BSI IT-Grundschutz Cross-Reference Table

Interactive mapping between BSI IT-Grundschutz building blocks and ISO 27001, NIST CSF 2.0, DORA, and NIS2.

Filter by framework:
Filter by layer:
IDTitleISO 27001NIST CSFDORANIS2
APP.1.1APP.1.1 Office ProductsA.8.26A.8.27A.8.25A.5.10PR.PS-02PR.PS-05PR.PS-06Art. 21(2)(e)
APP.1.2APP.1.2 Web BrowsersA.8.26A.8.3A.8.2PR.AA-05PR.PS-02Art. 21(2)(e)
APP.1.4APP.1.4 Mobile Applications (Apps)A.8.26A.8.27A.8.24PR.DS-02PR.PS-06Art. 21(2)(e)
APP.2.1APP.2.1 General Directory ServiceA.5.15A.5.16A.5.17A.5.18A.8.5PR.AA-01PR.AA-03PR.AA-05Art. 9(4)(b)Art. 21(2)(i)Art. 21(2)(j)
APP.2.2APP.2.2 Active Directory Domain ServicesA.5.15A.5.16A.8.2A.8.5PR.AA-01PR.AA-02PR.AA-03Art. 9(4)(b)Art. 21(2)(i)Art. 21(2)(j)
APP.2.3APP.2.3 OpenLDAPA.5.15A.5.16A.5.18A.8.2PR.AA-01PR.AA-05Art. 9(4)(b)Art. 21(2)(i)Art. 21(2)(j)
APP.3.1APP.3.1 Web Applications and Web ServicesA.8.26A.8.27A.8.28A.8.29A.5.14PR.PS-06PR.DS-02PR.AA-05Art. 9(4)(a)Art. 21(2)(e)
APP.3.2APP.3.2 Web ServersA.8.26A.8.27A.8.21PR.PS-06PR.DS-02Art. 9(4)(a)Art. 21(2)(e)
APP.3.3APP.3.3 File ServersA.5.14A.8.21A.8.26A.8.7PR.DS-02DE.CM-06Art. 21(2)(e)
APP.3.4APP.3.4 SambaA.5.14A.8.7A.8.24PR.DS-02PR.DS-01Art. 21(2)(h)
APP.3.6APP.3.6 DNS ServerA.8.21A.8.26A.5.14PR.DS-02PR.IR-01Art. 21(2)(e)
APP.4.2APP.4.2 SAP ERP SystemA.8.26A.8.3A.5.15A.8.9PR.AA-05PR.PS-01Art. 8(1)Art. 9(4)(b)Art. 21(2)(e)
APP.4.3APP.4.3 Relational DatabasesA.8.25A.8.26A.8.27A.8.28PR.PS-06ID.IM-02Art. 8(2)Art. 21(2)(e)
APP.4.4APP.4.4 KubernetesA.8.25A.8.26A.8.27A.5.23PR.PS-06PR.PS-01GV.SC-07Art. 9(4)(a)Art. 21(2)(e)
APP.4.6APP.4.6 SAP ABAP ProgrammingA.8.25A.8.26A.8.28A.5.19PR.PS-06GV.SC-05Art. 8(2)Art. 21(2)(e)Art. 21(2)(d)
APP.5.2APP.5.2 Microsoft Exchange and OutlookA.8.7A.8.26A.5.14A.8.8PR.PS-02DE.CM-09Art. 21(2)(e)
APP.5.3APP.5.3 General Email Client and ServerA.5.14A.8.7A.8.26PR.DS-02DE.CM-09Art. 21(2)(e)
APP.5.4APP.5.4 Unified Communications and Collaboration (UCC)A.5.14A.8.26A.8.7PR.DS-02PR.PS-02Art. 21(2)(e)
APP.6APP.6 General SoftwareA.8.26A.8.7A.8.8A.5.10PR.PS-02PR.PS-05Art. 21(2)(e)
APP.7APP.7 Development of Custom SoftwareA.8.25A.8.26A.8.28A.5.8PR.PS-06GV.SC-05Art. 9(4)(a)Art. 21(2)(e)
CON.1CON.1 Cryptographic ConceptA.8.24A.8.25A.5.1PR.DS-01PR.DS-02Art. 9(4)(e)Art. 21(2)(h)
CON.10CON.10 Development of Web ApplicationsA.5.30A.5.29A.8.13A.5.1PR.IR-03RC.RP-01Art. 11(1)Art. 11(2)Art. 21(2)(c)
CON.11.1CON.11.1 Classified Information Protection VS-ONLY FOR OFFICIAL USE (VS-NfD)A.5.31A.5.34A.8.11A.5.10GV.OC-03PR.DS-01Art. 21(2)(a)
CON.2CON.2 Data ProtectionA.5.9A.5.12A.5.13ID.AM-01ID.AM-05PR.DS-01Art. 21(2)(i)
CON.3CON.3 Data Backup ConceptA.8.13A.5.29A.5.30PR.DS-11RC.RP-03PR.IR-04Art. 12(1)Art. 12(4)Art. 21(2)(c)
CON.6CON.6 Deletion and DestructionA.5.14A.8.24A.5.10PR.DS-02PR.DS-10Art. 9(4)(d)Art. 21(2)(h)
CON.7CON.7 Information Security during International TravelA.6.7A.8.20A.8.21A.8.24PR.AA-05PR.DS-02PR.IR-01Art. 9(2)Art. 21(2)(h)
CON.8CON.8 Software DevelopmentA.8.25A.8.26A.8.27A.8.28A.8.29PR.PS-04PR.PS-06ID.IM-02Art. 8(2)Art. 9(4)(a)Art. 21(2)(e)
CON.9CON.9 Information ExchangeA.5.20A.5.21A.5.22A.5.19GV.SC-01GV.SC-06Art. 28(1)Art. 30(1)Art. 21(2)(d)
DER.1DER.1 Detection of Security-Relevant EventsA.8.16A.8.15A.5.25A.5.26DE.CM-01DE.CM-09DE.AE-02DE.AE-06Art. 10(1)Art. 10(2)Art. 21(2)(b)
DER.2.1DER.2.1 Security Incident HandlingA.5.24A.5.25A.5.26A.5.27RS.MA-01RS.AN-03RS.CO-02Art. 17(1)Art. 19(1)Art. 21(2)(b)Art. 23(1)
DER.2.2DER.2.2 Precautions for IT ForensicsA.5.26A.5.27A.5.28A.8.16RS.AN-06RS.MA-04DE.AE-07Art. 17(3)Art. 18(1)Art. 21(2)(b)
DER.2.3DER.2.3 Remediation of Extensive Security IncidentsA.5.26A.5.28A.8.15A.8.16RS.AN-06RS.AN-03DE.AE-04Art. 17(3)Art. 21(2)(b)
DER.3.1DER.3.1 Audits and RevisionsA.5.35A.5.36A.8.34ID.IM-01ID.IM-02GV.OV-02Art. 24(1)Art. 24(6)Art. 21(2)(f)
DER.3.2DER.3.2 Revisions Based on the IS Revision GuideA.5.35A.8.34A.5.36ID.IM-02ID.RA-01Art. 25(1)Art. 26(1)Art. 21(2)(f)
DER.4DER.4 Emergency ManagementA.5.29A.5.30A.5.26RC.RP-01RC.RP-02PR.IR-03Art. 11(1)Art. 11(6)Art. 21(2)(b)Art. 21(2)(c)
IND.1IND.1 Process Control and Automation TechnologyA.5.1A.5.9A.8.22A.5.29ID.AM-02GV.RM-06PR.IR-01Art. 21(2)(a)
IND.2.1IND.2.1 General ICS ComponentA.8.9A.8.8A.8.22A.5.37PR.PS-01PR.IR-01ID.AM-02Art. 21(2)(e)
IND.2.2IND.2.2 Programmable Logic Controller (PLC)A.8.9A.8.8A.8.22PR.PS-01PR.IR-01Art. 21(2)(e)
IND.2.3IND.2.3 Sensors and ActuatorsA.8.9A.8.22A.8.21PR.PS-01PR.IR-01Art. 21(2)(e)
IND.2.4IND.2.4 MachineA.8.9A.8.8A.7.8PR.PS-01PR.PS-03Art. 21(2)(e)
