IT-Grundschutz from the Federal Office for Information Security (BSI) provides organisations with a proven methodology for systematically building information security. We guide you from protection needs assessment through modelling with IT-Grundschutz building blocks to ISO 27001 certification on IT-Grundschutz basis.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










IT-Grundschutz offers a pragmatic approach to IT security. By combining standard security measures with supplementary risk analyses, even complex IT environments can be secured efficiently.
Years of Experience
Employees
Projects
We follow the proven IT-Grundschutz methodology of the BSI and adapt it to your specific requirements.
Structural analysis and definition of the information domain
Protection needs assessment for all information and processes
Modeling with IT-Grundschutz building blocks
Basic security check and action planning
Supplementary security analysis for elevated protection needs
"We support our clients in implementing IT-Grundschutz in a structured and pragmatic manner – with the goal of establishing an effective security level while simultaneously laying the foundation for a subsequent ISO 27001 certification. Our expertise combines regulatory requirements with practical implementation – efficient, targeted, and future-proof."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
We offer you tailored solutions for your digital transformation
Systematic capture and modeling of your IT landscape in accordance with the IT-Grundschutz methodology.
Review of current security measures against IT-Grundschutz requirements.
Choose the area that fits your requirements
The CIS Controls offer a prioritized approach to cybersecurity with the most important security measures. We support you in the effective implementation of these proven practices.
Financial institutions face strict regulatory requirements for cloud usage. We support you in implementing BaFin requirements, DORA obligations, EBA outsourcing guidelines, and BSI C5 attestations — so you can leverage cloud advantages securely and compliantly.
ISO 27001 is the international standard for Information Security Management Systems (ISMS). ISO 27001 certification demonstrates that your organisation manages information security risks systematically. ADVISORI guides you from gap analysis through ISMS implementation to successful certification audit.
BSI standard 200–1 defines general requirements for an information security management system (ISMS). BSI standard 200–2 describes the IT-Grundschutz methodology with three approaches: basic protection, standard protection and core protection. BSI standard 200–3 governs risk analysis based on IT-Grundschutz when protection needs exceed the normal level. Together they form the methodological foundation for IT-Grundschutz implementation.
Implementation follows a structured process: first, the information domain is defined and a structural analysis is performed. Then protection needs are determined for all identified objects. Next, suitable building blocks from the IT-Grundschutz Compendium are assigned (modelling). The basic security check compares the current state against requirements. Where protection needs are elevated, a supplementary risk analysis per BSI standard 200–3 follows.
ISO 27001 is an international standard with abstract ISMS requirements. IT-Grundschutz is a concrete BSI methodology that provides detailed measure recommendations via the IT-Grundschutz Compendium. Organisations can obtain ISO 27001 certification on the basis of IT-Grundschutz, combining international recognition with the methodological depth of the BSI approach.
IT-Grundschutz is particularly relevant for German federal authorities and public institutions subject to BSI requirements, critical infrastructure (KRITIS) operators with compliance obligations under the BSI Act, organisations seeking ISO 27001 certification on IT-Grundschutz basis, and any organisation wanting a structured entry into information security.
The IT-Grundschutz Compendium contains over
100 building blocks organised in ten layers, ranging from ISMS processes through organisation and personnel to technical systems such as networks and applications. Each building block describes typical threats and concrete security measure requirements. The BSI updates the Compendium annually to address current threats and technologies.
Discover how we support companies in their digital transformation
Klöckner & Co
Digital Transformation in Steel Trading

Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Festo
Intelligent Networking for Future-Proof Production Systems

Bosch
AI Process Optimization for Improved Production Efficiency

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance