Blog
A Comprehensive Guide for CISOs and Compliance Leads to Staying Ahead of NIS2 in Germany and Austria
30,000 German companies are now in NIS2’s crosshairs — most aren’t ready. The EU’s NIS2 Directive is no longer theory. It’s in force. And while Germany’s enforcement clock technically starts ticking in 2026, the reality is: Your audit trail, your access controls, and your leadership’s accountability will all be under scrutiny in 2025. In Austria, the pressure is even higher — enforcement is expected to begin by the end of this year. Meanwhile, identity and access management (IAM) has quietly become one of the most visible and enforceable compliance fronts. This article outlines what companies across the DACH region need to know — and how to use identity-centric data access governance as a core pillar of your compliance strategy.
NIS2 is already in force at the EU level. The directive applies to critical and digital sector companies with >50 employees or >€10M turnover — extending the coverage from ~2,000 organizations affected by NIS1 to ~30,000 organizations only in Germany.
At its core, NIS2 mandates:
Identity & Access Management (IAM) is a major focus — from least privilege and access reviews to on-boarding/off-boarding and traceability.
To be prepared, CISOs in DACH should already now:
🧩 Bottom line: NIS2 moves cybersecurity from best practice to legal obligation. 2025 is your last full year to build readiness before enforcement hits.
NIS2 is the EU’s updated cybersecurity law. It expands the scope of its predecessor NIS1 by requiring critical and digital service providers to implement a range of cybersecurity risk-management measures, including incident reporting, supply chain security, and robust identity and access governance.
Figure 1: Key Differences Between NIS1 and NIS2
Table 1: Key Differences in NIS2 Implementation Between Germany and Austria
📌 Takeaway: While both countries fall under the EU NIS2 Directive, Germany and Austria differ in terms of legislative progress, enforcement timelines, and the specificity of identity and access management (IAM) guidance. CISOs operating in the DACH region should align to the stricter requirements and prepare for Austria’s potential earlier enforcement in Q4 2025.
While the legal enforcement of NIS2 in DACH is expected in 2026 (with potential earlier enforcement for Austria), most companies are still in early stages of implementation. The chart below shows readiness of German companies across core areas like training, incident response, crisis management, and supply chain security. As visible, less than one-third of organizations have fully implemented key controls — leaving significant ground to cover before NIS2 becomes enforceable.
Figure 2: Degree of Implementation of NIS2 Requirements by Category in Germany (Source: TechConsult/Plusnet, June 2024, 200 companies surveyed)
At the heart of NIS2 is a set of baseline cybersecurity risk management measures that all in-scope entities must implement. Article 21 of the directive specifies that companies must take “appropriate and proportionate technical, operational and organisational measures to manage the risks” to their network and information systems and to “prevent or minimize the impact of incidents”. These measures must be state-of-the-art and risk-based, taking into account the company’s size, exposure, and the potential societal impact of incidents.
At a minimum, organizations need to address the following areas:
These ten areas form a comprehensive baseline. In summary, NIS2 is pushing organizations to adopt a holistic cybersecurity program – from prevention (risk management, secure development, supply chain security) to detection/response (incident handling, monitoring) to recovery (continuity plans) – and to institutionalize processes like training, access control, and regular audits of their security posture.
Beyond just handling incidents internally, NIS2 introduces detailed reporting requirements for certain cyber incidents. If an incident has a “significant impact” on the provision of an entity’s services (criteria include causing substantial disruption or financial loss, or affecting a large number of people or other organizations), it must be reported to the national authorities:
These strict timelines mean organizations need well-drilled incident response teams and incident reporting procedures in place. They also need the ability to quickly assess what happened – which systems and data were affected, and what might be the cause – to meet the content requirements of the reports. Notifying affected service recipients or the public is also required in some cases (if the incident could adversely affect users or if public awareness is necessary to mitigate an ongoing threat). Under NIS2, transparency and speed in incident disclosure are not just encouraged but mandated, which is a significant shift from the more ad-hoc reporting practices of the past.
Even though enforcement begins in 2026 (Q4 2025 expected for Austria), companies should not wait. IAM transformations take time — especially in distributed or hybrid environments. Here’s what your roadmap should include:
Tip: Use a framework like ISO/IEC 27001 or BSI IT-Grundschutz to align control maturity.
Practice incident simulations to test readiness across technical and executive teams.
"Policies and procedures to assess the effectiveness of cybersecurity risk-management measures." Source: Directive (EU) 2022/2555 – Article 21
Involve your Data Protection Officer (DPO) or Legal Counsel to align with GDPR and regulatory communications.
If you're navigating identity and access governance, CyberDesk gives you the operational muscle to comply — and prove it. As a SaaS platform purpose-built for identity-centric data access governance, CyberDesk helps you operationalize several of NIS2’s most critical obligations — not just for check-the-box compliance, but for real security maturity.
Here’s how:
CyberDesk auto-classifies sensitive data (e.g. PII, customer records) and links it to human and non-human identities.
Example: Know exactly which third-party bot or contractor has access to your payroll DB.
NIS2 Article 21(2)(h): Requires access control and asset mapping.
Figure 3: CyberDesk's Classification Engine Categorizes Your Organizations Data & Identities Based on Data Types and Sensitivity Levels
CyberDesk’s Access Graph shows relationships between people, apps, and data in one glance.
Example: Spot that a dormant test account still has admin rights to your production server.
NIS2 Article 21(2)(d): Calls for risk-aware system architecture and continuous monitoring.
Figure 4: CyberDesk's Access Graph Provides Identity & Data Level Visibility
Set and monitor for least privilege. Get alerts when access exceeds policy.
Example: An intern gaining access to sensitive HR documents = immediate alert and remediation.
NIS2 Article 21(2)(c): Focuses on incident prevention and risk limitation.
Figure 5: CyberDesk's Alerts Dashboard Facilitates Breach Risk Mitigation
Run scheduled reviews to check if users still need the access they have. Managers get smart prompts. Reviews are logged for audit.
Example: HR system access auto-review prompts quarterly approval from the HR lead. No spreadsheet needed.
NIS2 Article 21(2)(g): Requires assessing the effectiveness of cybersecurity controls.
Figure 6: CyberDesk's Access Review Frees You Up From Time-Consuming Manual Processes and Helps You Stay Compliant
NIS2 is raising the bar for cybersecurity across Europe, and companies in Germany and the broader DACH region are facing a new era of regulatory expectations. The directive brings cybersecurity out of the sole domain of IT and into the boardroom by introducing accountability for top management. Achieving compliance will require organizations to adopt a more structured and measurable approach to cyber risk management — what was once considered “good practice” is now becoming law. This isn’t just a security challenge — it’s a shift in governance, accountability, and organizational resilience. That’s where CyberDesk comes in. We help you gain clarity over who has access to what, flag risks early, and operationalize NIS2 requirements through automation and visibility.
📬 Ready to see how CyberDesk fits into your security and compliance roadmap? Let’s connect.
Learn how CyberDesk can help you to adaptively control who can take what actions on what data.
Founders
Dr. Tobias Lieberum & Prabhakar Mishra
Year of foundation
2022
Headquarters
Munich, Germany
About CyberDesk
Founded in 2022 and based in Munich, Germany, CyberDesk is led by Dr. Tobias Lieberum and Prabhakar Mishra. In their previous careers in sensitive environments in banking and consulting, the founders firsthand witnessed the challenges of securing data access in the cloud. In lack of a satisfactory solution, they decided to solve this global threat themselves.
We will be happy to connect with you. Contact CyberDesk today.
Copyright © CyberDesk GmbH 2025. All rights reserved.