B3S
Software, use cases & solutions
4.7/5 on Capterra | 2,000+ satisfied customers

What is B3S?
Introduction
What is B3S?
The B3S (industry-specific security standard) is a security standard defined by an industry to implement the requirements of the IT Security Act.
It describes how operators of critical infrastructures (KRITIS) implement appropriate organizational and technical measures to protect their systems and information.
The aim is to permanently ensure the availability, integrity, authenticity and confidentiality of critical services and the underlying information and IT systems.
Suitable software can be used to document and link security measures, responsibilities, processes and evidence in a standardized manner.
A B3S creates a binding framework for:
- the implementation of legal KRITIS requirements
- clearly defined responsibilities and security processes
- comprehensible technical and organizational measures
- reliable evidence for inspection bodies and authorities

Use cases
Use cases relating to ISMS, risk and compliance management

You control audits centrally, plan audits, document results and automatically generate audit reports.

You can manage documents in an audit-proof manner, version and edit them directly in the tool and use templates and import functions.

i-doit supports GAP analyses according to standards such as ISO 27001, ISO 9001 or NIS2, including maturity level assessment, responsibilities and document assignment.

You evaluate and manage suppliers centrally, document contracts and maintain contact details and replacement suppliers.

You derive measures, distribute tasks, track deadlines and receive automatic notifications by e-mail.

You document and evaluate security incidents in accordance with ISO and NIS2, assign affected assets and centrally derive measures.
Why ISMS?
Why an information security
management system forms the basis
Why ISMS?
Many KRITIS operators face the challenge of setting up an ISMS in a structured manner. There is often no central information base, responsibilities are not clearly defined and risks and measures are only recorded in a fragmented manner.
Critical functions, protection requirements, risks, measures (TOMs), processes, assets and responsibilities are uniformly mapped with i-doit and thus form the foundation for implementing B3S.
Advantages:
- Clear entry: ready-made structure for risks, measures, protection requirements, responsibilities and documents.
- Complete traceability: every measure, test, effectiveness assessment and decision is automatically versioned and historicized.
- B3S-compliant process support: risk analysis, risk treatment, effectiveness checks, continuity management and continuous improvement are integrated.
Each B3S requirement is managed as a separate data record, including responsibilities, status or maturity level, implementation notes, dependencies and the relevant links to systems, processes or documents.

3 steps to an ISMS
How you can achieve your ISMS in 3 steps
recognize risks
and verify
manage
1. recognize critical functions and risks
Asset management is a central element of B3S:
KRITIS operators need to know comprehensibly which systems and components they use, where they are located, what function they fulfill in the supply, what protection requirements exist and what risks arise from them.
Our solutions fully map these requirements by centrally recording, structuring and logically linking all relevant information values - from systems, networks and applications to locations, operating processes and service providers through to roles and responsibilities.
On this basis, the risk analysis can be carried out in a targeted manner.
Threats, vulnerabilities and effects are applied directly to the respective objects so that the risk assessment does not remain abstract, but is carried out specifically on the basis of the real system and process landscape.
Advantages:
- B3S-compliant asset management: All relevant system components, operating processes and responsibilities are recorded in a complete, structured and verifiable manner.
- Risk analysis on the object: Threats, vulnerabilities and effects can be assessed directly on assets, processes or critical functions - not in tables or Excel lists.
- Assignable measures: Technical and organizational measures (TOMs) can be assigned directly to the affected assets, risks or processes.
- Integrated determination of protection requirements: Criticality, confidentiality, integrity and availability are assessed centrally and are automatically incorporated into risk and action decisions.

2. plan, implement and verify measures
ISO 27001 requires that identified risks are dealt with by means of suitable measures. Measures from Annex A serve as the basis for this, which can be selected depending on the risk or supplemented by your own measures.
Our tools allow you to fully map this process: Measures are recorded in a structured manner, assigned to the relevant risks and assets and documented in an audit-proof manner. This makes it possible to see at any time which controls have been implemented, checked or are still open.
Advantages:
- Coverage of all Annex A controls: Measures can be structured and assigned directly in accordance with ISO 27001:2022.
- Audit-proof documentation: every change is historicized - ideal for internal and external audits
- Responsibilities & deadlines: Each control is assigned a responsible person, due dates and status
- Integrated effectiveness check: PDCA cycle with regular review and verification.
- Direct link to assets & risks: Measures do not take effect in the abstract - they are linked to the actual system or process.

