Guide To Basic Protection Based On IT-Grundschutz: 3 Steps To Information Security
Guide To Basic Protection Based On IT-Grundschutz: 3 Steps To Information Security
www.bsi.bund.de/grundschutz
Copyright © August 2017 by
Federal Office for Information Security (BSI)
Godesberger Allee 185-189, 53175 Bonn
Section IT-Grundschutz
<[email protected]>
Foreword
Cyber security is a wide, abstract term. However, filling it with life starts in the smallest organisa-
tion. Not only the government can contribute to cyber security in Germany, but also every com-
pany – regardless of the size – must make a contribution. With the IT-Grundschutz, the BSI has
been providing a proven method and an extensive offer for many years which is successfully
used in the administrative and industry sectors. Many government agencies and large companies
are – also due to their financial and personnel resources – well positioned when it comes to in-
formation security.
However, the exchange with small and medium-sized enterprises mostly – still – reveals a differ-
ent picture. Even though the awareness for information security issues is given, there is often a
lack of trained personnel and financial resources for a sustained and reasonable implementation
of the necessary safeguards.
As the national cyber security authority, it is our claim to design the information security in the
digitalization and to increase Germany’s resistance against cyber threats. The design also involves
to offer feasible and target-oriented solutions. This is exactly where this guide to “Basic Protec-
tion“ starts: As part of the complete IT-Grundschutz Methodology, Basic Protection provides an
entry point for all companies who would like to look into the safeguarding of their IT systems
and data for the first time. The guide explains in a comprehensible manner the steps required for
reviewing the existing information security level as well as safeguards that can be quickly imple-
mented with minimum financial investment and a small number of employees. In addition to
technical aspects, infrastructural, organisational and personnel issues will be considered in line
with a holistic management system for information security.
I hope you find this a stimulating read that adequately addresses your questions about informa-
tion security, and most of all that it leads you to a successful implementation of the safeguards
described.
Yours faithfully,
Arne Schönbohm
President of the Federal Office for Information Security
Page 3
Table of contents
Foreword 3
1 Introduction 5
5 Appendix 34
5.1 The IT-Grundschutz Compendium – Everything you need to know at a glance.............................34
5.2 References........................................................................................................................................................................... 37
5.3 Glossary............................................................................................................................................................................... 38
Page 4
Guide to Basic Protection based on IT-Grundschutz
1 Introduction
The challenges for authorities and companies to protect sensitive data and communication pro-
cesses from unauthorised access are constantly increasing. Today’s technologies such as Smart
Home, Internet of Things and the ongoing digitalisation of all areas of work and life forces or-
ganisations of all sizes to invest more and more resources in maintaining the information secur-
ity.
Building a security level for all business processes, information and IT systems that meets the ac-
tual needs requires more than procuring anti-virus programs, firewalls or data backup systems: A
holistic concept is the basis and the starting point for developing a sustainable security manage-
ment. Information security management, or short IS management, is the element of general risk
management that aims to ensure the confidentiality, integrity and availability of information,
business processes, applications and IT systems. This is a continuous process in which strategies
and safeguards are constantly reviewed and adjusted to changing requirements.
Information security is not only a question of technology but rather depends substantially on the
organisational and personnel environment. The IT-Grundschutz takes this into account by de-
scribing both technical and non-technical security requirements for typical business areas, ap-
plications and systems according to the state of the art in the publications. In this context the fo-
cus is on practical security requirements with the objective of keeping the initial barriers to the
security process as low as possible and avoiding too complex approaches.
Page 5
Minor security incidents can be tolerated – that means such incidents which despite costing
money or otherwise causing damage do not threaten the existence.
Basic Protection allows the prompt implementation of the most important security require-
ments. Based on this, the security level can be further increased at a later time, for example, by
protecting all areas with the Standard Protection or critical business processes with the Core Pro-
tection.
Basic Protection thus provide a feasible introduction to information security as part of daily
practice – also and particularly – for small and medium-sized enterprises. Basic initial safeguards
can be implemented very quickly with relatively low effort.
Target group
In general, the guide is aimed at those who implement the information security in companies.
Typically these are Information Security Officers (ISO). In smaller organisations, where the area
of information security has not been professionally developed to such an extent (yet), other em-
ployees may initially assume this task. Suitable are, for example, employees from the areas Fin-
ance and Controlling, IT operation or the corporate data protection officer, however, due to their
original task and potential role conflicts with restrictions only.
Page 6
Guide to Basic Protection based on IT-Grundschutz
The present guide shows how Basic Protection can be implemented in three steps. The steps are
based on the phases of the security process according to the IT-Grundschutz Methodology.
Some of these phases can be performed simultaneously, for example, designing and planning the
security process can take place at the same time as establishing the information security organ-
isation. In this case the advance phases must be updated later to take the new results into ac-
count.
In the following, the steps of the security process are briefly described.
Page 7
1. Initiation of the security process
The management level must initiate, control and monitor the security process. This requires stra-
tegic guiding statements regarding the information security, on the one hand, and general or-
ganisational conditions, on the other. The Information Security Officer (ISO) plays the central
role in this process.
An essential basis for the design of the security process is the Policy for information security. It
describes for which scope the organisation envisages which security objectives and which secur-
ity level, what the motivation is for this and with which safeguards and which structures this is to
be achieved.
2. Organisation of the security process
An organisational structure suitable for the size and type of the organisation has to be estab-
lished for the information security management. For this purpose, interfaces, communication
channels and processes for cooperation have to be defined. In case of very small companies this
should be as uncomplicated as possible.
