{"id":3100,"date":"2025-10-13T09:19:29","date_gmt":"2025-10-13T07:19:29","guid":{"rendered":"https:\/\/visit.astrum-it.de\/?post_type=news&#038;p=3100"},"modified":"2025-10-28T07:55:25","modified_gmt":"2025-10-28T06:55:25","slug":"iso-27001-zutrittskontrolle-bsi-grundschutz-astrum-it","status":"publish","type":"news","link":"https:\/\/visit.astrum-it.de\/en\/news\/iso-27001-zutrittskontrolle-bsi-grundschutz-astrum-it\/","title":{"rendered":"ISO 27001 Access Control &#038; BSI Basic Protection | Astrum IT"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-bottom:0;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>A key topic of ISO 27001 is the physical security of information\u2014in particular through effective access controls. These are designed to prevent unauthorized persons from gaining access to sensitive data or IT systems.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-top:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2000\" height=\"1113\" alt=\"Modern access control with turnstiles in a glass-fronted office building\" title=\"Zutrittskontrolle\" src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/10\/Zutrittskontrolle-1.jpg\" class=\"img-responsive wp-image-3053\" srcset=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/10\/Zutrittskontrolle-1-200x111.jpg 200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/10\/Zutrittskontrolle-1-400x223.jpg 400w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/10\/Zutrittskontrolle-1-600x334.jpg 600w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/10\/Zutrittskontrolle-1-800x445.jpg 800w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/10\/Zutrittskontrolle-1-1200x668.jpg 1200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2025\/10\/Zutrittskontrolle-1.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 2000px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h2>ISO 27001 requirements for access controls<\/h2>\n<p>The relevant regulations can be found in <strong>Annex A.11.1 of ISO 27001<\/strong>.<\/p>\n<ul>\n<li><strong>Section A.11.1.2<\/strong> deals with<strong> physical access controls<\/strong>. Companies must ensure that only authorized persons have access to buildings or areas where confidential information is processed.<\/li>\n<li><strong>Section A.11.1.6<\/strong> deals with the <strong>security of delivery and loading zones<\/strong>. Here too, clear control mechanisms must be implemented to prevent unauthorized access.<\/li>\n<\/ul>\n<p>Our <a href=\"https:\/\/visit.astrum-it.de\/en\/visitor-management\/\">visitor management software<\/a> VISIT supports companies in systematically implementing these requirements\u2014<strong>from issuing and approving<\/strong> <a href=\"https:\/\/visit.astrum-it.de\/en\/news\/visitor-badge-software\/\">visitor badges<\/a> to safety instructions for external companies to <strong>complete documentation<\/strong> of all accesses. This enables companies not only to meet ISO 27001 requirements, but also to precisely track who was in the building and when in the event of a security incident.<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><h2>Security for sensitive areas \u2013 data centers, server rooms, and external companies<\/h2>\n<p>Special attention must be paid to areas with increased security requirements, such as <strong>data centers<\/strong>, <strong>server rooms<\/strong>, or <strong>production areas<\/strong> with confidential data. Access controls must be even more precisely regulated in these areas. VISIT, as a<a href=\"http:\/\/Special attention must be paid to areas with increased security requirements, such as data centers, server rooms, or production areas with confidential data. Access controls must be even more precisely regulated in these areas. VISIT, as a yard management system, makes it possible to set up individual security zones to which only specially authorized persons have access. External companies that are commissioned for maintenance or repair work, for example, can also be temporarily and controlled integrated \u2013 including documentation of all activities.\"> yard management<\/a> system, makes it possible to set up <strong>individual security zones<\/strong> to which only specially authorized persons have access. <strong>External companies<\/strong> that are commissioned for maintenance or repair work, for example, can also be temporarily and controlled integrated \u2013 including documentation of all activities.<\/p>\n<h2>Two-factor authentication: Multi-step identity verification for maximum security<\/h2>\n<p>An essential component of modern access controls within the meaning of <strong>ISO 27001 is two-factor authentication (2FA)<\/strong>.<\/p>\n<p>In addition to the classic visitor badge or access code, a second, independent factor may be required\u2014for example, by <strong>scanning an ID card or passport<\/strong>. This biometrically verifiable identification provides an additional level of security and helps to effectively prevent identity fraud.<\/p>\n<p>Two-factor authentication is becoming increasingly important, particularly in connection with the implementation of the <strong>NIS2 Directive<\/strong> and the requirements of the <a href=\"https:\/\/visit.astrum-it.de\/en\/news\/kritis\/\">KRITIS umbrella law<\/a>. Both sets of regulations stipulate a higher level of protection for operators of critical infrastructures and digital services. VISIT supports companies in meeting these requirements in a practical and audit-proof manner.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h2>Connection to NIS2 and KRITIS \u2013 thinking about information security holistically<\/h2>\n<p>While <strong>ISO 27001<\/strong> as an international standard forms the basis for an information security management system, <strong>NIS2<\/strong> (EU Directive on Network and Information Security) and the <strong>KRITIS umbrella law<\/strong> go one step further. They require affected companies to implement <strong>specific technical and organizational measures<\/strong> to ensure cyber and physical security.<\/p>\n<p><strong>Certification according to ISO 27001<\/strong> is not mandatory, but it does make it much easier to meet the <strong>NIS2 requirements<\/strong>. This is because many measures \u2013 including access control \u2013 are identical in both sets of regulations. VISIT contributes to harmonization here: Companies that already operate in compliance with ISO 27001 can use VISIT to expand their processes in such a way that <strong>NIS2 and KRITIS<\/strong> requirements are also met.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:0px;--awb-background-color:var(--awb-custom_color_1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-text-color:var(--awb-color1);\"><h2>Conclusion: On the safe side with VISIT \u2013 ISO 27001, NIS2 &amp; KRITIS compliant<\/h2>\n<p>A well-designed access control system is a key component of any security strategy. With <strong>VISIT<\/strong> from <strong>ASTRUM IT<\/strong>, companies get a software solution that not only meets the requirements of <strong>ISO 27001<\/strong>, but also paves the way for <strong>NIS2 compliance<\/strong> and <strong>KRITIS conformity<\/strong> \u2013 from visitor registration and two-factor authentication to digital documentation.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:0px;--awb-background-color:var(--awb-color3);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><h3>Good to know:<\/h3>\n<p>ASTRUM IT is itself certified according to ISO 27001. You can find the current certificate <a href=\"https:\/\/www.astrum-it.de\/wp-content\/uploads\/2025\/07\/Zertifikat-27001-deutsch.pdf\">here<\/a>. Of course, we also provide support in complying with other standards\u2014for example, with <a href=\"https:\/\/www.astrum-it.de\/softwareentwicklung-fuer-regulierte-branchen-normen-zertifizierungen-und-compliance\/\">ISO 9001-compliant software development<\/a> or in setting up a security concept that complies with <strong>BSI basic protection<\/strong>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"featured_media":3051,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"mediathek-kategorie":[50],"class_list":["post-3100","news","type-news","status-publish","has-post-thumbnail","hentry","mediathek-kategorie-technology-insights-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/news\/3100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/types\/news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/media\/3051"}],"wp:attachment":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/media?parent=3100"}],"wp:term":[{"taxonomy":"mediathek-kategorie","embeddable":true,"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/mediathek-kategorie?post=3100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}