{"id":24656,"date":"2023-09-28T10:56:18","date_gmt":"2023-09-28T08:56:18","guid":{"rendered":"https:\/\/enginsight.com\/kritis-cybersecurity-for-critical-infrastructure\/"},"modified":"2025-03-31T13:38:27","modified_gmt":"2025-03-31T11:38:27","slug":"kritis-cybersecurity-for-critical-infrastructure","status":"publish","type":"page","link":"https:\/\/enginsight.com\/en\/kritis-cybersecurity-for-critical-infrastructure\/","title":{"rendered":"KRITIS: Cybersecurity for critical infrastructure"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"24656\" class=\"elementor elementor-24656 elementor-15861\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a648c85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a648c85\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"video\",\"background_video_link\":\"https:\\\/\\\/enginsight.com\\\/wp-content\\\/uploads\\\/KRITIS-header-video_HD.mp4\"}'>\n\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35963e2\" data-id=\"35963e2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cc36479 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc36479\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fdbfe5f\" data-id=\"fdbfe5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1917c45 premium-title-icon-column premium-title-icon-column premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"1917c45\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"premium-title-icon\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/made-in-germany-enginsight-1.png\" alt=\"made-in-germany-enginsight\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tGuideline for KRITIS operators\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12a3a9e premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"12a3a9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Cybersecurity <\/span><span class=\"premium-dual-header-second-header \">for critical infrastructure<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be57816 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"be57816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13a6a97 elementor-widget elementor-widget-text-editor\" data-id=\"13a6a97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The IT Security Act 2.0 calls for numerous changes and requirements for CRITIS operators and companies in the special public interest. Particular emphasis is placed on the use of attack detection systems in accordance with Section 8a (1a) BSIG. This will be mandatory as of May 01, 2023.  <\/p>\n<p><strong>Find out here how to implement the BSI recommendations simply and sustainably.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a42af2 elementor-widget elementor-widget-html\" data-id=\"3a42af2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a class=\"hero-mouse anchor\" href=\"#BSI-Empfehlungen\" id=\"BSI-Empfehlungen\" title=\"About the BSI recommendations\">\n  <div class=\"mouse-icon\"><span><\/span><\/div>\n<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a010b39 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"a010b39\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-1a1fd1a\" data-id=\"1a1fd1a\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fbb796 elementor-widget elementor-widget-image\" data-id=\"0fbb796\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"345\" height=\"125\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv.png\" class=\"attachment-large size-large wp-image-5808\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv.png 345w, https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv-300x109.png 300w\" sizes=\"(max-width: 345px) 100vw, 345px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-9ffa551\" data-id=\"9ffa551\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44a301a elementor-widget elementor-widget-image\" data-id=\"44a301a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"734\" height=\"554\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/IT-Security-made-in-Germany_TeleTrusT-Seal.png\" class=\"attachment-large size-large wp-image-10194\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-31934bd\" data-id=\"31934bd\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ffc349 elementor-widget elementor-widget-image\" data-id=\"3ffc349\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"200\" height=\"83\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2021\/09\/Logo_Teilnehmer_Web-200x83xc.png\" class=\"attachment-large size-large wp-image-9141\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-269c165\" data-id=\"269c165\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d14a599 elementor-widget elementor-widget-image\" data-id=\"d14a599\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"414\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/tuev-WEISS.png\" class=\"attachment-large size-large wp-image-10196\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-5ce2e15\" data-id=\"5ce2e15\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67a801d elementor-widget elementor-widget-image\" data-id=\"67a801d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"150\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/02\/jenoptik.png\" class=\"attachment-large size-large wp-image-5183\" alt=\"Jenoptik\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a0ae57d elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"a0ae57d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-291b6f4\" data-id=\"291b6f4\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71a48ff elementor-widget elementor-widget-image\" data-id=\"71a48ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"150\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/02\/hanse.png\" class=\"attachment-large size-large wp-image-5181\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-7ba0764\" data-id=\"7ba0764\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edc2d1c elementor-widget elementor-widget-image\" data-id=\"edc2d1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"136\" height=\"102\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/HSV_sw.png\" class=\"attachment-large size-large wp-image-15536\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-561d818\" data-id=\"561d818\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e428d0b elementor-widget elementor-widget-image\" data-id=\"e428d0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"112\" height=\"46\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/HDI_sw.png\" class=\"attachment-large size-large wp-image-15538\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-2084e52\" data-id=\"2084e52\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdde4a7 elementor-widget elementor-widget-image\" data-id=\"fdde4a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"132\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-1024x169.png\" class=\"attachment-large size-large wp-image-15540\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-1024x169.