2026年1月30日
Veröffentlichungsserie – 3 / 12 观点
Many companies in the automotive sector are currently reviewing the applicability and implementation of the NIS 2 requirements, which are gradually being incorporated into the respective implementation laws of the EU member states.
The NIS 2 Directive was adopted on December 14, 2022, entered into force in January 2023, and should be transposed into national law by EU member states by October 2024. It will then apply to numerous companies and organizations that provide critical or important services in the EU.
NIS 2 aims to ensure that companies and public authorities in the EU are better protected against cyberattacks and other security risks by introducing common, binding standards for cybersecurity, risk management, and incident reporting, and by monitoring compliance with these standards.
In Germany, the NIS 2 Implementation Act has been in force since December 6, 2025, with no general transition period.
This means that plans are now becoming concrete obligations. For many companies, this currently means assessing their exposure, conducting initial gap analyses, and holding workshops with IT/OT and purchasing departments.
This also includes the registration and reporting obligation, which must be carried out – for Germany - via the regulator (BSI) portal, which has been activated since January 6, 2026. The portal is the "one-stop shop" for communication with the regulator, and registration is a two-step process.1
The impact on companies in the automotive industry is considerable in some cases. We are taking this opportunity to take a look at NIS-2 and its significance for the industry in the following FAQ.
NIS-2 and the corresponding implementing laws regulate the manufacture of motor vehicles and motor vehicle parts as a critical activity that may be subject to the requirements of NIS-2 (see Annex II).
The wording already makes it clear that this is not purely an "OEM regulation," but rather an ecosystem-wide regulation for a large number of companies if they meet additional criteria.
The NIS-2 implementation in Germany distinguishes between "important" and "particularly important" entities, typically based on sector + size/threshold values. It generally applies to entities of the type specified in Annex I (particularly important) or Annex II (important) that are classified as at least medium-sized enterprises. "Medium-sized" are companies with at least ten employees or an annual turnover ≥ €10 million or an annual balance sheet total ≥ €10 million. On the other hand, only those companies with ≥ 250 employees or an annual turnover > €50 million or an annual balance sheet total > €43 million can fall into the "particularly important" category. At the same time, smaller companies can also be included in certain cases if they operate in certain critical business areas.
The classification includes, among others, the "manufacturing/production of goods" sector and explicitly companies that carry out activities listed in NACE Rev. 2, Section C, Division 29 – i.e., the core of motor vehicles and motor vehicle parts.
"Typical candidates" (depending on size/classification) include, for example:
Even if a company in the automotive industry is not directly classified as a NIS 2 facility, the requirements are often indirectly passed on in the supply chain (e.g., security requirements, evidence, audit rights) because "supply chain security" is explicitly part of the framework of obligations. For suppliers, this often has a comparable effect to being directly regulated themselves.
Until now, many automotive companies have essentially organized cybersecurity through industry standards and corresponding audits (e.g., ISMS/TISAX). NIS-2 shifts the picture to one where more companies are directly addressed by statutory law and must implement verifiable minimum measures by law – not only by industry standard commitment:
According to NIS-2 RL, manufacturing, development, and the supply chain must be demonstrably cyber-resilient, with clear roles, deadlines, and documentation—immediately, in the absence of transition periods.
The core elements are registration, reporting processes, risk management measures, and documentation.
For affected companies, registration is not "nice to have," but a prerequisite for authorities/CSIRTs to be able to communicate clearly in an emergency. The regulator portal is the central point of entry for this.
Security is a board issue because it directly affects production downtime, delivery capability, and product/backend risks.
NIS 2 requires appropriate, proportionate technical/operational/organizational measures and specifies at least the following components:
The directive sets a timetable for reporting "significant security incidents":
For the automotive industry, this is primarily a process issue: Who decides what is "significant," who provides the facts (IT/OT/engineering/legal/communications), and how can reliable information be gathered within 24–72 hours?
Companies are now required to define responsibilities and processes for this in a timely manner in order to be able to fulfill their respective obligations. This requires close integration with existing processes (including data protection incident management).
Depending on the classification, the BSI can order audits/inspections/certifications with varying degrees of "severity" for (particularly) important entities and request evidence/documentation of implementation (e.g., audit reports, documented concepts).
The new BSIG (German NIS-2 implementation law) allows for a statutory order to be issued stipulating that certain ICT products/services/processes may only be used if they are certified in accordance with EU cybersecurity certification schemes (Section 30 (6) BSIG, new version, in conjunction with Section 56 BSIG, new version).
NIS 2 provides that Member States may require certified ICT products/services/processes to meet certain requirements, and the Commission may adopt delegated acts for this purpose if necessary (Art. 24 NIS 2).
NIS 2 provides for maximum amounts for fines across the EU of EUR 10 million or 2% of turnover (essential facilities) or EUR 7 million or 1.4% of turnover (important facilities), whichever is higher.
✔️ Verify impact
Which companies/locations are in scope of NIS-2? What is the NACE classification? Which services are covered? What dependencies exist? (NIS 2 scope is linked to Annex I/II and company size.)
✔️ Ensure registration is organized
Plan a two-stage registration process (MUK and BSI portal), define roles (owner, deputy), make contact points/availability "incident-ready."
✔️ Update incident runbook with regard to deadlines
Set up or update incident runbook with regard to the definition of criteria such as "significant," define and describe reporting workflow, design fact pack template, determine approvals (legal/management), define communication paths so that the tight deadlines (24 hours, 72 hours, 1 month) can be met.
✔️ Anchor risk measures as a checklist in IT/OT/engineering
There is no need to reinvent the wheel here: use existing ISMS building blocks, but close gaps in the supply chain, toolchain, OT recovery, and MFA/communication.
✔️ Operationalize the supply chain
Identify top-risk suppliers (including cloud/managed services), define minimum controls, evidence, audit/assessment cycle, escalation, and exit plan.
✔️ Management enablement
Board briefing, responsibilities, training requirements, regular review cycle, because governance is explicitly required.
1 See the BSI press release
作者 Thomas Kahl 以及 Teresa Kirschner, LL.M. (Information and Media Law)
作者 Thomas Kahl 以及 Teresa Kirschner, LL.M. (Information and Media Law)