The EU's new NIS-2 Directive means that critical infrastructure operators (KRITIS) and companies categorised as "important" in Germany must update their cyber security concepts. There are only a few months left to implement the security standards of the NIS-2 Directive. Find out what NIS-2 is all about and what affected organisations need to pay attention to now.
The first version of the NIS-2 Directive was published on 27.12.2022 and is to be implemented by EU member states and the respective KRITIS organisations by autumn 2024. NIS-2 stands for Network Information Security 2 and is an initiative of the EU Commission to strengthen cyber security.
Its purpose: to make "important" and "particularly important" infrastructures more resilient in times of increasing cyber threats. It builds on the first NIS Directive from 2016 and expands the scope to include other sectors such as digital service providers and certain online platforms. Among other things, the directive sets out minimum security requirements for risk management and defines reporting obligations for cyber security incidents.
NIS 2 defines EU-wide standards and requirements for the security of KRITIS and amends existing guidelines of the Federal Office for Information Security (BSI) The abbreviation KRITIS stands for critical infrastructures, i.e. organisations and institutions from sectors such as energy supply, water, healthcare, transport or telecommunications. What they all have in common is that they fulfil fundamental and in some cases vital functions for the community and must therefore be protected against cyberattacks with particular rigour.
The EU's NIS 2 Directive supplements and expands the protective measures that have already been taken under previous KRITIS legislation. However, the legislation also increasingly affects commercial enterprises, which are defined as "important" or "particularly important" organisations depending on their size and annual turnover. As the threat situation and the methods and technologies used by hackers are evolving very quickly
According to Bitkom, cyberattacks cost the German economy over 200 billion euros per year. Reason enough for affected organisations to make cyber security a top priority - or so you might think. However, the reality is different: A recent survey shows that half of all employees believe a cyberattack on their own company is unlikely, while only one in four line managers is considered to have exemplary behaviour when it comes to IT security.
The discrepancy between this and the actual likelihood of companies falling victim to a cyberattack is alarming: In 2022, the Federal Criminal Police Office registered over 130,000 cases of cybercrime - which is one of the phenomenon areas with the highest potential for damage in Germany. In particular, the number of offences originating from abroad and causing damage in Germany is rising sharply. 49 per cent of CRITIS infrastructure operators state that they are experiencing a sharp increase in cyberattacks on their company.
In Germany, KRITIS operators must fulfil both the requirements of KRITIS legislation and the specifications of the NIS-2 directive. Anyone hearing about this for the first time usually has no precise idea of what this means in concrete terms. In cases of doubt, external cyber security service providers help with the step-by-step implementation of NIS-2-compliant security concepts. Networks and information systems are first subjected to a comprehensive risk analysis, on the basis of which suitable security measures are then evaluated and implemented.
These include access controls, encryption technologies and an incident response plan (IRP), which enables quick and effective countermeasures to be taken in the event of a cyberattack and limits the potential damage. Raising employee awareness of cyber threats through appropriate training measures is also an integral part of any NIS-2-compliant security concept. ISO27001 provides guidance: those who are ISO27001-certified can assume that they fulfil the majority of NIS2 requirements.
KRITIS operators as well as "important" and "particularly important" institutions are legally obliged by the NIS 2 directive to take suitable, proportionate and effective technical and organisational measures. This enables them to protect the IT and processes of the services they provide, avoid disruptions and minimise the impact of security incidents. Important to know: Companies affected by NIS2 must proactively register with the BSI. Failure to do so can result in severe penalties.
It is therefore important for those affected to promptly determine the extent to which they are affected by NIS-2 - and what measures are required by October 2024 in order to fulfil the new requirements. The numerous security-relevant areas of action include, for example
Ultimately, the NIS-2 directive is about the continuous monitoring and updating of security measures in order to be able to react to dynamic threat situations and the associated requirements. UEM systems play an important role here: they are predestined to support organisations in implementing the requirements of NIS-2.
UEM stands for Unified Endpoint Management. UEM systems manage and control end devices centrally and provide security updates and patches automatically. They also enable the configuration of security settings in accordance with company guidelines and the monitoring of compliance standards in real time. Unified endpoint systems thus improve the ability to respond to security incidents - and give companies exactly the capabilities they need to fulfil the requirements of NIS-2.
There is currently no transition period for the implementation of the NIS-2 directive. This means that affected companies are under great pressure to implement the requirements by October 2024. Aagon is also keeping an eye on developments in connection with NIS-2 and will be adding new features to the ACMP Suite over the course of the year that are aimed at implementing the NIS-2 requirements, such as multi-factor authentication for the ACMP Console, which will be available soon. Our ACMP Suite also offers important functions for documentation and therefore for risk assessment via reports and in asset and licence management.
Through our interpretation of SOAR (Security Orchestration Automation Response), we also combine various security tools and programs from the ACMP environment: Managed Software, Desktop Automation, CAWUM, Vulnerability, Defender and BitLocker Management. This bundling enables companies to react to detected threats in an automated, prioritised and therefore efficient manner with the ACMP Suite. Comprehensive patch management also ensures that deployed software is always provided with the latest security updates.
In Germany alone, around 30,000 companies need to take action due to the NIS-2 Directive. Decision-makers should therefore quickly check whether they are one of these companies or whether they are indirectly affected as a supplier, as they must register with the BSI independently as "important" or "particularly important" companies. And they should not take much longer to do so: Checking the current security standards and setting up NIS-2-compliant concepts are complex processes - but they can be considerably simplified by using a UEM solution.
Es scheint, als wären Sie auf nicht auf der gewünschten Sprachversion dieser Website gelandet. Möchten Sie wechseln?