"IT-Grundschutz": Audits & ISMS certification based on BSI IT-Grundschutz

Request an individual offer now

Holistic & systematic: information security with "IT-Grundschutz"

As the threat of cybercrime and data breaches continues to grow, a robust information security strategy is essential.

With “IT-Grundschutz”, the German Federal Office for Information Security (BSI) provides companies with a methodology with which they can comprehensively securing their data, systems and information and successfully implementing an information security management system (ISMS).
 

  Evidence of holistic information security

The holistic approach supports you in comprehensively protect information, data and existing IT and business processes. 
 

  Prevention instead of rehabilitation

By implementing “IT-Grundschutz”, you can prevent IT outages and data loss - and the associated financial and reputational damage
  

  Tailor-made ISMS thanks to the modular principle

The modular structure of "IT-Grundschutz" allows flexible adaptation to the specific requirements of your company. 
  

What is “IT-Grundschutz”?

"IT-Grundschutz" is a systematic approach developed by the German Federal Office for Information Security (BSI) to help companies and public authorities to set up and establish a tailor-made information security management system (ISMS) for the long term.

It takes a holistic approach to information security, focusing not only on technical aspects but also on infrastructural, organizational and personnel issues

"IT-Grundschutz" is made up of:

  • the BSI standards, which contain best practices for setting up an ISMS, and
  • the IT-Grundschutz compendium, which contains specific security requirements.

 

“IT-Grundschutz”: An overview of the BSI standards

BSI-Standard 200-1 


Defines general requirements for an information security management system (ISMS)

- Components of an ISMS
- Tasks of the management level

BSI-Standard 200-2


Explains how an ISMS can be built based on one of three different approaches:

- "Basic protection"
- "Standard protection"
- "Core protection"

BSI-Standard 200-3


Contains all risk-related tasks

-  Risk-related work steps in the implementation of “IT-Grundschutz”

BSI-Standard 200-4


Provides practical guidance on how to set up & successfully establish a Business Continuity Management System (BCMS) in a public authority or company

“IT-Grundschutz”: Benefits at a glance

Fulfillment of BSI requirements
You implement the well-founded recommendations of the Federal Office for Information Security.
 

Reduction of IT outages
By uncovering vulnerabilities, you minimize IT security risks & their potential consequences such as outages.
 

Sustainable protection
With “IT-Grundschutz” you protect sensitive information and data as well as existing IT and business processes.
 

Holistic information security
The systematic approach covers technical, infrastructural, organizational and personnel aspects.
 

Increased trust
By fulfilling the “IT-Grundschutz” requirements, you increase the trust of your customers and business partners.
 

Raising employee awareness
The implementation of “IT-Grundschutz” raises awareness of information security within the company.
 

Modular structure
The large number of modules in “IT-Grundschutz” enables flexible adaptation to your own company.
 

Long-term cost savings
The optimization of processes & the prevention of security incidents lead to long-term cost savings.
 

Our services for “IT-Grundschutz”


Assessment of the IT security situation in your organization


Analysis & evaluation of information security management according to “IT-Grundschutz”


Outperformance of gap analyses to determine deviations


ISMS assessments by licensed & experienced ISMS auditors


Planning & performing of “IT-Grundschutz” audits as a basis for ISO 27001 certifications


Planning & execution of supplier audits

"IT-Grundschutz" modules according to the "IT-Grundschutz" compendium

The IT-Grundschutz methodology consists of 10 different modules that contain the most important requirements and recommendations for securing individual and complex systems and processes. Users can select the modules that are relevant to their organization. The current 2023 edition was published in February 2023 (The current English version is from 2022). 

  

Certification according to "IT-Grundschutz"

ISO 27001 Certification based on "IT-Grundschutz"

If you have implemented an ISMS based on IT-Grundschutz, you have the option of obtaining “ISO 27001 based on IT-Grundschutz (BSI Standard 200-2: IT-Grundschutz methodology)” certification. 

