Information Security


Step by step to compliance

NIS2 implementation: a practical guide to achieving regulatory compliance [incl. checklist]

Mario Melmer and Younes Ahmadzei · Updated on: 22.12.2025
NIS-2 Umsetzung:  Praxisleitfaden zur rechtssicheren Compliance [inkl. Checkliste]

Why NIS2 implementation is critical now

The NIS2 Directive has been transposed into German law as of December 2025 and applies to approximately 29,000 organisations. For many companies, the key question is no longer whether they are affected, but how the requirements can be implemented efficiently and in a legally compliant manner.

This guide provides a step-by-step approach to achieving NIS2 compliance in practice – from scope assessment and determining your cybersecurity maturity level through a self-assessment, to a structured overview of all statutory NIS2 requirements, including a comprehensive compliance checklist.

Step 1: is my organisation subject to NIS2?

The classification under NIS2 depends on organisation size, revenue, and industry sector – however, the underlying criteria are complex. Using the HvS NIS2 scope assessment based on the graphic below, or the online tool from SKW Schwarz [German], you can quickly and systematically determine whether your organisation falls under the NIS2 Directive.

NIS-2 Impact Assessment – Image 1 of 2
NIS-2 Impact Assessment – Image 2 of 2

Step 2: assess the status quo 

NIS2 gap analysis: What is your current state?

To efficiently determine the need for action regarding NIS2 compliance, a gap analysis is recommended.

Based on our experience, it is advisable to first check the extent to which existing ISMS documents – such as policies and process descriptions – already cover the requirements of NIS2.

Subsequently, the relevant business areas (e.g., IT, HR, procurement, and facility security) should be involved in the assessment of practical implementation through structured interviews and audits, in order to obtain a realistic picture of the current state.

An additional benefit of this approach is that the interviewees gain transparency regarding which areas should be prioritized when establishing the necessary processes and policies from the perspective of an auditor and consultant, thanks to the targeted questioning technique.

Illustration NIS-2 gap analysis

The identified deviations and gaps are documented in a report. Based on this, a concrete roadmap is developed, outlining which measures are necessary to achieve NIS2 compliance in a targeted and prioritized manner.

Alternative: determine NIS2 maturity with the HvS NIS2 self-assessment tool

If you want to take the assessment of your current state into your own hands, we have developed a free self-assessment tool. The HvS NIS2 self-assessment tool provides a structured overview of how well organisations are already prepared for the requirements of the NIS2 Directive and in which areas specific action is needed.

NIS-2 Self Assessment Tool Screenshot


The tool systematically evaluates existing processes and measures against the statutory requirements and helps clearly identify implementation priorities and focus areas.

Check your NIS2 maturity with the self-assessment tool

Step 3: establish or extend an ISMS in line with NIS2

An information security management system (ISMS) forms the central foundation for NIS2 compliance. It establishes the organisational and structural prerequisites to systematically assess risks and effectively implement security measures.

Organisations that have already implemented an ISMS according to ISO/IEC 27001 or TISAX® can largely build directly on it.

For all others, NIS2 provides an appropriate opportunity to start introducing an ISMS in line with NIS2, thereby creating the basis for a sustainable and auditable implementation.

Step 4: implement appropriate measures in accordance with NIS2

The NIS2 Directive (Art. 21) as well as the German NIS2UmsuCG (§ 30) define concrete requirements for affected organisations. The following points provide a concise overview of the minimum requirements that must be implemented to achieve NIS2 compliance:

   Checklist of NIS2 requirements


Risk management

Organisations are required to implement appropriate, effective, and proportionate risk management measures.

   The goal is to systematically identify and assess security risks and derive appropriate measures from them.

In practice, however, it is often observed that without a clear methodology, extensive risk registers with limited added value are quickly created. A focused, practical approach that prioritises risks and supports implementation is therefore crucial. Using a proven methodology, security risks can be evaluated in a structured manner and concrete, actionable measures derived.

Incident management

Organisations need to establish appropriate processes for detecting, analysing, and managing security incidents.

   The goal is to identify incidents early, limit their impact, and restore operations as quickly as possible.

Effective incident management defines clear responsibilities, escalation paths, and standardized procedures for handling security incidents, and forms the basis for compliance with the NIS2 reporting obligations.

