BSI Standard · Germany
BSI IT-Grundschutz:
Germany's National Security Standard
The BSI IT-Grundschutz Compendium is Germany's most comprehensive security framework for information security. With over 200 building blocks, three protection levels and a recognized certification scheme, it forms the backbone of information security in government agencies, KRITIS companies and increasingly in the private sector. Internationally, it is Germany's equivalent to ISO 27001 - but with far more prescriptive implementation guidance.
- Building Blocks
- 200+
- Protection Levels
- 3
- BSIG Obligation
- §8a
- Published by
- BSI
Overview
What is BSI IT-Grundschutz?
BSI IT-Grundschutz is a security framework developed by Germany's Federal Office for Information Security (BSI). Introduced in the early 1990s and continuously updated, it combines a structured methodology ("the path to information security") with a comprehensive catalog of specific security controls - the IT-Grundschutz Compendium.
Unlike ISO 27001, which primarily defines a management framework, IT-Grundschutz also delivers detailed, practice-oriented implementation guidance. For each system component, process and infrastructure element, there is a specific building block with concrete requirements and implementation hints - from email security to hardening Windows servers to physical security of server rooms.
IT-Grundschutz has a legal basis: §8a(1) BSIG requires KRITIS operators to implement "technical and organizational measures corresponding to the state of the art" - and the BSI explicitly recognizes IT-Grundschutz as suitable evidence of compliance. For German federal agencies, IT-Grundschutz is mandatory via the BSI Grundschutz minimum requirements.
Core Components of IT-Grundschutz
Structure
IT-Grundschutz Compendium: The 10 Layers
The IT-Grundschutz Compendium is organized in ten layers covering all relevant aspects of an organization's information security - from ISMS processes to physical building security.
Security Management
Cross-cutting ISMS processes: security policy, organization, concepts, revision.
Organization & Personnel
Organizational structure, personnel, data privacy, identity and access management.
Concepts & Methodologies
Cryptography concept, data privacy, backups, software development, outsourcing.
Operations
Proper IT operations, patch management, malware protection, logging.
Detection & Response
Detection of security-relevant events, incident handling, forensics, emergency management.
Applications
Email, web applications, office communication, ERP systems, databases, identity management.
IT Systems
Linux/Windows servers, desktop systems, mobile devices, IoT, printers, storage systems.
Industrial IT
ICS/SCADA systems, OT security, process control systems, industrial networks.
Networks & Communications
Network architecture, VPN, WLAN, VoIP, network management, firewalls, DNS.
Infrastructure
Building security, data centers, server rooms, home offices, mobile workplaces.
Methodology
The 3 Protection Levels of IT-Grundschutz
Since the IT-Grundschutz modernization in 2017, three protection levels offer different entry points and security levels.
Basic Protection
Basic Protection is the entry level to IT-Grundschutz. It covers the most important security requirements - the "must-have" controls. Suitable for organizations beginning systematic IT security work for the first time, or as an immediate remediation measure when deficiencies are identified.
- No complete protection needs assessment required
- Focus on the most urgent baseline requirements
- Quickly implementable - typically 3-6 months
- No BSI certificate achievable at this level
- Good starting point for SMEs without a dedicated security team
Standard Protection
Standard Protection is the complete IT-Grundschutz approach. It encompasses the full methodology with structural analysis, protection needs assessment, modeling, IT-Grundschutz check and risk analysis where necessary. It is the basis for the BSI Grundschutz certificate and maps most closely to ISO 27001.
- Complete structural analysis of the information domain
- Protection needs assessment for all target objects
- Modeling with IT-Grundschutz building blocks
- IT-Grundschutz check (interview-based target/actual comparison)
- Basis for ISO 27001 certificate based on IT-Grundschutz
Core Protection
Core Protection focuses on the organization's "crown jewels" - the most critical information assets with the highest protection requirements. Suitable for organizations with very limited resources who need to prioritize first, or as a supplementary approach for particularly sensitive areas.
- Identification of and focus on few critical assets
- Significantly deeper protection level for these assets
- No complete information domain required
- No BSI Grundschutz certificate at this level
- Supplementary to Standard Protection for high-risk assets
Comparison
IT-Grundschutz vs. ISO 27001: Differences and Relationship
Both standards target information security - but their approach, depth and application context differ significantly. An ISO 27001 certification based on IT-Grundschutz combines the strengths of both.
| Criterion | BSI IT-Grundschutz | ISO/IEC 27001 |
|---|---|---|
| Publisher | BSI (Federal agency, Germany) | ISO/IEC (international standards bodies) |
| Geographic Scope | Germany - especially government, KRITIS | International - recognized worldwide |
| Approach | Methodology + detailed control catalog | Management framework - "What", not "How" |
| Control Depth | Very detailed: concrete implementation guidance per building block | Abstract: 93 controls, own interpretation |
| Flexibility | Lower - building blocks predefined | High - Statement of Applicability (SoA) freely selected |
| Certification | BSI Grundschutz Certificate (equivalent to ISO 27001) | ISO 27001 certificate by accredited auditors |
| Compendium Cost | Free (bsi.bund.de) | Paid (ISO standard text approx. EUR 170) |
| KRITIS Compliance | Explicitly recognized (§31 BSIG) | Recognized as equivalent standard |
| Entry Level | Basic Protection as low-threshold entry point | No formal entry level, direct full implementation |
| Recommendation | Government, KRITIS, public sector | Internationally operating companies, industry, SMEs |
Regulation
IT-Grundschutz for KRITIS: Requirements under §31 BSIG
Critical infrastructure operators (KRITIS) under §8a(1) BSIG are legally required to implement appropriate technical and organizational security measures and demonstrate this to the BSI every two years. This proof can be provided through IT-Grundschutz or a comparable standard.
