Securing the NIS2 Supply Chain: Section 30(2) No. 4 BSIG in Practice

Practitioner note: This article is practice-oriented compliance documentation, not legal advice. We are compliance specialists, not a law firm. For legally binding advice, please consult a licensed attorney.

TL;DR

  • Section 30(2) No. 4 BSIG: obligation for supply chain security in force since 06 December 2025
  • 8-step audit: Inventory → Criticality → Self-assessment → Audit → Contract → Monitoring → Incident plan → Re-evaluation
  • 6 mandatory contract clauses in every DPA
  • Critical suppliers: annually, and immediately upon incident
  • Fine risk: EUR 10 million / 2% of global turnover + Section 38 managing director liability

1. Why supply chain is a NIS2 focus area

NIS2 responds to reality: in 2024, 42% of all serious cyber incidents originated from supply chain attacks (ENISA Threat Landscape 2025). Examples:

Consequence: NIS2 makes supply chain security an explicit obligation.

2. Section 30(2) No. 4 BSIG (NIS2UmsuCG)

"Measures for the security of the supply chain including security-related aspects of the relationships between the individual entities and their direct providers or service providers" — Section 30(2) No. 4 BSIG

Specified by BSI Guideline 03/2026 + ENISA Supply Chain Guidelines 2024.

3. 8-step supplier audit

StepActivityOutput
1. InventoryCapture all external service providersSupplier list
2. Criticality assessmentScore risk of outage/compromiseTop-20 critical list
3. Self-assessmentSend security questionnaire (40 questions)Response sheet
4. AuditFor top 20: on-site audit or ISO 27001 certificateAudit report
5. Contract clausesEmbed 6 mandatory clauses in the DPAUpdated DPA
6. MonitoringQuarterly incident reports from the supplierReports stored in DMS
7. Incident planEscalation workflow for supplier incidentEmergency plan
8. Re-evaluationAnnual reassessmentUpdated score
Supplier questionnaire + DPA model clauses + audit checklist in the NIS2 Kit.

4. 6 mandatory contract clauses

  1. Security standards: ISO 27001 or NIST CSF or equivalent — in writing
  2. Incident notification: within 24 hours of becoming aware
  3. Right to audit: annual right-to-audit, where applicable through an independent third party
  4. Sub-suppliers: list provided in advance + approval of new sub-suppliers
  5. Continuity plan: BCM/DR documentation available, RTO/RPO defined
  6. Termination: data return + secure deletion documented

5. Prioritising critical suppliers

Criticality matrix (simplified):

SupplierBusiness impact of outageData sensitivityScore
IT hosting (AWS/Azure)critical (all systems)high (all data)9/10
ERP SaaS (SAP, MS Dyn.)criticalhigh (financial)9/10
Email service (M365)criticalmedium-high8/10
HR SaaS (Workday)highhigh (especially sensitive)8/10
Marketing CRM (HubSpot)mediummedium5/10
Print shop (advertising material)lowlow2/10

6. Practical examples 2025

Sources

As of: 02 May 2026

Sources