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-300x50.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-768x127.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw.png 1517w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-6d61c96\" data-id=\"6d61c96\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e19332e elementor-widget elementor-widget-image\" data-id=\"e19332e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"121\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/ZapfCreation-sw-1.png\" class=\"attachment-large size-large wp-image-15544\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19e892a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19e892a\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b1eef2\" data-id=\"5b1eef2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f5bacf6 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5bacf6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d4270cf\" data-id=\"d4270cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f13df4d elementor-widget elementor-widget-menu-anchor\" data-id=\"f13df4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"BSIrecommendations\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f87018a premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"f87018a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tFor IT decision-makers in KRITIS enterprises\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14804f2 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"14804f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">BSI recommendations <\/span><span class=\"premium-dual-header-second-header \"> simply implement <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8627c2d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8627c2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32aee94 elementor-widget elementor-widget-text-editor\" data-id=\"32aee94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber attacks are (unfortunately) part of everyday IT life today. The question is no longer if, but when an attack will occur. The attack scenarios are diverse and constantly present IT managers with new challenges. Because one thing is clear: attacks must be (automatically) defended against; the consequences of a successful cyberattack could be fatal, especially if critical infrastructures are affected.<\/p><p><strong>What is the &#x201C;BSI Orientation Guide&#x201D;?<\/strong><\/p><p>The BSI Guidance is a comprehensive document from the BSI. It outlines mandatory requirements for the use of attack detection systems (SzA) and divides these into three phases: <a href=\"#protokollierung\"><strong>LOGGING<\/strong><\/a>, <a href=\"#detektion\"><strong>DETECTION<\/strong><\/a>, and <a href=\"#reaktion\"><strong>RESPONSE<\/strong><\/a>. The measures described therein are divided into SHOULD, MUST, and CAN requirements, and are also prioritized into three levels, depending on the desired &#x201C;maturity level.&#x201D;<\/p><p>In the first step, achieving maturity level 3 is sufficient. Operators of critical infrastructures should aim for level 4 in the long term. Therefore, there is a continuous improvement of IT security measures, which is absolutely sensible and necessary given the aspect of the constantly increasing and more complex threat landscape.<\/p><p><strong>What is KRITIS?<\/strong><\/p><p>KRITIS (critical infrastructures) are all organisations and institutions that are of enormous importance to the state community. This includes, for example, the healthcare system, medical care, but also the energy and water supply. A failure or disruption of these social functions can have considerable consequences for public safety.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5f37758 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f37758\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-048d299\" data-id=\"048d299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06a43a8 elementor-widget elementor-widget-text-editor\" data-id=\"06a43a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>BSI-KRITIS-Regulation (BSI-KritisV) and German IT Security Act 2.0 (IT-SiG 2.0) therefore require &#x201C;appropriate organizational and technical precautions&#x201D;. From May 2023, operators of critical infrastructures will be <b>obliged to use systems for attack detection<\/b>, among other things. Which systems are suitable for this purpose remains an open question. It is not uncommon for those affected to be unsure which systems are really suitable and needed. SIEM systems are the first systems that come to mind. But, contrary to what many expect, they are not without alternative!     <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61ec103 elementor-widget elementor-widget-text-editor\" data-id=\"61ec103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Enginsight Matrix for BSI Guidance <br><\/strong> Find out at a glance how Enginsight supports you in implementing the BSI Guidance according to &#xA7; 8a Paragraph 3 BSIG.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b153e elementor-widget elementor-widget-button\" data-id=\"26b153e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"#matrix\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2fe6a20\" data-id=\"2fe6a20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20f289f elementor-widget elementor-widget-image\" data-id=\"20f289f\" data-element_type=\"widget\" data-e-type=\"widget\" title=\"Enginsight-Matrix zur BSI-Orientierungshilfe&#xA0;\" alt=\"Enginsight-Matrix zur BSI-Orientierungshilfe&#xA0;\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"551\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/KRITIS_enginsight_poster_thumb-1.png\" class=\"attachment-full size-full wp-image-15962\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/KRITIS_enginsight_poster_thumb-1.png 400w, https:\/\/enginsight.com\/wp-content\/uploads\/KRITIS_enginsight_poster_thumb-1-218x300.png 218w\" sizes=\"(max-width: 400px) 100vw, 400px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4cc7d4c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4cc7d4c\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c8557b\" data-id=\"6c8557b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1f378a7 