{"id":89481,"date":"2026-05-15T11:52:26","date_gmt":"2026-05-15T10:52:26","guid":{"rendered":"https:\/\/www.wallix.com\/expert-interview-nis2-and-the-new-accountability-model-for-access-governance\/"},"modified":"2026-05-15T12:36:55","modified_gmt":"2026-05-15T11:36:55","slug":"experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/","title":{"rendered":"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance"},"content":{"rendered":"<div class='flex_column_table av-m4gycypq-fb9e468fe802133cd1178d4038e45437 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gycypq-fb9e468fe802133cd1178d4038e45437\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\npadding:0 0 0 0;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4gycypq-fb9e468fe802133cd1178d4038e45437 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd\">\n#top .av_textblock_section.av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd .avia_textblock{\nfont-size:34px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h1>EXPERTENINTERVIEW:<br \/>\nNIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance<\/h1>\n<h3>Von Guido Kraft<\/h3>\n<\/div><\/section><br \/>\n<div  class='av-post-metadata-container av-m9v5qd0r-27e2cf9a87be30e7bcab67594aaa1f78 av-metadata-container-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\"> von<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/de\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-published\"><span class=\"av-metadata-before av-metadata-before-published\">am<\/span><span class=\"av-post-metadata-published-date\" >15. Mai 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-metadata-before av-metadata-before-modified\">- Zuletzt aktualisiert am<\/span><span class=\"av-post-metadata-modified-date\" >15. Mai 2026<\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-p98hjw-c6c0f0438e7e475afac12af8cb336432 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gydqi6-87119aa0fcb443d60d83631d39900441\">\n#top .av_textblock_section.av-m4gydqi6-87119aa0fcb443d60d83631d39900441 .avia_textblock{\nfont-size:15px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gydqi6-87119aa0fcb443d60d83631d39900441 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p><b>Wie ver\u00e4ndert NIS2 die Beziehung zwischen CISO, Gesch\u00e4ftsleitung und Vorstand?<\/b><\/p>\n<p>Mit NIS2 ist Cybersicherheit nicht l\u00e4nger nur ein IT-Thema, sondern wird zu einem echten Gesch\u00e4ftsrisiko. Die Gesch\u00e4ftsleitung und der Vorstand tragen nun direkte Verantwortung f\u00fcr die Cybersicherheitsma\u00dfnahmen und die Resilienz der Organisation.Dadurch ver\u00e4ndert sich auch die Rolle des CISO: Er wird zur Schnittstelle zwischen technischen Teams und strategischer Unternehmensf\u00fchrung. Gleichzeitig muss der Vorstand eine aktivere Aufsicht \u00fcbernehmen, Cyberrisiken verstehen und die richtigen Fragen stellen.<\/p>\n<p><b>Warum gewinnt die Zugriffs-<\/b><b>Governance<\/b><b> mit NIS2 zunehmend an Bedeutung?<\/b><\/p>\n<p>Nahezu alles in IT- und OT-Umgebungen basiert auf Zugriffen. Risiken entstehen immer dann, wenn Benutzer mehr Rechte besitzen als erforderlich oder Berechtigungen nicht mit den tats\u00e4chlichen Verantwortlichkeiten \u00fcbereinstimmen.<\/p>\n<p>Die Zugriffs-Governance definiert, wer auf welche Ressourcen zugreifen darf, unter welchen Bedingungen und mit welchem Verantwortungsniveau. Deshalb sollten Unternehmen sie als strategische Sicherheitsebene betrachten, die sowohl die Sicherheit als auch die Compliance st\u00e4rkt.<\/p>\n<p><b>Welche Hindernisse erschweren \u00f6ffentlichen Organisationen die Einf\u00fchrung einer st\u00e4rkeren Zugriffs-<\/b><b>Governance<\/b><b>?<\/b><\/p>\n<p>Die gr\u00f6\u00dften Herausforderungen sind Legacy-Systeme, fragmentierte IT-Landschaften und begrenzte Budgets. Viele \u00e4ltere Anwendungen unterst\u00fctzen keine modernen Zugriffsmodelle, wodurch gemeinsam genutzte Konten und \u00fcberm\u00e4\u00dfige Berechtigungen bestehen bleiben. Dennoch lassen sich Sicherheitskontrollen durch Privileged Access Management, starke Authentifizierung und nachvollziehbare Zugriffe deutlich verbessern.<\/p>\n<p><b>Wie sollten Unternehmen unter NIS2 Pr\u00e4vention und <\/b><b>Incident<\/b><b> Investigation ausbalancieren?<\/b><\/p>\n<p>Pr\u00e4vention und Untersuchung sind gleicherma\u00dfen wichtig. Unternehmen brauchen Sicherheitsma\u00dfnahmen, die Risiken reduzieren und gleichzeitig Transparenz sowie Nachvollziehbarkeit im Ernstfall gew\u00e4hrleisten. Security-Teams m\u00fcssen jederzeit nachvollziehen k\u00f6nnen, wer worauf zugegriffen hat und welche Aktionen durchgef\u00fchrt wurden.<\/p>\n<p><b>Warum sind gemeinsam genutzte Administratorkonten noch immer so verbreitet?<\/b><\/p>\n<p>Gemeinsam genutzte Konten entstehen oft durch Legacy-Systeme und operative Anforderungen. Wo m\u00f6glich, sollten Unternehmen auf individuelle Benutzerkonten umstellen. Andernfalls m\u00fcssen privilegierte Zugriffe kontrolliert werden, um Transparenz und Sicherheit zu gew\u00e4hrleisten.<\/p>\n<p><b>Wie sollte ein effektives Drittanbieterzugriffs-Management unter NIS2 aussehen?<\/b><\/p>\n<p>Der Zugriff externer Dienstleister sollte genauso streng verwaltet werden wie interne privilegierte Zugriffe. Wichtig sind zeitlich begrenzte Berechtigungen, kontinuierliche \u00dcberwachung und vollst\u00e4ndige Nachvollziehbarkeit. Unternehmen sollten un\u00fcberwachte externe Zugriffe und dauerhafte Berechtigungen vermeiden.<\/p>\n<p><b>Sollten Unternehmen NIS2 prim\u00e4r aus Compliance- oder <\/b><b>Resilienzsicht<\/b><b> angehen?