{"id":2253,"date":"2025-03-29T12:23:25","date_gmt":"2025-03-29T11:23:25","guid":{"rendered":"https:\/\/visit.netblue.de\/?post_type=news&#038;p=2253"},"modified":"2025-04-08T15:21:26","modified_gmt":"2025-04-08T13:21:26","slug":"kritis","status":"publish","type":"news","link":"https:\/\/visit.astrum-it.de\/en\/news\/kritis\/","title":{"rendered":"KRITIS: Companies should be aware of these EU directives"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>With the EU Directives EU 2022\/2557 and EU 2022\/2555, the European Union launched two key decisions at the beginning of 2024. EU 2022\/2557 deals with the implementation of the EU Directive EU-RCE in the so-called <strong>KRITIS umbrella law<\/strong>. This defines additional obligations (reporting obligations, BCM, physical security, personnel and crisis management) for operators of critical facilities. In parallel to the KRITIS Umbrella Act, the <strong>NIS2 Implementation Act<\/strong> implements the new EU NIS2 Directive (EU 2022\/2555) for cybersecurity in Germany. The existing KRITIS regulation will be replaced; the two new laws will come into force in October 2024.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2560\" height=\"1152\" title=\"kritis-intro-en\" src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/03\/kritis-intro-en-scaled.jpg\" alt class=\"img-responsive wp-image-2248\" srcset=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/03\/kritis-intro-en-200x90.jpg 200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/03\/kritis-intro-en-400x180.jpg 400w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/03\/kritis-intro-en-600x270.jpg 600w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/03\/kritis-intro-en-800x360.jpg 800w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/03\/kritis-intro-en-1200x540.jpg 1200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/03\/kritis-intro-en-scaled.jpg 2560w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 2560px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h2>KRITIS relevant terms<\/h2>\n<h4>What are KRITIS companies? Who is classified as a KRITIS operator?<\/h4>\n<p>According to the German Federal Office for Information Security (BSI): <em>&#8220;Critical infrastructures are organizations or facilities that are important for the state community and whose failure or impairment would result in lasting supply bottlenecks, significant disruptions to public safety or other dramatic consequences.&#8221;<\/em><\/p>\n<p>Two terms are frequently mentioned in the context of IT security:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><h3>What is cyber resilience?<\/h3>\n<p>Cyber resilience encompasses all preventive measures in KRITIS companies against cyber attacks and appropriate responses to limit or avoid negative consequences. Specifically for CRITIS operators, this means all measures that help to maintain or quickly resume operations after a cyber incident. For example, companies whose logistics exceed a certain threshold (see Annex 7 KRITISV) are obliged under the IT Security Act to protect their IT systems, IT components and IT processes &#8211; and have a duty of proof to the BSI. In addition, all KRITIS operators have a reporting obligation in the event of an incident, also in order to limit it. Effective protective measures include business continuity strategies and backup and recovery systems, such as those implemented by ASTRUM IT.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h3>What is cybersecurity?<\/h3>\n<p>All measures to protect network and information systems fall under the term cybersecurity. This includes organizational issues such as the harmonization of security requirements, personnel issues such as the provision of suitable IT specialists and technical issues such as hardened network architectures with secure access and patch and update management, as is standard at ASTRUM IT. These measures must be implemented in the context of corresponding compliance requirements and defined processes and responsibilities. Cybersecurity at KRITIS operators pursues an overarching goal: to protect the company and maintain its ability to act, thereby further securing the supply chain.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><h2>Why were KRITIS and NIS2 extended? The background.<\/h2>\n<p>Critical infrastructures (KRITIS) have fallen victim to cyber attacks more and more frequently in the past. The rising level of digitalization worldwide and increasing networking are increasing and intensifying the dynamics and complexity of cyber incidents. The BSI&#8217;s report on the &#8220;State of IT security in Germany 2023&#8221; speaks of almost 70 new vulnerabilities in software products that are discovered every day (!). That is around 25 percent more than in the previous reporting period. Small and medium-sized enterprises (SMEs) and, in particular, local authorities and municipal companies were affected disproportionately often.