Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

BSI · Cloud Security

C5: Cloud Computing Compliance
Criteria Catalogue

BSI C5 is Germany's definitive cloud security attestation standard. With C5:2020 and its 121 criteria in 17 domains, the BSI defines binding minimum requirements for cloud providers - mandated by law in the German healthcare sector since July 2025 (§393 SGB V, DigiG). Internationally comparable to SOC 2 (USA) and ISO 27017, but with additional transparency requirements specific to European data sovereignty.

Last updated: March 2026

Current Version
2020
BSI C5:2020 - fully revised requirements catalog
Requirement Domains
17 Domains
121 criteria in 17 areas from OIS to SSO
Attestation Types
Type 1 / 2
Design review vs. effectiveness testing over 6-12 months
DigiG Mandate
July 2025
§393 SGB V - mandatory for cloud in German healthcare

C5:2025 Announced: The BSI has announced a new edition of the C5 catalog for Q1/2026. Publication is still pending. This page is based on the currently valid C5:2020 and will be updated promptly after C5:2025 is released.

Current BSI Version
C5:2020
Requirement Domains
17
Audit Criteria
121
DigiG Mandate (§393 SGB V)
July 2025

Definition

What is C5?

The Cloud Computing Compliance Criteria Catalogue (C5) is an attestation standard for cloud services developed by Germany's Federal Office for Information Security (BSI). It defines minimum requirements for the information security of cloud providers and creates transparent, verifiable evidence of their actual security level.

The current version C5:2020 comprises 121 criteria in 17 requirement domains - from organizational security and access management to encryption and supplier relationships. Particularly important: C5 includes mandatory transparency requirements obligating providers to disclose subcontractors, data storage locations and applicable legal systems - including potential government access rights (e.g., US CLOUD Act implications for American providers).

C5 is audited and attested by independent auditing firms based on the international assurance standard ISAE 3000 (revised) or its German equivalent IDW PS 860 - the same standard underlying SOC 2 reports in the USA. The result is an attestation report that cloud customers can use as reliable evidence of cloud security.

Key Facts

Publisher
Federal Office for Information Security (BSI), Bonn, Germany
Current Version
C5:2020 (published January 2020, continuously updated)
Audit Standard
Auditors under ISAE 3000 (rev.) / IDW PS 860 (SOC 2 equivalent)
Legal Binding
Effectively mandatory for federal agencies; since July 2025 legally mandated in healthcare (§393 SGB V)
Target Group - Providers
IaaS, PaaS and SaaS providers serving regulated industries
Target Group - Customers
Federal agencies, healthcare providers, financial institutions, KRITIS operators

Scope

Who Needs C5?

C5 concerns both cloud providers who must demonstrate an attestation, and cloud customers from regulated industries who must require an attestation from their providers.

Cloud Providers (Attestation Obligation)

  • IaaS/PaaS/SaaS providers for German federal agencies
  • Cloud services for healthcare (DigiG §393 SGB V)
  • Cloud providers in the financial sector (BaFin BAIT/VAIT requirements)
  • Cloud services for KRITIS operators
  • Telematics infrastructure service providers (gematik)
  • SaaS for hospitals, health insurers, medical practices
  • International hyperscalers with German enterprise customers

Affected Industries (Evidence Requirement)

These organizations must require a valid C5 attestation from their cloud providers and verify its coverage for their specific use case:

  • Hospitals, clinics and care facilities (DigiG)
  • Statutory and private health insurers
  • Physicians' associations and medical practices
  • Federal agencies and subordinate authorities
  • Banks, insurance companies (BaFin regulation)
  • Critical infrastructure operators (KRITIS)
  • State authorities and municipalities

Requirements Catalog

The 17 C5 Domains

C5:2020 organizes its 121 audit criteria into 17 requirement domains. Each domain contains specific, auditable requirements with defined evidence for the auditing firm.

