2025年10月14日
The massive data theft at IT security provider SonicWall shows how vulnerable even companies that specialise in cybersecurity are.
This case is ideal for companies to use this security incident in the supply chain as an opportunity to analyse their own situation: Where are there still critical gaps in my company? As a manager, have I done everything necessary to avoid the new personal liability under the NIS 2 Directive?
SonicWall manufactures firewalls - digital protection walls for corporate networks. In October 2025 it became known: Cybercriminals stole all cloud-stored security settings from SonicWall customers. This data on settings is like a blueprint of a company's entire IT security - it shows attackers exactly where they can attack. An extreme risk for all affected organisations.
This incident shows that a problem at a service provider can quickly become a security incident at a service provider's customers and thus potentially a liability case for the customer's management. This is because the new NIS 2 directive makes cyber security a matter for the boss - with personal liability for the management.
We analyse the case in three phases: What should have been done BEFORE, DURING and AFTER the incident?
The NIS 2 Directive is a new EU cybersecurity law designed to better protect critical industries. In Germany, the implementation law is currently being prepared and is expected to apply from the end of 2025/beginning of 2026. At the core of the implementation law is the draft German IT-Security Act, called BSIG-E.
The key point: Section 38 BSIG-E makes the management personally responsible. It must not only authorise cybersecurity measures, but also actively monitor and control them. Cybersecurity thus becomes a matter for the boss and therefore cannot be fully delegated to the IT department.
What does this mean in concrete terms? We use the SonicWall case to show where liability risks can arise for affected management:
The management is personally responsible for ensuring that risk management measures are implemented and monitored (Section 38 (1) BSIG-E). The fact that sensitive firewall configuration data was entrusted to an external cloud service provider indicates a primary breach of the obligation to ensure the security of the supply chain (Section 30 para. 2 no. 4 BSIG-E).
Required behaviour would have been:
The management's monitoring obligation is an active control obligation. The breach of the training and monitoring obligations (Section 38 BSIG-E) becomes tangible here. The required behaviour would have been
The theft of the firewall configuration data fulfils the criteria of a significant security incident. The management is responsible for the correct handling - and may be liable for failures.
The SonicWall case makes the abstract NIS2 obligations tangible. The key question for every member of the management team (and also managers working on the case): How do I demonstrably fulfil my cybersecurity responsibilities?
The time until the NIS2 Implementation Act comes into force is not a break (as the obligations already apply in principle anyway), but your opportunity to prepare. Make the most of it: Build robust cyber governance, re-evaluate critical (IT) service providers and develop the necessary expertise to actively manage cyber risks.
作者