<\/p>\n<p>This is one of the reasons why the KRITIS umbrella law and the EU NIS2 implementation have now been expanded to include companies from almost all sectors, taking into account possible links in the value chain.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-custom_color_1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-row\"><div class=\"fusion-text fusion-text-6\" style=\"--awb-font-size:1.3em;--awb-text-color:var(--awb-color1);\"><p>Is KRITIS mandatory for our company?<\/p>\n<p><strong>We are happy to advise you on Tel. <span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" title=\"\" href=\"tel:004991181510-0\" aria-label=\"\">0911\/81510-0<\/a>.<\/span><\/strong><\/p>\n<\/div><div style=\"text-align:left;\"><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-custom_color_1);--button_border_hover_color:var(--awb-color1);--button_border_width-top:2px;--button_border_width-right:2px;--button_border_width-bottom:2px;--button_border_width-left:2px;--button_gradient_top_color:var(--awb-custom_color_1);--button_gradient_bottom_color:var(--awb-custom_color_1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_margin-right:20px;--button_margin-bottom:20px;\" target=\"_self\" href=\"https:\/\/visit.astrum-it.de\/en\/contact\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-color2);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><p>A possible interface for such a link is also visitor management, which has long been established in research, the defense industry, the financial sector and the pharmaceutical industry. ASTRUM IT increases cyber resilience by linking the operational and physical areas of these companies using the VISIT application. It enables companies to strictly monitor visitors, records and checks their ID documents and increases cyber resilience in companies through specially developed company-specific approval procedures for particularly sensitive areas, for example.<\/p>\n<p>Yard management, which many companies use to manage, monitor and control their logistics activities, is another such interface.<\/p>\n<p>KRITIS creates the framework for establishing cyber resilience and cyber security in these companies. The amended conditions of the KRITIS Umbrella Act and the NIS2 Implementation Act are also significantly increasing the number of affected companies in Germany: whereas an estimated 2,000 companies were previously required to have KRITIS, this number is now rising to an estimated 30,000.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-row\"><div class=\"fusion-text fusion-text-8\" style=\"--awb-font-size:1.3em;--awb-text-color:var(--awb-color7);\"><p>How do I increase my cyber resilience?<\/p>\n<p><strong>Call <a title=\"\" href=\"tel:004991181510-0\" aria-label=\"\">0911\/81510-0<\/a> for answers.<\/strong><\/p>\n<\/div><div style=\"text-align:left;\"><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-custom_color_1);--button_border_hover_color:var(--awb-color1);--button_border_width-top:2px;--button_border_width-right:2px;--button_border_width-bottom:2px;--button_border_width-left:2px;--button_gradient_top_color:var(--awb-custom_color_1);--button_gradient_bottom_color:var(--awb-custom_color_1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_margin-right:20px;--button_margin-bottom:20px;\" target=\"_self\" href=\"https:\/\/visit.astrum-it.de\/en\/contact\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\"><h2>KRITIS: What&#8217;s new in sectors, industries and companies?<\/h2>\n<p>According to the legislation published by the Federal Office of Justice<sup>1<\/sup>, the KRITIS umbrella law now affects these companies, which are clustered as follows on the independent OpenKRITIS platform:<\/p>\n<p><strong>1. KRITIS operators<\/strong><sup>2<\/sup><strong>\u00a0<\/strong>evaluate the affectedness of individual facilities according to the KRITIS Ordinance.<br \/>\nThe sectors affected are: Energy, transportation and traffic, finance and insurance, health, drinking water and wastewater, food, IT and TC, space, waste disposal.