{"id":10524,"date":"2021-03-12T09:20:45","date_gmt":"2021-03-12T08:20:45","guid":{"rendered":"https:\/\/www.accessmanager.net\/?p=10524"},"modified":"2021-03-12T09:20:45","modified_gmt":"2021-03-12T08:20:45","slug":"access-management-according-to-bsi","status":"publish","type":"post","link":"https:\/\/www.accessmanager.net\/en\/2021\/03\/12\/access-management-according-to-bsi\/","title":{"rendered":"Access management according to BSI"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kjlig755-a2331b6fb292013ceaa849b5ae0c41ab\">\n.avia-section.av-kjlig755-a2331b6fb292013ceaa849b5ae0c41ab{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/01\/shutterstock_141093727-1030x687.jpg);\nbackground-position:50% 50%;\nbackground-attachment:fixed;\n}\n.avia-section.av-kjlig755-a2331b6fb292013ceaa849b5ae0c41ab .av-section-color-overlay{\nopacity:0.7;\nbackground-color:#4f4f4f;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-kjlig755-a2331b6fb292013ceaa849b5ae0c41ab main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-fixed av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_px='400'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:400px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-10524'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km60ao56-d568e4ce70880cc5b3f5e69fb7621cec\">\n#top .av-special-heading.av-km60ao56-d568e4ce70880cc5b3f5e69fb7621cec{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-km60ao56-d568e4ce70880cc5b3f5e69fb7621cec .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-km60ao56-d568e4ce70880cc5b3f5e69fb7621cec .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-km60ao56-d568e4ce70880cc5b3f5e69fb7621cec av-special-heading-h1 blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Access management according to BSI<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-29akg70-a6cbde16813beefc99ce2b89958651d6 main_color avia-section-default avia-no-border-styling  avia-builder-el-2  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-10524'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-46qyau-18ab4a9f5b1c274fb8595a886a82b0a3\">\n.flex_column.av-46qyau-18ab4a9f5b1c274fb8595a886a82b0a3{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-46qyau-18ab4a9f5b1c274fb8595a886a82b0a3 av_four_fifth  avia-builder-el-3  el_before_av_hr  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kjlfm84c-e5453f7745392e48cb05594c7d758877 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Information is a sensitive asset. Ensuring the secure handling of it can be challenging, especially for small, medium-sized companies and institutions. One way to address this issue: Access management. How can this be done and what role does the BSI play in this? We have summarised it for you.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km5zzjx9-d3ac8645dc233519d81decb5567c2220\">\n#top .hr.hr-invisible.av-km5zzjx9-d3ac8645dc233519d81decb5567c2220{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-km5zzjx9-d3ac8645dc233519d81decb5567c2220 hr-invisible  avia-builder-el-5  el_after_av_four_fifth  el_before_av_four_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1p2fbcs-f0993581eae75bc347e061c606b0a7d0\">\n.flex_column.av-1p2fbcs-f0993581eae75bc347e061c606b0a7d0{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1p2fbcs-f0993581eae75bc347e061c606b0a7d0 av_four_fifth  avia-builder-el-6  el_after_av_hr  el_before_av_hr  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kjlg647c-f41b408443f36e45600bd763f78bc018 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h5>But first: Who or what is the BSI?<\/h5>\n<p>BSI is the abbreviation for the Federal Office for Information Security. The central IT security service provider of the federal government in German accompanies the topic of information security through prevention, detection and reaction. The specifically formulated main tasks of the BSI are to inform, advise, develop and certify.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km5zzjx9-ef67b463e5548c2285d416d364746f70\">\n#top .hr.hr-invisible.av-km5zzjx9-ef67b463e5548c2285d416d364746f70{\nheight:40px;\n}\n<\/style>\n<div  class='hr av-km5zzjx9-ef67b463e5548c2285d416d364746f70 hr-invisible  avia-builder-el-8  el_after_av_four_fifth  el_before_av_four_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-10i46jg-75115c20af07b61fbf5f406831160478\">\n.flex_column.av-10i46jg-75115c20af07b61fbf5f406831160478{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-10i46jg-75115c20af07b61fbf5f406831160478 av_four_fifth  avia-builder-el-9  el_after_av_hr  el_before_av_hr  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kjlg647c-f41b408443f36e45600bd763f78bc018 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h5>What does access management mean according to the BSI?<\/h5>\n<p>A definition of access management can be found in the <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Grundschutz\/Kompendium_Einzel_PDFs\/02_ORP_Organisation_und_Personal\/ORP_4_Identitaets_und_Berechtigungsmanagement_Editon_2020.pdf?__blob=publicationFile&amp;v=1\" target=\"_blank\" rel=\"noopener\">IT-Grundschutz Methodology<\/a> of the BSI:<\/p>\n<p>ORP.4 \/ 1.1:<\/p>\n<blockquote>\n<p><em>Access management is about whether and how users or IT components are allowed to access and use information or services, i.e. to grant or deny them access, entry or access based on the user profile. Access management refers to the processes required to assign, revoke and control access rights.<\/em><\/p>\n<\/blockquote>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km5zzjx9-ef67b463e5548c2285d416d364746f70\">\n#top .hr.hr-invisible.av-km5zzjx9-ef67b463e5548c2285d416d364746f70{\nheight:40px;\n}\n<\/style>\n<div  class='hr av-km5zzjx9-ef67b463e5548c2285d416d364746f70 hr-invisible  avia-builder-el-11  el_after_av_four_fifth  el_before_av_four_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-sl3z98-02becab7435553b92dbc62745d8109ef\">\n.flex_column.av-sl3z98-02becab7435553b92dbc62745d8109ef{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-sl3z98-02becab7435553b92dbc62745d8109ef av_four_fifth  avia-builder-el-12  el_after_av_hr  el_before_av_hr  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kjlg647c-f41b408443f36e45600bd763f78bc018 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h5>Access management according to BSI \u2013 how to do it correctly?