Select your location for location specific information:
If you would like to qualify in the field of IT security and prove your expertise, you can apply for certification under certain conditions.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
This form has to be signed and submitted to the responsible authority in person.
As the central certification body for IT security in Germany, the Federal Office for Information Security (BSI) currently offers you 9 certifications that prove your expertise around the BSI Technical Guidelines. The certifications are generally aimed at employees of IT security service providers.
You must submit your application for certification online or in writing to the BSI.
Applications may be submitted by
Further requirements:
When applying must achieve:
Notice:
For the current and legally binding details of the evidence to be provided, please refer to the procedure description and programme on the BSI website.
You can submit the application for certification of a person as well as recertification in the online procedure or in writing to the Federal Office for Information Security (BSI).
Online procedure
In writing by post
If you operate critical infrastructures, you must prove that the security of your information technology corresponds to the state of the art. You must submit proof to the Federal Office for Information Security (BSI) every two years.
You can register with the BSI as a common higher-level contact point (GÜAS). After registration, you can act as a contact point for reports and security notices for operators of critical infrastructures that belong to the same sector.
If you operate a Critical Infrastructure, you must name a point of contact to the Federal Office for Information Security that can be reached at any time.