Discovered, explained
With IT-Grundschutz, the German Federal Office for Information Security (BSI) provides companies with a methodology with which they can comprehensively secure their data, systems and information and successfully implement an information security management system (ISMS).
IT baseline protection is a systematic approach developed by the German Federal Office for Information Security (BSI) that enables companies and public authorities to set up a customised information security management system (ISMS) and establish it in the long term.
IT baseline protection pursues a holistic approach to information security that takes into account technical aspects as well as infrastructural, organisational and personnel issues.
IT baseline protection is made up of
BSI standard 200-1
Defines basic requirements for an information security management system (ISMS)
- Components of an ISMS
- Tasks of the management level
BSI Standard 200-2
Establishes 3 procedures for the implementation of IT-Grundschutz:
- Basic protection
- Standard protection
- Core protection
BSI Standard 200-3
Provides a simplified procedure for risk analysis
- Risk-related work steps in the implementation of IT baseline protection
Defines basic requirements for an information security management system (ISMS)
Establishes 3 procedures for the implementation of IT baseline protection:
Represents a simplified procedure for risk analysis
Provides practical guidance on how to set up and successfully establish a Business Continuity Management System (BCMS) in a public authority or company
Both IT-Grundschutz and ISO 27001 aim to increase IT security in companies and public authorities. Nevertheless, there are differences between the two standards.
IT-Grundschutz is not directly mandatory for companies. However, there are some legal regulations that require an implemented ISMS in accordance with ISO 27001 or IT-Grundschutz. Examples of this are the requirements of the NIS-2 Directive, the BSI Criticism Ordinance or the DiGAV.
In view of the increasing cyber threat situation, a minimum level of IT security is also generally advisable in order to prevent failures, financial damage or loss of reputation. Here, IT-Grundschutz offers organisations very good assistance in improving their own IT security.
IT-Grundschutz profiles contain the individual steps of a security process for a defined area of application, e.g. for industries or sectors. They serve as templates that companies can use to effectively secure their business processes with reduced effort.
You can find an overview of the current IT-Grundschutz profiles on the BSI website.
Yes, IT-Grundschutz also covers the topic of data protection, but not to the extent that is required for the General Data Protection Regulation (GDPR), for example. Companies that implement IT-Grundschutz can benefit from the security measures it contains, but must also take other data protection requirements into account.
The IT-Grundschutz methodology consists of 10 different building blocks that contain the most important requirements and recommendations for securing individual and complex systems and processes. Users can select the building blocks that are relevant to their organisation. The current 2023 edition was published in February 2023.
OPS.1.1.1 General IT operations
OPS.1.1.2 Proper IT administration
OPS.1.1.3 Patch and change management
OPS.1.1.4 Protection against malware
OPS.1.1.5 Logging
OPS.1.1.6 Software tests and releases
OPS.1.1.7 System management
OPS.1.2.2 Archiving
OPS.1.2.4 Teleworking
OPS.1.2.5 Remote maintenance
OPS.1.2.6 NTP time synchronisation
OPS.2.2 Cloud utilisation
OPS.2.3 Utilisation of outsourcing
OPS.3.2 Offering outsourcing
APP.1.1 Office products
APP.1.2 Web browser
APP.1.4 Mobile application (apps)
APP.2.1 General directory service
APP.2.2 Active Directory Domain Services
APP.2.3 OpenLDAP
APP.3.1 Web applications and web services
APP.3.2 Web server
APP.3.3 File server
APP.3.4 Samba
APP.3.6 DNS server
APP.4.2 SAP ERP system
APP.4.3 Relational database systems
APP.4.4 Kubernetes
APP.4.6 SAP ABAP programming
APP.5.2 Microsoft Exchange and Outlook
APP.5.3 General e-mail client and server
APP.5.4 Unified Communications and Collaboration
APP.6 General software
APP.7 Development of customised software
SYS.1.1 General server
SYS.1.2.2 Windows Server 2012
SYS.1.2.3 Windows Server
SYS.1.3 Server under Linux and Unix
SYS.1.5 Virtualisation
SYS.1.6 Containerisation
SYS.1.7 IBM Z
SYS.1.8 Storage solutions
SYS.1.9 Terminal server
SYS.2.1 General client
SYS.2.2.3 Clients under Windows
SYS.2.3 Clients under Linux and Unix
SYS.2.4 Clients under macOS
SYS.2.5 Client virtualisation
SYS.2.6 Virtual Desktop Infrastructure
SYS.3.1 Laptops
SYS.3.2.1 General smartphones and tablets
SYS.3.2.2 Mobile Device Management (MDM)
SYS.3.2.3 iOS (for Enterprise)
SYS.3.2.4 Android
SYS.3.3 Mobile phone
SYS.4.1 Printers, copiers and multifunctional devices
SYS.4.3 Embedded systems
SYS.4.4 General IoT device
SYS.4.5 Removable storage devices
INF.1 General building
INF.2 Computer centre and server room
INF.5 Room and cabinet for technical infrastructure
INF.6 Data storage archive
INF.7 Office workstation
INF.8 Domestic workstation
INF.9 Mobile workstation
INF.10 Meeting, event and training room
INF.11 General vehicle
INF.12 Cabling
INF.13 Technical building management
INF.14 Building automation