Back to Inquiries

NIS2 Supplier Security Assessment

pending
Mercedes-Benz Group AGNIS2Certification
Submitted:2. Feb. 2026
Due:28. Feb. 2026 (Overdue)

Progress

0%
Answered0
Pending10
Needs Review0
1

Documents

0/5 uploaded

2

Questions

0/10 answered

3

Review & Send

Pending

Step 1: Document Requirements (0/5)

0% complete

ISO 27001:2022 Certificate

Valid ISO 27001:2022 certification from accredited body

Requiredpending

Data Processing Agreement (DPA)

Signed DPA with Standard Contractual Clauses (SCCs)

Requiredpending

Business Continuity Plan

Documentation of business continuity and disaster recovery procedures

Requiredpending

Incident Response Procedure

Documentation of security incident handling procedures

Requiredpending

Penetration Test Report

Recent penetration test report (within last 12 months)

pending

Step 2: Questions (0/10)

1
Certification

Do you have an Information Security Management System (ISMS) certified to ISO 27001:2022?

pending
2
Risk Management

Describe your approach to risk management and how you identify, assess, and mitigate cybersecurity risks (NIS2 Art. 21(2)(a)).

pending
3
Incident Management

What measures do you have in place for incident handling, including detection, response, and recovery procedures? (NIS2 Art. 21(2)(b))

pending
4
Business Continuity

Describe your business continuity and crisis management procedures, including backup management and disaster recovery (NIS2 Art. 21(2)(c)).

pending
5
Supply Chain Security

How do you ensure supply chain security, including security aspects of relationships with direct suppliers and service providers? (NIS2 Art. 21(2)(d))

pending
6
System Security

Describe your network and information system security measures, including acquisition, development, and maintenance procedures (NIS2 Art. 21(2)(e)).

pending
7
Security Assessment

What policies and procedures do you have for assessing the effectiveness of cybersecurity risk-management measures? (NIS2 Art. 21(2)(f))

pending
8
Training & Awareness

Describe your basic cyber hygiene practices and cybersecurity training programs for employees (NIS2 Art. 21(2)(g)).

pending
9
Cryptography

What is your approach to cryptography and encryption, including key management practices? (NIS2 Art. 21(2)(h))

pending
10
Access Control

Describe your human resources security measures, access control policies, and asset management procedures (NIS2 Art. 21(2)(i)).

pending