3. Implementing the security process
Once an information security process has been initiated and the security policy and information
security organisation have been defined, the security conception for the organisation can be de-
veloped in the next step. As a basis, the modules of the IT-Grundschutz Compendium contain
corresponding security requirements according to the state of the art for typical components of
business processes, applications, IT systems and other objects. These are structured thematically
and can be build on each other.
The IT-Grundschutz Methodology reduces the analytical effort to a gap analysis approach
between the security requirements from the relevant modules and the safeguards already real-
ised in the organisation. Requirements that are found to be missing or inadequately implemen-
ted reveal security deficits that can be rectified by consequently implementing the derived safe-
guards.
Page 8
Guide to Basic Protection based on IT-Grundschutz
The management bears the responsibility for achieving the security objectives, whereas the oper-
ative implementation and control of the security process is the responsibility of an ISO. All em-
ployees of an organisation must play their part in achieving the security objectives.
Page 9
Above all, the management level must ensure that information security is integrated into all rel-
evant business processes, specialist procedures and projects. Experience has demonstrated that
the ISO requires the full support of the management of the company or government agency in
order to be integrated by the relevant specialists responsible.
The management must set the objectives both for information security management and other
areas so that the aspired security level is achievable in all areas with the resources provided (HR,
time, finance).
Page 10
Guide to Basic Protection based on IT-Grundschutz
Officer has knowledge and experience in the issues relating to information security and IT. The
ISO should also have knowledge of the organisation's business processes.
Page 11
Not only technical, but also organisational aspects should be considered when defining the scope,
so that the areas of responsibilities and competences can be clearly defined. In any case it should
be clear which information, specialised tasks or business processes are explicitly considered in the
security concept.
The following aspects should be taken into account when defining the information system:
If possible, the scope should comprise all areas, aspects and components which serve for support-
ing the specialised tasks, business processes or organisational units and which are administrated
within the organisation.
If this is not possible, because the organisation of parts of the specialised tasks or business pro-
cesses considered depends on external partners, for example, within the scope of outsourcing, the
interfaces should be clearly defined, so that this can be taken into account within the scope of the
security concept.
Important aspect: Outsourcing
The outsourcing of business and supporting processes, such as, for example, the IT operation
continues to be viewed with criticism by many experts. In smaller organisations, a well planned
outsourcing project can nonetheless contribute to increasing the level of information security.
This applies in particular, if outsourcing solutions or the purchase of external services is used to
compensate for expert knowledge missing in the organisation. However, for outsourcing solu-
tions to have a positive impact on the information security, some rules have to be observed: Be-
fore the outsourcing of business processes, it must be clarified whether this might not be advis-
able for security reasons. One reason could be, for example, insufficiently guaranteed protection
of confidential data.
Once a decision for an outsourcing solution has been taken, the essential security requirements
for the project must be defined. These form, among other things, the basis for choosing an out-
sourcing service provider. As part of this process, proof of the information security in the organ-
isation and the qualifications of the employees should be obtained. Certificates such as IT-
Grundschutz or ISO 27001 may be useful indicators for a certain security level.
When drafting a contract with an outsourcing service provider, the security requirements and
criteria regarding service quality and security must be described with the highest possible level of
detail. The contract should also include provisions regarding the obligation to provide informa-
tion, the duty to cooperate and the obligation to carry out audits.
In addition, the contractor and the outsourcing service provider must agree a detailed security
concept including a contingency concept. During transfer of the tasks, the areas of responsibility
must be defined and a contact person must be appointed on both sides. The contractor must also
carry out regular checks for maintenance of the information security at the service provider or
have such checks carried out by a third party during the outsourcing project. Before completion
of an outsourcing project, the rights of ownership to the hardware and software as well as the re-
turn of the data from the service provider should be clarified.
Information security is a fundamental subject which should be addressed at an early stage when
choosing possible outsourcing service providers. In negotiations consisting of several stages with
different providers internal risk assessments can make the choice easier. It will however not be
possible to implement every security feature from the requirements specification at an accept-
able price. Additional information on the subject of outsourcing can be found in the IT-
Grund-schutz Compendium, in particular in module OPS.2 Operations of third parties.
Page 12
Guide to Basic Protection based on IT-Grundschutz
Page 13
At a glance: Examples of security objectives
High reliability for actions, and for handling information in particular (availability, integrity,
confidentiality)
Ensuring the good reputation of the organisation in the eyes of the public
Preserving the value of investments in technology, information, work processes and know-
ledge
Protecting the high and possibly irretrievable value of information processed
Satisfying the requirements resulting from statutory provisions
Protecting individuals with regard to their physical and mental integrity
Page 14
Guide to Basic Protection based on IT-Grundschutz
Page 15
As risks for information security as well as IT risks are among the most important threats for the
operational day-to-day business, the methods for information security management should be
coordinated with the already existing methods for handling risks in other areas. Detailed inform-
ation on this subject can also be found in BSI Standard 200-3 "Risk analysis based on IT-
Grund-schutz".
Page 16
Guide to Basic Protection based on IT-Grundschutz
Page 17
isting process landscapes, business distribution plans, databases, overviews, network plans and
inventory tools can be used to identify the essential business processes. In taking these overviews
into account, it should be ensured that the records don’t become too detailed. The aim is an ini-
tial general overview of which information is processed for a business process with which applic-
ations and IT systems. This can be used as a basis for taking further decisions.
Page 18
Guide to Basic Protection based on IT-Grundschutz
rooms should not. The result of the initial recording should be an overview which can be created
with relatively limited resources.
Page 19
At a glance: Designing and planning the security process
Appoint contact persons for all business processes and specialist tasks
Perform basic assessment on the value and security level of information, business processes
and specialist tasks
Determine internal and external framework conditions
Estimate the importance of business processes, specialist tasks and information
Set general information security objectives
Draw up a consolidated overview of the existing assets based on the knowledge gained pre-
viously
Page 20
Guide to Basic Protection based on IT-Grundschutz
After the scope has been defined in the previous step of organising the security process, the cre-
ation of a security concept following the implementation of Basic Protection is divided into the
following fields of action, which will be described in more detail in the following:
Selection and Prioritisation:
The information system under consideration should be mapped with the help of the mod-
ules from the IT-Grundschutz Compendium.
IT-Grundschutz Check:
In this step, it is checked whether and to what extent the specifications in the basic require-
ments according to IT-Grundschutz are already met and which security safeguards are still
missing.
Realisation:
Suitable security safeguards have to be defined and implemented for the basic requirements
not yet met.
Choice of the following approach:
The Basic Protection is intended as an initial approach. It must thus be defined at which time
and with which IT-Grundschutz approach the security level is to be increased further.
Page 21
Modelling according to IT-Grundschutz
In order to model an often complex information system according to IT-Grundschutz, the cor-
responding modules from the IT-Grundschutz Compendium have to be selected and implemen-
ted. For improved manageability the modules in the IT-Grundschutz Compendium are divided
into process- and system-oriented modules as well as different layers. Further details on the
structure and the contents can be found in the Appendix “The IT-Grundschutz Compendium –
Everything you need to know at a glance".
Modelling according to IT-Grundschutz now consists of selecting modules or individual aspects
for mapping the information system. Depending on the module, the target objects may be differ-
ent: individual business processes or components, groups of components, buildings, premises,
organisational units etc. If individual target objects cannot be mapped with the modules, com-
parable or higher-level modules must be used instead.
Page 22
Guide to Basic Protection based on IT-Grundschutz
In general, an information system contains already existing as well as planned parts so that the
resulting IT-Grundschutz model contains a test plan as well as parts of a development plan.
Therefore, all security requirements together form the basis for creating the security concept:
security requirements already met,
requirements identified as inadequately met or not met at all during the gap analysis, and
requirements arising for the parts of the information system that are still being planned.
Assignment of modules
The assignment of modules to target objects should be documented in the form of a table con-
taining the following columns:
Complete title and number of the module (e.g. SYS.3.1 Laptop)
Target object or target group: For example, this could be the identification number of a com-
ponent or a group or the name of a building or organisational unit
Contact person: This column serves initially only as a placeholder. The contact person is not
determined at the modelling stage, but only at the point when the gap analysis in the IT-
Grundschutz Check is being planned
Order: The implementation order (R1, R2, R3) of the module should be entered.
Notes: Additional information or the rationale behind the modelling can be documented in
this column
Page 23
At a glance: Modelling an information system
Systematically work through the "Layer model and modelling" section in the IT-
Grund-schutz Compendium.
Determine the target objects in the information system under consideration to which each
module in the IT-Grundschutz Compendium is to be applied.
Document the assignment of modules to target objects ("IT-Grundschutz model") and the
relevant contact persons.
Note target objects that cannot be modelled appropriately.
Define an order for the implementation of the modules.
Page 24
Guide to Basic Protection based on IT-Grundschutz
For the modules in the ORP, CON and OPS layers a suitable contact person will generally be
found by means of the subject matter dealt in the module. For example, for the module
ORP.2 Personnel the contact person should be an employee from the HR department. For the
design modules, the person whose terms of reference include updating procedures in the
area under consideration should be interviewed.
For the layer INF the selection of suitable contact persons should be agreed with the general
services and/or site technical services departments. Depending on the size of the organisa-
tion under consideration, different contact persons could be responsible, for example, for
the infrastructural areas of buildings and technology rooms. In small organisations the care-
taker will often be able to provide the information.
In the system-oriented modules in the SYS, NET and IND layers, there is a heavy emphasis
on technical aspects in the security safeguards to be checked. Possible contact persons are
therefore generally the administrators of these components or groups of components.
For the modules in the layer APP the persons responsible for the individual applications
should be selected as the main points of contact.
Page 25
been minimised appropriately. If basic requirements are not met, generally an
increased risk remains present.
Requirements must not be set to "unnecessary” by generally accepting or rul-
ing out the risk for an elementary threat identified in the module using the
cross-reference table.
"yes" Appropriate safeguards have been implemented completely, efficiently and ap-
propriately for the requirement.
“partially" The requirement has only been partially implemented.
"no" The requirement has not been met yet, i.e. appropriate safeguards have largely
not been implemented yet.
It is useful to have the module texts as well as the implementation recommendations or other
supplementary material at hand during the interviews.
Page 26
Guide to Basic Protection based on IT-Grundschutz
Persons responsible
If, when performing the gap analysis, it is clear which member of staff will be responsible for
fully implementing a requirement or safeguard not fulfilled yet, the name of this person
should be documented in this field. Otherwise, a responsible person should be determined
as part of the later implementation planning.
Notes/reason(s)
This field is important to be able to understand decisions made at a later point. In the case of
requirements whose implementation appears dispensable, the rationale for this should be
stated here. In the case of requirements that have not yet been implemented or only partially
implemented, this field should document which safeguards still have to be implemented.
Any other notes which will assist in eliminating deficits or which need to be considered in
the context of the requirement should also be entered here.
Deficits/cost estimate
For requirements that have not yet been met or only partially met, the associated risk should
be determined and documented in an appropriate form. In the case of such safeguards, an
estimate of the financial and staffing resources that will be needed to eliminate the deficits
should be made.
Forms which can be used as resources for documentation of the IT-Grundschutz Check are avail-
able for all modules of the IT-Grundschutz Compendium on the BSI website.
Page 27
In the modelling step, the modules to be implemented for the individual target objects of the in-
formation system under consideration were selected. The requirements which typically have to
be implemented for these components in order to achieve an appropriate security level are de-
scribed in the modules. For implementation of the Basic Protection, only the basic requirements
need to be observed. They are of such elementary importance that their implementation is essen-
tial for the safeguarding of the information system. In addition, fulfilling the basic requirements
usually delivers good results with a comparably low use of resources, so-called quick wins. The
standard requirements as well as the requirements in the case of high protection requirements
are relevant for the approaches of the Standard and Core Protection. But also within the scope of
Basic Protection, it may be viable to take a look at these requirements in order to further increase
the security level.
The requirements in the modules are formulated briefly and concisely. They must be translated
into practical security safeguards which are appropriate for the organisational and technical cir-
cumstances in the organisation and meet the relevant requirements.
The safeguards serve as action guidelines for the various participants in the security process.
Therefore, they must
be adapted to the relevant framework conditions and the terminology used in an organisa-
tion, and
be sufficiently specific to be able to be applied in the information system under considera-
tion, i.e. contain technical details, for example.
In general, the requirements of the IT-Grundschutz modules should always be implemented in a
general sense. All changes with regard to the IT-Grundschutz Compendium should be docu-
mented for better traceability.
Implementation recommendations are available for many modules of the IT-Grundschutz Com-
pendium describing detailed and tried and tested safeguards for the security requirements. On
the one hand, these safeguards are formulated in a very general manner so that they can be ap-
plied in as many environments as possible, and on the other hand, they are described in great de-
tail to facilitate their implementation..
The safeguards suggested in the implementation recommendations should also be adapted to
the relevant framework conditions of an organisation. It can be appropriate, for example,
to further specify safeguards, i.e. to add technical details, for example,
to adapt safeguards to the terminology used in the organisation, i.e. to use different role
names, for example, and
to delete any recommendations which are not relevant in the area under consideration from
safeguards.
It is also important to plan for measures accompanying the implementation. These include, for
example, measures for raising awareness among employees to emphasise the concerns of in-
formation security as well as the necessity and the consequences of the safeguards.
In rare cases, it is possible that individual requirements of the elementary basic requirements
cannot be implemented under the specific framework conditions, for example, if their imple-
mentation would cause essential problems in other areas. This may be the case, for example, if
fire control and intrusion protection requirements are incompatible. In such cases, different solu-
tions must be found and the circumstances clearly documented.
Page 28
Guide to Basic Protection based on IT-Grundschutz
In order to be able to trace the procedure followed in drawing up and adapting the list of specific
safeguards at a later point, it should be documented. If security requirements are added or modi-
fied, this must also be documented in the security concept. When selecting and adapting the se-
curity safeguards based on the requirements, it must be observed that they should always be ap-
propriate. Appropriate means:
Effectiveness: The safeguards must provide effective protection against the potential threats,
i.e. cover the protection requirements identified.
Qualification: They must be able to be implemented in practice, i.e. they may not, for ex-
ample, excessively hinder organisational procedures or weaken other security safeguards.
Practicability: They should be easy to understand, easy to apply and generally not prone to
error.
Acceptance: They must be easy to apply for all users and must not discriminate or impair
anybody.
Cost-effectiveness: An optimum result should be achieved with the resources used. This
means that the security safeguards should, on the one hand, minimise the risk in the best
possible manner, and on the other hand, be proportionate to the assets to be protected.
Page 29
Specification of the order of implementation of the safeguards
The IT-Grundschutz Compendium describes an order in which the modules should be imple-
mented, from basic and comprehensive modules to such which cover more specific subjects and
can thus be considered with less priority in respect to the time of their implementation. This or-
der of implementation of the modules is particularly important when implementing Basic Pro-
tection. All safeguards derived from the basic requirements must be implemented for every mod-
ule. However, it may also be useful to take a look at the relevant standard requirements and the
requirements for elevated protection requirements, as these often describe and cover additional
aspects.
If the existing budget or the staffing resources are not sufficient to be able to implement all the
required safeguards immediately, a prioritisation must be determined here.
The further order of implementation is based on what is most appropriate for the relevant or-
ganisation. Here some tips:
For some safeguards, there are dependencies and logical relationships that require a specific
chronological order.
The order of implementation can be based on when the relevant safeguards can be imple-
mented within the life cycle of a target object. In the case of new target objects, for example,
safeguards from the areas of planning and design should be implemented before such safe-
guards which deal with the secure operation. In the case of target objects which have been in
the information system for a longer period securing the operation should be a priority.
Some safeguards affect a large area, while the others have stronger local effects. It often
makes sense to handle those safeguards affecting a large area first. However, it is also useful
to weight the safeguards from the different areas according to how fast they can be imple-
mented and to which security gain they provide. Quick wins can be often found in the or-
ganisational area or can be achieved by central configuration settings.