<\/b><\/p>\n<p>Der beste Ansatz besteht darin, NIS2 als Chance zur St\u00e4rkung der operativen Resilienz zu betrachten \u2013 nicht nur als Compliance-Anforderung.<\/p>\n<p>Wenn Unternehmen ihre Transparenz, ihre Zugriffs-Governance und ihre operative Disziplin verbessern, wird Compliance zu einer nat\u00fcrlichen Folge besserer Sicherheitskontrollen.<\/p>\n<p><b>Worauf k\u00f6nnte sich die n\u00e4chste gro\u00dfe europ\u00e4ische Cybersicherheitsregulierung konzentrieren?<\/b><\/p>\n<p>Voraussichtlich wird der n\u00e4chste gro\u00dfe Schwerpunkt auf der Governance von KI liegen.<\/p>\n<p>Je st\u00e4rker k\u00fcnstliche Intelligenz in Gesch\u00e4ftsprozesse integriert wird, desto wichtiger werden klare Richtlinien f\u00fcr Datennutzung, Verantwortlichkeiten, Risikomanagement und regulatorische Compliance.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409\">\n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409 av_one_third  avia-builder-el-5  el_after_av_two_third  el_before_av_two_third  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-eggfj0-ede17971daadce420c9d60fee72abc15 av-social-sharing-box-default  avia-builder-el-6  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Teilen<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=EXPERTENINTERVIEW%3A%20NIS2%20und%20das%20neue%20Verantwortungsmodell%20in%20der%20Zugriffs-Governance&#038;url=https:\/\/www.wallix.com\/de\/?p=89481' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=EXPERTENINTERVIEW%3A%20NIS2%20und%20das%20neue%20Verantwortungsmodell%20in%20der%20Zugriffs-Governance&#038;url=https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=EXPERTENINTERVIEW%3A%20NIS2%20und%20das%20neue%20Verantwortungsmodell%20in%20der%20Zugriffs-Governance&#038;body=https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a\">\n#top .hr.hr-invisible.av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a hr-invisible  avia-builder-el-7  el_after_av_social_share  el_before_av_team_member '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mp6t0j85-d9bd92f3e9b7d7dd1cbd6a9c12517fa6\">\n.avia-team-member.av-mp6t0j85-d9bd92f3e9b7d7dd1cbd6a9c12517fa6 .team-img-container img{\nborder-style:solid;\n}\n<\/style>\n<section  class='avia-team-member av-mp6t0j85-d9bd92f3e9b7d7dd1cbd6a9c12517fa6  avia-builder-el-8  el_after_av_hr  el_before_av_textblock '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><div class=\"team-img-container\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-60905 avia-img-lazy-loading-not-60905 avia_image avia_image_team' src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-80x80.png\" alt='Field CISO, WALLIX'  itemprop=\"image\"   height=\"80\" width=\"80\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-80x80.png 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-300x300.png 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-768x768.png 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-36x36.png 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-180x180.png 180w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-705x705.png 705w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT.png 1024w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/div><h3 class='team-member-name '  itemprop=\"name\" >Field CISO, WALLIX<\/h3><div class='team-member-job-title '  itemprop=\"jobTitle\" >Field CISO at WALLIX<\/div><div class='team-member-description '  itemprop=\"description\" ><p>Mehr als 20 Jahre Erfahrung in den Bereichen Cybersicherheit, Corporate Governance, ISO 27001, TISAX und operative Sicherheitsprogramme f\u00fcr kritische Infrastrukturen und regulierte Umgebungen.<\/p>\n<\/div><span class='hidden team-member-affiliation'  itemprop=\"affiliation\" >WALLIX<\/span><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gywq38-500db124898f0973bd3150d22d62c5a2\">\n#top .av_textblock_section.av-m4gywq38-500db124898f0973bd3150d22d62c5a2 .avia_textblock{\nfont-size:19px;\ncolor:#ec6707;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gywq38-500db124898f0973bd3150d22d62c5a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h3><span style=\"color: #000000;\">Verwandte Ressourcen<\/span><\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fklsyk-47345d08b4e405405f5336633191a3ed\">\n#top .hr.hr-invisible.av-2fklsyk-47345d08b4e405405f5336633191a3ed{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2fklsyk-47345d08b4e405405f5336633191a3ed hr-invisible  avia-builder-el-10  el_after_av_textblock  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-270hzek-853a99e369286e2cd90bbb4fcdd45e4d  avia-builder-el-11  el_after_av_hr  avia-builder-el-last   avia-builder-el-11  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-89550 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-05-15T12:55:21+01:00\" >15. Mai 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/' title='Link zu: Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten'>Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-89481 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-05-15T11:52:26+01:00\" >15. Mai 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/' title='Link zu: EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance'>EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68335 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:27:57+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-pam-die-implementierung-von-iec-62443-ermoeglicht\/' title='Link