Add-on Baseline Protection for 1.000 Objects


  • The Baseline protection 2 add-on was designed to sustainably support users in implementing the BSI IT-Grundschutz methodology 200-x. The add-on was not only revised in terms of content, but above all it was technically modernized. It supports users when establishing an ISMS and provides the basis for a BSI or ISO27001 certification.

    • Advanced Risk analyses according to BSI IT “Grundschutz” 200-X, seamlessly integrated with the CMDB
    • Management of the BSI IT “Grundschutz” catalogs
    • Creation of reports and diagrams
    • Wizard support for collecting data


Baseline protection contains the terms Availability, Integrity, Confidentiality, Authenticity. The Baseline protection 2 add-on supports you in implementing the BSI IT “Grundschutz” methodology 200-X. Which is unique is combining the processes of risk management with those of the IT documentation in the same tool.

Due to the integration in the i-doit CMDB, the maintenance of the foundation data is substantially facilitated and can seamlessly be used by further processes. The add-on integrates natively into i-doit pro and supports all CMDB core functions such as authorization management, templates, reporting, API and many other convenient functions for data maintenance.

On top of this the IT “Grundschutz” Compendium Edition 2018 issued by BSI is fully imported. The user can analyze and evaluate the IT infrastructure and ensure compliance to the directives at any time. Additional wizards make entering data easier.

Information about protection requirements, security analysis and mitigation measures are documented. Clear summaries and reports inform about where there is sufficient security already and where there is room for improvement. The reference documents required for the audit by BSI are created based on this documentation and are available in different formats.

Application scenarios

  • Analysis of Availability, Integrity, Confidentiality and Authenticity of IT and the processes according to IT “Grundschutz” 200-x.
  • Establishment of an ISMS
  • Building the basis for the certification according to BSI or ISO27001