01
OIS

Organizational Security

Security organization, roles, responsibilities and management commitment to information security

02
SP

Security Policies

Documented security policies, their approval, communication and regular review

03
AM

Asset Management

Inventory, classification and appropriate handling of all information-processing assets

04
PS

Physical Security

Access control to data centers, protection against environmental hazards and physical security of infrastructure

05
OS

Operational Security

Patch management, malware protection, monitoring, logging and secure operations of the cloud environment

06
IDM

Identity & Access Management

Authentication, authorization, privileged access management and tenant separation

07
CRY

Encryption & Key Management

Cryptographic protections for data at rest and in transit, and secure key management

08
CS

Communication Security

Network segmentation, secure transmission protocols and network boundary protection

09
PI

Portability & Interoperability

Data export, migration capabilities and avoidance of vendor lock-in

10
SOS

Availability

High availability, business continuity, disaster recovery and defined SLAs for operational continuity

11
IR

Incident Management

Detection, reporting, handling and post-processing of security incidents including customer notification

12
DEV

Procurement, Dev & Maintenance

Secure Development Lifecycle, code reviews, vulnerability management and secure change processes

13
COM

Compliance & Data Privacy

Compliance with legal requirements, GDPR conformity and privacy by design

14
CHA

Change Management

Controlled change processes for infrastructure, platform and services with impact analysis

15
RMG

Information Security Risk Mgmt

Systematic risk identification, assessment and treatment in the cloud context

16
AUD

Audit Management

Internal and external audits, penetration tests, vulnerability scans and tracking of findings

17
SSO

Supplier Relationships

Security requirements for sub-service providers, their review and transparency towards cloud customers

Attestation Levels

Type 1 vs. Type 2 Attestation

C5 distinguishes two attestation types that differ significantly in depth, meaningfulness and audit effort. The choice determines which regulatory requirements are fulfilled.

1

Type 1 Attestation

Design Review - Point-in-Time

The Type 1 attestation confirms that the security controls described by the provider are appropriately designed at the point of assessment. The auditor evaluates whether the controls are fundamentally suitable to meet C5 requirements.

  • Review of control design
  • Point-in-time assessment
  • Shorter audit period (typically 4-8 weeks)
  • Lower effort and costs
  • No statement on operational effectiveness
  • Entry level for new providers

Suitable for: Initial C5 attestation, internal orientation, providers in build-up phase

2

Type 2 Attestation

Effectiveness Review - 6 to 12 Months

The Type 2 attestation additionally tests the operational effectiveness of security controls over a defined observation period. It is significantly more meaningful and is preferred for government and regulatory requirements.

  • Review of both design AND effectiveness
  • Observation period: typically 6-12 months
  • Sample testing of controls in operation
  • Higher audit effort and cost
  • Required by German federal agencies
  • Mandatory under DigiG (§393 SGB V)
  • Annual renewal recommended

Suitable for: Federal agency customers, healthcare (DigiG), BaFin-regulated institutions, KRITIS operators

Typical Path to Type 2 Attestation

01

Readiness Assessment

Gap analysis against all 121 criteria, action plan

4-6 weeks
02

Gap Remediation

Closing identified gaps, building documentation

3-6 months
03

Type 1 Attestation

Auditor reviews control design, report issued

4-8 weeks
04

Type 2 Attestation

Observation period runs, effectiveness testing, final report

6-12 months

§393 SGB V

C5 and DigiG: Mandatory in German Healthcare

The Digital Healthcare Modernization Act (DigiG) created with §393 SGB V one of the most significant new regulations for cloud security in the German healthcare market. From July 1, 2025, social security data of statutorily insured persons may only be processed in cloud environments whose providers hold a valid C5 attestation.

The regulation affects the entire value chain of digital healthcare: hospital information systems, electronic health records, telematics infrastructure connectors, laboratory information systems, radiology PACS and all billing and administrative solutions in the cloud.

For cloud providers, this means: without a C5 attestation, they effectively lose market access in the German healthcare market. For healthcare providers - hospitals, insurers, medical practices - a documentation obligation arises: they must show that their cloud services are sourced from C5-attested providers.

Affected Data
Social security data under §67 SGB X of statutorily insured persons - patient data, billing data, medical findings
Affected Organizations
Health insurers, hospitals, medical practices, MVZ, laboratories, pharmacies and all other healthcare providers under SGB V
Requirement for Cloud Providers
Valid C5 Type 2 attestation (preferred) or Type 1 as transitional solution; updated at least annually
Obligation for Cloud Customers
Proof of C5 compliance of deployed providers, integration into Data Protection Impact Assessment

Framework Relationships

C5 in Context

C5 is not an isolated standard - it builds on established frameworks and enables synergistic audit approaches that significantly reduce total effort.

ISO/IEC 27001

ISO/IEC 27001 as a Foundation

An existing ISO 27001 certificate provides the ideal foundation for C5. Many requirements overlap directly - the additional effort for C5 is substantially reduced. ISO 27001 provides the ISMS framework; C5 provides the cloud-specific requirements catalog.

