IT-Grundschutz-Catalogues
Status 13th version of the IT-Grundschutz Catalogues (GSTOOL-Edition)
Introduction
IT-Grundschutz - The basis for information security
- Why is information security important?
- IT-Grundschutz: Objectives, concept, and design
- Structure of the IT-Grundschutz Catalogues
- Application methods of the IT-Grundschutz Catalogues
Layer model and modelling
Modules
Threat catalogues
- T0 Basic threats
- T1 Force Majeure
- T2 Organisational Shortcomings
- T3 Human Error
- T4 Technical Failure
- T5 Deliberate Acts
Safeguard catalogues
- S1 Infrastructure
- S2 Organisation
- S3 Personnel
- S4 Hardware and Software
- S5 Communication
- S6 Contingency planning
Assistance information (Reference to BSI-Webpage)
- Checklists and Forms (Reference to BSI-Webpage)
- Samples and examples (Reference to BSI-Webpage)
- IT-Grundschutz-example profiles (Reference to BSI-Webpage)
- Modules (Reference to BSI-Webpage)
- Documentation and studies (Reference to BSI-Webpage)
- Information from external users (Reference to BSI-Webpage)
- Archive (Reference to BSI-Webpage)