The implementation of some modules has a larger impact on the desired security level than
others. For example, safeguarding of servers should always come before safeguarding the
connected clients.
Modules, where a strikingly high number of requirements was identified as not met during
the gap analysis, represent areas with many vulnerabilities. They should also be given prefer-
ence.
Page 30
Guide to Basic Protection based on IT-Grundschutz
Page 31
4 Information security is a process: Follow-up options
The implementation of Basic Protection is an important first step towards significantly increas-
ing the level of information security in an organisation. It also establishes an initial solid base for
the management system for information security. The selected security safeguards must be im-
plemented further and specifications such as the security policy must be continuously updated to
be able to maintain and to improve the information security process now started. This includes
also to regularly review the IS process for its effectiveness and efficiency.
A regularly performance review and assessment of the process should be carried out by the man-
agement. For example, if the number of security incidents is increasing or in case of significant
changes to the framework conditions, an additional review must be conducted between the reg-
ular ones. All results and decisions must be documented transparently. It is the task of the ISO to
collect and to process this information and to inform the management.
By implementing Basic Protection, an organisation can achieve a good level of information se-
curity. In this initial process, many aspects have been considered, responsible specialists have
been involved and the awareness of employees has been raised. However, given the highly com-
plex and dynamic nature of information security, Basic Protection can merely be an initial start-
ing point for addressing the subject: In the best case, the organisation continues the process with
the two follow-up approaches from the IT-Grundschutz Methodology.
Core Protection
The focus of the Core Protection is initially on the business processes and assets at particular risk.
This approach is recommended if an organisation largely meets the following criteria:
The number of business processes with significantly elevated protection requirements is
limited or only comprises a small part of all business processes of the organisation.
The organisation is able to swiftly identify and clearly define those business processes hav-
ing a significantly elevated risk potential regarding their information security.
The organisation clearly owns identifiable assets the theft, destruction or compromising of
which would cause damage threatening the existence of the organisation (so called crown
jewels). These should be protected as a matter of priority.
Minor security incidents, which cost money or cause other damage, but do not cause dam-
age threatening the existence, are acceptable for the organisation.
Standard Protection
Standard Protection essentially corresponds to the classic IT-Grundschutz Methodology. Stand-
ard Protection provides an ISO with the means for comprehensive and in-depth safeguarding of
the assets and processes of an organisation. Approaching the security process with Standard Pro-
tection is recommended, if the organisation largely meets the following criteria:
The implementation of information security has reached a sufficient degree of maturity in
the organisation, so that security safeguards already exist in key areas and no basic initial
safeguards are required.
There is no need to take action to safeguard individual business processes as a matter of pri-
ority, which have a significantly elevated risk potential regarding their information security
(see Core Protection).
Page 32
Guide to Basic Protection based on IT-Grundschutz
The organisation does not have any assets the theft, destruction or compromising of which
would cause an immediate damage threatening the existence and which therefore need to
be safeguarded as a matter of priority.
Security incidents, which conceivably impair the fulfilment of tasks, cost money or other-
wise cause noticeable damage, are not acceptable for the organisation, even if they do not yet
cause damage threatening the existence.
Within the IT-Grundschutz Methodology, the Standard Protection represents the approach
which generally should be aspired in order to provide appropriate and comprehensive protection
for all areas of an organisation.
By increasing the information security level, every organisation makes an important contribu-
tion towards improving the cyber security in Germany. The more professionals in companies and
government agencies deal with the fundamentally important questions regarding information
security and safeguards for protection and defence, the greater the gains for Germany's economy.
The IT-Grundschutz with the updated contents in the BSI standards and the IT-Grundschutz
Compendium provides comprehensive and practical solutions for companies of all sizes.
Page 33
5 Appendix
5.1 The IT-Grundschutz Compendium – Everything you need to know at a
glance
The IT-Grundschutz Compendium contains the IT-Grundschutz modules, in which different
subjects of information security with regard to the specific threat scenario as well as security re-
quirements are elaborated. It is made available online as the successor to the previous IT-Grunds-
chutz Catalogues on an annual basis in the form of an updated edition.
Process modules:
The ISMS layer contains the module Security management as a basis for all subsequent activ-
ities in the security process.
The ORP layer contains the modules covering organisational and personnel security aspects.
The CON layer contains modules dealing with concepts and approaches.
Page 34
Guide to Basic Protection based on IT-Grundschutz
The OPS layer comprises all operational security aspects. These are in particular the security
aspects concerning the operational side of IT, but also such aspects which should be ob-
served in IT operations for third parties.
The DER layer contains all modules which are relevant for reviewing the implemented se-
curity safeguards and in particular for detecting security incidents and the suitable reactions
to those.
System modules:
The APP layer deals with the safeguarding of applications and services, among other things,
in the areas of communication, directory services, network-based services and business and
client applications.
The SYS layer addresses the individual IT systems of the information system that may have
been divided into groups.
The NET layer examines the networking aspects not directly related to specific IT systems,
but to the network connections and the communication.
The INF layer is concerned with architectural and structural factors, in which aspects of the
infrastructural security are brought together.
The IND layer is concerned with security aspects of industrial IT.
The division into process and system modules has the advantage that general aspects and com-
mon infrastructural issues can be considered separately from the IT systems. Redundancies are
avoided, because individual aspects only need to be addressed once and not for every IT system
individually. Breaking down the security aspects into layers also enables individual subject areas
within the ensuing security concepts to be updated and expanded more easily, without having a
significant effect on other layers.
Page 35
The indicated order is merely a recommendation. Every organisation can define a differing order,
as appropriate for their requirements.
Threats
Every module begins with a description of the specific threat scenario for a subject. As an addi-
tion, the relevant appendix contains a list of the elementary threats which were considered when
creating the module. The list of threads belongs to the first stage of the simplified risk analysis for
typical environments of information processing and forms the basis on which the BSI compiled
specific requirements, the implementation of which can ensure an appropriate level of informa-
tion security in an organisation. The advantage is that, for typical scenarios, the users do not need
to carry out tedious or additional analyses to achieve the security level needed for normal pro-
tection requirements. It is sufficient to identify the modules relevant for the business processes
under consideration and their necessary resources and to implement the requirements recom-
mended therein in a consistent and comprehensive manner.
Security requirements
In every module, the security requirements that are relevant for the protection of the object un-
der consideration are listed. They describe what has to be done for its protection. The require-
ments are grouped into three categories:
Basic requirements must be met as a matter or priority, as with these recommendations
maximum benefit can be achieved with (relatively) minimal effort. They are unconditional
requirements. The basic requirements form the basis for the Basic Protection approach.
Standard requirements are based on the basic requirements and address normal protection
requirements. They should generally be met, but not as a matter of priority. The objectives of
the standard requirements must be met to achieve standard safeguarding. However, due to
the relevant framework conditions of an organisation, reasons may arise why a standard re-
quirement cannot be implemented as described, but the security objectives are reached in a
different manner. If a standard requirement is met by other security safeguards, the arising
impacts must be carefully evaluated and documented in an appropriate manner.
Requirements for high protection requirements are a selection of suggestions for extended
safeguards that may be considered as a basis for developing suitable requirements and safe-
guards in case of elevated security requirements or under specific framework conditions.
Implementation recommendations
Detailed implementation recommendations are available for many modules of the IT-Grunds-
chutz Compendium. They describe how the requirements of the modules can be implemented
and explain suitable security safeguards with a detailed description. The security safeguards can
be used as a basis for security concepts, but should be adapted to the framework conditions of
the relevant organisation.
The implementation recommendations address the groups of persons that are responsible for
the implementation of the module requirements, for example, the IT operations or building ser-
vices departments.
Page 36
Guide to Basic Protection based on IT-Grundschutz
5.2 References
[BSI1] Managementsysteme für Informationssicherheit (ISMS) [English version: Informa-
tion Security Management Systems, BSI Standard 100-1], BSI Standard 200-1, https://www.b-
si.bund.de/grundschutz
[BSI2 ] IT-Grundschutz-Methodik, BSI Standard 200-2 [English version: IT-Grundschutz
Methodology, BSI Standard 100-2], https://www.bsi.bund.de/grundschutz
[BSI3] Risikoanalyse auf der Basis von IT-Grundschutz, BSI Standard 200-3 [English version:
Risk analysis based on IT-Grundschutz, BSI Standard 100-3], https://www.bsi.bund.de/grunds-
chutz
[GSK] IT-Grundschutz-Kompendium - Standard-Sicherheitsmaßnahmen [English version:
IT-Grundschutz Compendium - Standard Security Safeguards], BSI,
new each year, https://www.bsi.bund.de/grundschutz
Page 37
5.3 Glossary
This glossary lists the most important terms for management systems for information security
(ISMS). An additional glossary on cyber security can be found on the BSI website at
http://www.bsi.bund.de/cyberglossar.
Assets
Assets refer to inventories of objects which are required for a specific purpose, in particular to
meet business objectives. As a synonym for "asset" the term “value” is often used. However, the
term “value” can have many meanings – from the social relevance of something up to the in-
ternal quality of an object. In the IT-Grundschutz, the term "assets" is used in the meaning of
“valuable target objects".
Availability
The availability of services and IT system, IT application, and IT network functions, or even of in-
formation is guaranteed if the users are able to use them at all times as intended.
Basic Protection
Basic Protection enables the implementation of comprehensive, basic initial safeguards across all
business processes and/or specialist procedures of an organisation as a first entry point into the
IT-Grundschutz.
Basic requirement
See Security requirement.
Business process
A business process is a set of logically linked individual activities (tasks, workflows) that are car-
ried out to meet commercial or operational objectives.
Confidentiality
Confidentiality means protection against the unauthorised disclosure of information. Confiden-
tial data and information should only be accessible to those authorised using the allowed access
methods.
Core Protection
The focus of the cores safeguards is initially on the business processes and assets at particular
risk.
Core values of information security
The IT-Grundschutz defines three core values of information security:
Confidentiality,
Availability and
Integrity.
Each user is naturally free to include additional core values when assessing protection require-
ments if this is helpful in individual cases. Other generic terms concerning information security
include, for example:
Authenticity
Binding Character
Page 38
Guide to Basic Protection based on IT-Grundschutz
Reliability
Non-repudiation
Crown jewels
The term crown jewels refers to such assets the theft, destruction or compromising of which
would cause damage threatening the existence of the organisation.
Cyber security
Cyber security is concerned with all aspects of security in information and communication tech-
nology. The field of action of information security is extended to the entire cyber space. This
comprises all information technology connected to the Internet and comparable networks and
includes communication, applications, processes and processed information based on this. A spe-
cial focus is often on attacks from cyber space when considering cyber security.
Damage / Consequence
A deviation from an expected results leads to a consequence (often referred to as “damage”). As a
matter of principle, this can be a positive or a negative deviation.
A positive consequence/positive damage within the meaning of the opportunity and risk ana-
lysis is also referred to as an opportunity. In most cases, however, only the negative con-
sequences, I.e. The damage, are considered in the risk analysis.
The scale of a damage is defined as extent of damage and can be referred to as directly quantifi-
able or not directly quantifiable. The quantifiable damage can usually be described with direct ef-
forts (e.g. of financial nature). Not directly quantifiable damage includes for example damage to
one’s image or opportunity costs. In these cases, the actual extent of damage can often only be
assumed or estimated. All information is usually classified in categories due to empirical or in-
dustry values.
Data protection
Data protection is intended to protect the right to privacy of individuals from being violated
through improper handling of his or her personal data. Data protection is therefore used to refer
to the protection of personal data against eventual misuse by third parties (not to be confused
with the term data security).
The terms "data protection" and "data privacy" differ slightly, though: "Data protection" refers to
data protection as a legal concept. The term "data privacy", on the other hand, is more directly re-
lated to the lives of people (i.e. the protection of their privacy) and is used primarily in the U.S., al-
though its use is becoming more common in the European Union.
Information security
The aim of information security is to protect information. This information might be stored on
paper, on computers, or inside people's heads. IT security primarily concerns protecting and pro-
cessing information stored electronically. The term “information security” is therefore more
comprehensive than the term “IT security” and is being used more and more often. However,
since the term “IT security” is still overwhelmingly used in the literature, it will still be used in
this and other publications relating to IT-Grundschutz, although the documents will place more
and more emphasis on considering information security over time.
Information security management (IS management)
The planning, management, and control roles essential for establishing and continuously imple-
menting a thoroughly thought through and effective process for ensuring information security
are referred to as information security management. This is a continuous process to monitor
Page 39
strategies and concepts on an ongoing basis for their performance and effectiveness and to up-
date them as required.
The term “IT security management” is still frequently used in IT-Grundschutz for the same reas-
ons as mentioned above for the terms “Information security” and “IT security”
Information Security Officer (ISO)
An Information Security Officer (short IS Officer or ISO) is responsible for the operative fulfil-
ment of the task of “information security”. Other designations are CISO (Chief Information Se-
curity Officer) or information security manager (ISM). Information security comprises the com-
prehensive area of the protection of information, namely in and with IT, but also without IT or
beyond IT. IT security is thus a subdivision of information security and deals specifically with the
protection of the IT employed. In addition to the ISO, there can be a dedicated officer for IT se-
curity. This person typically operates in the IT area, while the ISO reports directly to the manage-
ment level.
Information system
An information system (or also IT system) refers to all infrastructural, organisational, personnel,
and technical objects serving to perform tasks in a particular field of application of information
processing. An information system may refer to the entire organisation or to individual areas
defined by organisational structures (e.g. departments) or joint business processes and/or shared
applications (e.g. HR information system).
Information technology (IT)
Information technology (IT) encompasses all technical resources which serve for processing or
communicating information. Information processing includes acquisition, recording, use, stor-
age, communication, program-controlled processing, internal display and output of information.
Integrity
Integrity refers to ensuring the correctness (intactness) of data and the correct functioning of
systems. When the term integrity is used in connection with the term “data”, it expresses that the
data is complete and unchanged. In information technology terms this is, however, used some-
what more widely, also for the term “information”. The term “information” is used for data that,
depending on the context, can be associated with certain attributes such as the author or the
time and date of creation. Loss of the integrity of information can therefore mean that it was
changed without authorisation, the information regarding the author was tampered with or that
the date of creation was manipulated.
IT-Grundschutz Check
In IT-Grundschutz, this term refers to the investigation of whether the requirements recommen-
ded according to IT-Grundschutz are already met in an organisation and which basic security re-
quirements are still missing (previously: basic security check).
IT-Grundschutz Compendium
The modules of the IT-Grundschutz are summarised in the IT-Grundschutz Compendium. It is
the successor to the IT-Grundschutz Catalogues available up to the 15th version.
IT Security Officer
Person with technical competence in IT security who is in charge of aspects around IT security in
close cooperation with the IT operation. The role of the person in charge of information security
has different names depending on the type and orientation of the organisation. IT-Grundschutz
uses the designation Information Security Officer (ISO).
Page 40
Guide to Basic Protection based on IT-Grundschutz
Modules
The IT-Grundschutz Compendium contains explanations regarding the threat scenario, security
requirements, and additional information for different processes, components and IT systems,
each summarised in a module. The Compendium has a modular structure and its focus is on rep-
resenting the major security requirements in the modules. According to the basic structure the
modules are divided into process- and system-oriented modules, and they are also categorised in
a layer model according to subjects.
Organisations
The term “organisations” is used in this context for companies, government agencies, and other
public and private organisations.
Policy for information security
The policy is a central document for the information security of an organisation. It describes how
information security is to be established in the organisation, for which purposes and with which
resources and structures. It contains the information security objectives aimed at by the organ-
isation and the information security strategy pursued. The security policy therefore also de-
scribes the level of security aimed at in a government agency or company beyond the security
objectives.
Requirements in the case of high protection requirements
See Security requirement.