IND.2.7IND.2.7 Safety Instrumented SystemsA.8.22A.8.9A.8.8PR.IR-01PR.PS-01Art. 21(2)(e)
IND.3.2IND.3.2 Remote Maintenance in Industrial EnvironmentsA.8.22A.8.9A.5.29A.5.30PR.IR-01PR.IR-02RC.RP-01Art. 21(2)(c)
INF.1INF.1 General BuildingA.7.1A.7.2A.7.3A.7.4A.7.5PR.AA-06PR.IR-02DE.CM-02Art. 21(2)(a)
INF.10INF.10 Meeting, Event, and Training RoomsA.7.3A.7.2A.7.9PR.AA-06
INF.11INF.11 General VehicleA.7.10A.8.10A.5.10PR.DS-01PR.DS-03
INF.12INF.12 CablingA.7.12A.7.11A.8.20PR.IR-02PR.PS-03
INF.13INF.13 Technical Building ManagementA.7.11A.7.5A.7.12A.8.20PR.IR-02PR.PS-03
INF.14INF.14 Building AutomationA.7.11A.7.5A.5.29A.5.30PR.IR-02PR.IR-04RC.RP-01Art. 21(2)(c)
INF.2INF.2 Data Center and Server RoomA.7.1A.7.2A.7.5A.7.6A.7.11A.7.12PR.AA-06PR.IR-02DE.CM-02Art. 9(4)(a)Art. 21(2)(a)
INF.5INF.5 Room and Cabinet for Technical InfrastructureA.7.1A.7.2A.7.3A.7.11PR.AA-06PR.IR-02Art. 21(2)(a)
INF.6INF.6 Storage Media ArchiveA.7.1A.7.2A.7.5PR.AA-06DE.CM-02
INF.7INF.7 Office WorkplaceA.7.3A.7.2A.7.9PR.AA-06
INF.8INF.8 Home WorkplaceA.7.9A.7.7A.5.10PR.AA-06PR.DS-01
INF.9INF.9 Mobile WorkplaceA.7.9A.7.7A.6.7PR.AA-06PR.DS-01
ISMS.1ISMS.1 Security ManagementA.5.1A.5.2A.5.4A.5.35A.5.36GV.OC-01GV.RM-01GV.PO-01GV.OV-01ID.IM-01Art. 5(1)Art. 5(2)Art. 6(1)Art. 20(1)Art. 21(2)(a)Art. 21(2)(f)
NET.1.1NET.1.1 Network Architecture and DesignA.8.20A.8.21A.8.22A.5.1PR.IR-01PR.IR-02ID.AM-03Art. 9(4)(a)Art. 21(2)(e)
NET.1.2NET.1.2 Network ManagementA.8.20A.8.21A.8.9A.8.22PR.IR-01DE.CM-01PR.PS-01Art. 9(4)(a)Art. 10(1)Art. 21(2)(e)
NET.2.1NET.2.1 WLAN OperationA.8.20A.8.22A.8.24A.8.5PR.IR-01PR.DS-02PR.AA-03Art. 9(4)(a)Art. 21(2)(e)
NET.2.2NET.2.2 WLAN UseA.6.7A.8.24A.8.20A.8.5PR.AA-03PR.DS-02PR.IR-01Art. 9(2)Art. 9(4)(a)Art. 21(2)(h)
NET.3.1NET.3.1 Routers and SwitchesA.8.20A.8.21A.8.22A.8.23PR.IR-01DE.CM-01PR.PS-01Art. 9(4)(a)Art. 21(2)(e)
NET.3.2NET.3.2 FirewallA.8.20A.8.21A.8.22A.8.23PR.IR-01DE.CM-01Art. 9(4)(a)Art. 21(2)(e)
NET.3.3NET.3.3 VPNA.6.7A.8.24A.8.20A.5.15PR.AA-03PR.DS-02PR.IR-01Art. 9(4)(a)Art. 21(2)(h)
NET.3.4NET.3.4 Network Access ControlA.8.16A.8.15A.8.20A.8.22DE.CM-01DE.AE-02PR.IR-01Art. 10(1)Art. 21(2)(b)
NET.4.1NET.4.1 PBX SystemsA.8.21A.5.14A.8.24PR.DS-02PR.IR-01Art. 21(2)(e)
NET.4.2NET.4.2 VoIPA.8.21A.5.14A.8.24PR.DS-02PR.IR-01Art. 21(2)(e)