  • - ~60-70% overlap in requirements
  • - Combined audit possible
  • - ISMS documentation reusable
  • - Synergies in risk analysis and audits
SOC 2

SOC 2 as International Partner

C5 and SOC 2 Type II are content-compatible. The BSI and AICPA have published an official mapping. International cloud providers are audited for both standards together - C5 for the DACH market, SOC 2 for the US market.

  • - Official BSI-AICPA mapping available
  • - Combined audit by auditing firm
  • - Same observation period usable
  • - Recommended for international providers
IT-Grundschutz

BSI IT-Grundschutz

BSI IT-Grundschutz and C5 share the same publisher (BSI) and conceptual foundations. Federal agencies that have implemented IT-Grundschutz will find many requirements already fulfilled. C5 extends IT-Grundschutz with cloud-specific aspects.

  • - Same publisher (BSI)
  • - Conceptual alignment
  • - Government agencies benefit from IT-Grundschutz basis
  • - OPS.5 Cloud Use as bridge building block

Recommended Combination Strategies

For German Cloud Providers
ISO/IEC 27001 + C5 Type 2
Maximum market coverage in the DACH region, accepted by federal agencies and DigiG
For International Providers
ISO/IEC 27001 + C5 + SOC 2
Complete EU and US market coverage; combined audit saves 30-40% effort
For Cloud Customers
ISMS + Provider Audit
Own ISMS (ISO 27001) + structured review of provider attestations in risk management

Our Services

How AWARE7 Helps with C5

We support cloud providers and cloud customers throughout the entire C5 process - from initial assessment to successful attestation.

01

C5 Readiness Assessment

Structured comparison of your existing security controls against all 121 C5 criteria. You receive a prioritized gap report with clear action recommendations for each domain - as a foundation for informed decisions and roadmap planning.

  • Complete review of all 17 domains
  • Prioritized gap report
  • Effort estimate for remediation measures
  • Recommendation on Type 1 vs. Type 2
02

Gap Analysis & Action Plan

Based on the readiness assessment, we develop a detailed, prioritized action plan. We support building missing controls, creating all required policies and procedural documentation, and the system description.

  • Detailed action plan
  • Policy and process documentation
  • System description per C5 requirements
  • Implementation support
03

Penetration Testing & Audit Preparation

C5 requires regular penetration tests and vulnerability assessments in the AUD domain. Our OSCP-certified penetration testers conduct the required tests and produce audit-compliant reports directly usable as C5 evidence.

  • Penetration testing per C5 AUD requirements
  • Vulnerability assessment
  • Audit-compliant documentation
  • Pre-attestation review
„C5 is not a bureaucratic audit exercise - it is an opportunity: organizations that genuinely implement all 121 criteria have cloud infrastructure that is truly secure, not just on paper. The combination of ISO 27001 methodology and cloud-specific C5 requirements is the most effective approach we know.“

Oskar Braun

ISO/IEC 27001 Lead Auditor (IRCA-certified) · AWARE7 GmbH

Why AWARE7 for C5 Compliance

Was uns von anderen Anbietern unterscheidet

Reine Awareness-Plattformen testen keine Systeme. Reine Beratungskonzerne sind zu weit weg. AWARE7 verbindet beides: Wir hacken Ihre Infrastruktur und schulen Ihre Mitarbeiter - mittelstandsgerecht, persönlich, ohne Enterprise-Overhead.

Forschung und Lehre als Fundament

Rund 20% unseres Umsatzes stammen aus Forschungsprojekten für BSI und BMBF. Unsere Studien analysieren Millionen von Websites und Zehntausende Phishing-E-Mails - publiziert auf ACM- und Springer-Konferenzen. Drei unserer Führungskräfte sind gleichzeitig Professoren an deutschen Hochschulen.

Digitale Souveränität - keine Kompromisse

Alle Daten werden ausschließlich in Deutschland gespeichert und verarbeitet - ohne US-Cloud-Anbieter. Keine Freelancer, keine Subunternehmer in der Wertschöpfung. Alle Mitarbeiter sind sozialversicherungspflichtig angestellt und einheitlich rechtlich verpflichtet. Auf Anfrage VS-NfD-konform.

Festpreis in 24h - planbare Projektzeiträume

Innerhalb von 24 Stunden erhalten Sie ein verbindliches Festpreisangebot - kein Stundensatz-Risiko, keine Nachforderungen, keine Überraschungen. Durch eingespieltes Team und standardisierte Prozesse erhalten Sie einen klaren Zeitplan mit definiertem Starttermin und Endtermin.

