May 13, 2019 posted by

The IT Baseline Protection Catalogs, or IT-Grundschutz-Kataloge are a collection of documents from the German Federal Office for Security in Information. @misc{BSI, added-at = {T+}, author = {für Sicherheit in der Informationstechnik, Bundesamt}, biburl. IT-Grundschutz-Kataloge. 2 likes. Book. IT-Grundschutz-Kataloge. Book. 2 people like this topic. Want to like this Page? Sign up for Facebook to get started.

Author: Nekora Nar
Country: Central African Republic
Language: English (Spanish)
Genre: Education
Published (Last): 28 January 2013
Pages: 94
PDF File Size: 5.70 Mb
ePub File Size: 11.73 Mb
ISBN: 521-3-57921-869-1
Downloads: 60891
Price: Free* [*Free Regsitration Required]
Uploader: Tezahn

The collection encompasses over pages, including the introduction and catalogs. It serves as the basis for the IT baseline protection certification of an enterprise. During realization of measures, personnel should verify whether adaptation grnudschutz the operation in question is necessary; any deviations from the initial measures should be documented for future reference.

Bundesamt für Sicherheit in der Informationstechnik

In the process, layers are used for structuring individual measures groups. However, the cross-reference tables only cite the most important threats. The component catalogs, threat catalogs, and the measures catalogs follow these introductory sections.

If the measure cited for a given threat is not applicable for the individual IT system, it is not superfluous. The component catalog is the central element, and contains the following five layers: Federal Office for Security in Information Technology. These present supplementary information. The detection and ggundschutz of weak points in IT systems often occurs by way of a risk assessmentwherein a threat potential is assessed, lataloge the costs of damage to the system or group of similar systems are investigated individually.


System administrators cover the third layer, looking at the characteristics of IT systems, including clientsservers and private branch exchanges or fax grunddschutz. If notability cannot be established, the article is likely to be mergedredirectedor deleted.

The conclusion consists of a cost assessment. Instead, it presents the information that decision makers need to assess the topic of information security and possible courses of action, to ask their experts the right questions and to set objectives. Partitioning into layers clearly isolates personnel groups impacted by a given layer from the layer in question.

Finally, a serial number within the layer identifies the element. Individual threat sources are described briefly.

IT Baseline Protection Catalogs

They summarize the measures and most important threats for individual components. The aim of IT- Grundschutz is to achieve an appropriate security level for all types of information of an organisation. The topic of this article may not meet Wikipedia’s general notability guideline. Grundscutz will find in the IT- Grundschutz Catalogues the modules, threats and safeguards. The following layers are formed: Finally, the realization is terminated and a manager is named.

This publication does not intend to make managers into security experts. The respective measures or threats, which are introduced in the component, can also be relevant for other components.

If the measures’ realization is not possible, reasons for this are katalohe in the adjacent field for later traceability.

IT- Grundschutz The aim of IT- Grundschutz is to achieve an appropriate security level for all types of information of an organisation. In the process, classification of measures into the categories A, B, C, and Z is undertaken.


It is not necessary to work through them to establish baseline protection.

Please help to establish notability by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. IT baseline protection protection encompasses standard security measures for typical IT systems, with normal protection needs.

BSI – IT-Grundschutz Catalogues

To familiarize the user with the manual itself, it contains an introduction with explanations, the approach to IT baseline protection, a series of concept and role definitions, and a glossary.

Measures, as well as threats, are cited with mnemonics. A detailed description of the measures follows. Measures are cited with a priority and a classification. The threat catalogs, in connection with the component catalogs, offer more detail about potential threats to IT systems. Kkataloge this way, a network of individual components arises in the baseline protection catalogs.

The given threat situation is depicted after a short description of the component examining the facts. C stands for component, M for measure, and T for threat. BundesanzeigerCologne The text follows the facts grundachutz the life cycle in question and includes planning and design, acquisition if necessaryrealization, operation, selection if necessaryand preventive measures.