The certificate proves that your ISMS not only meets the general requirements of ISO 27001, but also the much more specific requirements of I"T-Grundschutz". The subject of certification does not necessarily have to be the entire company. It is also conceivable to limit certification to individual business processes, specialist tasks or organizational units.

Our BSI-certified auditors conduct audits in accordance with ISO 27001 on the basis of "IT-Grundschutz". Please feel free to contact us. 

  

"IT-Grundschutz" vs. ISO 27001

Both "IT-Grundschutz" and ISO 27001 aim to improve IT security in companies and public authorities. However, there are differences between the two standards.

"IT-Grundschutz"

  

  • Specialization on the German market & the specific requirements of organizations in Germany
  • Comprehensive catalog of security measures with specific recommendations for the implementation of information security
  • Flexibility through modular approach based on building blocks
  • Stronger support through clear guidelines and guidance

ISO 27001

  

  • Internationally recognized standard with worldwide applicability
  • Defines basic, conceptual requirements, but does not contain any specific, technical security measures
  • Flexibility in the individual implementation & design of the ISMS
  • Generic design requires companies to take greater initiative

Frequently Asked Questions (FAQ):

Is BSI "IT-Grundschutz" mandatory in Germany?

IT-Grundschutz is not directly mandatory for companies. However, there are some legal regulations that require an implemented ISMS in accordance with ISO 27001 or IT-Grundschutz. An example of this is the requirements of the NIS 2 directive. 

However, in view of the increasing cyber threat situation, a minimum level of IT security is also generally advisable in order to prevent downtime, financial damage or loss of reputation. IT-Grundschutz is a very good way for organisations to improve their own IT security. 

What are basic, standard and core protection according to "IT-Grundschutz"?
  • Basic protection: Basic protection enables prompt implementation of the most important security requirements. The aim is to achieve broad, basic initial protection across all relevant business processes. Basic protection is particularly suitable for smaller institutions that are still at the beginning of their security process. 
  • Core protection: Core protection focuses on a small but very relevant part of an information network that is to be protected as a priority. It primarily addresses companies with a few business processes that are essential for the continued existence of the organization. 
  • Standard protection: Standard protection refers to the classic "IT-Grundschutz" approach in accordance with BSI Standard 200-2 and aims to provide comprehensive and in-depth protection for a company. 
What are the "IT-Grundschutz" profiles?

IT-Grundschutz profiles contain the individual steps of a security process for a defined area of application, e.g. for industries or sectors. They serve as templates that companies can use to effectively secure their business processes with reduced effort. 

An overview of the current IT-Grundschutz profiles can be found on the BSI website.

Does "IT-Grundschutz" also cover the topic of data protection?

Yes, IT-Grundschutz also covers the topic of data protection, but not to the extent that is required for the General Data Protection Regulation (GDPR), for example. Companies that implement "IT-Grundschutz" can benefit from the security measures it contains, but must also take other data protection requirements into account. 

Why we are a strong partner for you

Independence

Our employees are not subject to any conflicts of interest, as they are not committed to any product suppliers, system integrators, stakeholders, interest groups or government agencies.

Expertise

Our IT security experts are certified by the German Federal Office of Information Security (BSI) as Audit Team Leaders for ISO 27001 on the basis of “BSI IT-Grundschutz” or as IS auditors, respectively.

International network of experts

Around the globe: We support you both nationally and internationally. Our global network of experts is ready to help you in word and deed in all IT security issues.

Industry experience

Due to many years of experience in different branches of industry we can serve companies from a wide range of industries.

Tailor-made for you

We focus on individual services - and solutions - that optimally fit your current company situation and your set goals.

 

You have questions? We are pleased to help!

  

Samantha Murmann

Product Manager Data Protection & E-Health 

+49 201 8999 699
s.murmann@tuvit.de

Tobias Mielke

Lead Expert Information Security & Privacy  

+49 201 8999 553
t.mielke@tuvit.de