The Galactic Empire: Death Star cybersecurity in the NIS2 check

The NIS2 Directive demands cybersecurity for critical infrastructure. The Death Star is definitely critical infrastructure — and definitely not compliant. An analysis of the most famous vulnerability in film history.

The NIS2 Directive requires operators of critical infrastructure to handle: risk management, incident reporting, supply chain security and governance. The Death Star is a space station with 1.2 million crew members — infrastructure does not get more critical than that.

And yet: a single exhaust port, a saboteur in the supply chain, no encryption of the construction plans, no patch management. If the Empire were a German company, the BSI would have kicked the door in long ago.

1.4 / 5
Cybersecurity: exhaust port level.
Critically non-compliant 0 of 8 dimensions above 2

Radar: Empire vs. NIS2 compliance

Galactic Empire NIS2 compliance

The 8 NIS2 dimensions in detail

1. Risk management

1/5
Empire (reality)

The Death Star has a 2-meter-wide exhaust port leading directly to the reactor core. Galen Erso built it in as a backdoor — and nobody did a risk assessment.

NIS2 requirement

Systematic risk analysis of all critical systems, including regular penetration tests.

2. Incident reporting

2/5
Empire (reality)

The destruction of the first Death Star was covered up internally. The news only reached Outer Rim bases weeks later. No 24-hour reporting obligation.

NIS2 requirement

Security incidents must be reported to the responsible authority within 24 hours.

3. Supply chain security

1/5
Empire (reality)

Galen Erso, a saboteur, was the lead engineer of the Death Star. No background check, no four-eyes principle. The entire supply chain was compromised.

NIS2 requirement

Cybersecurity requirements for suppliers, supply chain vulnerability checks.

4. Business continuity

2/5
Empire (reality)

Plan after Death Star destruction: build Death Star II. No diversification, no backup concept. Single point of failure is doubled instead of eliminated.

NIS2 requirement

Business continuity plans, backup systems, disaster recovery for critical infrastructure.

5. Governance and accountability

1/5
Empire (reality)

Who is responsible for cybersecurity? Tarkin? Vader? Palpatine? Nobody. No CISO, no security department, no clear responsibilities.

NIS2 requirement

Management must approve cybersecurity measures and is personally liable.

6. Encryption and access control

2/5
Empire (reality)

The Death Star plans are stored on an unencrypted data archive on Scarif. R2-D2 can hack imperial systems with a standard interface. Every terminal, every time.

NIS2 requirement

Encryption of sensitive data, multi-factor authentication, role-based access control.

7. Vulnerability management

1/5
Empire (reality)

Known vulnerability (exhaust port) is not patched. On the Death Star II: the vulnerability is its half-built state — and it's deployed anyway.

NIS2 requirement

Regular patching, vulnerability scanning and coordinated disclosure.

8. Training and awareness

1/5
Empire (reality)

Stormtroopers are trained in combat, but not in cybersecurity. Social engineering by rebels (stolen uniforms, faked codes) works every time.

NIS2 requirement

Regular cybersecurity training for all employees, phishing awareness.

AI analysis

Average score: 1.4/5 — The Empire runs the largest critical infrastructure in the galaxy with the cybersecurity maturity of a seed-stage startup. No risk management, no incident reporting, compromised supply chain.

The exhaust port vulnerability (CVE-0000-BBY): Galen Erso intentionally built a vulnerability into the Death Star — a 2-meter-wide thermal exhaust port leading directly to the reactor core. A single proton torpedo is enough for destruction. Under NIS2, a penetration test would have caught this immediately. But: no test, no patch, no four-eyes principle in design.

Rogue One as a supply chain attack: The entire film "Rogue One" is essentially a supply chain attack. A compromised supplier (Galen Erso) plants a backdoor, and attackers (the rebels) steal the technical documentation (the plans) from an inadequately secured archive on Scarif. NIS2 Article 21 requires supply chain security precisely for this scenario.

R2-D2 as a penetration tester: R2-D2 hacks into the Death Star's central systems in seconds — control trash compactors, open doors, locate prisoners. No network segmentation, no authentication, no anomaly detection. If R2-D2 were a red team tester, his report would have one line: "Everything open."

Is your company NIS2-compliant?

Hopefully more secure than the Death Star.

Start NIS2 Applicability Check

Inspiriert von European Union — NIS2 Directive

Trivia

  • The thermal exhaust port of the Death Star was only 2 meters wide. That a proton torpedo could hit it was considered "impossible" — but no pentester verified it.
  • R2-D2 hacks the Death Star: trash compactor, doors, prisoner database — all from a single terminal. Zero network segmentation.
  • The Death Star plans were stored unencrypted on Scarif. That's like keeping your firewall configuration on a public FTP server.
  • On the Death Star II the vulnerability was even more obvious: it was half-finished and already operational. That's like a go-live without a staging environment.
  • Under NIS2, management is personally liable. Grand Moff Tarkin would not only have died in the explosion — he'd have caught a fine first.