Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Cybersecurity Frameworks im Vergleich: NIST CSF, ISO 27001, CIS Controls und BSI Grundschutz

Cybersecurity frameworks organize security measures and enable systematic risk reduction. The most important frameworks in the DACH region: NIST CSF 2.0 (function-based), ISO 27001 (certifiable), CIS Controls v8 (concrete and prioritized), BSI IT-Grundschutz (German, model-based). This comparison explains the strengths, weaknesses, and areas of application for each framework, as well as mapping possibilities between the standards.

Table of Contents (5 sections)

"Which framework should we use?" is one of the most common questions in cybersecurity projects. The honest answer: There is no one-size-fits-all answer. NIST CSF is suitable for strategic communication with the board. ISO 27001 is the right choice when customers or regulators require certification. CIS Controls v8 is ideal when an operational team needs to implement specific measures. BSI IT-Grundschutz is relevant for federal agencies and KRITIS. Many organizations use elements from all four.

NIST Cybersecurity Framework 2.0 (CSF)

NIST CSF 2.0 - published February 2024:

6 functions (new: Govern as the sixth function):
  GOVERN (GV) - NEW in 2.0:
    → Cybersecurity risk management as an organizational function
    → Define roles, responsibilities, and policies
    → Cybersecurity strategy, expectations, and oversight

  IDENTIFY (ID):
    → Asset management: what do we have?
    → Risk assessment: what threats exist?
    → Business environment: what is critical to operations?

  PROTECT (PR):
    → Access control: Who is authorized to access what?
    → Awareness and training: Do employees know their duties?
    → Data security: Encryption, backup, DLP

  DETECT (DE):
    → Detect anomalies and events
    → Continuous monitoring
    → Detection processes defined and tested

  RESPOND (RS):
    → Response Planning: What to do in the event of an incident?
    → Communication: Internal and external
    → Analysis, containment, improvements

  RECOVER (RC):
    → Recovery Planning: How do we restore operations?
    → Improvements: Incorporate lessons learned
    → Communication: Status of recovery

Usage:
  → Self-assessment: Current Profile → Target Profile → Gap
  → Communication: Executive Board understands functions (no technical details)
  → NOT certifiable: no audit, no certificate
  → Flexible: no prescriptive approach (what exactly to do)

Maturity Tiers (1–4):
  Tier 1 (Partial):   Reactive, ad hoc, little awareness
  Tier 2 (Risk Informed): Risk awareness, informal
  Tier 3 (Repeatable):  Formalized, risk-informed, consistent
  Tier 4 (Adaptive):   Continuous improvement, lessons learned

Strengths/Weaknesses:
  ✓ Good communication foundation for C-level
  ✓ Flexible and industry-agnostic
  ✓ Free (NIST, no license fee)
  ✓ CSF 2.0: better for SMEs and non-profits
  ✗ No certification available
  ✗ Vague – few concrete instructions
  ✗ US-centric (BSI Basic Protection preferred for German authorities)

ISO 27001:2022

ISO/IEC 27001:2022 - The international certification standard:

Core: ISMS (Information Security Management System)
  → Plan-Do-Check-Act cycle (PDCA)
  → Risk-based approach: not all controls apply to everyone
  → Certifiable by accredited bodies (e.g., TÜV, DQS, DNV)

Structure:
  Chapters 1–3:    Introduction, Normative References, Terms
  Chapter 4:      Organizational Context (Stakeholders, Scope)
  Chapter 5:      Leadership (Management Commitment, Policies)
  Chapter 6:      Planning (Risk Assessment, Risk Treatment)
  Chapter 7:      Support (Resources, Competence, Communication)
  Chapter 8:      Operation (Implementation, Change Management)
  Chapter 9:      Performance Evaluation (Audit, Management Review)
  Chapter 10:     Improvement (Nonconformities, Improvements)
  Appendix A:       93 Controls in 4 Subject Areas:
    A.5: Organizational Controls (37 Controls)
    A.6: People Controls (8 controls)
    A.7: Physical Controls (14 controls)
    A.8: Technological Controls (34 controls)

Important new controls in 2022:
  A.5.7:  Threat Intelligence (new!)
  A.5.23: Information Security in Cloud Usage (new!)
  A.5.30: ICT Readiness for Business Continuity (new!)
  A.8.9:  Configuration Management (new!)
  A.8.12: Data Leakage Prevention (new!)
  A.8.23: Web Filtering (new!)
  A.8.28: Secure Coding (new!)