NET.4.3NET.4.3 Fax Machines and Fax ServersA.8.21A.8.24A.5.14PR.DS-02PR.IR-01Art. 21(2)(h)
OPS.1.1.1OPS.1.1.1 General IT OperationsA.5.37A.8.19A.8.32PR.PS-01PR.PS-02GV.PO-01Art. 9(4)(a)Art. 21(2)(a)
OPS.1.1.2OPS.1.1.2 Proper IT AdministrationA.8.8A.8.19A.8.32A.8.9PR.PS-02ID.RA-01DE.CM-01Art. 9(4)(c)Art. 10(1)Art. 21(2)(e)
OPS.1.1.3OPS.1.1.3 Patch and Change ManagementA.8.15A.8.16A.8.17A.5.25DE.CM-03DE.CM-09DE.AE-02Art. 10(1)Art. 10(2)Art. 21(2)(b)
OPS.1.1.4OPS.1.1.4 Protection Against MalwareA.8.7A.8.19A.8.16DE.CM-09PR.PS-02PR.PS-05Art. 9(4)(c)Art. 10(1)Art. 21(2)(e)
OPS.1.1.5OPS.1.1.5 LoggingA.8.15A.8.16A.8.17A.5.26DE.CM-01DE.CM-03DE.AE-03Art. 10(2)Art. 21(2)(b)
OPS.1.1.6OPS.1.1.6 Software Testing and ApprovalsA.8.32A.5.37A.8.9PR.PS-03ID.AM-02Art. 8(1)Art. 21(2)(a)
OPS.1.1.7OPS.1.1.7 System ManagementA.8.34A.5.35A.5.36ID.IM-01ID.IM-03ID.RA-03Art. 24(1)Art. 21(2)(f)
OPS.1.2.2OPS.1.2.2 ArchivingA.5.23A.5.19A.5.20GV.SC-04GV.SC-07PR.IR-01Art. 28(2)Art. 30(2)Art. 21(2)(d)
OPS.1.2.4OPS.1.2.4 TeleworkA.5.10A.8.11A.5.34PR.DS-01PR.DS-10Art. 21(2)(i)
OPS.1.2.5OPS.1.2.5 Remote MaintenanceA.5.22A.5.20A.8.30GV.SC-06GV.SC-09Art. 28(4)Art. 30(1)Art. 21(2)(d)
OPS.1.2.6OPS.1.2.6 NTP Time SynchronizationA.5.37A.8.19A.8.22PR.PS-01PR.IR-01Art. 21(2)(e)
OPS.2.2OPS.2.2 Cloud UseA.5.23A.5.19A.5.20A.5.21GV.SC-04GV.SC-07PR.IR-01Art. 28(1)Art. 30(2)Art. 21(2)(d)
OPS.2.3OPS.2.3 Use of OutsourcingA.5.19A.5.20A.5.22GV.SC-03GV.SC-05Art. 28(2)Art. 28(4)Art. 21(2)(d)
OPS.3.2OPS.3.2 Providing OutsourcingA.5.19A.5.20A.5.22A.5.35GV.SC-07GV.SC-10Art. 28(7)Art. 30(3)Art. 21(2)(d)
ORP.1ORP.1 OrganisationA.5.1A.5.2A.5.3A.5.4A.5.31GV.RR-01GV.RR-02GV.PO-01Art. 5(4)Art. 20(1)Art. 21(2)(a)
ORP.2ORP.2 PersonnelA.6.1A.6.2A.6.4A.6.5A.6.6GV.RR-02PR.AA-05Art. 21(2)(i)
ORP.3ORP.3 Information Security Awareness and TrainingA.6.3A.5.1PR.AT-01PR.AT-02Art. 13(1)Art. 5(4)Art. 21(2)(g)
ORP.4ORP.4 Identity and Access ManagementA.5.15A.5.16A.5.18A.8.2A.8.5PR.AA-01PR.AA-02PR.AA-05PR.AA-06Art. 9(4)(b)Art. 21(2)(i)Art. 21(2)(j)
ORP.5ORP.5 Compliance Management (Requirements Management)A.5.31A.5.32A.5.33A.5.34A.5.36GV.OC-03GV.PO-02Art. 5(1)Art. 21(2)(a)
SYS.1.1SYS.1.1 General ServerA.8.9A.8.8A.8.2A.7.9A.8.19PR.PS-01PR.PS-02PR.PS-03Art. 8(1)Art. 9(4)(a)Art. 21(2)(e)
