Contact

 

MODERNISED
IT BASELINE SECURITY

The solution that maps BSI standards in a structured way

ISMS in accordance with IT baseline security
with INDITOR® BSI

The INDITOR® BSI solution represents the standards 200-2 and 200-3 of the German Federal Office for Information Security (BSI). A structured method provides the best-possible implementation support. The definition of the approach (Basic, Core and Standard Protection) can individually be determined for every scope. By linking the processes with the IT systems, the protection requirements are inherited right down as far as the application. The document template system allows you to create your own templates and to access existing templates, e.g. information security guidelines. Extensive reporting functions provide a comprehensive overview of the level to which information security is implemented at the company.

 

The shared database for ISMS, IT disaster recovery and data protection enables the straightforward use of company data created only once, such as data on processes, personnel and infrastructure.

Slide background
Slide background
Slide background
Slide background

Benefits

strukturiert b

STRUCTURED
Clear process determined by the softwaren

effizient b

EFFICIENT
Various import options and connection to available systems

aktuell b

UP TO DATE
Update data with a single click

komfort b

CONVENIENT
Easy import of data from the GSTOOL

schutz

CONSISTENT
By means of the dependencies displayed, protection requirements are inherited from the process right down to the application

praktisch

PRACTICAL
Integrated document templates, e.g. information security guidelines, provide assistance

anschaulich

CLEAR
Diagrams illustrate the extent to which information security is implemented at the company

uweit b

COMPANY-WIDE
Comprehensive task management and web module for local processing of tasks

ISMS BSI in three steps

  • Step 1 | Requirements catalogueModules and requirements contained in the BSI Compendium (2019) are supplemented with descriptions and help
  • Step 2 | Asset managementCreation of assets (company values) such as processes, HR and infrastructure. The data can be used when other CONTECHNET solutions are integrated
  • Step 3 | Determination of protection requirementsDetermination of the protection requirements and categorisation of the impact based on disaster scenarios for the individual assets of the information network in question