SaaSFort
NIS2 compliance Germany SMB BSI cybersecurity checklist

NIS2 Compliance Checklist for German SMBs: 10 Steps Before October 2026

Practical 10-step NIS2 compliance checklist for German SMBs. BSI registration, Article 21 measures, and automated evidence collection — no CISO required.

S
SaaSFort
· 8 min di lettura

Germany’s NIS2 transposition (NIS2UmsuCG) is law since December 6, 2025. The BSI registration deadline expired on March 6, 2026. Full enforcement hits October 2026 — seven months from now.

29,000 German companies are in scope. Most don’t have a CISO or a GRC platform. If that’s you, this checklist is your compliance roadmap.

Each step maps to a specific NIS2 Article 21 measure. Skip the consultant — start here.

Who Needs This Checklist?

NIS2 applies if your company meets both conditions:

  1. Size threshold: 50+ employees OR €10M+ annual revenue
  2. Sector: one of 18 regulated industries (energy, transport, healthcare, digital infrastructure, manufacturing, food, chemicals, and more)

Even if you fall below these thresholds, NIS2 obligations cascade through supply chains. If you provide SaaS or IT services to an in-scope company, expect their procurement team to audit your security posture. Our NIS2 SaaS vendor compliance checklist covers the vendor-side requirements in detail.

CategorySize CriteriaMax Fine
Particularly important entities250+ employees OR €50M+ revenue€10M or 2% global turnover
Important entities50+ employees OR €10M+ revenue€7M or 1.4% global turnover

The 10-Step NIS2 Compliance Checklist

Step 1: Confirm Scope and Register with BSI

Article: NIS2UmsuCG §33-34 | Effort: 1-2 hours

Check your employee count, revenue, and NACE sector code against the BSI’s scope criteria. If you’re in scope and haven’t registered yet, do it immediately — the deadline was March 6, 2026, but late registration is accepted.

Action items:

  • Verify your NACE sector code at the Federal Statistical Office
  • Register via the BSI’s online portal
  • Designate a contact person for BSI communications
  • Document your scope assessment rationale (keep it — auditors ask for this)

Tip: When in doubt, register. The BSI interprets scope broadly, and failing to register when required carries its own penalties.

Step 2: Run an External Security Baseline Scan

Article 21 measures: 21.2e (network security), 21.2h (cryptography) | Effort: 5 minutes

You can’t fix what you can’t measure. Before writing a single policy document, scan your public-facing infrastructure to find out where you actually stand.

An automated external scan reveals TLS misconfigurations, missing security headers, DNS issues, exposed services, and certificate problems — all of which map directly to Article 21 requirements.

Action items:

  • Scan your primary domain and all customer-facing subdomains
  • Document the baseline score and findings
  • Export the report for your compliance file

SaaSFort runs 60 security checks across 21 categories in under 60 seconds, with each finding mapped to NIS2 Article 21 and ISO 27001 controls. Run your free scan now — the report becomes your first compliance artifact.

Step 3: Write Your Information Security Policy

Article 21 measure: 21.2a (risk analysis and security policies) | Effort: 4-8 hours

BSI auditors expect a formal, written security policy approved by management. A 5-10 page document covering your approach to risk management, asset classification, and security responsibilities.

Minimum content:

  • Security objectives and scope
  • Roles and responsibilities (who owns what)
  • Risk assessment methodology
  • Acceptable use rules
  • Review schedule (minimum annual, quarterly is better)

Don’t overthink this. A clear, honest 8-page policy beats a 60-page document nobody reads.

Step 4: Build Your Incident Response Plan

Article 21 measure: 21.2b (incident handling) | Effort: 4-6 hours

NIS2 has non-negotiable incident reporting timelines:

DeadlineRequirement
24 hoursEarly warning to BSI after becoming aware of a significant incident
72 hoursFull incident notification with initial assessment
1 monthFinal report with root cause analysis and remediation

Action items:

  • Define what constitutes a “significant incident” for your organization
  • Create an escalation matrix (who calls whom, in what order)
  • Draft notification templates for BSI reporting
  • Test the plan with a tabletop exercise at least once before October 2026
  • Establish a communication plan for affected customers

Step 5: Document Business Continuity and Backup Procedures

Article 21 measure: 21.2c (business continuity) | Effort: 3-5 hours

Auditors want specific numbers, not vague assurances. Define your RTO (Recovery Time Objective) and RPO (Recovery Point Objective) for each critical system.

Action items:

  • List all critical systems and their dependencies
  • Set RTO and RPO targets for each
  • Document backup frequency, retention, and encryption method
  • Verify backup restoration works (run a test restore)
  • Store backups in a separate location from production

Step 6: Assess Your Supply Chain

Article 21 measure: 21.2d (supply chain security) | Effort: 4-8 hours

NIS2 requires you to assess the security posture of your suppliers — SaaS tools, cloud providers, payment processors, everyone who touches your data or infrastructure.

Action items:

  • Create an inventory of all third-party services and subprocessors
  • Classify each by data access level (critical, standard, minimal)
  • Request security documentation from critical suppliers
  • Add security requirements to vendor contracts
  • Schedule annual vendor reviews

For practical guidance on building a vendor assessment process, see our vendor security assessment checklist and the third-party risk management checklist.

Step 7: Enforce Multi-Factor Authentication

Article 21 measure: 21.2j (MFA and secure communication) | Effort: 2-4 hours

MFA on all admin and privileged accounts is a baseline expectation. SMS-based MFA is considered weak — use TOTP apps or hardware keys.

