To the page content
T IoT

Understanding and implementing the BSI KRITIS Regulation: How to fulfil the requirements of the security law

Critical infrastructures are the backbone of our modern society. They secure the power supply, healthcare, communication and many other essential areas. To ensure that these systems remain stable and functional even in crisis situations, strict legal requirements apply to their operators - for example, the BSI KRITIS Regulation. You can find out exactly what this is and what obligations it entails in this article.

blog-header-bsi-kritis

In brief

  • The BSI KRITIS Regulation defines which companies and facilities in Germany are considered critical infrastructures and obliges them to take special security measures.
  • Affected operators must implement state-of-the-art IT security standards, report incidents to the BSI immediately and provide regular evidence.
  • The aim is to ensure security of supply in areas such as energy, healthcare, transport and IT despite growing cyber threats.

New standards for critical infrastructures: BSI KRITIS Regulation

A new threat situation also requires a new understanding of security. The BSI KRITIS Ordinance - also known as the Ordinance on the Determination of Critical Infrastructures according to the BSI Act (BSI = Federal Office for Information Security) or BSI KritisV for short - is a centralised set of rules that is intended to promote precisely this understanding of security and the associated protective measures. The regulation defines which facilities, systems and companies in Germany are considered particularly relevant for the provision of services to the general public and how these infrastructures must be strengthened in terms of their information security and functionality.

The KRITIS Regulation came into force on 3 May 2016, but has been amended and expanded several times since then: The first amending regulation from 2017 included additional sectors such as healthcare, finance and insurance as well as transport and traffic, while the amendment to the BSI KRITIS Regulation from 2022 provided for adjustments to the content (e.g. the threshold values). Further amendments were made in 2023 and 2024, each of which added additional annexes to the KRITIS Regulation.

Similar use case or any questions?

Simply fill out the contact form – we’ll get back to you as soon as possible.

How the KRITIS Regulation and the NIS2 Directive differ

The BSI KRITIS Regulation should not be confused with the so-called NIS2 Directive, even though both pursue similar objectives and complement each other. The BSI KRITIS Regulation is based on German law and is aimed specifically at operators of critical infrastructures. NIS2, on the other hand, is an EU-wide directive that has a much broader scope and also applies to many companies outside the classic KRITIS sectors.

According to the regulation, these companies count as critical infrastructure

As already mentioned, the BSI KRITIS Regulation is aimed at operators of critical infrastructures, or "KRITIS" for short, which play a central role for the community. However, whether a company falls under this regulation does not depend solely on its size, but also on its specific function within certain sectors and whether it reaches defined thresholds. A company belongs to KRITIS if it ...

  • ... is active in one of the sectors specified in the regulation, for example energy, information technology, transport and traffic, health, finance and insurance, water, food or municipal waste disposal.
  • ... exceeds the threshold values specified for the sector in the CRITIS Regulation (e.g. network capacities, daily processing volumes, number of persons supplied).
  • ... operates a system that is categorised as supply-relevant and/or contributes to the supply of the general public and is therefore considered system-critical.

Always up to date

The CRITIS Regulation is regularly amended to take account of technological developments and risk situations. New versions may include additional companies. The current status of the ordinance can be found in the Federal Law Gazette (BGBL).

Duties and requirements under the BSI KRITIS ordinance

So what exactly does the BSI KRITIS Ordinance require? In general terms, it obliges affected companies to comprehensively secure their IT systems and ensure continued operations even in the event of technical faults, cyberattacks or other security-related incidents. Many of the measures are based on the so-called BSI IT-Grundschutz, which serves as a guideline for implementation. The requirements affect not only technical systems but also organisational processes, reporting procedures and cooperation with the BSI. 

  • Operators must implement appropriate organisational and technical security measures in line with current best practices.
  • There is an obligation to immediately report significant IT disruptions or security incidents to the Federal Office for Information Security.
  • Companies must regularly submit proof of implemented security measures in the form of audit reports.
  • Operators are required to designate a contact point that is available around the clock and acts as the BSI’s direct contact.
  • For certain facilities and systems, a risk assessment must be carried out to identify potential threats and vulnerabilities.
  • Operators must ensure that service providers and third parties involved in operational processes also meet the relevant security requirements.

