VIVA2
i-doit / Paid
Set up an information security management system (ISMS) in accordance with the BSI's IT-Grundschutz methodology.
-
Advanced Risk analyses according to BSI IT “Grundschutz” 200-X, seamlessly integrated with the CMDB
-
Management of the BSI IT “Grundschutz” catalogs
-
Creation of reports and diagrams
-
Wizard support for collecting data
Per year:
Small - Not available
(less than 1.000 objects)
Medium - 619,00 €
(less than 5.000 objects)
Large - 1.158,00 €
(less than 10.000 objects)
Flex - Contact us
(more than 10.000 objects)
Information on support options can be found on the developer website
For installation instructions, please contact the developer
Description
The update of the methodology of BSI IT “Grundschutz” from 100-X to 200-X, which was published by the Federal Office for Information Security (BSI) in October 2017, also raises the risk analysis to a new level. To support this methodology there is the proven Baseline protection add-on in a completely revised version. The add-on was not only revised in terms of content, but above all it was technically modernized. Like the well-proven Baseline protection add-on, the new Baseline protection 2 supports you in setting up an Information Security Management System (ISMS).
Core functions
Baseline protection contains the terms Availabilty, Integrity, Confidentiality, Authenticity. The Baseline protection 2 add-on supports you in implementing the BSI IT “Grundschutz” methodology 200-X. Unique is the combining of the processes of risk management with those of the IT asset management in the same tool. Due to the integration in the i-doit CMDB, the maintenance of the foundation data is a one-time exercise and the processes can merge. The add-on integrates natively into i-doit and supports all CMDB core functions such as authorization management, templates, reporting, API and many other convenient functions for data maintenance.
The IT “Grundschutz” Compendium Edition 2018 issued by BSI will be fully imported. This allows you to perform state-of-the-art analysis and assessment of your IT environment. Additional wizards simplify data entry by combining several procedure steps. Information on protection requirements, security analyzes and mitigation measures are documented. Clear summaries and reports inform about where there is sufficient security already and where there is room for improvement. The reference documents required for the audit by BSI are created based on this documentation and are available in different formats. Existing customers of the Baseline protection 1.0 add-on can also use the Baseline protection 2 Add-on.
Application scenarios
- Analysis of Availability, Integrity, Confidentiality and Authenticity of IT and the processes according to IT “Grundschutz” 200-X.
- Establishment of an Information Security Management System (ISMS)
- Building the basis for the certification according to BSI or ISO27001
Who do we recommend this add-on for?
Organizations that have to carry out IT Risk Management according to BSI IT “Grundschutz” 200-X and who want to combine this with existing data of the CMDB and the necessary maintenance processes.
Use-Cases
.webp?width=300&name=multi-ethnic-colleagues-working-together-at-data-c-2025-03-15-19-35-44-utc%20(1).webp)
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Related Add-ons
Add-on für mächtige Datenanalyse. Berechnen Sie Servicekosten, prüfen Sie die Datenqualität der CMDB und führen Sie Ausfallsimulationen durch.
Erstellen Sie leistungsstarke Automatisierungen ohne Programmierkenntnisse ganz einfach nach einem Zeitplan oder manuell per Knopfdruck starten.
Bauen Sie ein Information-Security-Management-System mit Risikoanalyse und -management nach ISO 27001 auf.
Dokumente auch als PDF automatisch erstellen mit tagesaktuellen Daten (z.B. Hardware-Übergabeschein oder Desaster Recovery Plan).
Integrieren Sie das Monitoring-System Checkmk2 in i-doit. Abgleiche zwischen SOLL und IST aus CMDB und Monitoring werden damit unterstützt.
Erstellen Sie auf einfache Weise Formulare, die Sie Nutzern zur vereinfachten Dateneingabe zur Verfügung stellen. Beispiel: Hardware oder Waren selbst dokumentieren lassen.
Hinterlegen Sie Buttons mit eigenen Triggern und starten Sie IT-Prozesse direkt aus i-doit –z.B. das automatische Deployen einer virtuellen Maschine.
Mit diesem Add-on können Sie ein Managementsystem für die Informationssicherheit (ISMS) nach IT-Grundschutz-Methodik des BSI erstellen.
Get your personalized quote today!
Discover how the i-doit Add-on VIVA2 can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

Telefon: +49 (0) 211 - 699 31 0

