Skip to content

Modelling (Security Modules)🔗

Purpose🔗

In the Modelling section you assign modules from the IT-Grundschutz Compendium to your scope.
You link modules with assets and requirements; checkpoints alert you to missing links.

Usage🔗

  1. Select the desired scope (information domain) at the top.
  2. Add the appropriate security modules to the scope.
  3. Link the relevant assets (one or more) beneath each module.
  4. The General Control column indicates whether the requirement is a general or specific one
  5. Use the Checkpoints view to identify gaps:
  6. missing module assignments
  7. assets without assigned requirements
  8. requirements without evidence

Work through the open checkpoints before switching to the Check (Requirements) section. The goal is a fully modelled structure.