Certification Process:
  Stage 1 (Document Audit): Review policies and ISMS documentation
  Stage 2 (Main Audit):       On-site review of implementation
  Certificate Valid:          3 years
  Surveillance Audit:          Annual (Year 1 and Year 2)
  Recertification:           Full re-audit after 3 years

Strengths/Weaknesses:
  ✓ Internationally recognized certificate
  ✓ Market requirement: Enterprise customers require ISO 27001
  ✓ Systematic, risk-based approach
  ✓ Clearly defined scope (Certificate applies to a specific scope)
  ✗ Time-consuming (6–18 months for implementation)
  ✗ Costs (Audit: €5,000–€50,000 depending on size)
  ✗ Significant documentation effort
  ✗ Controls relatively abstract (what exactly to implement?)

CIS Controls v8

CIS Controls v8 - Center for Internet Security:
  18 controls with 153 safeguards
  Strengths: concrete, prioritized, free

Implementation Groups (Prioritization!):
  IG1 (56 safeguards): Basic cyber hygiene - for EVERYONE!
    → Low resource requirements, high impact
    → "If you do nothing else, do IG1!"
    Examples:
      CIS.1.1: Inventory of all enterprise assets
      CIS.2.1: Inventory of authorized software
      CIS.4.1: Password length min. 14 characters (privileged) / 8 (standard)
      CIS.6.3: MFA for all administrators
      CIS.11.2: Secure data recovery (backup test!)
      CIS.17.1: Documented incident response process

  IG2 (+74 safeguards): For organizations with IT staff
    → Configuration management, vulnerability scanning, logs
    Examples:
      CIS.4.7: Multi-factor authentication for remote access
      CIS.7.3: Automated patch management for operating systems
      CIS.8.2: Centralized log collection (SIEM)
      CIS.13.1: Centralized email security monitoring

  IG3 (+23 safeguards): For organizations with security experts
    → Penetration testing, red teaming, advanced threat detection
    Examples:
      CIS.18.5: Penetration testing for internet-facing systems
      CIS.16.1: Application security testing in the SDLC
      CIS.10.5: Enabling anti-exploitation features

The 18 CIS Controls:
  1.  Inventory and Control of Enterprise Assets
  2.  Inventory and Control of Software Assets
  3.  Data Protection
  4.  Secure Configuration of Enterprise Assets and Software
  5.  Account Management
  6.  Access Control Management
  7.  Continuous Vulnerability Management
  8.  Audit Log Management
  9.  Email and Web Browser Protection
  10. Malware Defense
  11. Data Recovery
  12. Network Infrastructure Management
  13. Network Monitoring and Defense
  14. Security Awareness and Skills Training
  15. Service Provider Management
  16. Application Software Security
  17. Incident Response Management
  18. Penetration Testing

Strengths/Weaknesses:
  ✓ Very concrete and actionable (exactly what needs to be done)
  ✓ Prioritization via IG1/2/3 (not everything at once)
  ✓ Free, regularly updated
  ✓ Useful for audit evidence
  ✓ CIS Benchmarks: concrete configuration recommendations (OS, cloud, etc.)
  ✗ No certificate
  ✗ US perspective (less integration of EU regulations)
  ✗ Less strategic than NIST CSF or ISO 27001

BSI IT-Grundschutz

BSI IT-Grundschutz – the German standard:

Developed by: Federal Office for Information Security (BSI)
Applicability: Mandatory for federal agencies; recommended for all German companies
Costs: Basic Protection Compendium available free of charge at bsi.bund.de

Structure: Building blocks + Threats + Measures

Building blocks (as of 2023, 100+ building blocks):
  ISMS:  ISMS.1 (Security Management)
  ORP:   Organizational Processes (ORP.1-5: Org, Personnel, etc.)
  CON:   Concepts (CON.3 Data Backup, CON.10 Development)
  OPS:   Operations (OPS.1.1 General IT Operations, OPS.1.2 Admin)
  DER:   Detection and Response (DER.1 Monitoring, DER.2 IR)
  APP:   Applications (APP.3.1 Web Applications, APP.4.4 Kubernetes!)
  SYS:   IT Systems (SYS.1.1 Servers, SYS.2.2 Windows Clients)
  IND:   Industrial IT (IND.1-2 OT/ICS Security)
  NET:   Networks (NET.1.1 Network Architecture, NET.3.2 Firewall)
  INF:   Infrastructure (INF.1 Buildings, INF.2 Data Center)