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f378a7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a1e553a\" data-id=\"a1e553a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51f9d82 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"51f9d82\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tImplementation of the BSI orientation guide\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45cb05e premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"45cb05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Automated systems <\/span><span class=\"premium-dual-header-second-header \">for attack detection and defense <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-940f690 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"940f690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b07bd9 elementor-widget elementor-widget-text-editor\" data-id=\"1b07bd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When it comes to securing your IT infrastructure and complying with the legal requirements for critical infrastructures, we support you from planning to implementation. In this way, you achieve at least maturity level 3, demonstrate cyber resilience and secure your &#x201C;Digital Compliance&#x201D;.<\/p><p>Below is a small excerpt of which requirements from the &#x201C;BSI orientation guide for the use of attack detection systems&#x201D; you can fulfill with Enginsight and the appropriate service providers. The <a href=\"https:\/\/enginsight.com\/en\/kritis-cybersecurity-for-critical-infrastructure\/#BSI-Empfehlungen\">Enginsight matrix for the BSI orientation guide<\/a> provides you with a complete overview.<br><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6891cf1 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"6891cf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\"> <\/span><span class=\"premium-dual-header-second-header \">KRITIS audit - how the KRITIS verification is carried out<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce19113 elementor-widget elementor-widget-text-editor\" data-id=\"ce19113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>All companies that belong to the KRITIS operators are obliged to have a special audit report drawn up in order to prove to the Federal Office for Information Security (BSI) that their IT security measures correspond to the current state of the art. This requires a KRITIS audit to be carried out by an external auditor in accordance with Section 8a (3) BSIG. After a successful audit, the security of your IT infrastructure is confirmed by an independent and accredited testing centre.&#xA0;<\/p><p>The exact security requirements vary depending on the industry and are specified in the industry-specific security standards (B3S) recognised by the BSI. These standards specify which measures are required to ensure an optimum level of security.&#xA0;<\/p><div>&#xA0;<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52a6abd premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"52a6abd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\"> <\/span><span class=\"premium-dual-header-second-header \">KRITIS requirements for companies<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-136d8d2 elementor-widget elementor-widget-text-editor\" data-id=\"136d8d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>1. Designation of a contact point<\/strong><\/p><p>Companies that are considered KRITIS operators are obliged to designate a contact point by setting up a functional mailbox. The aim is to be consistently accessible to the BSI so that IT security information can be sent to the KRITIS operator&#x2019;s mailbox.<\/p><p><strong>2. Obligation to report IT malfunctions and security incidents<\/strong><\/p><p>In the event of an unplanned and unusual disruption as well as immediate cyberattacks against your IT infrastructure, KRITIS companies must be reported to the BSI using the functional mailbox.<\/p><p><strong>3. Staying &#x2018;state of the art&#x2019;<\/strong><\/p><p>The KRITIS Regulation states that all critical infrastructure companies must implement the latest cyber security protection measures. The international standards and norms such as DIN. ISO, DKE and ISO\/IEC. As part of a KRITIS audit, updates on these precautions must also be demonstrably submitted to the BSI every two years.<\/p><p><strong>4. KRITS audit<\/strong><\/p><p>To ensure that all KRITIS operators meet their obligations for standardised IT security protection, all companies that provide critical services in KRITIS sectors must undergo an audit. The audit takes place every two years and can be verified by a KRITIS audit.<\/p><p>If you need help with the KRITIS requirements and are perhaps unsure whether you have all the IT assets required for the KRITIS audit, please contact us. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8112aa4 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8112aa4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d50e5af\" data-id=\"d50e5af\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3972f34 elementor-widget elementor-widget-heading\" data-id=\"3972f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Basics<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10f6763 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10f6763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Continuous anomaly detection in real time based on communication data (metadata and content) and log data <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Specifically designed for monitoring and anomaly detection in IT networks, connectable to other systems (e.g. SIEM) via standard interfaces<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fully automated response processes can be implemented (intrusion prevention \/ IPS) for direct threat stop<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fc60a4b\" data-id=\"fc60a4b\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fda8175 elementor-widget elementor-widget-menu-anchor\" data-id=\"fda8175\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Logging\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af9d072 elementor-widget elementor-widget-heading\" data-id=\"af9d072\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Logging<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03aba9a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"03aba9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Comprehensive data collection of