Risk
Risk is also often defined as the combination (i.e. the product) of the frequency of occurrence of
damage and the extent of this damage. The damage is often described as the difference between a
planned and unplanned result. Risk is a special form of uncertainty or rather imponderability.
The ISO also defines risk as the result of imponderabilities on target objects. Within this mean-
ing, the term “consequences” is used instead of damage, if events occur differently than expected.
In this context, a consequence can be negative (damage) or positive (opportunity). However, the
above definition has become more common in practice.
In contrast to the term "threat", the term "risk" includes an assessment of the extent to which a
certain damage scenario is relevant to the scenario being examined.
Risk analysis
The term “risk analysis” refers to the complete process for determining (identifying, assessing
and evaluating) and treating risks. According to the relevant ISO standards ISO 31000 ISO 27005,
“risk analysis” only refers to a single step as part of the risk determination, which consists of the
following steps:
Risk Identification
Risk Analysis
Risk Evaluation
In the meantime, however, the term “risk analysis” has been established for the entire process of
risk determination and risk treatment. Therefore, the term “risk analysis” is still used in this doc-
ument to refer to the comprehensive process.
Risk management
Risk management refers to all activities with respect to the strategic and operative treatment of
risks, i.e. all activities to identify, control and monitor risks for an organisation.
Page 41
The strategic risk management describes the essential framework conditions how the handling
of risks within an organisation, the culture regarding the handling of risks and the methodology
are designed. These principles for the treatment risks within an ISMS must be consistent with the
framework conditions of the organisation-wide risk management or coordinated.
The framework conditions of the operative risk management include the control process con-
sisting of
Risk identification
Risk assessment and evaluation
Risk treatment
Risk monitoring and
risk communication
Security concept
A security concept serves to implement the security strategy and describes the approach planned
to achieve the security objectives set in an organisation. The security concept is the main docu-
ment in the security process of a company and/or government agency. It must be possible to
trace every security safeguard back to the security concept.
Security design
The creation of a security design is one of the primary tasks of information security manage-
ment. Based on the results of the structure analysis and the protection requirements determina-
tion, the required security safeguards are identified and documented in the security concept.
Security policy
In a security policy the security objectives and general security requirements are formulated in
the sense of the official regulations of a company or a government agency. Detailed security safe-
guards are contained in a more comprehensive security concept.
Security requirement
The term “security requirement” refers to requirements for the organisational, personal, infra-
structural and technical area the fulfilment of which is necessary in order to increase the inform-
ation security or contributes towards it. A security requirements also describes what has to be
done in order to achieve a specific level regarding the information security. How the require-
ments can be fulfilled in the specific case is described in corresponding security safeguards (see
there). The term "control" is also often used for security requirements.
The IT-Grundschutz differentiates between basic safeguards, standard safeguards and require-
ments in the case of high protection requirements. Basic requirements are fundamental and
must always be implemented, unless there are substantial reasons against it. Standard require-
ments must generally be implemented for normal requirements, unless they are replaced by at
least equal alternatives or the deliberate acceptance of the residual risk. Requirements in the case
of high protection requirements are exemplary suggestions, which should be implemented in an
appropriate manner in the case of corresponding protection requirements.
Security safeguard
The term security safeguard (safeguard for short) refers to all actions serving to control and
counteract security risks. This includes organisational, personnel, technical or infrastructural se-
curity safeguards. Security safeguards serve to fulfil security requirements (see there). The terms
security precaution and protective measure are often used synonymously. "Security measure” or
“measure” are also used.
Page 42
Guide to Basic Protection based on IT-Grundschutz
Specialised task
Specialised tasks are tasks resulting from an organisation’s specific purpose or mission. In the IT-
Grundschutz, the term “specialise tasks” is used for business processes in government agencies.
Standard Protection
Standard Protection essentially corresponds to the classic IT-Grundschutz Methodology. Stand-
ard Protection provides an ISO with the means for comprehensive and in-depth safeguarding of
the assets and processes of an organisation.
Standard requirement
See Security requirement.
Structure analysis
As part of a structure analysis, the necessary information on the selected information system, ap-
plications, IT systems, networks, rooms, buildings, and connections is captured and prepared in
such a way that it supports the next steps of IT-Grundschutz.
Target objects
Target objects are those parts of the information system one or several modules from the IT-
Grundschutz Compendium can be assigned to within the framework of modelling. Target objects
may include physical objects, such as networks or IT systems. Often however, target objects are
logical objects such as organisational units, applications, or the entire information system.
Threat
A threat is a basic threat with a direct effect on an object as the result of a vulnerability. A threat
therefore only becomes an imminent threat for an object when it is combined with a vulnerabil-
ity.
For example, is harmful software a basic or applied threat to the user who is surfing the Internet?
According to the above definition it can be ascertained that all users are principally exposed to a
basic threat by harmful software on the Internet. The user who downloads an infected file is ex-
posed to a threat by the harmful software, if his computer is vulnerable to this type of harmful
software. Users with effective anti-virus protection, a configuration preventing the harmful soft-
ware from working, or an operating system not able to execute the code of the harmful software
are not exposed to a threat as a result of the downloaded harmful software, however.
Vulnerability
A vulnerability is a security-relevant error of an IT systems of an organisation. Causes may in-
clude the design, the algorithms used, the implementation, the configuration, or the operation, as
well as the organisation itself. A vulnerability may cause a threat to become effective and damage
an organisation or a system. As a result of a vulnerability an object (an organisation or a system)
is susceptible to threats.
Page 43