IoT solutions for secure and compliant critical infrastructures

Digital security requires technical stability. Use the powerful IoT network technologies and customised tariffs from Deutsche Telekom to make your critical infrastructures future-proof and compliant with the KRITIS Regulation.

Why the BSI KRITIS ordinance is important and necessary

The sometimes strict and demanding requirements have a serious background: In an increasingly digital and interconnected world, dependency on reliably functioning systems is growing, while the risk of cyberattacks, technical faults and human error is also increasing. Failures in critical infrastructure would have far-reaching consequences for the economy, government and society. The KRITIS Ordinance therefore creates uniform and binding security standards to help companies strengthen their information security in a structured and proactive way. 

Moreover, the ordinance provides a clear legal framework – backed by the Security Act – and supports operators of critical infrastructure in identifying risks early on, implementing appropriate security measures and making their supply systems more resilient. In doing so, it helps protect Germany as a business location and strengthens trust in digital processes. The KRITIS Ordinance is thus a cornerstone of the national cybersecurity strategy and indispensable for protecting modern critical infrastructures.

6 points you should consider when implementing the KRITIS Regulation

A structured approach is crucial in order to not only formally fulfil the requirements of the BSI KRITIS Regulation, but also to effectively anchor them in day-to-day operations. In addition to the legal obligations and technical measures already mentioned, strategic, procedural and personnel aspects play an equally important role. Pay attention to the following points to make your organisation resilient in the long term:

  1. Actively involve management!
    The responsibility for implementing KRITIS requirements lies at the highest level. Without clear prioritisation by management, security concepts remain ineffective.
  2. Integrate information security into all business processes!
    Security measures are only effective if they are an integral part of operational processes - from procurement to operation and maintenance of your systems.
  3. Train your employees regularly!
    The level of security depends largely on the behaviour of your teams. Sensitisation and awareness training must therefore be targeted and continuous.
  4. Use established management systems!
    Orientate yourself to standards such as ISO 27001 or industry-specific guidelines in order to set up your security architecture in a structured manner and review it regularly.
  5. Document all measures in a traceable manner!
    Complete documentation facilitates internal audits, external audits and proof to the BSI. It is the basis for transparency and compliance.
  6. Keep an eye on changes and adjustments!
    The CRITIS Regulation is subject to dynamic developments. Adapt your processes to new requirements at an early stage.

Telekom IoT: Future-proof solutions for critical infrastructures

Deutsche Telekom's IoT solutions create the ideal basis for implementing the requirements of the BSI KRITIS Regulation digitally, efficiently and in a future-proof manner. Intelligent sensor technology, secure connectivity and real-time data analysis enable you to detect critical conditions at an early stage, optimise your operating processes and sustainably increase the resilience of your infrastructures.

IoT Use Cases & References

Stage backdrop for IoT use cases with a city and sunset background and an abstract network overlay.

IoT Use Cases & References

The Internet of Things (IoT) is transforming industries with smart solutions that drive efficiency, sustainability, and convenience. Discover real-world use cases that make digital transformation tangible.

Potrait photo Annalena Rauen

Annalena Rauen

Marketing Manager IoT

Back in 2016, Anna worked on IoT topics at Deutsche Telekom for the first time. Since then, she has been supporting customer best practices in a wide range of industries – always focusing on the benefits that the Internet of Things can provide. Her IoT blogposts describe real use cases and the value these innovations add to market players, their business models, and even entire industries.

Curious? Find out more now:

IoT security: recognising and closing security gaps

In modern companies, more and more devices are communicating with each other in real time. However, the stronger the networking, the greater the attack surface, as every IoT device is a potential gateway into the company network. Find out here what risks exist and how you can protect your systems effectively.

Read article