NIS2-ready Self-Hosted Made in Germany

The turnkey compliance platform for mid-market companies

NIS2, ISO 27001, BSI IT-Grundschutz, TISAX — 11 frameworks with 583 controls in one self-hosted tool. Docker deploy, no cloud dependency.

Every control with hands-on implementation guidance. Optional local AI integration. Everything on your own server.

ISMS Lite Dashboard

NIS2 is in effect — affecting around 29,000 companies

Since December 2025, affected companies need a demonstrable information security management system. With comprehensive documentation, met reporting deadlines, and an audit-proof trail.

11 frameworks, one goal

NIS2, ISO 27001, BSI IT-Grundschutz, TISAX — depending on your industry and customer requirements, different frameworks apply. Controls overlap, but the mapping is complex.

583 Controls

Tight reporting deadlines

24 hours for the initial report, 72 hours for the assessment, 1 month for the final report. Without a system, these deadlines work against you.

24h Initial report

Everything documented

Policies, risk assessments, measures, training records, audit reports — the auditor does not want to hear what you do, they want to see it.

Complete & audit-proof

A complete ISMS on your own server

ISMS Lite is a turnkey compliance platform for companies with 50–500 employees. Deploy in 5 minutes via Docker Compose, 11 frameworks out of the box, hands-on guidance for every single control. Self-hosted — your data stays with you.

One integrated system for the entire ISMS lifecycle

From risk analysis to incident response to the recovery plan — all in one tool.

Frameworks & SoA

11 frameworks and 583 controls in one hub

NIS2, ISO 27001, BSI C5, IT-Grundschutz Compendium, TISAX VDA ISA 6.0.3, DIN SPEC 27076, DSGVO (GDPR) Art. 32, BSI WiBA, DORA, KRITIS, BSI Basic Protection. All with cross-mappings via ISO 27001 as the central hub.

Every single control with practical guidance: What is required, minimum implementation, real-world example for ~100 employees, typical evidence. No cryptic standard text — clear action items.

NIS2 ISO 27001 BSI C5 IT-Grundschutz TISAX DIN SPEC 27076 GDPR TOMs BSI WiBA DORA KRITIS BSI Basis
Screenshot: SoA with framework selection
BCM & Emergency

From business process to recovery.

Business Continuity Management with Business Impact Analysis, recovery strategies, and tabletop exercises — including team, checklist, and findings. Emergency plans with escalation chains and reporting channels.

Emergency handbook generated with one click from emergency plans, contacts, and reporting channels — as a PDF with QR code linking to the interactive recovery plan. Backup documentation with automated restore tests and derivable risks.

The recovery plan maintains itself: based on asset dependencies, criticality, and stored recovery procedures. Available in-app and exportable as PDF.

Screenshot: BCM business processes
Incident Response

NIS2 and GDPR reporting deadlines — always under control

Record security incidents, assess severity, view reporting deadlines as a live countdown. NIS2: 24-hour initial report, 72-hour assessment, 1-month final report. GDPR: supervisory authority and data subject notification.

BSI initial report generated directly from incident data with the correct legal basis. Root Cause Analysis using 5-Why, Fishbone, or Timeline method. Incident timeline with complete documentation.

Screenshot: Incident with NIS2 countdown
Risk & Audit

From risk to action in 60 seconds.

5x5 risk matrix, AI-assisted measure suggestions with time estimates and priority, documented residual risk assessment. Internal audit with audit checklist, findings, and audit report.

Management review with automatically aggregated ISMS metrics, minutes, decisions, and action items. The complete PDCA cycle in one tool.

Screenshot: Risk assessment with measures

Over 20 modules in one integrated system

Everything ISO 27001, NIS2, and your auditor require — structured, documented, verifiable.

Dashboard

KPIs, risk matrix, review calendar, escalations

Statement of Applicability

Implementation status of all controls, snapshots, gap analysis

Risk Management

5x5 matrix, treatment strategy, residual risk, AI-suggested measures

Asset Management

Criticality, BIA, dependencies, contracts, recovery steps

Measure Tracking

Status, deadlines, owners, effectiveness reviews

Policy Lifecycle

AI generation, versioning, acknowledgment, management sign-off

Security Incidents

NIS2 and GDPR reporting deadlines, AI-assisted reports, Root Cause Analysis

Vendor Management

Assessment, criticality, contracts, sub-contractors

Access Management

Requirements, approval workflow, role profiles

User Lifecycle

Onboarding, offboarding, role changes with permission profiles

Emergency Plans & Handbook

Escalation chains, reporting channels, PDF export with QR code

BCM & Business Processes

BIA, recovery strategies, tabletop exercises with findings

Backup & Restore Tests

Backup jobs, automated restore tests, RPO validation

Recovery Plan

Auto-generated from asset dependencies, phases, PDF export

Training Management

Planning, tracking, records, deadline monitoring

Internal Audit

Audit checklist, findings, team, report

Management Review

Automated ISMS metrics, minutes, decisions

Data Protection / ROPA

Records of processing activities Art. 30, TOMs, retention periods

Scope

Scope definition, interfaces, versioning

Audit Log

Tamper-proof logging of all changes

Authentication

TOTP, Entra ID SSO, Active Directory LDAPS

Role-Based Permission Matrix

Granular access control across all modules

Framework Import/Export

Open JSON format, create custom frameworks

AI Integration

Local LLMs or external APIs for policies and reports

Local AI Integration

ISMS Lite works completely without AI. If you choose, you can optionally connect a local language model — via LM Studio, Ollama, or any OpenAI-compatible API. Your data never leaves your server.

What the integration enables:

Policy drafts generated from selected controls — the practical descriptions from the frameworks serve as context
NIS2 reports pre-drafted from incident data — initial report, assessment, final report
Measure suggestions derived from risk assessments — with time estimates and priority

All AI-generated content is marked as draft and must be reviewed before use.

KI-Integration Screenshot

Built for companies with 50–500 employees

Tailored to the needs of mid-market companies — in features, pricing, and complexity.

100% Self-Hosted

Your data stays on your server. Docker deploy, full control, no cloud dependency. GDPR-compliant by design.

583 practical guides

Every control with concrete action items: What is required, minimum implementation, real-world example, typical evidence.

Productive in 5 minutes

Docker Compose, adjust .env, start. No weeks of onboarding, no training required. Get started right away.

Unlimited users

No seat licenses. Include as many team members as needed — CISO, management, departments, external consultants.

Open data format

JSON export at any time. No vendor lock-in. Your data belongs to you, not the tool vendor.

11 frameworks, one hub

NIS2, ISO 27001, BSI C5, IT-Grundschutz, TISAX, and more. All with cross-mappings — one control, multiple frameworks.

Pricing that leaves no questions open

Full feature set — no hidden costs, no seat licenses. MSPs get a dedicated program.

Subscription

Flexible, cancel annually

500€

plus VAT

  • All modules & frameworks
  • Unlimited users
  • Updates included
  • Email support
  • 1 instance
Order now

Both options include the full feature set, all 11 frameworks with practical guides, and optional AI integration. One-time purchase: Lifetime license, updates included in the first year, optional afterwards. MSP-Programm für IT-Dienstleister →

Setup in five minutes with Docker

One command, a running ISMS — on your own infrastructure.

Bash
$ curl -sSL https://get.ismslite.de | sudo bash

 ISMS Lite laeuft auf https://isms.deine-firma.de

Vollstaendige Installationsanleitung →

Stack

Docker, Node.js, PostgreSQL

Authentication

Local, Active Directory, Entra ID, SSO, 2FA, Magic Link

Encryption

AES-256-GCM for sensitive fields (risks, incidents, emergency plans, documents)

AI Integration

Any OpenAI-compatible API — LM Studio, Ollama, vLLM, or cloud providers

Backup

pg_dump + filesystem. Standard Linux tools, no proprietary format.

Requirements

Ubuntu/Debian, Docker, 500 MB RAM, 10 GB disk. No Kubernetes required.

Order now or request a quote

Choose your license model. For orders, you will receive the invoice via email.

Mit dem Absenden stimmst du unserer Datenschutzerklärung zu.