zu: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt'>Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68309 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:45:11+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/das-entscheidende-bindeglied-iec-62443-standards-zum-schutz-industrieller-cyber-oekosysteme\/' title='Link zu: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme'>Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-64219 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-09T16:03:49+01:00\" >9. Oktober 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/gewaehrleistung-von-compliance-und-sicherheit-fuer-msps-und-ihre-kunden\/' title='Link zu: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden'>Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div  class='flex_column av-nok0rg-0413bcf117d44f341a48260f58b5064a av_two_third  avia-builder-el-12  el_after_av_one_third  el_before_av_two_third  first flex_column_div  column-top-margin'     ><div  class='avia-button-wrap av-mf6m6h2e-22900cab6ecd74f81fc5fdae813bbb97-wrap avia-button-center  avia-builder-el-13  avia-builder-el-no-sibling '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mf6m6h2e-22900cab6ecd74f81fc5fdae813bbb97\">\n#top #wrap_all .avia-button.av-mf6m6h2e-22900cab6ecd74f81fc5fdae813bbb97{\nfont-size:16px;\nbackground-color:#ec6707;\nborder-color:#ea6e52;\ncolor:#ffffff;\nborder-style:solid;\nborder-width:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-22900cab6ecd74f81fc5fdae813bbb97:hover{\nbackground-color:#ec6707;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-22900cab6ecd74f81fc5fdae813bbb97 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-22900cab6ecd74f81fc5fdae813bbb97:hover .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_EXPERT-INTERVIEW_NIS2-and-the-New-Accountability-Model_DE.pdf'  class='avia-button av-mf6m6h2e-22900cab6ecd74f81fc5fdae813bbb97 av-link-btn avia-icon_select-no avia-size-large avia-position-center'   aria-label=\"Das Interview als PDF herunterladen\"><span class='avia_iconbox_title' >Das Interview als PDF herunterladen<\/span><\/a><\/div><\/div><\/p>\n<div  class='flex_column av-1cmx7rn-a058b0e44965034797fa52b1e3c28332 av_two_third  avia-builder-el-14  el_after_av_two_third  avia-builder-el-last  first flex_column_div  column-top-margin'     ><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":89482,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1644,2557,1641],"tags":[],"class_list":["post-89481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-audit-compliance-de","category-blog-im-fokus","category-blogpost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T10:52:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-15T11:36:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-1030x577.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance\",\"datePublished\":\"2026-05-15T10:52:26+00:00\",\"dateModified\":\"2026-05-15T11:36:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/\"},\"wordCount\":2986,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"BLOG IM FOKUS\",\"BLOGPOST\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/\",\"name\":\"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"datePublished\":\"2026-05-15T10:52:26+00:00\",\"dateModified\":\"2026-05-15T11:36:55+00:00\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"width\":2560,\"height\":1434,\"caption\":\"Digital compliance concept with document icons, checklists, and shield symbol on waving European Union flag background, representing business regulation\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/","og_locale":"de_DE","og_type":"article","og_title":"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance - WALLIX","og_url":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/","og_site_name":"WALLIX","article_published_time":"2026-05-15T10:52:26+00:00","article_modified_time":"2026-05-15T11:36:55+00:00","og_image":[{"width":1030,"height":577,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-1030x577.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance","datePublished":"2026-05-15T10:52:26+00:00","dateModified":"2026-05-15T11:36:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/"},"wordCount":2986,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","articleSection":["AUDIT &amp; COMPLIANCE","BLOG IM FOKUS","BLOGPOST"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/","url":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/","name":"EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","datePublished":"2026-05-15T10:52:26+00:00","dateModified":"2026-05-15T11:36:55+00:00","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","width":2560,"height":1434,"caption":"Digital compliance concept with document icons, checklists, and shield symbol on waving European Union flag background, representing business regulation"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/89481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=89481"}],"version-history":[{"count":5,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/89481\/revisions"}],"predecessor-version":[{"id":89509,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/89481\/revisions\/89509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/89482"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=89481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=89481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=89481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}