Preventing cyberattacks: EU-wide standards for security
The risk of cyberattacks remains very high. Jakob Munzert provides an overview of how companies can safely and effectively counter the growing...
5 min read
Jakob Munzert : Oct 24, '25
 
              The risk of cyberattacks remains very high. Jakob Munzert provides an overview of how companies can safely and effectively counter the growing threats and new legal requirements (such as NIS2) in 2025.
According to a study by the digital trade association Bitkom, 70% of Germans consider the risk of cyberattacks to be high and believe that the country is poorly prepared. In addition, 61% fear a cyberwar, while 64% consider Germany to be inadequately equipped to deal with one. Of the 30 cybersecurity measures planned in the National Security Strategy, only two have been implemented so far. Bitkom president Dr. Ralf Wintergerst warns of a growing threat in which the boundaries between cybercrime and hybrid warfare are becoming blurred. He calls for digital security to be strengthened, especially in government agencies, critical infrastructure, and businesses. The results of the study were presented at the Munich Cyber Security Conference (MCSC) in February 2025.
The EU NIS2 Directive sets uniform minimum cybersecurity standards for operators of critical infrastructure in Europe. Its implementation into German law was slated for completion by October 2024. However, due to the early federal elections, insiders say this will likely be delayed until at least fall 2025.
Over 30,000 companies in Germany are affected, including operators of critical facilities, large and federal institutions, along with some special cases. In addition to the existing KRITIS sectors, large parts of the economy are now also included in the regulation. The directive requires companies to implement comprehensive security measures, including risk management, incident reporting, technical protective measures, and overarching cybersecurity governance. Operators of critical facilities must provide evidence of compliance with security requirements every three years, while other institutions are subject to documentation requirements and random checks by authorities. Government oversight is strengthened by expanded registration, verification, and reporting requirements, with various authorities such as the BSI, BBK, and BNetzA playing a role.
In addition, sector-specific laws such as the Telecommunications Act (TKG) and the Energy Industry Act (EnWG) will be amended to meet the requirements of the NIS2 Directive. Special regulations apply to financial companies under the Digital Operational Resilience Act (DORA). Sanction regulations will also be tightened, with fines ranging from €100,000 to €20 million, some of which will be linked to a company's global revenue.
In addition, the Supply Chain Due Diligence Act increases the pressure to ensure information security throughout the entire supply chain. Companies must not only minimize internal risks, but also adapt contractual arrangements with suppliers to ensure compliance with the new security standards. Violations can result in substantial fines and damage to their reputation. 
Reaching the goal of efficiently establishing information security within a company requires time and careful planning. The business needs not only to comply with laws and standards, but also to adapt them to its specific requirements. For security measures to be effective in the long term, they must become part of the corporate culture. Depending on the size of the company and the complexity of its IT infrastructure, it can take over a year to fully establish an information security management system (ISMS).
The most effective way to implement the requirements of the NIS2 Directive is to introduce an ISMS in accordance with ISO 27001. This internationally recognized standard provides a structured framework for the systematic protection of information.
In addition, companies should integrate components of a business continuity management system (BCMS) to ensure that operations are not impacted in the event of security incidents.
In Germany, companies also need to pay special attention to the reporting requirements of the Federal Office for Information Security (BSI). They must register there and are obliged to report relevant incidents within a specified time frame. The combination of a certified ISMS, a functioning BCMS, and compliance with legal reporting requirements enables companies to meet the requirements of the NIS2 Directive efficiently and in a legally compliant manner.
Information security plays a central role in the development of new SAP S/4HANA systems, as these often manage business-critical processes and sensitive data. Companies should implement technical security measures even before the first test migration. An important step in this process is penetration testing (colloquially known as pentesting), which identifies vulnerabilities at an early stage. These tests should be carried out not only before commissioning, but also regularly throughout the entire life cycle of the system in order to detect and remedy new threats at an early stage.
The SAP system environment must be fully integrated into the information security management system in order to meet the requirements of the NIS2 Directive. This includes a comprehensive risk assessment that analyzes threats and vulnerabilities across the entire system environment and defines countermeasures.
It is also crucial to ensure security at the application level. This is achieved through the targeted configuration of log settings in SAP S/4HANA, which enable the seamless logging of security-related events. Continuous evaluation of log data helps to detect unusual activities at an early stage and quickly resolve security incidents. This ensures comprehensive protection of SAP systems that meets both legal requirements and corporate security objectives.
Companies must view information security not only as a technical issue, but also as an integral part of their corporate culture. Establishing a robust information security management system (ISMS) is essential in order to meet increasing threats and legal requirements, such as the NIS2 Directive. This requires time and continuous adjustments, as security measures must be incorporated into all aspects of business operations.
An effective way to achieve this is to establish an ISMS in accordance with ISO 27001, supplemented by components of a business continuity management system (BCMS) and the regular performance of penetration tests. Companies should integrate their SAP system landscape into the ISMS and conduct a comprehensive risk assessment to identify security gaps at an early stage. It is also crucial to strengthen security at the application level, for example by correctly configuring log data and evaluating it regularly.
By establishing information security as a long-term priority and systematically implementing security standards, companies can not only meet legal requirements but also protect themselves against growing digital threats.
Suitable for: Companies that want an initial security assessment of their SAP applications.
Detailed review of critical SAP components
Identification of vulnerabilities at the application and database level
Protection of sensitive and critical data
Suitable for: Companies with more complex SAP environments that require testing beyond the application level.
Holistic security assessment of the SAP system
Analysis of vulnerabilities at all relevant levels
Comprehensive protection through in-depth testing of infrastructure and applications
Suitable for: companies with high security requirements that want to achieve complete protection for their SAP environment.
| Service | Days | 
| SAP pentesting for one SAP system (SID) – Package S (each additional system 3 PT) | 4 | 
| SAP pentesting for one SAP system (SID) – Package M (each additional system + database 5 PT) | 6 | 
| SAP pentesting for one SAP system (SID) – Package L (The number given is a guideline and may vary depending on the number of servers) | 10 | 
 
                  
                
                The risk of cyberattacks remains very high. Jakob Munzert provides an overview of how companies can safely and effectively counter the growing...
 
                  
                
                In complex migration projects, clean master data is one of the keys to success. Thorough duplicate cleansing lays the foundation for all further...
 
                  
                
                Right now, migrating to SAP S/4HANA is one of the primary drivers behind transformation initiatives. In the automotive industry, companies pursue...