠ incident timeline.
7Geographical spreadNoYesNot modeled by scanner.
8Threat indicators (IPs, hashes, domains, MITRE TTPs)Partial (5%)YesScan finds exposures (CVE in JS lib, exposed .git, source maps), not live IoCs. Template has full IoC ledger.
9Suspected malicious causeNoYesScanner cannot distinguish malicious from misconfiguration.
10Cross-border elementNoYesMulti-CSIRT routing if multiple member states affected.
11Mitigation actions takenNoYesReactive, post-event.
12Recovery / BCP-DRP / RTO-RPO actualsNoYesOut of scanner scope entirely.
13Root cause analysis (final report)NoYesRequires log forensics.
14Lessons learnedNoYesPost-incident artifact.
15Notification audit trail (24h/72h/1-month clock)NoYesThe awareness-clock worksheet is the audit trail.
16Internal escalation / comms logNoYesPre-formatted ledger in template.

Coverage: scanner ≈ 5 percent, template ≈ 95 percent. The 5 percent is real but adjunct: scan output gives you a credible “control regression observed at T=…” line in the early warning, plus a pre-incident exposure register that anchors RCA later.

BSI Meldeportal Field Mapping (CSIRT Format)

For German entities, Article 23 submissions go through the BSI Meldeportal. The Meldeformular structure is its own bureaucratic dialect — knowing how Article 23 fields map to BSI’s field names saves hours during the first 24 hours.

Article 23 evidenceBSI Meldeportal field (DE)English equivalent
Date/time of awarenessZeitpunkt der KenntnisnahmeTime of awareness
Incident classificationArt des SicherheitsvorfallsType of security incident
Severity / impactAuswirkung auf den BetriebOperational impact
Affected services & assetsBetroffene Systeme und DiensteAffected systems and services
Number of users affectedAnzahl betroffener NutzerNumber of affected users
Duration of disruptionDauer der BeeinträchtigungDuration of disruption
Geographical spreadGeografische AusbreitungGeographic spread
Threat indicatorsIndikatoren der KompromittierungIndicators of compromise
Suspected causeVermutete Ursache (vorsätzlich/zufällig)Suspected cause (deliberate/accidental)
Cross-border elementGrenzüberschreitende AuswirkungCross-border impact
Mitigation takenBisher ergriffene GegenmaßnahmenMitigation actions to date
Recovery / RTO-RPOWiederherstellungsstatusRecovery status

Trap: the Meldeportal accepts free-text fields, but BSI parses them with structured expectations. Vague entries trigger follow-up requests that compress your 72-hour window. The template’s pre-written field-by-field guidance is calibrated to the wording BSI’s CSIRT analysts are reading for.

The non-German member states use comparable national CSIRT portals — France ANSSI, Italy ACN, Spain CCN-CERT. Multi-jurisdiction filing is covered in our MSP NIS2 compliance guide.

The Awareness Clock — Three Deadlines, One Worksheet

The single highest-leverage field in Article 23 is also the one teams compute incorrectly under stress. The clock starts at awareness, not at detection. Awareness is when your organization’s responsible function recognized the incident is significant — typically a documented escalation moment, not the first alert ping.

The three deadlines, computed from awareness:

StageFormulaWhat gets submitted
Early warningawareness + 24hAcknowledgement of awareness, preliminary nature, suspected attacker (if known)
Incident notificationawareness + 72hInitial impact assessment, IoCs, cross-border effect
Final reportnotification + 1 monthRoot cause, mitigation applied, preventive measures

The awareness-clock worksheet inside the incident-readiness template pre-computes these for you with timezone normalization (BSI runs on CET/CEST; multi-region SaaS teams on UTC). Five fillable fields:

  • incident_detected_at (your monitoring/alert timestamp)
  • awareness_declared_at (the human escalation moment — this is the clock-start)
  • early_warning_due_at (= awareness + 24h)
  • notification_due_at (= awareness + 72h)
  • final_report_due_at (= notification + 30d)

The detection-vs-awareness distinction is what auditors will probe most. Documenting awareness in writing — with timestamp, who escalated, what evidence triggered escalation — is the single best investment in the first hour. Without it, a regulator defines awareness for you, less generously, after the fact. For the broader 24-hour notification breakdown, see our BSI 24-hour template + tabletop guide.