Ihr fester Ansprechpartner - jederzeit erreichbar

Ein persönlicher Projektleiter begleitet Sie vom Erstgespräch bis zum Re-Test. Sie buchen Termine direkt bei Ihrem Ansprechpartner - keine Ticket-Systeme, kein Callcenter, kein Wechsel zwischen wechselnden Beratern. Kontinuität schafft Vertrauen.

Für wen sind wir der richtige Partner?

Mittelstand mit 50–2.000 MA

Unternehmen, die echte Security brauchen - ohne einen DAX-Konzern-Dienstleister zu bezahlen. Festpreis, klarer Scope, ein Ansprechpartner.

IT-Verantwortliche & CISOs

Die intern überzeugend argumentieren müssen - und dafür einen Bericht mit Vorstandssprache brauchen, nicht nur technische Findings.

Regulierte Branchen

KRITIS, Gesundheitswesen, Finanzdienstleister: NIS-2, ISO 27001, DORA - wir kennen die Anforderungen und liefern Nachweise, die Auditoren akzeptieren.

Mitwirkung an Industriestandards

LLM

OWASP · 2023

OWASP Top 10 for Large Language Models

Prof. Dr. Matteo Große-Kampmann als Contributor im Core-Team des international anerkannten OWASP LLM-Sicherheitsstandards.

BSI

BSI · Allianz für Cyber-Sicherheit

Management von Cyber-Risiken

Prof. Dr. Matteo Große-Kampmann als Mitwirkender des offiziellen BSI-Handbuchs für die Unternehmensleitung (dt. Version).

Frequently Asked Questions about BSI C5

Answers to the most common questions about the Cloud Computing Compliance Criteria Catalogue and its requirements for cloud providers and cloud customers.