<\/p>\n<p><strong>2. Particularly important facilities<\/strong>\u00a0(by company size) in\u00a0<strong>NIS2 sectors\u00a0<\/strong>(no. 1)<\/p>\n<ul>\n<li>Companies with 250 or more employees or<\/li>\n<li>Companies with a turnover of \u20ac 50 million or more and a balance sheet of \u20ac 43 million or more<\/li>\n<li>Special cases (excerpt): TC providers, critical facilities, central governments<\/li>\n<\/ul>\n<p><em>Affected are:\u00a0<\/em>Large companies from the energy, transport and traffic, finance and insurance, health, drinking water and waste water, IT and TC, space and special cases such as central governments or TC networks\/services<\/p>\n<p><strong>3. Important facilities<\/strong>\u00a0(by size of company in<strong>\u00a0NIS2 sectors\u00a0<\/strong>(1 and 2))<\/p>\n<ul>\n<li>Companies with 50 or more employees or<\/li>\n<li>Companies with a turnover of EUR 10 million or more and a balance sheet of EUR 10 million or more<\/li>\n<li>Trust services<\/li>\n<\/ul>\n<p><em>Affected are:\u00a0<\/em>Medium-sized companies from the energy, transport and traffic, finance and insurance, health, drinking water and wastewater, IT and telecommunications, space, postal and courier, waste disposal, chemicals, food, manufacturing, digital services and research sectors.<\/p>\n<h3>Dependencies through digitalization<\/h3>\n<p>Today, digitalization stands for the increasing interdependence of different sectors. This leads to dependencies. For example, energy suppliers often determine the user&#8217;s consumption via remote reading. Water suppliers work closely with energy suppliers in order to be able to distribute water at all. Such dependencies increase the risk of critical infrastructures failing. What&#8217;s more, failures in one sector lead to failures in other sectors &#8211; the domino effect<sup>3<\/sup>\u00a0sets in. If the failure in one sector leads to far greater consequences in another sector, this is known as a cascade effect.<\/p>\n<p><strong>Against this backdrop, the KRITIS umbrella law brings all sectors together under one roof for the first time and formulates a framework for risks that can be caused by natural events, human error or sabotage in an &#8220;all-hazards approach&#8221;<\/strong><sup>4<\/sup>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-custom_color_1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p>The\u00a0<em>UP KRITIS<\/em>\u00a0has established a public-private cooperation between operators of critical infrastructures, associations and the responsible government agencies. Authors from various\u00a0<em>UP KRITIS<\/em>\u00a0committees regularly publish valuable information on the BSI website. For example, there are checklists on possible contractual arrangements and content regulations for the use of cloud services, such as those offered by IT companies like ASTRUM IT.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\"><h2>Would you like to find out more?<\/h2>\n<ul>\n<li>Read how cyber security and cyber resilience can also be realized in your company with a lot of public traffic and access to many external service providers.\u00a0<strong>Details\u00a0<a title=\"\" href=\"https:\/\/visit.astrum-it.de\/en\/visitor-management\/\" aria-label=\"\">here.<\/a><\/strong><\/li>\n<li>Get to know the cybersecurity weak points within your logistics processes and what solutions are available.\u00a0<strong>Details\u00a0<a title=\"\" href=\"https:\/\/visit.astrum-it.de\/en\/yard-management\/\" aria-label=\"\">here.<\/a><\/strong><\/li>\n<li>Find out why KRITIS is so important to us\u00a0<strong><a title=\"\" href=\"https:\/\/www.astrum-it.de\/en\" aria-label=\"\">here<\/a>.<\/strong><\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-12\"><p><strong><u>Sources:<\/u><\/strong><\/p>\n<p><sup>1<\/sup><a title=\"\" href=\"https:\/\/www.gesetze-im-internet.de\/bsi-kritisv\/BJNR095800016.html\" aria-label=\"\">https:\/\/www.gesetze-im-internet.de\/bsi-kritisv\/BJNR095800016.html<\/a><br \/>\n<sup>2<\/sup>KRITIS operators evaluate the impact of individual systems in accordance with the KRITIS Regulation. Whether a company is a KRITIS operator can be determined using the so-called KRITIS methodology.<br \/>\n<sup>3<\/sup><a title=\"\" href=\"https:\/\/www.bbk.bund.de\/DE\/Themen\/Kritische-Infrastrukturen\/KRITIS-Gefahrenlagen\/kritis-gefahrenlagen_node.html\" aria-label=\"\">https:\/\/www.bbk.bund.de\/DE\/Themen\/Kritische-Infrastrukturen\/KRITIS-Gefa\u2026<\/a><br \/>\n<sup>4<\/sup>All-hazards approach: Consideration of all types of hazards (e.g. natural hazards, technological hazards, etc.) as part of risk and crisis management.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"featured_media":2244,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"mediathek-kategorie":[50],"class_list":["post-2253","news","type-news","status-publish","has-post-thumbnail","hentry","mediathek-kategorie-technology-insights-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/news\/2253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/types\/news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/media\/2244"}],"wp:attachment":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/media?parent=2253"}],"wp:term":[{"taxonomy":"mediathek-kategorie","embeddable":true,"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/mediathek-kategorie?post=2253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}