Modelling (Security Modules)🔗
Purpose🔗
In the Modelling section you assign modules from the IT-Grundschutz Compendium to your scope.
You link modules with assets and requirements; checkpoints alert you to missing links.
Usage🔗
- Select the desired scope (information domain) at the top.
- Add the appropriate security modules to the scope.
- Link the relevant assets (one or more) beneath each module.
- The General Control column indicates whether the requirement is a general or specific one
- Use the Checkpoints view to identify gaps:
- missing module assignments
- assets without assigned requirements
- requirements without evidence
Work through the open checkpoints before switching to the Check (Requirements) section. The goal is a fully modelled structure.