Select your location for location specific information:
If you operate critical infrastructures, you must prove that the security of your information technology corresponds to the state of the art. You must submit proof to the Federal Office for Information Security (BSI) every two years.
Sie müssen in dem Formular Angaben zum betreibenden Unternehmen, den Ansprechpersonen und zur Anlage der geprüften Kritischen Infrastruktur machen.
This form can be submitted electronically (e.g. via a secure contact form using your user account with login via the electronic ID function or the ELSTER certificate) or handwritten and signed in paper form to the responsible authority.
Critical infrastructures (KRITIS) are organizations and facilities that are important for the state community. If these facilities fail or are impaired, this can lead to supply bottlenecks, significant disruptions to public safety or other dramatic consequences. Regular proof of compliance with the state of the art is therefore required by law. KRITIS includes the following sectors, for example:
As an operator of critical infrastructures, you must ensure that the security of your information technology systems, components and processes, which are fundamental to their operation, corresponds to the state of the art. You must prove this to the Federal Office for Information Security (BSI) at least every two years.
To protect your information technology against failure and external attacks, you must take organizational and technical measures and precautions. This also includes the use of attack detection systems.
You can have this documented by security audits, tests or certifications from auditing bodies. In the next step, you submit the results of these audits to the BSI using a verification document, including any security deficiencies discovered.
The BSI then checks whether your precautions and measures meet the legal requirements. The BSI can request the submission of further test documents and, in the event of security deficiencies, the rectification of the security deficiencies.
You can submit your evidence via the online service, by encrypted e-mail or by post.
If you submit evidence via the online service:
If you submit evidence by encrypted e-mail:
If you are submitting evidence by post:
There are no costs for you for submitting the certificates to the BSI.
There are no indications or special features.
There are no legal remedies.
If you would like to qualify in the field of IT security and prove your expertise, you can apply for certification under certain conditions.
You can register with the BSI as a common higher-level contact point (GÜAS). After registration, you can act as a contact point for reports and security notices for operators of critical infrastructures that belong to the same sector.
If you operate a Critical Infrastructure, you must name a point of contact to the Federal Office for Information Security that can be reached at any time.