Elementary Threats of the BSI IT-Grundschutz Compendium

Elementary Threats of the BSI IT-Grundschutz Compendium

The Elementary Threats of the BSI IT-Grundschutz Compendium form the foundation of every IT-Grundschutz-compliant risk analysis. Defined in BSI Standard 200-3, these 47 threats condense the broad landscape of potential risks into a compact, product-neutral and methodologically coherent catalogue. For organisations implementing IT-Grundschutz or aiming for ISO 27001 certification on the basis of IT-Grundschutz, these threats are an indispensable starting point for developing a robust and reproducible security concept.

What Are Elementary Threats?

Elementary threats are generalised, real-world events that can directly impair the confidentiality, integrity or availability of information. They originate from the detailed threat descriptions in the IT-Grundschutz Modules but are distilled into a standardised list optimised for risk analysis.

The BSI’s objectives when designing this catalogue were clear:

  • Optimised for risk analysis
    The threats are defined at a level of abstraction that allows fast and consistent assessment across different systems.
  • Product-neutral and (as far as possible) technology-neutral
    Threats are not tied to specific manufacturers or technologies, ensuring broad applicability.
  • Compatible with international standards
    The structure aligns with ISO/IEC 27005, ISO 31000, NIST 800-30 and similar frameworks.
  • Fully integrated into IT-Grundschutz
    Elementary threats are used throughout the IT-Grundschutz methodology—from modelling to safeguard selection and risk evaluation.

Direct Impact on the CIA Triad

A key feature of the BSI’s approach is the direct assignment of each threat to the core security values:

  • C – Confidentiality
  • I – Integrity
  • A – Availability

Only direct impacts are considered—not indirect or secondary effects.
For example:

  • G 0.1 Fire is mapped to Availability because a fire directly disrupts operations.
    While confidentiality or integrity may be affected indirectly (e.g., damaged or exposed media), these consequences are not part of the primary mapping.

This clarity enables precise determination of which threats are relevant for assets with high or very high protection requirements.

Why Elementary Threats Matter in Practice

The Elementary Threat catalogue is used to:

  • Identify relevant risks for each asset during the threat overview phase.
  • Support structured risk assessment using frequency–impact matrices.
  • Ensure consistent threat modelling across different systems and organisational units.
  • Create a unified basis for security concepts, audits and ISO 27001 certificates based on IT-Grundschutz.

By excluding threats that merely describe missing controls (e.g., “no patching” or “insufficient encryption”), the BSI ensures the catalogue focuses on actual events, not design weaknesses.

Examples of Elementary Threats

The full catalogue includes threats originating from environmental, technical, organisational, human and deliberate sources, such as:

  • Fire, water, natural disasters
  • Power outages, communication failures
  • Software vulnerabilities, device malfunctions
  • Espionage, social engineering, malware
  • Misuse of authorisations, identity theft
  • Loss of data or destruction of media

Each threat is tagged with its corresponding CIA impact, creating a consistent analytical baseline.

A Foundation for Digital Operational Resilience

For organisations pursuing digital operational resilience, compliance with IT-Grundschutz, or alignment with the broader European regulatory landscape (including DORA), the Elementary Threats serve as a highly structured and recognised starting point. They ensure that risk assessments are systematic, comparable and aligned with best-practice information security standards.

ThreatCore value
G 0.1FireA
G 0.2Unfavourable environmental conditionsI,A
G 0.3WaterI,A
G 0.4Soiling, dust, corrosionI,A
G 0.5Natural catastrophesA
G 0.6Catastrophes in the environmentA
G 0.7Major events in the environmentC,I,A
G 0.8Disruption or malfunction of power supplyI,A
G 0.9Failure or malfunction of communication networksI,A
G 0.10Failure or malfunction of supply networksA
G 0.11Failure or malfunction of service providersC,I,A
G 0.12Electromagnetic interferenceI,A
G 0.13Interception of compromising radiationC
G 0.14EspionageC
G 0.15Line tappingC
G 0.16Theft of devices, data media and documentsC,A
G 0.17Loss of devices, data media and documentsC,A
G 0.18Poor planning or lack of adjustmentC,I,A
G 0.19Disclosure of information that should be protectedC
G 0.20Information from unreliable sourcesC,I,A
G 0.21Manipulation of hardware or softwareC,I,A
G 0.22Manipulation of informationI
G 0.23Unauthorised entry into IT systemsC,I
G 0.24Destruction of devices or data mediaA
G 0.25Failure of devices or systemsA
G 0.26Malfunctions of devices or systemsC,I,A
G 0.27Lack of resourcesA
G 0.28Software vulnerabilities or errorsC,I,A
G 0.29Violation of laws or contractsC,I,A
G 0.30Unauthorised use or administration of devices and systemsC,I,A
G 0.31Incorrect use or administration of devices and systemsC,I,A
G 0.32Misuse of authorisationsC,I,A
G 0.33Loss of personnelA
G 0.34AttackC,I,A
G 0.35Coercion, extortion or corruptionC,I,A
G 0.36Identity theftC,I,A
G 0.37Repudiation of actsC,I
G 0.38Misuse of personal dataC
G 0.39MalwareC,I,A
G 0.40Denial of servicesA
G 0.41SabotageA
G 0.42Social engineeringC,I
G 0.43Importing messagesC,I
G 0.44Unauthorised entry into roomsC,I,A
G 0.45Loss of dataA
G 0.46Loss of integrity of information that should be protectedI
G 0.47Harmful side effectsC, I, A

Sources:

https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/IT-Grundschutz/it-grundschutz_node.html

https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Grundschutz/International/bsi-standard-2003_en_pdf.html

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert