Section 30 BSIG: 10 NIS2 Mandatory Measures for Companies Explained

Practitioner note: This article is practice-oriented compliance documentation, not legal advice. We are a compliance specialist, not a law firm. For legally binding advice, please consult a licensed attorney.

TL;DR

  • 10 mandatory measure areas under Section 30 (2) BSIG (in force since 06 December 2025)
  • Risk-based + proportionate — no rigid minimum list, but each area must be addressed
  • ISO 27001 covers 70-80% — but mapping gaps must be closed systematically
  • Most frequent audit findings 2026: supply chain, effectiveness assessment, cyber hygiene
  • Fines up to EUR 10 million / 2% of turnover — plus personal managing director liability under Section 38 (5)

1. Overview: What Section 30 BSIG Requires

Section 30 BSIG (German IT Security Act, in force since 06 December 2025 through the NIS2UmsuCG) obliges essential and important entities to implement appropriate and proportionate technical, operational, and organizational measures for managing cyber risks.

"The measures shall, taking into account the particularities of the essential or important entity, reflect the state of the art and comply with the relevant European and international standards." — Section 30 (1) sentence 2 BSIG

The regulation lists 10 measure areas that every affected entity must address — the depth of implementation scales with the risk.

If you don't want to draft the 22 templates for all 10 areas yourself, you'll find a complete measures package including ISO 27001 mapping and BSI Baseline Protection crosswalk in the NIS2 Kit.

2. Areas 1 + 2: Risk Analysis + Incidents

AreaObligationTemplates
1. Risk analysis + security conceptsMethodology (e.g. ISO 27005), risk register, risk treatment planISMS policy, risk register, RMP
2. Handling of security incidentsIncident response policy, 24h/72h/30d notification templates, playbooksIR policy, IR playbook, notification templates

Practitioner note: The 24h early warning is mandatory within 24 hours of becoming aware — not from the start of the incident. 24/7 availability must be ensured.

3. Area 3: Business Continuity

"Maintenance of operations (backup management and recovery after an emergency, crisis management)" — Section 30 (2) no. 3 BSIG.

4. Areas 4 + 5: Supply Chain + Secure Development

The most frequent audit finding in 2026 is Area 4. Mandatory contents:

Area 5: secure software development — typically OWASP-oriented + vulnerability management following the CVD process (Coordinated Vulnerability Disclosure).

5. Area 6: Effectiveness Assessment

Obligation to implement "concepts for assessing the effectiveness of the measures". In practice:

6. Area 7: Cyber Hygiene

"Concepts and procedures in the area of cyber hygiene and training in the area of cybersecurity" — Section 30 (2) no. 7 BSIG.

7. Area 8: Cryptography

ApplicationStandard
Data in transitTLS 1.3 (BSI TR-02102), HTTPS everywhere
Data at restAES-256 for storage media and backups
Email securityS/MIME or PGP for sensitive communication
Key managementHSM or equivalent Key Management System
Quantum cryptographyPost-Quantum preparation (NIST Standards 2024)

8. Areas 9 + 10: Personnel Security + Authentication

AreaObligation
9. Personnel security + access controlAuthorization concept, need-to-know, regular review, onboarding/offboarding workflow, security screening where applicable
10. MFA + secure communicationMFA for all admin and external access, secure voice/video/text communication, emergency communication

9. ISO 27001 Mapping

Section 30 AreaISO 27001 Annex AGap probability
1. Risk analysisA.5, A.8low
2. IncidentsA.16medium (NIS2 notification obligations 24/72/30 missing)
3. BCPA.17low
4. Supply chainA.15high (cybersecurity clauses often missing)
5. Secure developmentA.14low
6. EffectivenessA.18medium (KPI reporting to managing director missing)
7. Cyber hygieneA.7medium
8. CryptographyA.10low
9. Personnel securityA.7, A.9low
10. MFAA.9medium

10. Practitioner Checklist: 22 Templates for the 10 Areas

  1. ISMS policy
  2. Risk analysis methodology
  3. Risk register
  4. Risk treatment plan
  5. Incident response policy
  6. Incident playbook
  7. 24h/72h/30d notification templates (3 pieces)
  8. Business Continuity Plan
  9. Backup & recovery concept
  10. Disaster Recovery Plan
  11. Crisis management plan
  12. Supplier questionnaire
  13. Cybersecurity contract clauses
  14. Vulnerability management process
  15. Vulnerability Disclosure Policy
  16. Cyber hygiene training
  17. Phishing simulation concept
  18. Cryptography policy
  19. Authorization concept
  20. MFA policy
  21. Asset inventory
  22. Audit checklist + effectiveness measurement

Sources

As of: 02 May 2026

  1. BSIG 2025 (consolidated version) — Sections 28–60 (as of: 02 May 2026)
  2. NIS2 Implementation Act — Federal Law Gazette 2025 I No. 301 (as of: 02 May 2026; in force 06 December 2025)
  3. Directive (EU) 2022/2555 (NIS2) — Art. 21 (EUR-Lex DE) (as of: 02 May 2026)
  4. BSI — NIS2 FAQ regulated companies

Sources