How HvS Consulting can support you

If you do not have the required expertise in-house, the experts at HvS Consulting can provide professional support – for example, through our Incident Response Retainer or the HvS Threat Insights, which help organisations meet NIS2 requirements. Additionally, we offer an Incident Readiness Check (consultation), allowing you to assess in just one day where your organisation may need to improve its incident management capabilities.

Business continuity 

Organisations must implement measures to maintain business operations during a crisis. This particularly includes backup and restore concepts as well as a structured crisis management approach, ensuring that the organisation remains operational in the event of serious security incidents.

   The goal is to minimize downtime, protect critical processes, and ensure the timely restoration of systems and services.

Supply chain security 

Organisations must identify security-relevant suppliers and service providers and define appropriate security requirements. These requirements should be contractually anchored, and their implementation must be regularly reviewed.

   The goal is to detect, assess, and mitigate cyber risks along the supply chain, effectively controlling dependencies and potential vulnerabilities.

Secure development and operations

Organisations must implement appropriate security measures for the development and operation of IT systems. This particularly includes structured patch and vulnerability management, effective malware protection, and the use of multi-factor authentication (MFA).

   The goal is to promptly close known security gaps, reduce attack surfaces, and ensure the secure operation of systems and applications on a sustainable basis.

Effectiveness review

Organisations must regularly assess the effectiveness of their security measures. This includes, among other things, audits, the use of appropriate key performance indicators (KPIs), and technical assessments such as penetration tests

   The goal is to evaluate the actual maturity level of the implemented measures, identify vulnerabilities early, and ensure the continuous improvement of information security.

Security awareness & employee training

Organisations must conduct regular awareness activities and training for employees and executive management.

   The goal is to make security risks more visible and to establish an appropriate security awareness across all levels of the organisation. 

Executive management plays a particularly important role, as it is responsible for the strategic direction and oversight of cybersecurity measures.

State-of-the-art cryptography

Organisations must use appropriate cryptographic methods according to the state of the art to effectively protect data and communication channels. This particularly includes the secure encryption of stored data as well as the protection of data transmission.

   The goal is to ensure the confidentiality and integrity of sensitive information and to prevent unauthorised access.

Access control & personnel processes

Organisations must implement appropriate access controls to ensure that only authorised personnel have access to systems, applications, and data. This particularly includes role-based access concepts and regular permission reviews.

In addition, security aspects must be integrated into personnel processes, for example during onboarding, role changes, and offboarding, to effectively prevent misuse and unauthorised access.

Step 5: fulfil formal requirements

Regardless of the prescribed measures, the formal obligations must also be observed. This particularly includes timely registration and compliance with reporting obligations for security incidents. Further information can be found here:

Blog article: NIS2 Directive – overview, requirements, and distinction from other legislation

Step 6: ensure continuous improvement

In other words, implementing the NIS 2 requirements - or, more generally, the effort to strengthen an organization’s resilience against cyberattacks - is not a one-time project. It requires regular questioning, assessment, review, and monitoring, as well as the continuous consideration of new threats, including adjustments to established procedures and practices. 

Concise NIS2 checklist for organisations

  • Assess scope
  • Determine current state
  • Establish or enhance ISMS
  • Implement risk management measures
  • Fulfil formal obligations (in particular registration and reporting requirements)
  • Ensure continuous improvement

Conclusion: implementing NIS2 in a structured and sustainable way

Implementing NIS2 is challenging, but manageable. With a clear roadmap, appropriate methods and tools, as well as the support of experienced partners, compliance can be achieved in a structured, efficient, and sustainable manner.

Get started now with a scope assessment [German] or our free NIS2 self-assessment tool

NIS2 self assessment tool

About the authors

Younes Ahmadzei

Younes Ahmadzei

Trainee Information Security Consultant

Both during his studies and bachelor thesis and his time at HvS, he engaged intensively with the NIS2 Directive and developed profound expert knowledge. A key outcome of his work was the development of a self-assessment tool to determine the NIS2 maturity level of organisations. His goal is to convey complex regulatory requirements in a clear and practical manner.

Connect on LinkedIn

Mario Melmer

Head of Information Security at HvS-Consulting

Our specialist for ISMS. He knows what makes an ISMS successful, how to develop it securely and in line with requirements and, above all, how to make it resilient. He's an expert on processes and guidelines that need to be established in your company.

Connect on LinkedIn

Mario Melmer