Internal Communications Log Format

Article 23 expects an audit trail of internal communications during the incident response. BSI inspections under §29 BSIG consistently request this log even when the formal Article 23 submission is complete.

The minimum-viable log structure (pre-formatted in the template):

timestampactoractionrecipientchannel
2026-05-02T21:47Zon-call SREescalated suspected ransomware in prod-eu-west-1CTOPagerDuty
2026-05-02T21:51ZCTOdeclared awareness, started 24h clockCEO, CISOphone
2026-05-02T22:04ZCISOnotified external IR retainerexternal IR firmemail

Five fields, append-only, never deleted. The auditor question that breaks unprepared teams: “Show me when leadership was first told.” If the answer requires forensic Slack reconstruction, the company has already lost the framing.

How This Connects to the Incident-Readiness Template

The field map above is the index. The free incident-readiness bundle is the executable form. It includes:

  • The 24h / 72h / 1-month notification templates (DE + EN, .docx)
  • The awareness-clock worksheet (fillable)
  • The internal-comms log (pre-formatted ledger)
  • A tabletop exercise with three scenarios (ransomware, supply-chain, data exfiltration)
  • The CSIRT-format mapping above as a printable one-pager

The bundle is email-gated, free, no credit card. New SaaSFort accounts also receive a 14-day Growth trial automatically — useful because the scan output supplies the 5 percent that is derivable: pre-incident exposure baseline, control regression detection between scans, and remediation evidence in the final report (Article 23 final reports require “measures applied to prevent recurrence” — a closed-gap scan is reusable evidence).

For broader context on where Article 21 evidence comes from, the NIS2 Article 21 self-audit template covers the preventive side of the same compliance program.

FAQ

Why doesn’t SaaSFort just generate Article 23 reports automatically?

Because the data isn’t there to generate. Article 23 evidence comes from internal logs, EDR, SIEM, customer reports, and human judgment about classification and impact. An external scanner has no path to those signals. We could fake it, but the first auditor would catch it. Templates are the honest answer.

Is this field map BSI-specific or does it apply to all EU member states?

The 16 evidence fields apply across all NIS2 implementations — they come from the Directive itself. The Meldeportal field-name mapping is BSI-specific (Germany). For ANSSI (France), ACN (Italy), and CCN-CERT (Spain), the field structures are similar but with different bureaucratic dialect; the underlying evidence is the same.

What if my company experienced a “near miss” — do I still notify?

Article 23 only triggers on significant incidents — operational disruption, financial loss, or considerable damage to other persons. A near miss without disruption typically does not trigger notification. Document it internally regardless: future inspections look for evidence of mature triage, not just submitted reports.

Can the awareness clock be reset if new information emerges?

No. Once awareness is documented, the clock runs. New facts go into the 72-hour notification or final report. Resetting awareness retroactively is a credibility-destroying move under inspection — auditors specifically test for it.

My company is a sub-50-person SaaS vendor selling to NIS2-scoped buyers. Does Article 23 apply to me?

Directly, only if you are independently in scope. Cascading: yes — your customer’s Article 21(2)(d) supply-chain obligation will pull notification timelines and evidence from you contractually. The same template works for both direct and cascade obligations. See our B2B SaaS supply chain compliance guide.

What’s the relationship between Article 23 and GDPR’s 72-hour breach notification?

They overlap on personal-data incidents but operate independently. NIS2 Article 23 goes to BSI / national CSIRT; GDPR Article 33 goes to the data protection authority. The same incident may trigger both notifications on different deadlines. Our NIS2 vs GDPR guide covers the dual-track filing strategy.


Templates document. Scans verify. Together they cover Article 21 and Article 23. Download the free incident-readiness bundle — 24h/72h/1-month templates, awareness-clock worksheet, internal-comms log, tabletop exercise, BSI Meldeportal field-map. New accounts also get a 14-day Growth trial — run a baseline scan to lock in your pre-incident exposure register. For the complete framework, download our free SaaS Security Playbook 2026.

Condividi questo articolo

Dalla lettura all'azione

Scansionate il vostro dominio gratuitamente. Primi risultati in meno di 10 secondi — senza registrazione.

Scansione gratuita

Continua a leggere