Security Concept:
  Basic Security:       Minimum standard for all (quick to implement)
  Standard Protection:    Full IT-Grundschutz implementation
  Core Protection:        Focus on most critical assets (quick, risk-based)

IT-Grundschutz Audit (GP-Check):
  Target/Actual Comparison: Which requirements are met?
  Status per module: Yes / No / Optional / Not applicable

ISO 27001 based on IT-Grundschutz:
  → BSI certification possible: "ISO 27001 based on IT-Grundschutz"
  → Simplified: IT-Grundschutz recognized as a risk assessment method
  → Popular among federal agencies requiring ISO 27001 certification

Strengths/Weaknesses:
  ✓ Very detailed and concrete (includes sample documents)
  ✓ German → ideal for German regulations and authorities
  ✓ Regularly updated (cloud, OT, Kubernetes modules!)
  ✓ Certifiable (ISO 27001 based on IT-Grundschutz)
  ✓ Free (Grundschutz Compendium)
  ✗ Very extensive → high learning curve
  ✗ Little international recognition (BSI C5 for cloud, otherwise an insider standard)
  ✗ Too heavy for small businesses

Framework Mapping and Combination

Mappings between frameworks:

NIST CSF ↔ ISO 27001:
  Govern   → Ch. 5 (Leadership), Ch. 6 (Planning), A.5.x (Organizational)
  Identify → Ch. 4 (Context), A.5.9 (Asset Inventory), A.8.8 (Vulnerabilities)
  Protect  → A.5–A.8 (Controls)
  Detect   → A.8.16 (Monitoring), DER (IT-Grundschutz)
  Respond  → A.5.26 (IR), A.5.24 (IR Planning)
  Recover  → A.5.29 (BCM), A.5.30 (ICT Continuity)

CIS Controls ↔ ISO 27001 Mapping:
  CIS 1 (Asset Inventory)     → A.5.9, A.5.10
  CIS 4 (Configuration)      → A.8.9
  CIS 6 (Access Control)  → A.8.2, A.8.3, A.5.18
  CIS 7 (Vulnerability Management) → A.8.8
  CIS 8 (Audit Logs)         → A.8.15, A.8.16
  CIS 18 (Penetration Testing)  → A.8.8, A.5.8

Recommended Combination (DACH Companies):

  SMEs without certification requirements:
    Foundation: CIS Controls IG1 (immediately operational)
    Governance: NIST CSF (for C-level communication)
    Supplement: GDPR measures

  Enterprises facing customer pressure:
    Certification: ISO 27001 (as a market requirement)
    Operational: CIS Controls (concrete measures)
    Strategy: NIST CSF (management communication)
    DACH: BSI IT-Grundschutz modules where relevant

  Federal authorities / KRITIS:
    Mandatory: BSI IT-Grundschutz
    Optional: ISO 27001 based on IT-Grundschutz
    Cloud: BSI C5 for cloud providers
    Supplement: NIST CSF as a maturity framework

Multi-framework tooling:
  GRC tools: ServiceNow GRC, MetricStream, OneTrust
  → Import ISO 27001, NIST CSF, CIS, BSI controls
  → Link evidence to multiple frameworks simultaneously
  → Implement once → demonstrate compliance multiple times!

  Open Source Alternative:
  ERAMBA: Open Source GRC (eramba.org)
  → CIS, ISO 27001, NIST CSF integrated
  → Control mapping between frameworks

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Oskar Braun
Oskar Braun

Abteilungsleiter Information Security Consulting

E-Mail

Dipl.-Math. (WWU Münster) und Promovend am Promotionskolleg NRW (Hochschule Rhein-Waal) mit Forschungsschwerpunkt Phishing-Awareness, Behavioral Security und Nudging in der IT-Sicherheit. Verantwortet den Aufbau und die Pflege von ISMS, leitet interne Audits nach ISO/IEC 27001:2022 und berät als externer ISB in KRITIS-Branchen. Lehrbeauftragter für Communication Security an der Hochschule Rhein-Waal und NIS2-Schulungsleiter bei der isits AG.

ISO 27001 Lead Auditor (IRCA) ISB (TÜV)
This article was last edited on 04.03.2026. Responsible: Oskar Braun, Abteilungsleiter Information Security Consulting at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung