3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About
The German IT Security Act 2.0 (IT-SiG 2.0) has been in force since May 2021. Due to this new law, significantly more German companies have been classified as operators of critical infrastructures (KRITIS) than ever. This is a major cause of headaches for many managers. In addition, IT departments are starting to ask themselves: "Are we now regarded as KRITIS"? And if so, "What do we have to take into consideration?"
What is the Significance of the German IT-SiG 2.0 for Operators of Essential Services?
What is the BSIG?
The BSI Act is the most important law on KRITIS regulation and outlines the tasks and obligations of KRITIS operators. For example, the BSIG mandates KRITIS operators to implement appropriate security measures. These include, for instance, systems for attack detection and processing.
The BSIG also stipulates that these security systems must be in operation by May 1, 2023, at the latest:
After two years at the latest, i.e., by May 2025, operators of critical infrastructures must provide the BSI with corresponding proof of commissioning. In addition, the BSI subsequently requires the provision of proof of active operation of the corresponding systems at regular intervals of two years:
How can IT Managers Implement the BSIG Requirements?
To facilitate the implementation of BSIG requirements, the BSI offers guidance, guidelines, recommendations, interpretation aids and application notes on a vendor-neutral basis. We recommend every SIEM or SOC manager read the three documents that are linked below. These BSI documents show in great detail and in a practical way, which IT security capabilities need to be built for digital sovereignty. Use these BSI documents as a helpful guide and study them carefully:
(2) BSI's minimum standard for logging and detecting cyber attacks
(a) Logging Guideline Federal (PR-B) Logging for the detection of cyber attacks on the federal government's information technology, including the implementation guideline for Section 5 (1) Sentence 1 No. 1 and in conjunction with Sentence 4 BSIG
(3) Guidance on the use of systems for attack detection (SzA) (Community Draft).
As you can see, the BSI has developed project goals, scope, procedures and even the business case. Now it’s up to SIEM and SOC managers to implement these successfully.
But what about you? Which requirements and capabilities have you already implemented? Where are any gaps or open questions? Feel free to leave us a comment below!
How to Successfully Implement KRITIS Requirements
Knowledge of the aforementioned three documents is critical, however, they are not a guarantee that you are out of the woods yet. That's why you should also take a look at our e-book on the topic of the IT Security Act 2.0 and watch our webinar on IT security operations in critical infrastructures. We explore the following and more questions:
- With IT-SiG 2.0 in place, what is required of IT decision-makers in critical infrastructures (KRITIS) today and in the future?
- What are the most important innovations of the IT-SiG 2.0? And who do they affect?
- Who is now considered a KRITIS operator and an "organization in the special public interest"?
- What do IT decision-makers have to implement within a certain timeframe?
We don’t blame you if still have a whole bunch of questions. You are not alone. Many others had to deal with the same challenges, e.g. municipal utilities such as Würzburger Versorgungs- und Verkehrs-GmbH, IT service providers such as DATEV, logistics companies such as Dachser or even international corporations such as Siemens (by the way, all of these organizations have been using Splunk for years).
Feel free to reach out to us directly. We will help you crack even the toughest nuts in the field of cybersecurity, security operations and security automation. That's our speciality at Splunk.
Regards,
Matthias
*This blog including articles on federal law has been edited and translated from the German blog.
Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Splunk Security Content for Threat Detection & Response: November Recap

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

AI for Humans: A Beginner’s Field Guide

Splunk Security Content for Threat Detection & Response: November 2025 Update

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
