{"id":4514,"date":"2025-12-08T07:46:05","date_gmt":"2025-12-08T06:46:05","guid":{"rendered":"https:\/\/www.astrum-it.de\/kritis-und-nis-2-compliance-meistern-so-sichern-sie-ihre-kritische-infrastruktur-nachhaltig\/"},"modified":"2026-04-14T12:01:29","modified_gmt":"2026-04-14T10:01:29","slug":"kritis-und-nis-2-compliance-meistern-so-sichern-sie-ihre-kritische-infrastruktur-nachhaltig","status":"publish","type":"post","link":"https:\/\/www.astrum-it.de\/en\/kritis-und-nis-2-compliance-meistern-so-sichern-sie-ihre-kritische-infrastruktur-nachhaltig\/","title":{"rendered":"Mastering KRITIS and NIS-2 Compliance \u2013 How to Secure Your Critical Infrastructure for the Long Term"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><strong>How does ASTRUM IT\u2019s VISIT visitor and yard management system support compliance with KRITIS and NIS-2?<\/strong><\/p>\n<div id=\"attachment_3842\" style=\"width: 410px\" class=\"wp-caption alignright\"><img decoding=\"async\" aria-describedby=\"caption-attachment-3842\" class=\"wp-image-3842 size-fusion-400\" src=\"https:\/\/www.astrum-it.de\/wp-content\/uploads\/2025\/12\/KRITIS_Bild_Kollegen-400x267.jpg\" alt=\"\" width=\"400\" height=\"267\" srcset=\"https:\/\/www.astrum-it.de\/wp-content\/uploads\/2025\/12\/KRITIS_Bild_Kollegen-200x133.jpg 200w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2025\/12\/KRITIS_Bild_Kollegen-400x267.jpg 400w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2025\/12\/KRITIS_Bild_Kollegen-600x400.jpg 600w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2025\/12\/KRITIS_Bild_Kollegen.jpg 640w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><p id=\"caption-attachment-3842\" class=\"wp-caption-text\">Daniel Tantinger, Christoph Weber und Daniel Tripp<\/p><\/div>\n<p><strong>Daniel Tripp:<\/strong> \u201cOur VISIT software platform plays a central role in securely managing physical access and visitor flows in sensitive areas. In KRITIS environments, it is essential to precisely control access rights and track who was on site and when. This significantly improves security controls. This enables companies and government agencies to prevent unauthorized access and, in an emergency, quickly determine whether security protocols were followed. In addition, VISIT automates approval processes, verifies identification documents, and provides self-service terminals for efficient check-in. This prevents unauthorized access and ensures transparent documentation.\u201d<\/p>\n<p><strong>What is ASTRUM IT&#8217;s focus in the area of hosting and IT operations for KRITIS compliance?<\/strong><\/p>\n<p><strong>Daniel Tantinger:<\/strong> \u201cThrough our hosting and IT operations, we ensure that critical IT systems remain highly available, secure, and monitored. This includes redundant infrastructure, continuous monitoring, and rapid response capabilities in the event of security incidents. For KRITIS and NIS 2 operators, it is crucial that their systems not only remain secure but also operate stably and reliably, as any downtime can have serious consequences. Through our close partnership with noris network, one of Germany\u2019s leading providers of highly secure data centers, we offer state-of-the-art infrastructure, industry-specific security concepts, and the highest certification standards (including ISO\/IEC 27001). Data is processed in German high-security data centers and protected by multi-layered security systems as well as geographically redundant backups. This ensures that even critical applications remain reliably available and compliant with legal requirements.&#8221;<\/p>\n<p><strong>How does ASTRUM IT support information security and ISO 27001?<\/strong><\/p>\n<p><strong>Christoph Weber:<\/strong> \u201cInformation security is at the heart of every KRITIS compliance program. We assist with the implementation and maintenance of ISO 27001-certified management systems that systematically identify and minimize risks. ISO 27001 certification ensures that security processes are not only documented but also actively implemented. A must for operators of critical infrastructure!\u201d<\/p>\n<p><strong>What added value does the combination of these skills offer at ASTRUM IT?<\/strong><\/p>\n<p><strong>Daniel Tripp:<\/strong> \u201cThe integration of physical visitor management, secure IT operations, and a robust information security management system creates a comprehensive security architecture.\u201d<\/p>\n<p><strong>Daniel Tantinger:<\/strong> \u201e\u201cThis enables us to offer our customers highly secure services and provide tailored solutions that meet their specific needs.\u201d<\/p>\n<p><strong>Christoph Weber:<\/strong> \u201cIt provides operators of critical infrastructure with the necessary security in an ever-changing threat landscape.\u201d<\/p>\n<p><strong>In a nutshell: What advice do you have for decision-makers in industry and government agencies?<\/strong><\/p>\n<p><strong>Daniel Tripp:<\/strong> \u201cUse modern tools like VISIT to address physical security vulnerabilities.\u201d<\/p>\n<p><strong>Daniel Tantinger:<\/strong> \u201cChoose professional hosting and IT operations services that minimize the risk of downtime.\u201d<\/p>\n<p><strong>Christoph Weber:<\/strong> \u201cAnd be sure to systematically expand your information security management system in accordance with ISO 27001\u2014it\u2019s well worth the effort.\u201d<\/p>\n<p><strong>Conclusion: KRITIS and NIS-2 as an opportunity to strengthen your IT resilience<\/strong><\/p>\n<p>On November 13, the German Bundestag passed the national NIS2 Implementation Act. Now, more than ever, it is time to analyze risks and define areas for action. With ASTRUM IT, you have an experienced partner at your side who will guide you safely through the complex requirements, step by step. Rely on certified IT security solutions and sustainably increase the cyber resilience of your company or government agency.<\/p>\n<p>Want to know if you\u2019re affected? Simply check the BSI website, answer a few simple questions, and get a clear assessment right away.<\/p>\n<p>If you have any questions about KRITIS and NIS-2, please feel free to contact us!<\/p>\n<p>Further information is also available on our website and in our <a href=\"https:\/\/www.astrum-it.de\/en\/company\/kritis-und-nis-2-sicher-umsetzen-2\/\" target=\"_blank\" rel=\"noopener\">Video<\/a>!<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":3841,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[120],"tags":[],"class_list":["post-4514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogbeitrag-interview-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts\/4514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/comments?post=4514"}],"version-history":[{"count":2,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts\/4514\/revisions"}],"predecessor-version":[{"id":4516,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts\/4514\/revisions\/4516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/media\/3841"}],"wp:attachment":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/media?parent=4514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/categories?post=4514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/tags?post=4514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}