The Cloud Computing Compliance Criteria Catalogue (C5) is an attestation standard for cloud services developed by Germany's Federal Office for Information Security (BSI). C5 defines minimum requirements for the information security of cloud providers and creates transparency about their actual security level. The current version C5:2020 comprises 121 criteria in 17 requirement domains addressing both technical and organizational security aspects. A C5 attestation enables cloud customers to assess a provider's security based on independently verified evidence, without having to conduct their own expensive audits. Internationally, C5 is comparable to SOC 2 (USA) or ISO 27017 (cloud-specific ISO standard), but with German/EU-specific requirements including mandatory transparency about data locations and applicable legal systems.
A C5 Type 1 attestation confirms that the security controls described by the cloud provider are appropriately designed at the point of assessment (design review). The auditor evaluates whether the existing controls are fundamentally suitable to meet C5 requirements. A Type 1 attestation provides no information about whether the controls are actually effective in operations. A C5 Type 2 attestation additionally tests the operational effectiveness of security controls over a defined observation period of typically 6 to 12 months. Type 2 is significantly more meaningful and is preferred or required by German federal agencies and under the DigiG. For most regulatory requirements, Type 1 is sufficient as an entry point; Type 2 should be the long-term target.
C5 is effectively mandatory for cloud providers serving German federal agencies since 2020 - federal agencies require corresponding evidence before cloud adoption. Through the Digital Healthcare Modernization Act (DigiG), C5 was legally mandated via §393 SGB V from July 2025 for cloud services in healthcare: health insurers, hospitals and other healthcare providers may only process social security data in clouds whose providers hold a valid C5 attestation. The German Federal Financial Supervisory Authority (BaFin) expects C5 from cloud providers in the financial sector under BAIT/VAIT requirements. KRITIS operators should also consider C5 in the context of their statutory due diligence obligations.
C5:2020 organizes its 121 criteria into 17 requirement domains: (1) Organizational Security (OIS), (2) Security Policies (SP), (3) Asset Management (AM), (4) Physical Security (PS), (5) Operational Security (OS), (6) Identity and Access Management (IDM), (7) Encryption and Key Management (CRY), (8) Communication Security (CS), (9) Portability and Interoperability (PI), (10) Availability (SOS), (11) Incident Management (IR), (12) Procurement, Development and Maintenance (DEV), (13) Compliance and Data Privacy (COM), (14) Change Management (CHA), (15) Information Security Risk Management (RMG), (16) Audit Management (AUD), (17) Supplier Relationships (SSO). Each domain contains specific, auditable requirements with corresponding evidence requirements.
C5 and ISO 27001 overlap significantly in content - an existing ISO 27001 certificate is an excellent foundation for a C5 attestation and substantially reduces the additional effort. However, C5 is more cloud-specific and concretizes many ISO 27001 requirements for the cloud context: tenant separation, transparency requirements towards customers, portability and specific GDPR data privacy requirements are topics that C5 addresses in considerably more detail. ISO 27001 provides the general ISMS framework; C5 delivers the cloud-specific requirements catalog. In practice, a combined audit is recommended to leverage synergies. Organizations combining an ISO 27001 certificate with a C5 attestation demonstrate a comprehensive security posture.
A distinctive feature of C5 are the extensive transparency requirements: cloud providers must publish a system description in the attestation disclosing subcontractors and their security level, data storage locations and processing (particularly outside the EEA), applicable legal systems and potential government access, and the architecture of the cloud environment. These "environment information" enable cloud customers to make informed risk assessments - particularly relevant for US cloud providers and the CLOUD Act. For providers, this means: full transparency about all sub-service providers that provide security-relevant services.
A C5 attestation is conducted by an independent auditing firm based on the international assurance standard ISAE 3000 (revised) or its German equivalent IDW PS 860. The auditor assesses all 121 C5 criteria in four phases: First, the cloud provider creates a detailed system description covering architecture, controls and scope. The auditor then plans audit procedures and, for Type 2, determines the observation period (6-12 months). During execution, the auditor examines through document analysis, interviews, observations and sampling. Finally, the auditor produces the attestation report in SOC 2 format with an audit opinion and findings per criterion. Costs range from EUR 80,000 to EUR 250,000 for a Type 2 attestation depending on scope.
ISAE 3000 (revised) - International Standard on Assurance Engagements - is the standard developed by the IAASB (International Auditing and Assurance Standards Board) for assurance engagements outside traditional financial audits. C5 attestations are based on this standard (or its German equivalent IDW PS 860), because it creates a unified framework for quality, independence and reporting. ISAE 3000 distinguishes between Reasonable Assurance (positive confirmation that controls are effective - required for Type 2) and Limited Assurance (negative assurance - may suffice for Type 1). ISAE 3000 is also the basis for SOC 2 reports (AICPA), enabling combined C5/SOC 2 audits with significant efficiency gains.
Hospital information systems and all cloud services processing social security data of statutorily insured persons must from July 1, 2025 be sourced from providers with a valid C5 attestation. This covers practically all cloud services in patient care: electronic health record platforms, telematics infrastructure connectors, cloud-based laboratory information systems, radiology PACS solutions and billing systems. Hospitals and other healthcare providers bear the responsibility to use only C5-attested providers and document this. Providers without an attestation effectively lose market access in the German healthcare market.
Yes - C5 and SOC 2 Type II (the American equivalent standard) are content-compatible and are frequently assessed together. Many international cloud providers pursue both attestations: SOC 2 for the US market and C5 for Germany and Europe. The AICPA and BSI have published a mapping table documenting overlaps between Trust Service Criteria (SOC 2) and C5 criteria. A combined audit achieves significant efficiency gains as many controls and evidence can be used for both standards. For an international cloud provider with German customers from regulated industries, the combination C5 + ISO 27001 + SOC 2 is the recommended attestation strategy.
The BSI announced in late 2025 that an updated version of the C5 catalog would be published in Q1 2026. C5:2025 is expected to incorporate current developments - anticipated additions include enhanced supply chain security requirements, AI-specific cloud services and zero trust architectures, as well as closer alignment with the EU Cybersecurity Certification Scheme (EUCS). Until publication, C5:2020 remains the applicable standard. Organizations beginning C5 preparation now are well-advised: existing criteria will likely be extended, not fundamentally changed. A solid C5:2020 foundation will facilitate the transition to the new version considerably.
AWARE7 supports cloud providers and cloud customers along the entire C5 journey: For cloud providers, we conduct a C5 Readiness Assessment - a structured comparison of existing security controls against all 121 C5 criteria with clear gap reporting and a prioritized action plan. We support building missing controls, creating required documentation and the system description, through to a pre-attestation readiness review. As an offensive security company, we also conduct the C5-required penetration tests and vulnerability assessments. For cloud customers from regulated industries (healthcare, finance), we review whether existing provider attestations cover their own regulatory requirements.

DigiG Deadline Approaching - Check Your C5 Readiness Now

We analyze whether your cloud environment or your providers' services meet C5 requirements - with a clear result and a prioritized action plan on a fixed-price basis.

Kostenlos · 30 Minuten · Unverbindlich