NIS2 Compliance: What German Companies Need to Know
NIS2 expands cybersecurity obligations to thousands of German companies. Here's what changes, who is affected, and how to prepare.
NIS2 Article 21 requires organizations to implement risk-based vulnerability management — but most teams focus on the scanning side and miss the exposure side. Here is what the directive actually demands, where the gap is, and how to close it.
NIS2's Article 21 lists ten categories of security measures that essential and important entities must implement. One of them is explicit: organizations must have processes for handling and disclosing vulnerabilities. The German implementation (NIS2UmsuCG) and BSI's technical guidance elaborate this into something more operational: you need a vulnerability management process that covers detection, prioritization, remediation, and verification — not just periodic scanning.
The practical implication is that NIS2 does not just require you to run a vulnerability scanner once a quarter and file the report. It expects a continuous capability: knowing what assets you have, understanding which vulnerabilities apply, assessing exploitability in your specific environment, and patching within a defensible timeline. For supervisory authorities assessing compliance under NIS2, the question will not be 'did you scan?' but 'can you demonstrate a repeatable process that results in timely remediation of high-risk findings?'
The core challenge in vulnerability management is the gap between disclosure and exploitation. For critical vulnerabilities that land in CISA's Known Exploited Vulnerabilities (KEV) catalog, the median time from public disclosure to first observed exploitation in the wild has been measured at under 5 days for a growing share of entries. Organizations, on the other hand, operate on patch cycles that are measured in weeks — governed by change management processes, testing requirements, and operational windows that cannot always move faster.
This gap is not new, but NIS2 makes it a governance question rather than just an operational one. If a vulnerability that was added to the KEV catalog on a Monday is actively exploited against your infrastructure by Friday, and your change management process has a two-week minimum cycle, that is no longer just a technical lag. Under NIS2, it is potentially a control deficiency that a competent authority can examine. The BSI has been explicit that risk-based prioritization — meaning faster cycles for critical, externally reachable vulnerabilities — is expected practice.
Internal vulnerability scanners are necessary but not sufficient for NIS2 compliance. They answer the question 'what vulnerabilities exist on systems I know about?' but they do not answer 'which of those systems are reachable from the internet right now?' and 'are there systems exposed that I have not inventoried?'. Both of those questions matter for risk prioritization and, by extension, for NIS2's requirement that your measures are proportionate to the actual risk.
The practical failure mode is familiar: a vulnerability scanner flags a management interface on an internal IP as medium-severity, a human decides to schedule it for the next monthly cycle, and in the meantime that same management interface is reachable via an undocumented NAT rule through the perimeter. The risk rating in the scanner was wrong — not because the scanner is broken, but because it lacked external reachability context. NIS2 does not distinguish between a vulnerability you knew was exposed and one you missed. The outcome for your incident report is the same.
External attack surface management (EASM) addresses this by continuously enumerating what is visible from outside your network. It does not replace internal scanning — it provides the missing reachability context that determines which internally-flagged vulnerabilities are genuinely urgent.
The exploitation pattern for most KEV-listed vulnerabilities follows a predictable sequence. Within hours of a proof-of-concept being published, automated scanners operated by threat actors begin identifying exposed instances across the internet. Shodan and Censys index these systems continuously, and attacker tooling queries these indices to build target lists before most security teams have even reviewed the advisory. By the time a CVE reaches CISA's KEV, reliable exploitation code typically already exists and is in active use.
For DACH organizations, the threat is not abstract. German mid-market companies, hospitals, and public sector entities are indexed in the same Shodan data as global infrastructure. A FortiGate management interface in Bavaria and one in California appear identically in a passive internet scan. Geographic location provides no protection against opportunistic mass exploitation. NIS2's Article 21 requirement for 'technical and operational measures' proportionate to risk exists precisely because regulators understand that doing nothing is not a neutral choice when your infrastructure is continuously scanned.
Meeting NIS2 Article 21's vulnerability management expectations requires three things working together: knowing your full external asset footprint, understanding which CVEs apply to externally reachable components, and demonstrating a prioritization process that responds faster for critical, internet-facing exposures. Tinte's attack surface intelligence platform is built around the first two. It continuously discovers and fingerprints your externally visible infrastructure — services, certificates, exposed management interfaces, and technology versions — and maps current CVE data against what is actually reachable.
The practical output for a NIS2 compliance program is a continuously updated list of externally exposed assets with their associated CVE risk, sorted by exploitability and exposure severity. This gives your patch prioritization process the signal it is currently missing: not 'which vulnerabilities exist on all systems' but 'which vulnerabilities are on systems attackers can reach today'. For an incident response team, it also provides pre-incident documentation that a supervisory authority can review: evidence that your organization detected the exposure and responded within a defined timeline.
For organizations subject to NIS2 that are building or reviewing their vulnerability management process, the question to ask is not just 'what is our patch cycle time?' but 'do we have real-time visibility into which of our vulnerabilities are externally reachable, and does our prioritization process reflect that context?' If the answer to the second part is no, the patch cycle time is largely irrelevant — you are optimizing a process that is using incomplete data.
Get a comprehensive threat briefing for your organization — exposures, breached credentials, and actionable recommendations.
NIS2 expands cybersecurity obligations to thousands of German companies. Here's what changes, who is affected, and how to prepare.
Most organizations don't know what attackers can see. External Attack Surface Management closes this gap — before threat actors exploit it.
Thousands of FortiGate firewalls are still running with factory default credentials. Here's why this keeps happening and what attackers do with that access.