Entrepreneurship

Kontron AIS: NIS-2 implementation law passed – What you need to know now as a machine manufacturer and factory operator

December 6, 2025. Germany continues to be under high cyber pressure. The latest situation report¹ from the German Federal Office for Information Security (BSI) describes a situation in which attack surfaces are growing and professional groups of criminals are specifically exploiting vulnerabilities. The decision by the German Bundestag on 13 November 2025 to implement the EU NIS-2 Directive has been passed and fundamentally modernizes national IT security law. It was promulgated in the Federal Law Gazette² on December 5, 2025, so the law has been in force since December 6, 2025. In practice, this means that responsibilities, processes and evidence should now be documented in an orderly and reliable manner.

Share this Post
Photo: Kontron AIS

Contact info

Silicon Saxony

Marketing, Kommunikation und Öffentlichkeitsarbeit

Manfred-von-Ardenne-Ring 20 F

Telefon: +49 351 8925 886

Fax: +49 351 8925 889

redaktion@silicon-saxony.de

Contact person:

Decision and starting signal: What NIS-2 means for machine manufacturers and factory operators

The core of the reform is a clear distribution of roles. The Federal Office for Information Security is responsible for supervising the companies that fall under NIS-2. In the federal administration, it coordinates cyber security as the Federal CISO. This is the federal government’s central office for information security: it defines requirements, bundles responsibilities and monitors implementation. This means that specifications, advice and monitoring come from a single source. For machine builders and factory operators, this means a clear point of contact who explains requirements, supports implementation and checks compliance.

Which machine builders and factory operators are affected by NIS-2?

In addition to traditional infrastructures, NIS-2 also covers parts of industrial manufacturing, including computers and electronics, electrical engineering, machinery and equipment, motor vehicles and other means of transportation. As a rule, the obligations apply from 50 employees; turnover and balance sheet total also play a role. In particularly sensitive areas, the requirements apply regardless of size. The group of addressees in Germany is thus growing from around 4,500 to around 30,000 companies and organizations, including many medium-sized machinery and plant manufacturers that were not previously covered by critical infrastructures (KRITIS) but which carry important parts of supply chains.

If your company falls under NIS-2, you must register within three months of being affected. The joint registration office of the BSI and the Federal Office of Civil Protection and Disaster Assistance (BBK) is responsible for this. The BBK contributes its role in civil protection and crisis management. Together with the BSI, it operates the central point of contact for registration and reporting. Company master data, contact persons and the internal reporting channel should be available for registration so that the process runs smoothly.

What will change in practice for machine manufacturers and factory operators?

The law raises the security level to a binding, verifiable basis. It requires effective risk management, clear processes for closing vulnerabilities and patching, practised emergency and restart plans, continuous logging and monitoring, strong access security with multi-factor login and rules for cooperation with suppliers and service providers. These minimum measures have been specifically adopted from the EU directive into German law. In practice, this means for machines and systems: control systems and gateways need a plannable update path, distributed device fleets require documented approval and rollback, remote access must be managed restrictively and the supply chain requires reliable evidence of the components used. Management is responsible for this and must document decisions and training in a comprehensible manner.

What to do in the event of a security incident

In the event of a significant security incident, a three-stage procedure applies: Initial report within 24 hours, supplement after 72 hours, final report after one month. The report is sent to the joint office of the BSI and BBK; additional interim reports may be necessary on request. In order to meet the deadlines reliably, a practiced process is required between production, IT, information security and communication – with clear roles, deputies, contact persons who can be reached and prepared text modules. Evidence such as logs, timelines, affected systems, measures taken and an initial assessment of the impact should be collected right from the start.

Violations can be expensive: For particularly important facilities, the threat is up to 10 million euros or up to 2 percent of annual global turnover, for important facilities up to 7 million euros or up to 1.4 percent. The specific amount depends on the individual case and the severity of the breach. Good preparation reduces the risk of failures and fines.

– – – – – –

Further links

👉 https://kontron-ais.com    

Photo: Kontron AIS

You may be interested in the following

Contact info

Silicon Saxony

Marketing, Kommunikation und Öffentlichkeitsarbeit

Manfred-von-Ardenne-Ring 20 F

Telefon: +49 351 8925 886

Fax: +49 351 8925 889

redaktion@silicon-saxony.de

Contact person: