KRITIS and NIS-2 – Compliance and security for critical infrastructures
The EU NIS 2 Directive imposes new, binding requirements on operators of critical infrastructure (KRITIS) and “particularly important” and “important” facilities in a total of 18 sectors with high or other criticality. The aim is to effectively increase the cybersecurity of network and information systems, thereby ensuring the resilience of critical systems in the energy, health, finance, transport, and digital services sectors.
Companies covered by NIS-2 must implement comprehensive security measures, report security incidents, and establish comprehensive risk management.
ASTRUM-IT falls into the category of “medium-sized companies” with more than 50 employees and a turnover of more than EUR 10 million.
Important companies according to Section 28 II of the NIS-2 Implementation Act.
How ASTRUM IT prepares companies for NIS-2 and KRITIS
Which companies are specifically affected by NIS-2 and KRITIS?
The EU’s NIS-2 Directive applies in Germany to numerous companies in essential and critical sectors such as energy, water, health, finance, transport, and digital infrastructure. This affects both large and small and medium-sized enterprises that perform important social functions. They are obliged to implement high IT security standards, report security incidents, and introduce comprehensive cyber risk management. The directive thus strengthens the cyber resilience and security of supply of critical systems in Germany.

TÜV-certified applicability and ISO 27001 certification from ASTRUM IT
As a certified IT service provider, ASTRUM IT has TÜV-certified ISO 27001 certification, which confirms our high standards in information security.
As an important company under §28 (2), we are not only obligated to the legislator; our 27001 certification means that compliance with the requirements of NIS-2 is regularly checked by independent bodies.
Customers can rest assured that IT services at ASTRUM IT are operated securely and in compliance with the law.
Our TÜV-certified expertise makes ASTRUM IT a trustworthy partner for implementing cybersecurity and compliance requirements for KRITIS.
ASTRUM IT – Your experienced partner for NIS-2
With comprehensive expertise and state-of-the-art security solutions, ASTRUM IT supports companies in IT security compliance in accordance with NIS-2. Our range of services includes:
- Comprehensive cyber risk management and continuous security assessments
- Implementation of secure network and information systems
- Support with reporting obligations and incident response processes
- Consulting on supply chain security and compliance requirements
- Ongoing optimization and monitoring of IT security measures
- Successfully meet NIS-2 requirements – with ASTRUM IT at your side
The requirements of NIS-2 are demanding and legally binding. ASTRUM IT helps companies to effectively establish all processes and technical protective measures in order to minimize security incidents, ensure compliance, and secure the long-term availability of critical IT services.

“The requirements of the NIS 2 Directive are complex and legally binding. At ASTRUM IT, we support companies with our TÜV-certified ISO 27001 certification in implementing all necessary security measures and introducing comprehensive cyber risk management. In this way, we work together to strengthen the resilience of critical infrastructures and ensure sustainable IT security that complies with legal requirements.”
Gerhard Pölz, CEO ASTRUM IT GmbH
FAQs on KRITIS and NIS-2 compliance for critical infrastructures
Put your trust in ASTRUM IT, the IT service provider for KRITIS and NIS-2
With our TÜV-certified ISO 27001 certification and many years of experience, we are a reliable partner for IT security and compliance. Let us work together to take your security strategy to the next level and implement the NIS-2 requirements in a legally compliant manner.

Contact us now and ensure NIS 2 compliance!
Contact ASTRUM IT for individual advice on implementing the NIS 2 Directive and KRITIS compliance. Find out how you can strengthen your IT security in the long term.

