{"id":12018,"date":"2021-05-07T18:10:04","date_gmt":"2021-05-07T16:10:04","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-audits\/kritis\/"},"modified":"2026-03-09T14:37:08","modified_gmt":"2026-03-09T13:37:08","slug":"kritis","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-audits\/kritis\/","title":{"rendered":"KRITIS"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/header-kritis-1.jpg\" custom_margin=\"-25px||0px||false|true\" custom_padding=\"166px|21px|62px|21px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">KRITIS-Audit<\/h1>\n<p style=\"text-align: center\">Security proof for operators of critical infrastructures<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row make_equal=\"on\" _builder_version=\"4.23.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.23.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>With increasing digitization, modern infrastructures are becoming more efficient and intelligent \u2013 but also more susceptible to disruptions and breakdowns, for example through attacks by cybercriminals. In order to provide the best possible protection for these infrastructures, which are essential to the general public, the German Federal Office for Information Security (BSI) has issued legal regulations.<\/p>\n<p>The BSI Act requires <a href=\"https:\/\/www.kritis.bund.de\/SubSites\/Kritis\/EN\/introduction\/introduction.html\" target=\"_blank\" rel=\"noopener\">operators of critical infrastructures<\/a> (KRITIS) to take appropriate organizational and technical precautions to protect against disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems, components or processes. The state of the art shall be observed.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" disabled_on=\"off|off|off\" _builder_version=\"4.23.1\" _module_preset=\"default\" custom_margin=\"30px||30px||true|false\" border_width_top=\"2px\" border_color_top=\"#F07F1D\" border_width_bottom=\"2px\" border_color_bottom=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/icon-symbol-orange-007-2.png\" title_text=\"icon-symbol-orange-007\" _builder_version=\"4.23.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e29014-61 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e29014-63 x-col\">\n<h2 class=\"h-custom-headline h3\"><span><span class=\"ui-provider ee bkd bwf bwg bwh bwi bwj bwk bwl bwm bwn bwo bwp bwq bwr bws bwt bwu bwv bww bwx bwy bwz bxa bxb bxc bxd bxe bxf bxg bxh bxi bxj bxk bxl\" dir=\"ltr\">NIS 2: Be prepared<\/span><\/span><\/h2>\n<\/div>\n<div class=\"e29014-66 x-col\"><span><span class=\"ui-provider ee bkd bwf bwg bwh bwi bwj bwk bwl bwm bwn bwo bwp bwq bwr bws bwt bwu bwv bww bwx bwy bwz bxa bxb bxc bxd bxe bxf bxg bxh bxi bxj bxk bxl\" dir=\"ltr\">Prepare your company in good time: Conduct a gap analysis to uncover specific deviations between your company's security organization and the requirements of NIS 2. This allows you to plan and carry out suitable implementation projects. Find out more <a href=\"https:\/\/www.usd.de\/en\/nis-2-how-to-prepare-your-company\/\">here<\/a>.<\/span><\/span><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"61px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\">Are you an operator of critical infrastructures?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"20px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>For each KRITIS-relevant sector, the BSI has defined different thresholds. If a company reaches the threshold value, it is considered an operator of critical infrastructures.<\/p>\n<p>Even if your company is not classified as a KRITIS company, IT security certifications may be necessary for you. Especially if you are a partner or supplier of a KRITIS company.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"x-text\">\n<h3>The regulation applies to the following sectors:<\/h3>\n<\/div>\n<ul class=\"x-ul-icons\">\n<li class=\"x-li-icon\">Energy (electricity and gas supply)<\/li>\n<li class=\"x-li-icon\"><i class=\"x-icon-raindrops\" aria-hidden=\"true\" data-x-icon-s=\"\uf75c\"><\/i>Water<\/li>\n<li class=\"x-li-icon\"><i class=\"x-icon-apple-alt\" aria-hidden=\"true\" data-x-icon-s=\"\uf5d1\"><\/i>Nutrition<\/li>\n<li class=\"x-li-icon\"><i class=\"x-icon-computer-classic\" aria-hidden=\"true\" data-x-icon-s=\"\uf8b1\"><\/i>Information technology and telecommunications<\/li>\n<li class=\"x-li-icon\"><i class=\"x-icon-clinic-medical\" aria-hidden=\"true\" data-x-icon-s=\"\uf7f2\"><\/i>Health<\/li>\n<li class=\"x-li-icon\"><i class=\"x-icon-train\" aria-hidden=\"true\" data-x-icon-s=\"\uf238\"><\/i>Transport and traffic<\/li>\n<li class=\"x-li-icon\"><i class=\"x-icon-university\" aria-hidden=\"true\" data-x-icon-s=\"\uf19c\"><\/i>Finance and insurance<i class=\"x-icon-power-off\" aria-hidden=\"true\" data-x-icon-s=\"\uf011\"><\/i><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2 class=\"h-custom-headline mtn h2\"><span>How do you obtain the proof of compliance?<\/span><\/h2>\n<p>As an operator of critical systems, you must present a special audit report to the BSI to confirm that your IT security is state of the art. For this purpose, an independent, accredited testing agency will test your IT security in the course of a KRITIS audit in accordance with Section 39 (formerly Section 8a) (3) BSIG. Which security requirements you have to meet in detail depends on your industry. These requirements are fleshed out in industry-specific security standards recognized by the BSI (<strong><a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/IT-SiG\/b3s_Orientierungshilfe_1_0_en.html\" target=\"_blank\" rel=\"noopener\">B3S<\/a><\/strong>).<\/p>\n<p>In order to prepare yourself optimally for the audit, you should<\/p>\n<div class=\"x-text\"><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"25px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li class=\"x-li-icon\">Create a network structure plan<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e33404-44 x-col\">\n<ul class=\"x-ul-icons\">\n<li class=\"x-li-icon\">Conduct risk assessments<\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li class=\"x-li-icon\">Perform an internal pre-audit<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||1px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2 class=\"h-custom-headline mtn h2\"><span>How can we help?<\/span><\/h2>\n<div class=\"x-text\">\n<p>As an IT security consulting firm and accredited Qualified Security Assessor with many years of experience in a wide variety of IT security consulting projects and audits, we are the optimal partner for your KRITIS audit.<\/p>\n<p>On the BSI website you can read about the strict conditions we have to meet in order to be allowed to conduct tests according to Section 39 (formerly Section 8a) (3) BSIG. These include, for example:<\/p><\/div>\n<div class=\"x-text\"><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Uniformity in security assessments<\/li>\n<li>Independence and neutrality<\/li>\n<li>Competent employees and extensive human resources<\/li>\n<li>Secure infrastructure, systems and applications<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Sound knowledge in the areas of information security and information security management systems (ISMS)<\/li>\n<li>Familiarity with common norms and standards of IT and information security<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"30px||30px||true|false\" border_width_top=\"2px\" border_color_top=\"#F07F1D\" border_width_bottom=\"2px\" border_color_bottom=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/icon-lupe-orange-006.png\" title_text=\"icon-lupe-orange-006\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e29014-61 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e29014-63 x-col\">\n<h2 class=\"h-custom-headline h3\">Synergy effects with other certifications<\/h2>\n<\/div>\n<div class=\"e29014-66 x-col\">Existing IT security certifications can be accredited for the KRITIS proof. Use synergies and combine, for example, your KRITIS audit with your PCI DSS assessment. This saves you time and effort.<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline mtn h2\">Our approach<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,1_4,1_4,1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" background_enable_image=\"off\" custom_padding=\"||0px||false|false\" custom_css_main_element=\"width: 10%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-10.png\" title_text=\"Icons_Wie gehen wir vor? -10\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_code _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_code][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 30%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4 class=\"x-feature-box-title\">Phase 1<\/h4>\n<p class=\"x-feature-box-text\"><span>Audit preparation, including determination of audit basis and audit scope<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 10%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-12.png\" title_text=\"Icons_Wie gehen wir vor? -12\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 30%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4 class=\"x-feature-box-title\">Phase 4<\/h4>\n<p>On-site audit<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,1_4,1_4,1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 10%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-09.png\" title_text=\"Icons_Wie gehen wir vor? -09\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_code _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_code][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 30%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4 class=\"x-feature-box-title\">Phase 2<\/h4>\n<p class=\"x-feature-box-text\"><span>Creation of the audit plan<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 10%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-05-1.png\" title_text=\"Icons_Wie gehen wir vor? -05\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 30%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4 class=\"x-feature-box-title\">Phase 5<\/h4>\n<p class=\"x-feature-box-text\">On-site audit follow-up<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,1_4,1_4,1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 10%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-03-1.png\" title_text=\"Icons_Wie gehen wir vor? -03\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_code _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_code][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 30%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"x-feature-box-content \">\n<h4 class=\"x-feature-box-title\">Phase 3<\/h4>\n<p>Documentation review<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 10%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-11.png\" title_text=\"Icons_Wie gehen wir vor? -11\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 30%!important; \" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"x-feature-box-content \">\n<h4 class=\"x-feature-box-title\">Phase 6<\/h4>\n<p class=\"x-feature-box-text\">Creation of the audit report<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" make_equal=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"54px||||false|false\" custom_padding=\"||6px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-unser-team.jpg\" title_text=\"usd-pci-unser-team\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\"><span>Your KRITIS audit<\/span><span><\/span><\/h2>\n<p><span><\/span><\/p>\n<p>Is your company subject to the KRITIS regulation? Do you need support with the KRITIS proof or do you have any questions?<\/p>\n<p>Get a non-binding consultation from our experts.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/contact-form-pci\/\" button_text=\"Contact us\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"39px|auto||auto||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#F07F1D\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"30px|0px|30px|0px|true|true\" border_radii=\"on|5px|5px|5px|5px\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/icon-symbol-orange-007.png\" title_text=\"icon-symbol-orange-007\" align=\"right\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"75%\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"30px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h3\"><span>Keep track with your proof compliance<\/span><\/h2>\n<div class=\"x-text\">\n<p style=\"text-align: left\">The KRITIS proof of compliance must be provided every 2 years.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>KRITIS-Audit Security proof for operators of critical infrastructuresWith increasing digitization, modern infrastructures are becoming more efficient and intelligent \u2013 but also more susceptible to disruptions and breakdowns, for example through attacks by cybercriminals. In order to provide the best possible protection for these infrastructures, which are essential to the general public, the German Federal Office [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":20327,"parent":11896,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-12018","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=12018"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12018\/revisions"}],"predecessor-version":[{"id":64621,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12018\/revisions\/64621"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/20327"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=12018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}