pds-it
['Blog post','no']
IT Security
Blog
IT baseline protection (BSI)

IT Baseline Protection: How to Achieve a Verifiable Level of Security

Contents

    Implementing IT-Grundschutz in Your Organization: From Methodology to Certification

    [DEFINITION][IT-Grundschutz][IT-Grundschutz is an established standard that enables companies to systematically bring their information security up to a verifiable level. The approach combines specific security requirements with clear processes, thereby making information security manageable rather than ad hoc. As a result, measures are not implemented in isolation but are planned, reviewed, and continuously refined in a structured manner. IT-Grundschutz is particularly relevant for companies that are establishing a structured information security framework, making it auditable, or seeking certification.]

    In this article, you’ll gain a clear overview of the structure and functioning of IT-Grundschutz, the role of the IT-Grundschutz Compendium, and the central importance of scope, security requirements, and modeling. You’ll also learn when a risk analysis is necessary, how to successfully implement IT-Grundschutz within your organization, and how to achieve a verifiable level of security, all the way up to ISO 27001 certification.

    IT-Grundschutz: Key Points at a Glance

    • IT-Grundschutz establishes a verifiable level of security: The methodology developed by the Federal Office for Information Security combines specific security requirements with a controllable management system.
    • The IT-Grundschutz Compendium is the operational core: It provides building blocks, requirements, and implementation guidelines for securing processes, systems, and organizations in a structured manner.
    • Scope, security requirements, and modeling determine quality: Security concepts are only effective when there is a clearly defined information architecture, a robust assessment of security requirements, and the appropriate assignment of security components.
    • Risk analysis specifically supplements basic protection: it becomes relevant in situations where increased protection needs, special operating conditions, or unaddressed components necessitate additional security requirements.
    • Success depends on governance rather than individual measures: clear roles, documented processes, evidence, emergency management, and a phased implementation transform a formally established ISMS into an effectively implemented information security system.

    What is IT-Grundschutz?

    IT-Grundschutz is the structured methodology developed by the Federal Office for Information Security (BSI) that enables organizations to achieve an appropriate, verifiable, and manageable level of information security. The approach has evolved since the 1990s and is particularly widespread in Germany because it combines specific security requirements with a management system. This is relevant for companies because IT-Grundschutz not only defines security but also organizes its implementation, execution, and verifiability in the workplace.

    Today's IT baseline protection is based on five key references:

    • BSI Standard 200-1: Information Security Management Systems as a foundation for a structured information security management system.
    • BSI Standard 200-2: IT-Grundschutz methodology for the systematic implementation of security requirements.
    • BSI Standard 200-3: Risk analysis based on IT-Grundschutz for additional security requirements in cases where a higher level of protection is needed.
    • BSI Standard 200-4: Business Continuity Management to ensure emergency management and operational readiness.
    • IT-Grundschutz Compendium: A work and testing catalog containing modules and specific security requirements for practical implementation.

    [DEFINITION][Tip][If you come across terms like the "IT-Grundschutz Handbook" or "IT-Grundschutz Catalogs," they usually refer to older versions. Today, the IT-Grundschutz Compendium and the BSI Standards of the 200 series form the current basis.]

    How is the IT-Grundschutz Compendium structured?

    The IT-Grundschutz Compendium published by the Federal Office for Information Security translates IT-Grundschutz into specific building blocks and requirements for typical corporate environments. It serves as a central working and testing catalog and is often referred to simply as the BSI Compendium. It allows you to translate abstract security standards into concrete guidelines for processes, systems, and organizations.

    The structure of the compendium follows a layered model:

    • Process-oriented layers: Information Security Management System (ISMS), ORP for Organization and Personnel, CON for Concepts and Procedures, OPS for Operations, and DER for Detection and Response.
    • System-oriented layers: INF for infrastructure, NET for networks and communication, SYS for IT systems, APP for applications, and IND for industrial IT.

    Each module outlines the objective, scope, typical hazards, and the corresponding safety requirements for basic, standard, and core safeguards. This is supplemented by implementation guidelines that demonstrate how requirements can be met in practice and which safety measures have proven effective. These implementation guidelines are continuously updated to ensure that the compendium remains applicable in day-to-day operations.

    IT-Grundschutz profiles can also be used for typical use cases. They combine proven module assignments and requirements for specific industries, organizational types, or deployment scenarios, thereby simplifying modeling and implementation in practice.

    For risk analysis, IT-Grundschutz provides a list of basic threats. To this end, the BSI has defined 47 typical threat scenarios that cover areas such as organizational deficiencies, human error, technical failure, cyberattacks, and force majeure, among others, and support the use of the compendium. This means that threats, risks, and protection requirements do not have to be modeled from scratch, but can be built upon a structured and proven foundation.

