NIS2 → BSI IT-Grundschutz Mapping

Cross-reference mapping between NIS2 Directive requirements and BSI IT-Grundschutz building blocks.

This page maps NIS2 Directive (EU 2022/2555) requirements to BSI IT-Grundschutz building blocks. NIS2 establishes cybersecurity risk-management measures and reporting obligations for essential and important entities across the EU.

Art. 20(1) Governance — management body approval and oversight
Art. 21(2)(e) Security in network and information systems acquisition, development and maintenance
APP.1.1 APP.1.1 Office Products APP.1.2 APP.1.2 Web Browsers APP.1.4 APP.1.4 Mobile Applications (Apps) APP.3.1 APP.3.1 Web Applications and Web Services APP.3.2 APP.3.2 Web Servers APP.3.3 APP.3.3 File Servers APP.3.6 APP.3.6 DNS Server APP.4.2 APP.4.2 SAP ERP System APP.4.3 APP.4.3 Relational Databases APP.4.4 APP.4.4 Kubernetes APP.4.6 APP.4.6 SAP ABAP Programming APP.5.2 APP.5.2 Microsoft Exchange and Outlook APP.5.3 APP.5.3 General Email Client and Server APP.5.4 APP.5.4 Unified Communications and Collaboration (UCC) APP.6 APP.6 General Software APP.7 APP.7 Development of Custom Software CON.8 CON.8 Software Development IND.2.1 IND.2.1 General ICS Component IND.2.2 IND.2.2 Programmable Logic Controller (PLC) IND.2.3 IND.2.3 Sensors and Actuators IND.2.4 IND.2.4 Machine IND.2.7 IND.2.7 Safety Instrumented Systems NET.1.1 NET.1.1 Network Architecture and Design NET.1.2 NET.1.2 Network Management NET.2.1 NET.2.1 WLAN Operation NET.3.1 NET.3.1 Routers and Switches NET.3.2 NET.3.2 Firewall NET.4.1 NET.4.1 PBX Systems NET.4.2 NET.4.2 VoIP OPS.1.1.2 OPS.1.1.2 Proper IT Administration OPS.1.1.4 OPS.1.1.4 Protection Against Malware OPS.1.2.6 OPS.1.2.6 NTP Time Synchronization SYS.1.1 SYS.1.1 General Server SYS.1.2.2 SYS.1.2.2 Windows Server 2012 SYS.1.2.3 SYS.1.2.3 Windows Server SYS.1.3 SYS.1.3 Servers Running Linux and Unix SYS.1.5 SYS.1.5 Virtualization SYS.1.6 SYS.1.6 Containerization SYS.1.7 SYS.1.7 IBM Z SYS.1.9 SYS.1.9 Terminal Server SYS.2.1 SYS.2.1 General Client SYS.2.2.3 SYS.2.2.3 Clients Running Windows SYS.2.3 SYS.2.3 Clients Running Linux and Unix SYS.2.4 SYS.2.4 Clients Running macOS SYS.2.5 SYS.2.5 Client Virtualization SYS.2.6 SYS.2.6 Virtual Desktop Infrastructure SYS.3.1 SYS.3.1 Laptops SYS.3.2.1 SYS.3.2.1 General Smartphones and Tablets SYS.3.2.2 SYS.3.2.2 Mobile Device Management (MDM) SYS.3.2.3 SYS.3.2.3 iOS (for Enterprise) SYS.3.2.4 SYS.3.2.4 Android SYS.3.3 SYS.3.3 Mobile Phone SYS.4.1 SYS.4.1 Printers, Copiers, and Multifunction Devices SYS.4.3 SYS.4.3 Embedded Systems SYS.4.4 SYS.4.4 General IoT Device SYS.4.5 SYS.4.5 Removable Storage Media
Art. 21(2)(g) Basic cyber hygiene practices and cybersecurity training
Art. 23(1) Reporting obligations — significant incident notification

These mappings are provided for reference and do not replace a professional compliance assessment.