Action items:

  • Enable MFA on all admin accounts (cloud, email, code repos, infrastructure)
  • Enforce MFA for all employees accessing sensitive systems
  • Document your MFA policy and exception process
  • Disable SMS as an MFA factor where possible

Step 8: Implement Vulnerability Management

Article 21 measure: 21.2f (vulnerability handling and disclosure) | Effort: 3-6 hours setup, then ongoing

You need a documented process for finding, triaging, and fixing vulnerabilities — with defined timelines.

Recommended SLAs:

SeverityRemediation Target
Critical (CVSS 9.0+)24 hours
High (CVSS 7.0-8.9)7 days
Medium (CVSS 4.0-6.9)30 days
Low (CVSS 0.1-3.9)90 days

Action items:

  • Set up automated scanning (external + dependency) on a weekly schedule
  • Publish a security.txt file per RFC 9116
  • Create a responsible disclosure page
  • Track vulnerabilities in a central register with SLA compliance metrics

For a deeper breakdown, see our vulnerability management guide.

Step 9: Train Your Team

Article 21 measure: 21.2g (cybersecurity hygiene and training) | Effort: 2-3 hours setup

NIS2 requires documented training — and specifically requires management to complete cybersecurity training (Article 20).

Action items:

  • Run annual security awareness training for all employees
  • Conduct phishing simulation exercises (at least quarterly)
  • Provide role-specific training for developers and IT staff
  • Mandatory: ensure C-level and board members complete cybersecurity training
  • Keep training completion records (auditors check these)

Step 10: Set Up Continuous Monitoring and Evidence Collection

Article 21 measure: 21.2a, 21.2e, 21.2f (ongoing) | Effort: 1-2 hours setup

Annual audits aren’t enough for NIS2. The BSI expects continuous risk management, which means ongoing monitoring with timestamped evidence.

Action items:

  • Schedule automated security scans at minimum weekly
  • Set up alerts for certificate expiry, TLS changes, and header modifications
  • Maintain a compliance dashboard accessible to management
  • Archive scan reports monthly for audit trail

SaaSFort’s continuous security monitoring generates timestamped, NIS2-mapped reports automatically — the kind of evidence BSI auditors actually accept.

Timeline: What to Do When

PeriodPriority Actions
Now (March 2026)Register with BSI (if not done). Run baseline scan. Start security policy.
April-May 2026Complete incident response plan. Document business continuity. Assess supply chain.
June-July 2026Enforce MFA across all systems. Set up vulnerability management. Train team.
August-September 2026Enable continuous monitoring. Run tabletop exercise. Compile evidence package.
October 2026Full compliance required. BSI inspections begin.

Management Liability: This Is Personal

NIS2 introduces personal liability for executives. Under the NIS2UmsuCG, C-level and board members face individual accountability for inadequate cybersecurity measures.

This isn’t just about fines for the company. Management must:

  • Personally approve the cybersecurity risk management measures
  • Oversee implementation (not just delegate to IT)
  • Complete cybersecurity training themselves
  • Accept liability for compliance failures

For more on management obligations and the broader regulatory framework, read our NIS2 compliance guide for German SMBs.

Cost Comparison: DIY vs. Consultant vs. Automated

ApproachCostTime to ComplianceOngoing Effort
External consultant€15,000-€50,0003-6 monthsAnnual re-engagement
In-house CISO hire€80,000-€120,000/year2-4 monthsFull-time role
Automated scanning + self-service policies€9-€29/month2-4 weeks2-3 hours/month

Most SMBs with 50-250 employees don’t need a full-time CISO for NIS2 compliance. An automated scanning tool for the technical baseline, combined with clear policy templates, covers 80% of what auditors check — at 1% of the consultant cost.

Frequently Asked Questions

My company has exactly 50 employees. Am I in scope?

Yes, if you meet the revenue threshold (€10M+) OR the employee threshold (50+) AND operate in a regulated sector. The thresholds are inclusive — 50 employees puts you in scope. Check both criteria; meeting either one is sufficient.

We registered late with BSI. What happens now?

Late registration is accepted. The BSI prioritizes getting organizations into the system over penalizing late registration. Register immediately and document the reason for delay. Focus your energy on implementing the Article 21 measures — that’s what auditors will actually assess.

Do we need ISO 27001 certification for NIS2?

No. ISO 27001 is not required by NIS2, but it helps significantly. About 70-80% of ISO 27001 Annex A controls map to NIS2 Article 21 measures. If you already have ISO 27001, you’re ahead — but you still need to address NIS2-specific gaps like incident notification timelines and management liability. See our ISO 27001 vendor certification guide for the full mapping.

What evidence does the BSI actually check during audits?

BSI auditors focus on: written security policies with management approval, incident response plans with documented test exercises, scan reports showing continuous monitoring, backup restoration test results, MFA enforcement evidence, training completion records, and supply chain assessment documentation. Timestamped, automated evidence carries more weight than manual spreadsheets.

Can a free security scan count as NIS2 evidence?

A single scan is a starting point, not compliance evidence. NIS2 requires continuous risk management. However, your initial scan report documents your baseline — which is exactly what auditors want to see as step one. Pair it with regular automated scans to build the ongoing evidence trail the BSI expects.


NIS2 compliance doesn’t require a six-figure budget. SaaSFort scans 60 security checks across 21 categories, maps findings to NIS2 Article 21, and generates audit-ready reports — starting at €9/month. Start your free compliance scan.

Condividi questo articolo

Dalla lettura all'azione

Scansionate il vostro dominio gratuitamente. Primi risultati in meno di 10 secondi — senza registrazione.

Scansione gratuita

Continua a leggere