KRITIS sectors include: Energy (electricity, gas, oil, district heating), Water (drinking water, wastewater), Food, IT and Telecommunications, Health (hospitals, laboratories, pharmaceuticals), Finance and Insurance, Transport and State and Administration. Applicability thresholds are sector-specific and regulated in the BSI KRITIS Ordinance (BSI-KritisV).
The IT Security Act 2.0 (ITSiG 2.0, 2021) expanded the KRITIS concept and introduced the new status "Companies of Special Public Interest" (UNBI/UBI), bringing additional security obligations even without reaching KRITIS thresholds.
KRITIS Sectors and Examples
Municipal utilities, grid operators, biogas plants, district heating
Waterworks, sewage treatment plants, water supply companies
Data centers, internet exchanges, telecom carriers, DNS resolvers
Hospitals with 30,000+ cases/year, blood donation services, laboratories
Banks, stock exchanges, payment systems, insurance companies
Ports, airports, rail infrastructure, canal management systems
Food manufacturers and distributors with high supply relevance
Federal agencies, certain state and municipal authorities
Source: §2(10) BSIG in conjunction with BSI-KritisV (last amended 2022). Applicability check recommended - specific thresholds are regulated in Annex 1 of the BSI-KritisV.
Why AWARE7 for IT-Grundschutz
Was uns von anderen Anbietern unterscheidet
Reine Awareness-Plattformen testen keine Systeme. Reine Beratungskonzerne sind zu weit weg. AWARE7 verbindet beides: Wir hacken Ihre Infrastruktur und schulen Ihre Mitarbeiter - mittelstandsgerecht, persönlich, ohne Enterprise-Overhead.
Forschung und Lehre als Fundament
Rund 20% unseres Umsatzes stammen aus Forschungsprojekten für BSI und BMBF. Unsere Studien analysieren Millionen von Websites und Zehntausende Phishing-E-Mails - publiziert auf ACM- und Springer-Konferenzen. Drei unserer Führungskräfte sind gleichzeitig Professoren an deutschen Hochschulen.
Digitale Souveränität - keine Kompromisse
Alle Daten werden ausschließlich in Deutschland gespeichert und verarbeitet - ohne US-Cloud-Anbieter. Keine Freelancer, keine Subunternehmer in der Wertschöpfung. Alle Mitarbeiter sind sozialversicherungspflichtig angestellt und einheitlich rechtlich verpflichtet. Auf Anfrage VS-NfD-konform.
Festpreis in 24h - planbare Projektzeiträume
Innerhalb von 24 Stunden erhalten Sie ein verbindliches Festpreisangebot - kein Stundensatz-Risiko, keine Nachforderungen, keine Überraschungen. Durch eingespieltes Team und standardisierte Prozesse erhalten Sie einen klaren Zeitplan mit definiertem Starttermin und Endtermin.
Ihr fester Ansprechpartner - jederzeit erreichbar
Ein persönlicher Projektleiter begleitet Sie vom Erstgespräch bis zum Re-Test. Sie buchen Termine direkt bei Ihrem Ansprechpartner - keine Ticket-Systeme, kein Callcenter, kein Wechsel zwischen wechselnden Beratern. Kontinuität schafft Vertrauen.
Für wen sind wir der richtige Partner?
Mittelstand mit 50–2.000 MA
Unternehmen, die echte Security brauchen - ohne einen DAX-Konzern-Dienstleister zu bezahlen. Festpreis, klarer Scope, ein Ansprechpartner.
IT-Verantwortliche & CISOs
Die intern überzeugend argumentieren müssen - und dafür einen Bericht mit Vorstandssprache brauchen, nicht nur technische Findings.
Regulierte Branchen
KRITIS, Gesundheitswesen, Finanzdienstleister: NIS-2, ISO 27001, DORA - wir kennen die Anforderungen und liefern Nachweise, die Auditoren akzeptieren.
Mitwirkung an Industriestandards
OWASP · 2023
OWASP Top 10 for Large Language Models
Prof. Dr. Matteo Große-Kampmann als Contributor im Core-Team des international anerkannten OWASP LLM-Sicherheitsstandards.
BSI · Allianz für Cyber-Sicherheit
Management von Cyber-Risiken
Prof. Dr. Matteo Große-Kampmann als Mitwirkender des offiziellen BSI-Handbuchs für die Unternehmensleitung (dt. Version).
„BSI IT-Grundschutz is not a bureaucratic rulebook - it is a proven guide that shows German government agencies and organizations how to systematically and transparently implement information security. Those who apply it consistently create real security.“
Chris Wojzechowski
IT-Grundschutz Practitioner (TUV) · AWARE7 GmbH
Frequently Asked Questions about BSI IT-Grundschutz
Answers to the most important questions about IT-Grundschutz implementation, certification and KRITIS requirements.
What is BSI IT-Grundschutz and who should use it?
What is the difference between BSI IT-Grundschutz and ISO 27001?
Who is required to implement IT-Grundschutz under §31 BSIG?
What are the 3 protection levels of IT-Grundschutz?
What is the BSI IT-Grundschutz Compendium and how is it structured?
How does the BSI Grundschutz certification process work?
What does IT-Grundschutz implementation cost?
How are IT-Grundschutz and NIS2 related?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelRequest IT-Grundschutz Consulting
Whether starting with Basic Protection, preparing for the KRITIS audit obligation under §31 BSIG, or seeking certification support - we provide a binding fixed-price proposal within 24 hours.
Kostenlos · 30 Minuten · Unverbindlich