nexalign
← Alle Insights
Regulatorik·8 min read

NIS2 German transposition in 2026: what to do while the law is delayed

The EU NIS2 deadline was October 2024. Germany missed it. Mid-2026 the NIS2-Umsetzungs- und Cybersicherheitsstärkungsgesetz (NIS2UmsuCG) is still not in force. Companies are torn between waiting and pushing ahead. Both strategies carry risk. Here is a clear status update and five steps that cannot wait, no matter when the German law actually applies.

Where the German law stands in mid-2026

The NIS2UmsuCG has been delayed repeatedly through Bundeskabinett and Bundestag. As of 2026 the entry into force is expected within the next months, with a short vacatio legis and no major grace period.

The European Commission opened an infringement procedure in June 2024 against several member states including Germany, which adds political pressure to pass the law promptly.

Until entry into force, the existing BSI-Gesetz with KritisV applies. NIS2 duties are not directly enforceable yet, but they are de facto already pushed through customer contract clauses and insurance terms.

Why waiting is dangerous

First: a credible NIS2 compliance programme realistically takes 9 to 18 months. Starting at entry into force means being 1 to 2 years late.

Second: contract clauses already cascade down. Essential entities are pushing NIS2-aligned requirements into new supplier contracts. Without preparation, suppliers lose business.

Third: cyber insurance increasingly couples premium and deductible to NIS2 maturity. Without a documented maturity level you pay more or get no policy.

Fourth: under Art. 20 NIS2 management bodies are personally accountable. Endorsing a late implementation can trigger personal liability after entry into force.

Five steps that cannot wait

1. Document an applicability assessment. Am I an essential or important entity, am I a supplier to one, do I fall under thresholds. This assessment must be written down with reasoning and date.

2. Run a gap assessment against Art. 21. The ten minimum measures are clear. A structured delta against ISO 27001 and existing practice gives you the roadmap.

3. Get a management body resolution on the cyber risk strategy. Art. 20 explicitly requires the management body to approve and oversee. A minuted resolution is mandatory documentation.

4. Run structured decisions on the most expensive measures: EDR/XDR, IAM with MFA, SIEM/SOC, backup with immutability. Each of these decisions should be documented as an auditable decision memo, not an Excel spreadsheet.

5. Test reporting paths technically and organisationally. 24 h early warning, 72 h incident notification, 1 month final report. A reporting chain that has never been drilled fails on the first real incident.

Where DecisionOS fits in

DecisionOS produces the structured decision memos for step 4. Each memo maps directly to Art. 21 minimum measures, documents stakeholder alignment across CIO / CISO / management body, exposes dealbreakers (EU hosting, mandatory clauses, exit strategy) and computes a Readiness Score that signals audit readiness. The NIS2 obligation programme turns into one consolidated audit dossier instead of many disconnected artefacts.