{"id":2718,"date":"2023-12-20T13:54:42","date_gmt":"2023-12-20T13:54:42","guid":{"rendered":"https:\/\/cyber-curriculum.com\/?page_id=2718"},"modified":"2024-04-19T06:23:13","modified_gmt":"2024-04-19T06:23:13","slug":"bsi-it-basic-protection","status":"publish","type":"page","link":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/","title":{"rendered":"BSI IT-Grundschutz"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:120px;--awb-background-image:linear-gradient(180deg, rgba(35,199,172,0.44) 0%,rgba(255,255,255,0) 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p style=\"color: rgb(204, 204, 204);\"><span style=\"color: rgb(255, 255, 255);\"> <\/span><span style=\"font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover); color: var(--awb-color1);\">BSI IT-Consultation<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-no-small-visibility fusion-no-medium-visibility fusion-sep-none fusion-title-text fusion-title-size-one gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:48;line-height:var(--awb-typography1-line-height);\"><span class=\"s1\">Your contacts for BSI basic protection advice<\/span><\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-no-small-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\"><span class=\"s1\">Your contacts for BSI basic protection advice<\/span><\/h3><\/div><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">YOUR CONTACT FOR BSI BASIC PROTECTION ADVICE<\/h4><\/div><div class=\"fusion-text fusion-text-2 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>You can rely on established standards developed by the German Federal Office for Information Security (BSI) to secure your company&#8217;s IT. This BSI IT baseline protection analyzes the potential for hazards and damage and defines appropriate protection levels and security measures. You can prove your basic IT protection with a certification.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-row fusion-flex-align-items-center\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2000\" height=\"2000\" title=\"Hero-BSI\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-BSI.png\" alt class=\"img-responsive wp-image-2659\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-BSI-200x200.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-BSI-400x400.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-BSI-600x600.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-BSI-800x800.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-BSI-1200x1200.png 1200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-BSI.png 2000w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-medium:60px;--awb-padding-top-small:60px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion-flex-column fusion-flex-align-self-stretch fusion-animated borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-small:35px;--awb-padding-right-small:35px;--awb-padding-bottom-small:35px;--awb-padding-left-small:35px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:95%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:95%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-evenly fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 sm-text-align-center fusion-text-no-margin\" style=\"--awb-content-alignment:left;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>BSI basic protection consulting<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Security conception, audit &amp; implementation (KRITIS &amp; public sector)<\/h4><\/div><div class=\"fusion-text fusion-text-4 sm-text-align-center fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>You can rely on established standards developed by the German Federal Office for Information Security (BSI) to secure your company&#8217;s IT. BSI IT-Grundschutz analyzes the potential for threats and damage and defines appropriate protection levels and security measures. You can prove your basic IT protection with a certification.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"accordian fusion-accordian\" style=\"--awb-padding-bottom:10px;--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(0,0,0,0);--awb-divider-hover-color:var(--awb-color8);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color4);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:22px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2718-1\"><div class=\"fusion-panel panel-default panel-2c6cec7c3450d76d5 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2c6cec7c3450d76d5\"><a aria-expanded=\"false\" aria-controls=\"2c6cec7c3450d76d5\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2718-1\" data-target=\"#2c6cec7c3450d76d5\" href=\"#2c6cec7c3450d76d5\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">BSI IT baseline protection - what is it?<\/span><\/a><\/h4><\/div><div id=\"2c6cec7c3450d76d5\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2c6cec7c3450d76d5\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p style=\"color: rgb(255, 255, 255);\">The German Federal Office for Information Security (BSI) has developed an IT baseline protection catalog for companies, authorities and other stakeholders active in the field of critical data security to enable the gradual establishment and continuous maintenance of a comprehensive information security management system (ISMS).<\/p>\n<p style=\"color: rgb(255, 255, 255);\">The primary objective is to safeguard information technology. The first step is to identify and evaluate security risks. An action implementation plan consolidates the required safety measures, after which they are finally implemented. All areas of the company with a high or very high need for IT protection must be checked for compliance with the ISMS on a regular and ad hoc basis. ISO 27001 certification also serves this purpose.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"accordian fusion-accordian\" style=\"--awb-padding-bottom:10px;--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(0,0,0,0);--awb-divider-hover-color:var(--awb-color8);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color4);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:22px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2718-2\"><div class=\"fusion-panel panel-default panel-3d7e833e03d844c5b fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_3d7e833e03d844c5b\"><a aria-expanded=\"false\" aria-controls=\"3d7e833e03d844c5b\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2718-2\" data-target=\"#3d7e833e03d844c5b\" href=\"#3d7e833e03d844c5b\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">BSI IT baseline protection audit for KRITIS and the public sector<\/span><\/a><\/h4><\/div><div id=\"3d7e833e03d844c5b\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_3d7e833e03d844c5b\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p style=\"color: rgb(255, 255, 255);\">Since 2017, the German government has been revising the law to increase the security of information technology systems. The so-called IT Security Act (IT-SiG) 2.0 focuses in particular on data security in the federal administration, in critical infrastructure companies (KRITIS) and organizations of special public interest (UBI) &#8211; these include companies of great economic importance as well as arms manufacturers and producers and processors of hazardous substances.<\/p>\n<p style=\"color: rgb(255, 255, 255);\">Companies in these sectors will gradually be obliged to register with the BSI and submit a declaration on their IT security. This includes certifications, safety audits and safety measures.<\/p>\n<p style=\"color: rgb(255, 255, 255);\">The IT-SiG 2.0 significantly expands both the obligations for data protection-critical companies and the control powers of the state. The revision, including the lowering of various KRITIS thresholds, led to a significant evaluation of the group of affected operators. The sharp increase in the amount of fines for non-compliance with specifications and requirements to up to EUR 2 million (EUR 20 million for legal entities) is also a reminder to implement cyber security stringently in the company now at the latest.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-small:35px;--awb-padding-right-small:35px;--awb-padding-bottom-small:35px;--awb-padding-left-small:35px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:95%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:95%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">8 KRITIS sectors for BSI IT baseline protection audits<\/h4><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Energy suppliers (electricity, gas, fuels, district heating)<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Water supply (drinking water, waste water)<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Food suppliers (manufacturers and handlers, distribution and ordering)<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Transport and traffic companies<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Healthcare services (supply, laboratories, production and distribution of medicines and blood\/plasma)<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Disposal company<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>IT and telecommunications companies<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Finance and insurance<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-bottom-small:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">BSI STANDARDS REQUIRED FOR THE SECURITY CONCEPT<\/h3><\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>In order to guarantee the prescribed IT baseline protection, the BSI prescribes four standards for the security concept, which are presented in more detail below. The BSI&#8217;s IT baseline protection catalog includes a large number of documents for analyzing and modeling security risks and protection requirements. The focus here is on protecting the most important areas of information security: Integrity, confidentiality and availability.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:150px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"51\" title=\"CC Logo\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-300x51.png\" alt class=\"img-responsive wp-image-2614\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-200x34.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-400x67.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-600x101.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-800x135.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-1200x202.png 1200w\" sizes=\"(max-width: 640px) 100vw, 300px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-paragraph\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><p class=\"fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:16;--minFontSize:16;line-height:var(--awb-typography4-line-height);\">(BSI Standard 200-1)<\/p><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Management systems for information security<\/h4><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">Just like the internationally recognized ISO 27001 standard, BSI Standard 200-1 defines the general requirements for information security management systems (ISMS), such as the methods for initiating, monitoring and controlling these systems.  <\/p>\n<p style=\"text-align: left;\">In addition, this standard also sets out the rules for the general handling of the other three data security standards. BSI Standard 200-1 is based on the terminology of the ISO standards, but is formulated more clearly and structured slightly differently. This means that project managers and executives are also addressees of this standard, whereas the previous versions were explicitly aimed at those responsible for information security.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:150px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"51\" title=\"CC Logo\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-300x51.png\" alt class=\"img-responsive wp-image-2614\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-200x34.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-400x67.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-600x101.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-800x135.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-1200x202.png 1200w\" sizes=\"(max-width: 640px) 100vw, 300px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-paragraph\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><p class=\"fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:16;--minFontSize:16;line-height:var(--awb-typography4-line-height);\">(BSI Standard 200-2)<\/p><\/div><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">IT basic protection<br \/>\nMethodology<\/h4><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">The BSI Standard 200-2 provides a solid basis for setting up an ISMS in the company. This standard also defines methods for reviewing and expanding information security management. As a company, you can choose between different levels of cover:  <\/p>\n<p style=\"text-align: left;\">The standard provides procedures for a comprehensive standard hedge and a reduced basic hedge as well as a core hedge. The latter two are particularly suitable for small and medium-sized companies. This standard is also largely congruent with ISO 27001. The structure of the document is deliberately similar to that of BSI Standard 200-1 in order to facilitate the comparison of content.