Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

IT-Grundschutz BSI-100-2 Report

by Stephanie Dunn
August 14, 2015

The IT-Grundschutz Standards and Catalogues are a set of recommendations designed to assist an organization in achieving an appropriate security level for information throughout an organization. The Federal Office for Information Security (BSI) in Germany develops and maintains the BSI Standards, of which IT-Grundschutz is a part of. The Standards and Catalogues provide methods, processes, procedures, and approaches to information security management, risk analysis, and business continuity management.

The BSI-100-2 Report provides details on the vulnerability status of specific services and devices, such as FTP, Telnet, password audits, firewall, and other policy and services audit checks. The devices and services presented within this report can be considered areas of high risk to an organization. This report can assist the analyst by providing a comprehensive view of outstanding risks that need to be addressed. SecurityCenter Continuous View (CV) provides the analyst with the most current information of existing vulnerabilities that need to be remediated, and can aid in actively identify and responding to threats quickly and efficiently. This report compliments the IT-Grundschutz BSI-100-2 Dashboard, which can be found here: IT-Grundschutz BSI-100-2 Dashboard.

The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the SecurityCenter Feed under the category Compliance & Configuration Assessment. This report requires the IT-Grundschutz BSI Audit File along with the following below:

  • SecurityCenter 4.8.2
  • Nessus 6.2.1
  • Local Checks
  • Compliance Data

SecurityCenter Continuous View (CV) is the market-defining continuous network monitoring platform, which includes active vulnerability detection with Nessus. SecurityCenter CV assists organizations by alerting to vulnerabilities concerns, which aids in actively identify and responding to threats quickly and efficiently. By using SecurityCenter CV, an organization will obtain the most comprehensive and integrated view of its network.

The following chapters are included in the report:

Executive Summary: This chapter contains several components including one monitoring the top ten areas of concern, and two components each displaying severity levels on twelve key areas on a network. 

Information Related Concerns: This chapter provides specific information on policies and audit checks within a network. Some of the areas detected include login activity, password policy, USB and CD-ROM’s audit checks. The areas defined within this component pose security risks for an organization, and should be investigated further.

Network/Device Concerns: This chapter presents specific information on protocols, services, and policy checks. Some of the services detected include monitoring FTP, Telnet, log and firewall activity. The services defined within this component pose security risks for an organization, and should be investigated further.

Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.