    Making security levels predictable

    IT-Grundschutz makes information security manageable when you manage the scope, protection requirements, and risk analysis in the correct order. The process does not begin with individual security measures, but with a clearly defined information environment—that is, the entirety of business processes, applications, IT systems, physical locations, and communication links.

    You will then analyze and document the structure of the information network. This will clarify responsibilities, interfaces, and data flows before you assign modules or select measures. It is precisely this sequence that forms the basis for robust security concepts and a transparent level of security.

    The IT-Grundschutz methodology follows a clear security process:

    • Define the scope: Specifies which organizational units, processes, and systems are part of the information network, so that it is clear what is being audited and validated.
    • Perform a structural analysis: Identify target objects such as applications, IT systems, rooms, and communication links, along with their interdependencies.
    • Determine security requirements: Assess confidentiality, integrity, and availability for each target using categories such as normal, high, and very high.
    • Modeling building blocks: Assign appropriate building blocks from the IT-Grundschutz Compendium to the target objects and derive the target catalog from them.
    • Conduct an IT-Grundschutz assessment: Determines the degree of compliance with requirements through interviews, documentation, and structured reviews.
    • Plan and track actions: Prioritize implementation, assign responsibilities, and review effectiveness within the management system.

    Using Risk Assessment and Protection Needs Correctly

    Determining security requirements is the most effective way to prevent over- or under-protection. The overall security requirements for an IT system are derived from the highest value among confidentiality, integrity, and availability. By evaluating and justifying each of these core values separately, you can avoid blanket classifications that lack a solid basis in potential harm.

    In IT-Grundschutz, you use a risk analysis specifically in cases where the compendium alone is insufficient. Typical triggers include an increased need for protection, special operating conditions, or components that cannot be clearly mapped to existing modules. In these cases, the risk analysis justifies additional or more stringent security requirements.

    The risk analysis follows the BSI 200-3 standard and uses basic hazards as a starting point. Risks are assessed using a matrix that considers occurrence frequency and severity of damage, supplemented by a before-and-after comparison to evaluate the effectiveness of measures. This is particularly valuable for companies because it allows risks, risk mitigation, and risk treatment to be documented in a transparent manner and thoroughly verified during audits.

    Implementing IT-Grundschutz in the Enterprise: ISMS, Roles, and Processes

    IT-Grundschutz works only as a management system, not as a standalone set of measures. A robust level of security is achieved through clear responsibilities, defined processes, and regular oversight—not through individual technical measures. This is precisely why many security initiatives fail if a functioning information security management system is not in place.

    Responsibility lies primarily with senior management. They define security objectives, establish risk tolerance levels, and allocate resources. At the operational level, the information security officer oversees the security process, while business units, IT operations, HR, and procurement must be involved to ensure that security requirements are implemented across all areas.

    Documentation ensures not only compliance but also actual operational capability. You need at least:

    • Security Policy: Defines the objectives, requirements, and framework for information security within the organization.
    • IT-Grundschutz Model: Documents the assignment of modules as the basis for implementation.
    • Determination of security requirements: Justifies the classification of confidentiality, integrity, and availability.
    • Evidence of implementation: Show which security measures have been implemented and verified.
    • Action Plan: Manages priorities, responsibilities, and progress.

    Documentation, Tools, and Certification

    The implementation of IT-Grundschutz in organizations only scales effectively with the right tools. These tools support the identification of protection needs, risk analysis, reporting, audits, and cost control, and translate the methodology into clear, repeatable processes. This transforms individual documents into a manageable management system.

    IT-Grundschutz can be specifically combined with ISO 27001: While ISO 27001 defines requirements for the management system, IT-Grundschutz provides a concrete and verifiable catalog of measures for implementation through its compendium.

    A key purpose is to demonstrate a defined level of security. ISO 27001 certification based on IT-Grundschutz is available for both Standard and Core security levels. The IT-Grundschutz Compendium serves as a checklist, while the audit report forms the basis for the certification decision. Certification is granted through an external audit, during which the implementation, documentation, and effectiveness of the ISMS are systematically reviewed. For basic security, the BSI additionally provides a certificate as a standalone form of verification.

    The actual effort involved depends heavily on the size of the company, its complexity, and the chosen level of coverage.

    Ensuring Emergency Management and Timeliness

    IT-Grundschutz integrates resilience and emergency management directly into its methodology. The BSI 200-4 standard describes the structure of a business continuity management system and ensures operational capability even in the event of disruptions. In addition, mapping to ISO 22301 ensures that requirements remain compatible and verifiable.

    One factor that is often underestimated is the currency of the audit criteria. The IT-Grundschutz Compendium is updated regularly, for example with new editions and errata. For companies, this means that during audits and certifications, they must always refer to the current version and the latest corrections in order to demonstrate a valid level of security.