communications and network events; in addition, log data is collected on systems and stored in a targeted manner for forensic investigations<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Log data can be anonymized as required (data protection)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Evaluation of the collected data and classification and alert function<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1079d8a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1079d8a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4017a44\" data-id=\"4017a44\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c92bd88 elementor-widget elementor-widget-menu-anchor\" data-id=\"c92bd88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"detection\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12525e8 elementor-widget elementor-widget-heading\" data-id=\"12525e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Detection<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95b7db8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"95b7db8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Autonomous event response and anomaly mitigation, managed services from Enginsight partners provide additional organizational and staffing support<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Host-based IDS detects the specific payload of a possible attack and can block successful execution thanks to IPS; integrated endpoint detection response module protects against malicious code <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Anomaly messages are prioritized by criticality and color-coded; defined alerts, customizable user and group policies<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Comprehensive vulnerability management <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a9bf95b\" data-id=\"a9bf95b\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0b4810 elementor-widget elementor-widget-menu-anchor\" data-id=\"a0b4810\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"reaction\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae3a510 elementor-widget elementor-widget-heading\" data-id=\"ae3a510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Reaction<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78fa98f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"78fa98f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automated intrusion into the network stream by means of Intrusion Prevention System (IPS) <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">In addition to automated qualification, manual handling of vulnerabilities and events is possible<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Running operation remains unaffected while handling suspicious network communication<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">For faults with mandatory reporting, the message can be enriched with analysis data from Enginsight<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enginsight can automatically alert in case of safety-relevant events<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29dfd94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29dfd94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0106f0a\" data-id=\"0106f0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b7fd36 elementor-widget elementor-widget-menu-anchor\" data-id=\"1b7fd36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"matrix\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f1e01d premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"0f1e01d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tEnginsight matrix for BSI orientation guide \t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a1a61e elementor-widget elementor-widget-hubspot-form\" data-id=\"6a1a61e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hubspot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 143253842,\n\t\t\t\t\t\t\t\t\tformId: \"4729d2ae-2f7b-4ca2-a88a-22b62b7e734a\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1776164276000-7095777032\",\n\t\t\t\t\t\t\t\t\tregion: \"eu1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1776164276000-7095777032\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-08ad723\" data-id=\"08ad723\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e883e60 elementor-widget elementor-widget-image\" data-id=\"e883e60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"694\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/KRITIS_enginsight_poster_thumb-bg-1.jpg\" class=\"attachment-large size-large wp-image-15977\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/KRITIS_enginsight_poster_thumb-bg-1.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/KRITIS_enginsight_poster_thumb-bg-1-300x260.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/KRITIS_enginsight_poster_thumb-bg-1-768x666.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e105197 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e105197\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5c84f9c\" data-id=\"5c84f9c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-624ba08 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"624ba08\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bea5cdd\" data-id=\"bea5cdd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1ac927 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"e1ac927\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_mobile&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tCreate transparency\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72408e5 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"72408e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Status quo <\/span><span class=\"premium-dual-header-second-header \">How well are you positioned so far?<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6f199 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5b6f199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c4c80c elementor-widget elementor-widget-text-editor\" data-id=\"4c4c80c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If your company is KRITIS-regulated and you are still unsure whether your measures are sufficient: Take an inventory. An analysis of your IT infrastructure creates transparency. Once the deviations between the actual and target state have been determined, you can initiate the necessary measures in a prioritized manner.   <\/p>\n<p>With Enginsight, the inventory of your IT assets succeeds at the push of a button. <br \/><a href=\"https:\/\/enginsight.com\/en\/demo\/\"><b>We will be happy to show you live how quickly this can be done. Contact us. <\/b><\/a><\/p>\n<p>In the long term and sustainably, Enginsight helps you with the live monitoring of your IT infrastructure. We would be happy to tell you more about this in a live demo or one of our <a href=\"\" target=\"\" rel=\"\">webcasts<\/a>. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b9a93b5\" data-id=\"b9a93b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ead04d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ead04d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fc5eb9a\" data-id=\"fc5eb9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edb2bed premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"edb2bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_mobile&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<h2 class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tFAQ on KRITIS requirements\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a61ad56 elementor-widget elementor-widget-toggle\" data-id=\"a61ad56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1741\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1741\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Which companies and industries are covered by the KRITIS regulation?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1741\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1741\"><p>The KRITIS regulation in Germany refers to critical infrastructures that are essential for the country. These include: <\/p>\n<ol>\n<li><strong>Energy<\/strong>: companies that provide electricity and gas.<\/li>\n<li><strong>Water<\/strong>: companies responsible for drinking water supply and wastewater disposal.<\/li>\n<li><strong>Information technology and telecommunications<\/strong>: provider of IT and communications services.<\/li>\n<li><strong>Health<\/strong>: hospitals and other medical facilities.<\/li>\n<li><strong>Transportation and traffic<\/strong>: this includes both public transportation and major transportation hubs.<\/li>\n<\/ol>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1742\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1742\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What is the deadline for implementing the KRITIS requirements?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1742\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1742\"><p>According to the BSI, operators of critical infrastructures will have to prove that they meet the KRITIS requirements by May 1, 2023, and every two years thereafter.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1743\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1743\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What consequences can KRITIS companies expect if they do not comply in a timely manner?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1743\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1743\"><p>Operators of critical infrastructures (KRITIS) in Germany have certain obligations under the BSI Act (BSIG) and the BSI Criticality Ordinance:<\/p>\n<ol>\n<li>You must designate a <strong>point of contact<\/strong> for the Critical Infrastructure you operate.<\/li>\n<li>You are obliged to report <strong>IT malfunctions or significant impairments<\/strong>.<\/li>\n<li>You must implement <strong>&#8220;state of the art&#8221; IT security<\/strong>.<\/li>\n<li>You must <strong>demonstrate<\/strong> to the BSI every two years that you meet these requirements.<\/li>\n<\/ol>\n<p>If KRITIS operators do not comply with these requirements on time, they may face sanctions. The exact sanctions or fines are specified in the BSI Act and other legal regulations. It is therefore important that KRITIS operators inform themselves precisely about their obligations and possible consequences in the event of violations.  <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1744\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1744\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Are there different requirements for different operators?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1744\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1744\"><p>Some basic requirements are the same for all operators of critical infrastructures and the BSI&#8217;s handout, the so-called &#8220;<strong>BSI Orientation Guide<\/strong>&#8220;, is based on these. Other standards apply in addition, but on a sector-specific basis. <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1745\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1745\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Which technologies should operators use?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1745\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1745\"><p>The BSI does not specify any concrete technologies to be used. It is undisputed that the use of classic antivirus programs is not sufficient. <\/p>\n<p>The publication &#8220;<a href=\"http:\/\/www.bsi.bund.de\/dok\/980540\" target=\"_blank\" rel=\"noopener\">Recommendations for the development and use of products used in critical infrastructures<\/a>&#8221; by UP KRITIS (a public-private cooperation of operators of critical infrastructures, associations and government agencies) is worth reading in connection with the products used.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1746\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1746\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What information must the BSI proof include?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1746\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1746\"><p>According to the BSI orientation guide, the results of the audits, tests or certifications carried out on the systems for attack detection, including the security deficiencies uncovered in the process and the maturity level achieved, must be communicated.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1747\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1747\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Why are there different levels of implementation\/maturity?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1747\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1747\"><p>The implementation level model is intended to successively increase the quality of systems for attack detection. The maturity level shows whether there is still potential or need for action to optimize IT security or in the use of SzA. The lower the maturity level, the greater the need for action.  <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1748\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1748\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Why does the orientation guide (OH SzA) not provide any binding requirements?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1748\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1748\"><p>The guidance provides operators with a rough framework and thus allows scope for individual implementation. The formulations in the guidance and the implementation levels are based on the BSI&#8217;s IT-Grundschutz. <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"Which companies and industries are covered by the KRITIS regulation?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The KRITIS regulation in Germany refers to critical infrastructures that are essential for the country. These include: <\\\/p>\\n<ol>\\n<li><strong>Energy<\\\/strong>: companies that provide electricity and gas.<\\\/li>\\n<li><strong>Water<\\\/strong>: companies responsible for drinking water supply and wastewater disposal.<\\\/li>\\n<li><strong>Information technology and telecommunications<\\\/strong>: provider of IT and communications services.<\\\/li>\\n<li><strong>Health<\\\/strong>: hospitals and other medical facilities.<\\\/li>\\n<li><strong>Transportation and traffic<\\\/strong>: this includes both public transportation and major transportation hubs.<\\\/li>\\n<\\\/ol>\\n\"}},{\"@type\":\"Question\",\"name\":\"What is the deadline for implementing the KRITIS requirements?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>According to the BSI, operators of critical infrastructures will have to prove that they meet the KRITIS requirements by May 1, 2023, and every two years thereafter.<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"What consequences can KRITIS companies expect if they do not comply in a timely manner?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Operators of critical infrastructures (KRITIS) in Germany have certain obligations under the BSI Act (BSIG) and the BSI Criticality Ordinance:<\\\/p>\\n<ol>\\n<li>You must designate a <strong>point of contact<\\\/strong> for the Critical Infrastructure you operate.<\\\/li>\\n<li>You are obliged to report <strong>IT malfunctions or significant impairments<\\\/strong>.<\\\/li>\\n<li>You must implement <strong>&#8220;state of the art&#8221; IT security<\\\/strong>.<\\\/li>\\n<li>You must <strong>demonstrate<\\\/strong> to the BSI every two years that you meet these requirements.<\\\/li>\\n<\\\/ol>\\n<p>If KRITIS operators do not comply with these requirements on time, they may face sanctions. The exact sanctions or fines are specified in the BSI Act and other legal regulations. It is therefore important that KRITIS operators inform themselves precisely about their obligations and possible consequences in the event of violations.  <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Are there different requirements for different operators?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Some basic requirements are the same for all operators of critical infrastructures and the BSI&#8217;s handout, the so-called &#8220;<strong>BSI Orientation Guide<\\\/strong>&#8220;, is based on these. Other standards apply in addition, but on a sector-specific basis. <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Which technologies should operators use?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The BSI does not specify any concrete technologies to be used. It is undisputed that the use of classic antivirus programs is not sufficient. <\\\/p>\\n<p>The publication &#8220;<a href=\\\"http:\\\/\\\/www.bsi.bund.de\\\/dok\\\/980540\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Recommendations for the development and use of products used in critical infrastructures<\\\/a>&#8221; by UP KRITIS (a public-private cooperation of operators of critical infrastructures, associations and government agencies) is worth reading in connection with the products used.<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"What information must the BSI proof include?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>According to the BSI orientation guide, the results of the audits, tests or certifications carried out on the systems for attack detection, including the security deficiencies uncovered in the process and the maturity level achieved, must be communicated.<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Why are there different levels of implementation\\\/maturity?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The implementation level model is intended to successively increase the quality of systems for attack detection. The maturity level shows whether there is still potential or need for action to optimize IT security or in the use of SzA. The lower the maturity level, the greater the need for action.  <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Why does the orientation guide (OH SzA) not provide any binding requirements?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The guidance provides operators with a rough framework and thus allows scope for individual implementation. The formulations in the guidance and the implementation levels are based on the BSI&#8217;s IT-Grundschutz. <\\\/p>\\n\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1838cd3 elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"1838cd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/en\/ids_ips\/\" title=\"IDS Intrusion Detection System (System zur Angriffserkennung)\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Attack detection system with Enginsight<br><span style=\"font-weight:normal\">IDS Intrusion Detection Sytem<\/span><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/section><\/div>\n\t\t\n\t\t\t\t\n\t\t","protected":false},"excerpt":{"rendered":"<p>Guideline for KRITIS operators Cybersecurity for critical infrastructure The IT Security Act 2.0 calls for numerous changes and requirements for CRITIS operators and companies in the special public interest. Particular emphasis is placed on the use of attack detection systems in accordance with Section 8a (1a) BSIG. This will be mandatory as of May 01, [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-24656","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/24656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/comments?post=24656"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/24656\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media?parent=24656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}