SYS.1.2.2SYS.1.2.2 Windows Server 2012A.8.9A.8.8A.8.2A.8.22PR.PS-01PR.PS-02PR.IR-01Art. 8(1)Art. 9(4)(a)Art. 21(2)(e)
SYS.1.2.3SYS.1.2.3 Windows ServerA.8.9A.8.8A.8.2PR.PS-01PR.PS-02Art. 8(1)Art. 21(2)(e)
SYS.1.3SYS.1.3 Servers Running Linux and UnixA.8.9A.8.8A.8.2PR.PS-01PR.PS-02Art. 8(1)Art. 21(2)(e)
SYS.1.5SYS.1.5 VirtualizationA.8.22A.8.23A.8.9A.5.23PR.IR-01PR.PS-01GV.SC-07Art. 9(4)(a)Art. 28(2)Art. 21(2)(e)
SYS.1.6SYS.1.6 ContainerizationA.8.22A.8.9A.8.8A.5.23PR.IR-01PR.PS-01Art. 9(4)(a)Art. 21(2)(e)
SYS.1.7SYS.1.7 IBM ZA.8.9A.8.8A.8.2PR.PS-01PR.PS-02Art. 21(2)(e)
SYS.1.8SYS.1.8 Storage SolutionsA.8.9A.8.8A.7.8PR.PS-01PR.PS-03PR.IR-02Art. 9(4)(a)Art. 21(2)(c)
SYS.1.9SYS.1.9 Terminal ServerA.8.9A.8.8A.7.8A.7.1PR.PS-01PR.PS-03Art. 21(2)(e)
SYS.2.1SYS.2.1 General ClientA.8.9A.8.8A.8.7A.5.10PR.PS-01PR.PS-02PR.PS-05Art. 8(1)Art. 21(2)(e)
SYS.2.2.3SYS.2.2.3 Clients Running WindowsA.8.9A.8.8A.8.7PR.PS-01PR.PS-02Art. 8(1)Art. 21(2)(e)
SYS.2.3SYS.2.3 Clients Running Linux and UnixA.8.9A.8.8A.8.7PR.PS-01PR.PS-02Art. 21(2)(e)
SYS.2.4SYS.2.4 Clients Running macOSA.8.9A.8.8A.8.7PR.PS-01PR.PS-02Art. 21(2)(e)
SYS.2.5SYS.2.5 Client VirtualizationA.8.9A.8.8A.8.7PR.PS-01PR.PS-02Art. 21(2)(e)
SYS.2.6SYS.2.6 Virtual Desktop InfrastructureA.8.9A.8.7A.8.8PR.PS-01PR.PS-02Art. 21(2)(e)
SYS.3.1SYS.3.1 LaptopsA.6.7A.8.9A.5.10A.7.9PR.PS-01PR.AA-05Art. 21(2)(e)
SYS.3.2.1SYS.3.2.1 General Smartphones and TabletsA.8.9A.5.10A.7.9A.8.1PR.PS-01PR.AA-05Art. 21(2)(e)
SYS.3.2.2SYS.3.2.2 Mobile Device Management (MDM)A.8.1A.8.9A.5.10A.7.9PR.PS-01PR.AA-05Art. 21(2)(e)
SYS.3.2.3SYS.3.2.3 iOS (for Enterprise)A.8.1A.8.9A.5.10PR.PS-01PR.AA-05Art. 21(2)(e)
SYS.3.2.4SYS.3.2.4 AndroidA.8.1A.8.9A.5.10A.7.9PR.PS-01PR.AA-05Art. 21(2)(e)
SYS.3.3SYS.3.3 Mobile PhoneA.8.1A.7.9A.5.10A.8.9PR.PS-01PR.AA-05Art. 21(2)(e)
SYS.4.1SYS.4.1 Printers, Copiers, and Multifunction DevicesA.8.21A.8.9A.8.20PR.IR-01PR.PS-01Art. 9(4)(a)Art. 21(2)(e)
SYS.4.3SYS.4.3 Embedded SystemsA.8.9A.7.9A.5.10PR.PS-01PR.PS-03Art. 21(2)(e)
SYS.4.4SYS.4.4 General IoT DeviceA.8.9A.8.8A.5.10PR.PS-01PR.PS-02Art. 21(2)(e)
SYS.4.5SYS.4.5 Removable Storage MediaA.8.9A.5.10A.7.9PR.PS-01PR.AA-05Art. 21(2)(e)

These mappings are provided for reference and do not replace a professional compliance assessment.