3. manage guidelines and procedures in an audit-proof manner
The B3S requires structured, traceable and version-controlled documentation of all security-relevant information - from guidelines and operating procedures to emergency concepts and proof of testing and effectiveness. All documents must have clear responsibilities, be kept up to date and have a verifiable effect in the context of critical services.
With our tools, these documents can be managed centrally, assigned to responsible parties, versioned and linked directly to assets, risks, measures and processes.
This creates a consistent, auditable documentation basis that meets the requirements of the B3S audit procedures.
Advantages:
- Central storage of all safety-relevant documents: guidelines, operating and emergency procedures, work instructions, logs and test reports in one place.
- Versioning & historization: Changes are stored in an audit-proof manner - including the person responsible, time stamps and reason for change.
- Evidence management for B3S audits: Decisions, measures, audits and effectiveness assessments are fully traceable.
- Link to assets, risks & measures: Documents do not exist in isolation, but in the context of the actual infrastructure, processes and KRITIS responsibilities.

Industries
View all solutions for your industry



Read more




Example use cases
Take a look at further use cases
assets
and system manuals
management
management
and access
1. import of existing assets
Many companies already have data on systems, applications, locations, contracts or responsibilities. However, it is often scattered across Excel lists, internal repositories, monitoring information or previous inventories. Instead of manually entering this information again, existing structures can be adopted and integrated into a central information security architecture.
The import enables an orderly consolidation of all relevant assets - from technical components, cloud services and process data to roles and responsibilities. During the import process, the data is classified, responsibilities are assigned and dependencies are made visible.
On this basis, protection requirements can be determined, risks assessed and suitable measures assigned in accordance with ISO 27001.
Advantages:
- No starting from scratch: existing information is transferred instead of newly recorded
- Transparency: assets, responsibilities and dependencies are clearly visible
- Structure: classification, protection requirements and risks can be assigned directly
- Traceability: changes are versioned and documented for auditing purposes
- Future-proof: repeatable imports avoid data silos and duplicate maintenance

2. IT concepts, emergency and system manuals
Create, link and maintain operational and emergency documentation in a structured and audit-proof manner.
With our tools, you can create and maintain all important technical documentation in a complete, up-to-date and audit-proof manner. Data changes are automatically transferred to emergency and system manuals, operating concepts and guidelines. These can be linked directly to the associated assets, processes and locations. This means that all documentation is automatically fed with real statuses from the IT landscape and remains permanently consistent.
All relevant information such as responsibilities, operating parameters, dependencies, restart processes and recovery times (RTO/RPO) are maintained and versioned centrally. The connection to infrastructure, applications and services means that documentation is not only maintained, but actively lived and constantly kept up to date. This is one of the most important factors for audits, certifications and operational stability.
Advantages:
- Centralized, versioned and audit-proof documentation
- Clear responsibilities and traceable operating processes
- Audit and audit-proof evidence in accordance with ISO 27001, NIS2 and BSI requirements
- Faster restart times in an emergency thanks to clear, always up-to-date instructions
- Transparent dependencies between systems, processes and services

3. security incident management
Link processes and associated assets
Control IT service processes efficiently and transparently. With the integration of ticket systems in i-doit, you can bundle all processes in one place. From fault reports and change requests to service requests. The link to your assets, contracts and responsibilities creates a central information base for the entire IT operation.
Tickets are documented in a traceable manner, automatically classified and can be prioritized, delegated and closed using defined workflows. This creates a smooth process between technology, organization and support.
Advantages:
- Standardized control of all IT processes
- Clear responsibilities and faster response times
- Seamless traceability of changes and measures
- Direct connection to CMDB objects and documentation
- Basis for key figures, evaluations and process optimization

4. supplier management
External service providers, hosting providers, maintenance partners or cloud services are often directly involved in critical business processes. Structured supplier management makes it possible to map their services, risks, contracts and dependencies centrally. Responsibilities, service levels, security requirements and effects on information assets are documented in a traceable manner and linked to the relevant processes and measures.
This allows companies to retain control over which suppliers have access to which information assets, which requirements apply and whether agreed protective measures are being adhered to
Advantages:
- Transparency across all security-relevant suppliers and service providers
- Traceable assignment to assets, processes, locations and risks
- Clear responsibilities, competencies and service levels
- Contractual security requirements and compliance specifications can be documented centrally
- Ready to provide evidence for audits, certifications and regulatory checks

5. control & distribution of tasks and access
A functioning ISMS requires clear responsibilities. Who evaluates measures, who releases risks, who is allowed to change guidelines or who is only allowed to read - all of this determines security, efficiency and auditability.
Finely granulated role and authorization concepts clearly assign responsibilities: Teams, departments and individuals are given exactly the access they need for their tasks. Sensitive information remains protected, operational processes remain transparent and evidence is not diluted.
Advantages:
- Clear responsibilities: Roles and tasks are clearly assigned - no gray areas or duplication of responsibilities.
- Finely granulated access control: Authorizations for objects, categories and processes can be precisely defined.
- Protection of sensitive information: Critical data is only visible and editable for authorized users.
- Auditability through traceability: every action can be traced back in terms of time, organization and personnel.
- Reduced errors and misunderstandings: Teams only work with the information they really need.

Book your personal live demo
Our i-doit team will be happy to take the time to advise you personally on your application.

