The KRITIS regulation requires regular tests and audits for continuous validation of IT security measures. We conduct systematic reviews that not only meet regulatory requirements but also provide valuable insights for continuous improvement of your security architecture.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










The Section 8a compliance proof must be submitted to the BSI every two years. The audit covers document review, interviews, on-site inspection and technical assessment. Begin preparation at least six months before your submission deadline.
Years of Experience
Employees
Projects
We develop customized test and audit programs with you that systematically validate all aspects of your IT security and enable continuous improvements.
Development of risk-based test and audit plans
Execution of systematic technical and organizational tests
Comprehensive documentation and compliance-compliant reporting
Development and prioritization of improvement measures
Continuous adaptation of test strategies to new threats
"Regular tests and audits are the backbone of a living KRITIS compliance. They not only create regulatory security but also enable continuous evolution of security architecture in a changing threat landscape."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
We offer you tailored solutions for your digital transformation
We conduct comprehensive technical tests ranging from automated vulnerability scans to manual penetration tests that validate all layers of your IT infrastructure.
We systematically review the organizational aspects of your KRITIS compliance, from governance structures to operational processes and emergency plans.
Choose the area that fits your requirements
The threat landscape for critical infrastructure evolves constantly — AI-powered attacks, ransomware, and geopolitical cyber risks demand agile process adaptation. We integrate threat intelligence into your KRITIS security processes.
Security awareness is legally required for KRITIS operators. Our tailored training programs and awareness campaigns sensitize your employees to cyber threats and strengthen security culture in critical infrastructure.
The Section 8a compliance audit is conducted in two stages. In Stage 1, the audit scope is defined, documentation is reviewed and the audit plan is prepared. In Stage 2, the actual audit procedures take place: document review, interviews with responsible personnel, on-site inspection of systems and technical assessment. At the end, the compliance documents are prepared: BSI Form P (audit evidence), Form KI (description of the critical infrastructure), the audit report and, where applicable, a deficiency list. The BSI provides guidance documents (GAiN, RUN) that describe the exact procedure.
The audit basis is either a sector-specific security standard (B3S) recognised by the BSI, or established standards such as ISO 27001 or BSI IT-Grundschutz. Auditors must hold the special audit procedure competence for Section 8a BSIG. Since the NIS 2 transposition into the BSIG, the ten measure areas under Section
30 BSIG additionally serve as audit subjects, including risk analysis, incident management, business continuity, supply chain security and cryptography.
KRITIS operators must demonstrate to the BSI every two years that their IT security measures meet the state of the art. The deadline runs from the date of the last submission. Since the NIS 2 transposition in 2026, transitional provisions apply: operators may submit the next proof under the previous BSI requirements or already apply the NIS2-compliant requirements. The subsequent proof must then follow the updated procedure.
Penetration tests are a central component of the technical on-site assessment in the Section 8a procedure. The BSI recommends annual penetration tests for KRITIS operators, even though formal proof is only required every two years. Tests should follow recognised methodologies such as OWASP, the BSI penetration testing guide or PTES, and should cover IT/OT segmentation, firewall configurations, privileged accounts and, where applicable, physical access security. The pentest report serves as key evidence in the Section 8a audit.
With the transposition of the NIS 2 Directive into the BSIG, extended requirements apply. KRITIS operators are classified as particularly important entities and must demonstrate compliance with the ten measure areas under Section
30 BSIG. New requirements include supply chain security, use of cryptography and attack detection systems (SzA). The compliance procedure is being gradually adapted to NIS 2 requirements, with transitional periods in effect.
After completing the audit, the following documents must be submitted to the BSI: the audit evidence document (Form P), the critical infrastructure description (Form KI), the audit plan, the audit report with findings from the document review and on-site assessment, and where applicable a deficiency list with remediation deadlines. The BSI provides the forms and guidance documents (GAiN, RUN) that specify the exact scope and requirements for the compliance documents.
ADVISORI supports KRITIS operators throughout the entire audit cycle: in the preparation phase, we conduct a gap analysis to identify deviations from BSI requirements early. We assist with preparing the required documentation, conduct internal pre-audits and prepare responsible personnel for the interviews. Additionally, we provide regular penetration tests and vulnerability assessments between audit cycles to ensure security measures are continuously validated.
Discover how we support companies in their digital transformation
Klöckner & Co
Digital Transformation in Steel Trading

Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Festo
Intelligent Networking for Future-Proof Production Systems

Bosch
AI Process Optimization for Improved Production Efficiency

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance