Qualified Entities: a list of QuaSte providers according to the NIS Act
The Austrian NIS Act requires operators of essential services to conduct regular audits of their network and information security. The audits are organisational and technical and must be carried out every three years.
These audits must be carried out by "qualified entities" ("QuaSte"). The list of qualified entities is provided to operators of essential services upon request.
We have taken the trouble to compile a list of qualified entities in Austria for you.
Qualified Entities according to the NIS Act
|Name||Technical fields||Organisational fields||Headquarters|
|A1 Digital International GmbH||1 to 11||1 to 11||Vienna|
|BDO Consulting GmbH||1 to 11||1 to 11||Vienna, Linz|
|B-SEC better secure KG||1 to 11||1 to 11||Weingraben|
|Certification & Information Security Services GmbH||1 to 11||1 to 11||Vienna|
|condignum GmbH||1 to 10||1 to 10||Vienna|
|CoreTEC IT Security Solutions GmbH||1 to 11||1 to 11||Vienna|
|Devoteam Consulting GmbH||1 to 11||1 to 11||Vienna|
|Ernst & Young Management Consulting GmbH||1 to 11||1 to 11||Vienna|
|GAI NetConsult GmbH||1 to 11||1 to 11||Berlin|
|HACKNER Security Intelligence GmbH||3 to 9||3 to 9||Krummnußbaum|
|K-Businesscom AG||1 to 11||1 to 11||Vienna|
|KPMG Security Services GmbH||1 to 11||1 to 11||Vienna|
|Limes Security GmbH||1 to 11||1 to 11||Hagenberg|
|Österreichische Computer Gesellschaft||1 to 11||1 to 11||Vienna|
|PwC Advisory Services GmbH||1 to 11||1 to 11||Vienna|
|RISE GmbH||keine||3 to 6||Schwechat|
|SBA Research gGmbH||1 to 11||1 to 11||Vienna|
|SEC Consult Unternehmensberatung GmbH||1 to 11||1 to 11||Vienna|
|T-Systems Austria GesmbH||1 to 11||1 to 11||Vienna|
|TÜV AUSTRIA CERT GMBH||1 to 11||1 to 11||Vienna|
|TÜV SÜD Landesgesellschaft Österreich GmbH||1 to 11||1 to 11||Wiesing|
|XSEC infosec GmbH||1 to 11||1 to 11||Vienna|
|ZT Zeiler, Ziviltechniker Gesellschaft m.b.H.||1-2, 4-5, 6.1, 7-11||1 to 11||Vienna|
This overview has been compiled to the best of our knowledge and belief. We do not guarantee the accuracy and timeliness of the information.
We are happy to receive tips and information regarding changes and new entries. Please send us a short message to firstname.lastname@example.org.
Here is an overview of the fields.
The table headings are translated "Categories according to NISV", the subheadings translated "Safety measures according to NISV".
|1||Governance and Risk Management|
|1.3||Network and Information Systems Review Plan|
|1.5||Information Security Management System Review (World Record Attempt by the Austrian Government for the Longest Word)|
|2||Dealing with Service Providers, Suppliers and Third Parties|
|2.1||Relations with Service Providers, Suppliers and Third Parties|
|2.2||Service Agreements with Service Providers and Third Parties|
|4.1||Administrative Access Rights|
|4.2||Systems and Applications for System Administration|
|5||Identification and Access Management|
|5.1||Identification and Authentication|
|6||System Maintenance and Operation|
|6.1||System Maintenance and Operation|
|8.2||Logging and Monitoring|
|8.3||Correlation and Analysis|
|10.1||Business Continuity Management (nicely translated, dear government)|