<\/h5>\n<p>The BSI specifies several requirements that must be considered in access management. Thus:<\/p>\n<ul>\n<li>User set-ups and deletions must be carried out by a separate administrative unit<\/li>\n<li>Access rights must be assigned according to daily needs and rights that are no longer required must be removed directly<\/li>\n<li>Access authorisations and their changes must be documented<\/li>\n<li>Documentation of assigned access rights and roles is carried out regularly to ensure that it is up to date.<\/li>\n<li>The use of passwords should be standardised and binding within the company, and the same password should not be used for different systems.<\/li>\n<li>Passwords must be resettable by means of a secure procedure.<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km5zzjx9-ef67b463e5548c2285d416d364746f70\">\n#top .hr.hr-invisible.av-km5zzjx9-ef67b463e5548c2285d416d364746f70{\nheight:40px;\n}\n<\/style>\n<div  class='hr av-km5zzjx9-ef67b463e5548c2285d416d364746f70 hr-invisible  avia-builder-el-14  el_after_av_four_fifth  el_before_av_three_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6gw4mu-7232d0a1c325eea6b4c351f10496adc5\">\n.flex_column.av-6gw4mu-7232d0a1c325eea6b4c351f10496adc5{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6gw4mu-7232d0a1c325eea6b4c351f10496adc5 av_three_fifth  avia-builder-el-15  el_after_av_hr  el_before_av_two_fifth  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kjlh32h7-f9b7a6aa975bef0b5a2eaac554670b4f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>To meet these requirements, there are software solutions that support and relieve IT administrators. The manual, operational effort can be reduced siginificantly and data security can be increased at the same time.<\/p>\n<p>The <strong>BAYOOSOFT Access Manager<\/strong> involves the end users and data managers in the access management process. Access rights requests are processed directly at the relevant points. This not only saves time and money, but is also essential for audit-proof documentation of all authorisations.<\/p>\n<p><strong>Forgotten passwords<\/strong> can be easily reset using various authentication procedures, so that the employee can get back to work as quickly as possible.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3ld292-4a119db67f1bde9ec463fe7bec05cb4b\">\n.flex_column.av-3ld292-4a119db67f1bde9ec463fe7bec05cb4b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3ld292-4a119db67f1bde9ec463fe7bec05cb4b av_two_fifth  avia-builder-el-17  el_after_av_three_fifth  avia-builder-el-last  flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kjlj89uf-a1c4b550030e4342ddb07aa5012f2b06\">\n.avia-image-container.av-kjlj89uf-a1c4b550030e4342ddb07aa5012f2b06 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kjlj89uf-a1c4b550030e4342ddb07aa5012f2b06 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kjlj89uf-a1c4b550030e4342ddb07aa5012f2b06 av-styling- avia-align-center  avia-builder-el-18  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-7224 avia-img-lazy-loading-not-7224 avia_image ' src=\"https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2-300x300.png\" alt='' title=''  height=\"300\" width=\"300\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2-300x300.png 300w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2-80x80.png 80w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2-36x36.png 36w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2-180x180.png 180w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2-120x120.png 120w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2-450x450.png 450w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/05\/FMS-Identity-2.png 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/div><\/div><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_3'  class='avia-section av-km5zxzcm-267833b59902f31149d63c801103abdd alternate_color avia-section-default avia-no-border-styling  avia-builder-el-19  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-10524'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3alz2e-48a92aac586432527e4223e7c79f057f\">\n.flex_column.av-3alz2e-48a92aac586432527e4223e7c79f057f{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3alz2e-48a92aac586432527e4223e7c79f057f av_one_full  avia-builder-el-20  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><div  class='av_promobox av-kjljd24y-3abcdde37d9f8e94a2c2ec2e115b5c8c avia-button-yes  avia-builder-el-21  avia-builder-el-no-sibling '><div class='avia-promocontent'><p>\nWould you like to learn more about authorisation management and supporting tools?<\/p>\n<p>Then get to know the <strong>BAYOOSOFT Access Manager<\/strong> now as part of a product presentation.<\/p>\n<p>Do you have specific questions? Please feel free to use our <a href=\"https:\/\/www.accessmanager.net\/en\/home#start_services\"><strong>contact<\/strong> <strong>form<\/strong><\/a>.<\/p>\n<\/div><div  class='avia-button-wrap av-kjljd24y-5ef0e04a4f62d900ab3b2af084a47384-wrap avia-button-right '><a href='https:\/\/www.accessmanager.net\/en\/services\/product-presentation-inquiry\/'  class='avia-button av-kjljd24y-5ef0e04a4f62d900ab3b2af084a47384 av-link-btn avia-icon_select-no avia-size-large avia-position-right avia-color-theme-color'   aria-label=\"inquiry\"><span class='avia_iconbox_title' >inquiry<\/span><\/a><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":42,"featured_media":9922,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51],"tags":[],"class_list":["post-10524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/10524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/comments?post=10524"}],"version-history":[{"count":5,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/10524\/revisions"}],"predecessor-version":[{"id":12629,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/10524\/revisions\/12629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media\/9922"}],"wp:attachment":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media?parent=10524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/categories?post=10524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/tags?post=10524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}