BSI · Cloud Security
C5: Cloud Computing Compliance
Criteria Catalogue
BSI C5 is Germany's definitive cloud security attestation standard. With C5:2020 and its 121 criteria in 17 domains, the BSI defines binding minimum requirements for cloud providers - mandated by law in the German healthcare sector since July 2025 (§393 SGB V, DigiG). Internationally comparable to SOC 2 (USA) and ISO 27017, but with additional transparency requirements specific to European data sovereignty.
Last updated: March 2026
C5:2025 Announced: The BSI has announced a new edition of the C5 catalog for Q1/2026. Publication is still pending. This page is based on the currently valid C5:2020 and will be updated promptly after C5:2025 is released.
- Current BSI Version
- C5:2020
- Requirement Domains
- 17
- Audit Criteria
- 121
- DigiG Mandate (§393 SGB V)
- July 2025
Definition
What is C5?
The Cloud Computing Compliance Criteria Catalogue (C5) is an attestation standard for cloud services developed by Germany's Federal Office for Information Security (BSI). It defines minimum requirements for the information security of cloud providers and creates transparent, verifiable evidence of their actual security level.
The current version C5:2020 comprises 121 criteria in 17 requirement domains - from organizational security and access management to encryption and supplier relationships. Particularly important: C5 includes mandatory transparency requirements obligating providers to disclose subcontractors, data storage locations and applicable legal systems - including potential government access rights (e.g., US CLOUD Act implications for American providers).
C5 is audited and attested by independent auditing firms based on the international assurance standard ISAE 3000 (revised) or its German equivalent IDW PS 860 - the same standard underlying SOC 2 reports in the USA. The result is an attestation report that cloud customers can use as reliable evidence of cloud security.
Key Facts
Scope
Who Needs C5?
C5 concerns both cloud providers who must demonstrate an attestation, and cloud customers from regulated industries who must require an attestation from their providers.
Cloud Providers (Attestation Obligation)
- IaaS/PaaS/SaaS providers for German federal agencies
- Cloud services for healthcare (DigiG §393 SGB V)
- Cloud providers in the financial sector (BaFin BAIT/VAIT requirements)
- Cloud services for KRITIS operators
- Telematics infrastructure service providers (gematik)
- SaaS for hospitals, health insurers, medical practices
- International hyperscalers with German enterprise customers
Affected Industries (Evidence Requirement)
These organizations must require a valid C5 attestation from their cloud providers and verify its coverage for their specific use case:
- Hospitals, clinics and care facilities (DigiG)
- Statutory and private health insurers
- Physicians' associations and medical practices
- Federal agencies and subordinate authorities
- Banks, insurance companies (BaFin regulation)
- Critical infrastructure operators (KRITIS)
- State authorities and municipalities
Requirements Catalog
The 17 C5 Domains
C5:2020 organizes its 121 audit criteria into 17 requirement domains. Each domain contains specific, auditable requirements with defined evidence for the auditing firm.
Organizational Security
Security organization, roles, responsibilities and management commitment to information security
Security Policies
Documented security policies, their approval, communication and regular review
Asset Management
Inventory, classification and appropriate handling of all information-processing assets
Physical Security
Access control to data centers, protection against environmental hazards and physical security of infrastructure
Operational Security
Patch management, malware protection, monitoring, logging and secure operations of the cloud environment
Identity & Access Management
Authentication, authorization, privileged access management and tenant separation
Encryption & Key Management
Cryptographic protections for data at rest and in transit, and secure key management
Communication Security
Network segmentation, secure transmission protocols and network boundary protection
Portability & Interoperability
Data export, migration capabilities and avoidance of vendor lock-in
Availability
High availability, business continuity, disaster recovery and defined SLAs for operational continuity
Incident Management
Detection, reporting, handling and post-processing of security incidents including customer notification
Procurement, Dev & Maintenance
Secure Development Lifecycle, code reviews, vulnerability management and secure change processes
Compliance & Data Privacy
Compliance with legal requirements, GDPR conformity and privacy by design
Change Management
Controlled change processes for infrastructure, platform and services with impact analysis
Information Security Risk Mgmt
Systematic risk identification, assessment and treatment in the cloud context
Audit Management
Internal and external audits, penetration tests, vulnerability scans and tracking of findings
Supplier Relationships
Security requirements for sub-service providers, their review and transparency towards cloud customers
Attestation Levels
Type 1 vs. Type 2 Attestation
C5 distinguishes two attestation types that differ significantly in depth, meaningfulness and audit effort. The choice determines which regulatory requirements are fulfilled.
Type 1 Attestation
Design Review - Point-in-Time
The Type 1 attestation confirms that the security controls described by the provider are appropriately designed at the point of assessment. The auditor evaluates whether the controls are fundamentally suitable to meet C5 requirements.
- Review of control design
- Point-in-time assessment
- Shorter audit period (typically 4-8 weeks)
- Lower effort and costs
- No statement on operational effectiveness
- Entry level for new providers
Suitable for: Initial C5 attestation, internal orientation, providers in build-up phase
Type 2 Attestation
Effectiveness Review - 6 to 12 Months
The Type 2 attestation additionally tests the operational effectiveness of security controls over a defined observation period. It is significantly more meaningful and is preferred for government and regulatory requirements.
- Review of both design AND effectiveness
- Observation period: typically 6-12 months
- Sample testing of controls in operation
- Higher audit effort and cost
- Required by German federal agencies
- Mandatory under DigiG (§393 SGB V)
- Annual renewal recommended
Suitable for: Federal agency customers, healthcare (DigiG), BaFin-regulated institutions, KRITIS operators
Typical Path to Type 2 Attestation
Readiness Assessment
Gap analysis against all 121 criteria, action plan
Gap Remediation
Closing identified gaps, building documentation
Type 1 Attestation
Auditor reviews control design, report issued
Type 2 Attestation
Observation period runs, effectiveness testing, final report
§393 SGB V
C5 and DigiG: Mandatory in German Healthcare
The Digital Healthcare Modernization Act (DigiG) created with §393 SGB V one of the most significant new regulations for cloud security in the German healthcare market. From July 1, 2025, social security data of statutorily insured persons may only be processed in cloud environments whose providers hold a valid C5 attestation.
The regulation affects the entire value chain of digital healthcare: hospital information systems, electronic health records, telematics infrastructure connectors, laboratory information systems, radiology PACS and all billing and administrative solutions in the cloud.
For cloud providers, this means: without a C5 attestation, they effectively lose market access in the German healthcare market. For healthcare providers - hospitals, insurers, medical practices - a documentation obligation arises: they must show that their cloud services are sourced from C5-attested providers.
Framework Relationships
C5 in Context
C5 is not an isolated standard - it builds on established frameworks and enables synergistic audit approaches that significantly reduce total effort.
ISO/IEC 27001 as a Foundation
An existing ISO 27001 certificate provides the ideal foundation for C5. Many requirements overlap directly - the additional effort for C5 is substantially reduced. ISO 27001 provides the ISMS framework; C5 provides the cloud-specific requirements catalog.
- - ~60-70% overlap in requirements
- - Combined audit possible
- - ISMS documentation reusable
- - Synergies in risk analysis and audits
SOC 2 as International Partner
C5 and SOC 2 Type II are content-compatible. The BSI and AICPA have published an official mapping. International cloud providers are audited for both standards together - C5 for the DACH market, SOC 2 for the US market.
- - Official BSI-AICPA mapping available
- - Combined audit by auditing firm
- - Same observation period usable
- - Recommended for international providers
BSI IT-Grundschutz
BSI IT-Grundschutz and C5 share the same publisher (BSI) and conceptual foundations. Federal agencies that have implemented IT-Grundschutz will find many requirements already fulfilled. C5 extends IT-Grundschutz with cloud-specific aspects.
- - Same publisher (BSI)
- - Conceptual alignment
- - Government agencies benefit from IT-Grundschutz basis
- - OPS.5 Cloud Use as bridge building block
Recommended Combination Strategies
Our Services
How AWARE7 Helps with C5
We support cloud providers and cloud customers throughout the entire C5 process - from initial assessment to successful attestation.
C5 Readiness Assessment
Structured comparison of your existing security controls against all 121 C5 criteria. You receive a prioritized gap report with clear action recommendations for each domain - as a foundation for informed decisions and roadmap planning.
- Complete review of all 17 domains
- Prioritized gap report
- Effort estimate for remediation measures
- Recommendation on Type 1 vs. Type 2
Gap Analysis & Action Plan
Based on the readiness assessment, we develop a detailed, prioritized action plan. We support building missing controls, creating all required policies and procedural documentation, and the system description.
- Detailed action plan
- Policy and process documentation
- System description per C5 requirements
- Implementation support
Penetration Testing & Audit Preparation
C5 requires regular penetration tests and vulnerability assessments in the AUD domain. Our OSCP-certified penetration testers conduct the required tests and produce audit-compliant reports directly usable as C5 evidence.
- Penetration testing per C5 AUD requirements
- Vulnerability assessment
- Audit-compliant documentation
- Pre-attestation review
„C5 is not a bureaucratic audit exercise - it is an opportunity: organizations that genuinely implement all 121 criteria have cloud infrastructure that is truly secure, not just on paper. The combination of ISO 27001 methodology and cloud-specific C5 requirements is the most effective approach we know.“
Oskar Braun
ISO/IEC 27001 Lead Auditor (IRCA-certified) · AWARE7 GmbH
Why AWARE7 for C5 Compliance
Was uns von anderen Anbietern unterscheidet
Reine Awareness-Plattformen testen keine Systeme. Reine Beratungskonzerne sind zu weit weg. AWARE7 verbindet beides: Wir hacken Ihre Infrastruktur und schulen Ihre Mitarbeiter - mittelstandsgerecht, persönlich, ohne Enterprise-Overhead.
Forschung und Lehre als Fundament
Rund 20% unseres Umsatzes stammen aus Forschungsprojekten für BSI und BMBF. Unsere Studien analysieren Millionen von Websites und Zehntausende Phishing-E-Mails - publiziert auf ACM- und Springer-Konferenzen. Drei unserer Führungskräfte sind gleichzeitig Professoren an deutschen Hochschulen.
Digitale Souveränität - keine Kompromisse
Alle Daten werden ausschließlich in Deutschland gespeichert und verarbeitet - ohne US-Cloud-Anbieter. Keine Freelancer, keine Subunternehmer in der Wertschöpfung. Alle Mitarbeiter sind sozialversicherungspflichtig angestellt und einheitlich rechtlich verpflichtet. Auf Anfrage VS-NfD-konform.
Festpreis in 24h - planbare Projektzeiträume
Innerhalb von 24 Stunden erhalten Sie ein verbindliches Festpreisangebot - kein Stundensatz-Risiko, keine Nachforderungen, keine Überraschungen. Durch eingespieltes Team und standardisierte Prozesse erhalten Sie einen klaren Zeitplan mit definiertem Starttermin und Endtermin.
Ihr fester Ansprechpartner - jederzeit erreichbar
Ein persönlicher Projektleiter begleitet Sie vom Erstgespräch bis zum Re-Test. Sie buchen Termine direkt bei Ihrem Ansprechpartner - keine Ticket-Systeme, kein Callcenter, kein Wechsel zwischen wechselnden Beratern. Kontinuität schafft Vertrauen.
Für wen sind wir der richtige Partner?
Mittelstand mit 50–2.000 MA
Unternehmen, die echte Security brauchen - ohne einen DAX-Konzern-Dienstleister zu bezahlen. Festpreis, klarer Scope, ein Ansprechpartner.
IT-Verantwortliche & CISOs
Die intern überzeugend argumentieren müssen - und dafür einen Bericht mit Vorstandssprache brauchen, nicht nur technische Findings.
Regulierte Branchen
KRITIS, Gesundheitswesen, Finanzdienstleister: NIS-2, ISO 27001, DORA - wir kennen die Anforderungen und liefern Nachweise, die Auditoren akzeptieren.
Mitwirkung an Industriestandards
OWASP · 2023
OWASP Top 10 for Large Language Models
Prof. Dr. Matteo Große-Kampmann als Contributor im Core-Team des international anerkannten OWASP LLM-Sicherheitsstandards.
BSI · Allianz für Cyber-Sicherheit
Management von Cyber-Risiken
Prof. Dr. Matteo Große-Kampmann als Mitwirkender des offiziellen BSI-Handbuchs für die Unternehmensleitung (dt. Version).
Frequently Asked Questions about BSI C5
Answers to the most common questions about the Cloud Computing Compliance Criteria Catalogue and its requirements for cloud providers and cloud customers.
What is BSI C5?
What is the difference between Type 1 and Type 2 attestation?
Who is required to have a C5 attestation?
What 17 domains does C5 cover?
How does C5 relate to ISO/IEC 27001?
What are the transparency requirements in C5?
How is a C5 attestation conducted?
What is ISAE 3000 and why is it relevant for C5?
What does DigiG §393 SGB V mean for hospitals?
Can C5 and SOC 2 be combined?
What is planned for C5:2025?
How does AWARE7 help with C5 preparation?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelDigiG Deadline Approaching - Check Your C5 Readiness Now
We analyze whether your cloud environment or your providers' services meet C5 requirements - with a clear result and a prioritized action plan on a fixed-price basis.
Kostenlos · 30 Minuten · Unverbindlich