    Where IT-Grundschutz delivers the greatest benefits in a company

    IT-Grundschutz is particularly effective when information security needs to be implemented in a way that is effective, transparent, and cost-efficient. The methodology employs tiered approaches for basic, standard, and core security measures and covers typical processes, systems, and requirements in a structured manner using building blocks. This is particularly valuable for companies that want to not only implement individual measures but also establish a sustainable level of security backed by verifiable evidence.

    Typical areas of application for IT-Grundschutz include:

    • A Quick Start for SMEs: Basic coverage first mitigates the biggest risks at a manageable cost and creates a solid foundation for further expansion.
    • Protecting critical areas: Core protection prioritizes business processes and assets that are particularly vulnerable or require a high level of protection, so you can secure critical areas first.
    • Comprehensive standardization: Standard security measures establish a pragmatic level of security that you can build upon in a risk-managed way.
    • Audits and Certification: ISO 27001, based on IT-Grundschutz, combines ISMS requirements with a verifiable list of requirements from the compendium.
    • Cloud and Outsourcing: IT-Grundschutz helps clearly define the boundaries of responsibility between providers and users and, particularly in cloud and hybrid infrastructures, model these boundaries appropriately depending on the service model.
    • Detection, Response, and Incident Management: By using DER components and the BSI 200-4 standard, you can enhance your ability to detect and respond to incidents and maintain critical processes.

    Common challenges during implementation and what works in practice

    The most common issues with IT-Grundschutz do not stem from a lack of technology, but rather from weak governance, an overly broad scope, or a lack of alignment with business operations. A comprehensive, all-at-once rollout is too ambitious for many companies. In practice, a phased approach works better because it allows security, documentation, and processes to evolve in parallel.

    The following approaches have proven effective for typical challenges:

    • Scope too broad: A phased approach—with basic coverage for the broader scope or core coverage for particularly critical areas—makes it easier to get started. Only expand the scope once roles, processes, and documentation have been established.
    • Incomplete structural analysis: Consistently document systems, applications, communication links, rooms, and their interdependencies to ensure that the modeling of the building blocks remains technically sound.
    • Assess protection requirements on a flat-rate basis: Document confidentiality, integrity, and availability separately, and derive the overall protection requirement using the maximum principle, providing a brief justification.
    • Incorrectly assigned building blocks: Treat modeling as a methodical design process and assign building blocks precisely to each target object, rather than grouping them too broadly.
    • Requirements remain abstract: Translate implementation guidelines into clear work instructions so that general safety requirements can be translated into specific measures.
    • Unclear service provider interfaces: Define tasks, responsibilities, and handoffs in the contract and through established procedures, as responsibility for information security remains with the company.
    • Lack of audit evidence: Use checklists, clear status logic, and tool-based reporting to document implementation progress in a transparent manner and provide audit-proof evidence.
    • Risk analysis is omitted: Conduct a targeted risk analysis when there is an increased need for protection or when a module does not provide sufficient coverage, and consistently translate the results into additional safety requirements.

    For a quick yet robust start to basic security measures, a three-step approach is recommended: First, senior management establishes the framework; next, a security organization with clearly defined roles is set up; and finally, building on this foundation, a security strategy is developed that addresses the most critical requirements. This allows risks to be mitigated early on without hindering future development, and creates a robust foundation for standard or core security measures, all the way up to ISO 27001 certification based on IT-Grundschutz.

    IT Security Fundamentals Training: Build Your Knowledge and Get Certified

    IT-Grundschutz only realizes its full potential when the necessary expertise is systematically developed within the organization. The BSI’s methodology is clearly structured, but in practice it requires experience in implementation, modeling, risk analysis, and audit preparation. Continuing education thus becomes a key lever not only for documenting information security but also for effectively managing it.

    Our range of training courses on IT-Grundschutz covers both introductory and advanced topics. It includes training sessions and certification courses that qualify you for the roles of IT-Grundschutz Practitioner and Consultant. Related topics such as business continuity management are also part of the program and help you integrate emergency management and resilience into IT-Grundschutz in a structured manner.

    For companies, this results in more than just a transfer of knowledge: internal expertise grows in a targeted manner, reliance on external service providers decreases, and the quality of security concepts, documentation, and audits improves measurably.

    Get an overview of our professional development offerings and find the right programs for getting started, advancing your skills, and earning certification:

    [CTA]

    Author
    Benjamin Koehler
    Benjamin Koehler is a product manager at Haufe Akademie an expert in IT skills. He designs innovative learning programs to address the challenges of the digital world—with a particular focus on future-oriented IT skills, including IT security, cyber resilience, and the secure use of digital technologies.