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:150px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"51\" title=\"CC Logo\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-300x51.png\" alt class=\"img-responsive wp-image-2614\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-200x34.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-400x67.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-600x101.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-800x135.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-1200x202.png 1200w\" sizes=\"(max-width: 640px) 100vw, 300px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-paragraph\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><p class=\"fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:16;--minFontSize:16;line-height:var(--awb-typography4-line-height);\">(BSI Standard 200-3)<\/p><\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Risk management<\/h4><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">The BSI standard entitled &#8220;Risk analysis based on IT baseline protection&#8221; is a supplementary element for BSI baseline protection. It can be used by authorities or companies that have already implemented IT baseline protection and want to carry out an additional risk analysis. The standard specifies eight steps in which information security risks can be systematically identified, assessed and managed. The effectiveness of the proposed measures can be verified by means of comparative analyses.<\/p>\n<p style=\"text-align: left;\">Standard 200-3 is a revision of the original Standard 100-3. The updated version is based on a simplified hazard model that combines the former 450 specific hazards into 46 elementary, product- and technology-neutral hazards.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:150px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"51\" title=\"CC Logo\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-300x51.png\" alt class=\"img-responsive wp-image-2614\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-200x34.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-400x67.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-600x101.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-800x135.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/CC-Logo-1200x202.png 1200w\" sizes=\"(max-width: 640px) 100vw, 300px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-paragraph\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><p class=\"fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:16;--minFontSize:16;line-height:var(--awb-typography4-line-height);\">(BSI Standard 200-4)<\/p><\/div><div class=\"fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Business Continuity Management<\/h4><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">Standard 100-4 was also revised a few years after the other BSI baseline protection standards. It has been available as a revised community draft since 2022. Standard 200-4 is significantly more comprehensive than its predecessor and, with the title &#8220;BCM&#8221;, focuses more strongly on general security in companies.  <\/p>\n<p style=\"text-align: left;\">With systematic instructions, it supports the implementation of a business continuity system in order to be able to react quickly in emergencies &#8211; especially in time-critical business processes &#8211; and minimize downtime. A three-stage model allows for a needs-based introduction.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:60px;--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:60px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>The specifications are fully compatible with those of the internationally recognized ISO 22301, but also include detailed instructions and tools for practical implementation.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-small:35px;--awb-padding-right-small:35px;--awb-padding-bottom-small:35px;--awb-padding-left-small:35px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:95%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:95%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-15 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">The 4 new BSI baseline protection standards<\/h4><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-3 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>BSI Standard 200-1: General requirements for an ISMS<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>BSI Standard 200-3: Risk management in the implementation of IT baseline protection<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-4 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>BSI Standard 200-2: IT-Grundschutz Methodology &#8211; A Guide to IT Security<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>BSI Standard 200-4: Guidance on setting up business continuity management<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:28%;--awb-margin-top-large:0px;--awb-spacing-right-large:6.8571428571429%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:6.8571428571429%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-1 fusion-no-medium-visibility\" data-id=\"1\" style=\"--awb-margin-right:-60px;--awb-margin-left:-60px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/15-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:72%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.6666666666667%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.6666666666667%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-16 fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Implementation of BSI IT-Grundschutz<\/h3><\/div><div class=\"fusion-text fusion-text-11 md-text-align-center sm-text-align-center\"><p style=\"color: rgb(255, 255, 255);\">Information security in companies is a process that must be constantly monitored and optimized. The BSI IT baseline protection standards offer a practical guide to establishing your own information security management system, especially for less experienced users in small and medium-sized companies with an independent IT department.<\/p>\n<p style=\"color: rgb(255, 255, 255);\">A distinction is made between eight phases or steps. The first step is to define which components and areas in the company are eligible for an ISMS. This is followed by a structural analysis of all security-critical company assets and their dependencies. Once the protection requirements have been determined, the minimum requirements specified by the BSI baseline protection as building blocks are modeled and then compared with the current status in the IT baseline protection check. A risk analysis is necessary for all company values that do not match any of the modules.<\/p>\n<p style=\"color: rgb(255, 255, 255);\">An action implementation plan summarizes all the safety measures that will ultimately be implemented in order to achieve the desired safety level. This is divided into 3 levels (basic, core and standard) so that the security concept can be implemented and tested in line with the requirements of your own company.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion-flex-column fusion-animated borderhover2\" style=\"--awb-padding-top:100px;--awb-padding-right:80px;--awb-padding-bottom:100px;--awb-padding-left:80px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:80px;--awb-padding-left-medium:40px;--awb-padding-top-small:40px;--awb-padding-right-small:30px;--awb-padding-bottom-small:40px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-top:0px;--awb-border-right:0px;--awb-border-bottom:0px;--awb-border-left:0px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p style=\"color: var(--awb-color1); font-size: 18px;\" data-fusion-font=\"true\">Cyber Curriculum\u00ae as a cyber security expert for your company<\/p>\n<\/div><div class=\"fusion-title title fusion-title-17 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">BSI IT baseline protection consulting from experts<\/h2><\/div><div class=\"fusion-text fusion-text-13 md-text-align-center sm-text-align-center\"><p style=\"color: var(--awb-color1);\">Trust our many years of experience as security experts in the public sector and in the area of data protection. With our customized IT compliance packages, we offer you exactly the service you need &#8211; always tailored to your security requirements and your budget.<\/p>\n<\/div><div class=\"md-text-align-center sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:50px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-2 fusion-no-small-visibility\" data-id=\"2\" style=\"--awb-margin-top:-90px;--awb-margin-right:-70px;--awb-margin-bottom:-150px;--awb-margin-left:-70px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"viewport\" data-start_point=\"0\" data-end_point=\"100\" data-animationoffset=\"top-into-view\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-lottie fusion-lottie-3 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"3\" style=\"--awb-margin-top:-70px;--awb-margin-right:-100px;--awb-margin-bottom:-50px;--awb-margin-left:-100px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"parent":2668,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2718","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BSI IT-Grundschutz - CyberCurriculum<\/title>\n<meta name=\"description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BSI IT-Grundschutz - CyberCurriculum\" \/>\n<meta property=\"og:description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberCurriculum\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-19T06:23:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"55 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/bsi-it-basic-protection\\\/\",\"url\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/bsi-it-basic-protection\\\/\",\"name\":\"BSI IT-Grundschutz - CyberCurriculum\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"datePublished\":\"2023-12-20T13:54:42+00:00\",\"dateModified\":\"2024-04-19T06:23:13+00:00\",\"description\":\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/bsi-it-basic-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/bsi-it-basic-protection\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/bsi-it-basic-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security &amp; Compliance\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BSI IT-Grundschutz\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"CyberCurriculum\",\"description\":\"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BSI IT-Grundschutz - CyberCurriculum","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/","og_locale":"en_US","og_type":"article","og_title":"BSI IT-Grundschutz - CyberCurriculum","og_description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","og_url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/","og_site_name":"CyberCurriculum","article_modified_time":"2024-04-19T06:23:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"55 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/","url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/","name":"BSI IT-Grundschutz - CyberCurriculum","isPartOf":{"@id":"\/#website"},"datePublished":"2023-12-20T13:54:42+00:00","dateModified":"2024-04-19T06:23:13+00:00","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","breadcrumb":{"@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/bsi-it-basic-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cyber-curriculum.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"IT Security &amp; Compliance","item":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/"},{"@type":"ListItem","position":3,"name":"BSI IT-Grundschutz"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"CyberCurriculum","description":"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/comments?post=2718"}],"version-history":[{"count":7,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2718\/revisions"}],"predecessor-version":[{"id":3730,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2718\/revisions\/3730"}],"up":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2668"}],"wp:attachment":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/media?parent=2718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}