Implementing NIS2: Gap Analysis and Prioritized Actions Before Year-End

6. November 2025
Image symbolizing what will have changed in 2025 as a result of NIS2

Current Status 2025 – What Companies Have Already Achieved

Although national implementation of the NIS2 Directive is still underway, many companies are already acting in accordance with the new requirements. Responsibilities and reporting channels have been defined, risk analyses are established, and SOC structures have been expanded. The development of operational control mechanisms for incident response and cyber risk management is visibly progressing.

According to Bitkom (CISO Report 2025), 64% of affected companies have implemented formal cyber risk management, and over 70% have defined incident response processes. Progress is evident, yet operational practices reveal significant differences in depth, integration level, and system coverage.

NIS2 Compliance Reality Check: Technical Deficiencies and Operational Gaps

Despite these advances, critical implementation gaps remain. Audits and technical assessments show that many companies fulfill key requirements only partially or in a purely formal manner:

  • SIEM infrastructures exist but are not fully integrated. OT assets and external service providers are often not actively monitored.
  • Identity & Access Management (IAM) is frequently incomplete – privileged access often lacks MFA, and shadow IT bypasses central controls.
  • Patch management and vulnerability scanning are still mostly manual or infrequent – especially concerning third-party applications or IoT components.
  • Supply chain security is addressed organizationally but lacks technical enforcement via monitoring, certification, or penetration testing.
  • Business continuity plans exist, but failover tests and recovery time objectives (RTO/RPO) are rarely validated in practice.

Final Sprint for NIS2: Prioritized Actions by Year-End

In the remaining months, the focus is on controllable, auditable mechanisms:

  1. Network segmentation and fine-grained access policies
    Zero Trust principles, microsegmentation, and software-defined network zones reduce lateral movement. Remote access, especially in OT environments, should be secured via ZTNA.
  2. Automated vulnerability and patch management
    Regular scans, risk-based prioritization, automated rollouts, and asset categorization by criticality enhance surface protection and audit readiness.
  3. MFA and privileged access security
    Privileged accounts need consistent MFA policies, session monitoring, and just-in-time access. OT environments must receive the same level of protection.
  4. Technical supply chain security
    SBOM-based transparency, API gateway policies, dependency scanning, and Zero Trust access for vendors ensure practical control of third-party risks.
  5. Operationalizing incident response
    SOAR-driven playbooks, red team simulations, recovery drills, and KPIs (MTTD/MTTR) boost responsiveness and audit validity.

The focus is clearly shifting toward reproducible technical control mechanisms.

NIS2 in Critical Sectors: Architecture Patterns That Work

Cross-sector patterns show that technical consistency and traceability define maturity levels. Implementation examples from critical sectors highlight proven architectural strategies. The key takeaway: security controls must be technically embedded, not just added as a compliance afterthought.

  • Finance & Tax:
    Identity-first controls, consolidated SIEM pipelines across core banking and cloud workloads, privileged session monitoring, and automated response processes with defined MTTD/MTTR targets.
  • Energy & Utilities:
    OT telemetry integrated into SOC, SCADA segmentation, ZTNA for remote access, and compensating controls for unpatchable components. Failover testing ensures service continuity.
  • Healthcare & Life Sciences:
    Full asset visibility in clinical networks, hardened medical devices, controlled identity chains for patient data, and validated recovery processes in hybrid models.
  • Manufacturing:
    IIoT integrated into vulnerability management, segregated production networks, automated anomaly detection, and predefined containment paths to avoid downtime.

Across sectors, NIS2 succeeds when security logic is integrated into infrastructure and operational processes.

Technical Architecture for NIS2: Modularity, Automation, Control

A stable, modular IT architecture is essential for implementing NIS2 effectively. Companies that rely on API-first strategies, containerization, and composable architectures can integrate security controls flexibly, rapidly, and without legacy constraints.

Automation is also becoming increasingly important. RPA-based incident detection, automated ticketing systems, and AI-driven anomaly detection not only enhance efficiency but also ensure auditability – a key requirement for reporting obligations.

Operationalizing NIS2: Embedding Security into IT Operations

In the months ahead, the focus will shift from initial implementation to stable operational routines. However, viewing NIS2 as a one-time obligation is short-sighted – the goal is permanent technical integration into day-to-day operations.
CONVOTIS helps companies embed security mechanisms structurally into their architecture, deployment, and monitoring – so that compliance is not just met, but truly lived.

Implement NIS2 – Technically, Now.
Close Critical Security Gaps.

NIS2 requires verifiable security controls. We support you with gap analysis, architectural decisions, and the operational rollout of automated control paths – from identity chains to incident response. Start planning your actions now – before audit deadlines approach and operational risks increase.

Get in Touch

Find your solution

To top