Category: Security

Infografik zu authentik als Identity Provider: Im Zentrum das authentik-Logo mit der Frage „Warum eure Identität nicht in fremde Hände gehört?". Darum herum sind verschiedene Dienste netzwerkartig verbunden: Plane, Cloud Services, Mail, Git, Jira, openDesk und Local Identities. Schaltkreis-Linien im Hintergrund symbolisieren die technische Vernetzung.

Authentik: Why Your Identity Doesn’t Belong in Someone Else’s Hands

There are systems you can ‘quickly’ outsource. And there are systems that are something like the backbone of your entire digital infrastructure. Identities and permissions clearly belong to the second category for me. If your identity provider (IdP) wobbles, everything wobbles: VPN, email, Git, Kubernetes, Atlassian, HR tools, password manager, cloud console—and, in case of […]

Blog EnglishISMS Audits

Audits and regular reviews: How an ISMS is continuously improved

An ISMS is not a project – It is a process The information security management system (ISMS) is already implemented in many companies or in the process of being introduced. But even with a cleanly documented system, up-to-date policies, and a completed audit, the work is not done. On the contrary: An ISMS that is […]

Schaubild NIS 2 Gesetzesentwurf. Vom BSI führt ein Pfeil mit der Aufschrift "NIS 2 Gesetzesentwurf" zu einem Gesetztestext-Icon.

NIS2 is coming – are you ready?

Many companies that previously did not consider themselves “critical” are suddenly in the spotlight of European cybersecurity regulation. IT management, executive leadership and security officers in medium-sized companies are currently asking: Are we affected by the NIS-2 Directive – and what exactly does that mean for us? On 30. Juli 2025, the Federal Office for […]

Microsoft Sharepoint Logo im Vordergrund im Hintergrund düster beleuchteter Laptop in Serverraum

Critical Security Vulnerability in Microsoft SharePoint: Urgent Action Required for Businesses!

“The on-premises instances of Microsoft SharePoint are currently threatened by highly critical security vulnerabilities. This means action is required. Some of these vulnerabilities are already being actively exploited.” Claudia Plattner, President of the BSI Video message from the BSI In a recent video message, the Federal Office for Information Security (BSI) issues an urgent warning about a […]

Digitalisierung Asset ohne LOGO

Digitalization in public administration: opportunities, challenges, and how Honicon GmbH’s Cyber Security Check helps

A conversation among equals: What digitalization in public administration means today The digitalization of public administration is a central topic for public authorities and companies alike. As part of a recent conversation between Helene Brubrowski and Claudia Plattner, a renowned expert in public-sector digitalization, it became clear: The biggest challenges lie not only in outdated […]

Blog Präsentationsszene im Büro: Ein Mann mit Klemmbrett präsentiert an einem Bildschirm den vierphasigen Weg zum BSI-Grundschutz. Zwei Kollegen sitzen mit einem HONICON-Laptop am Tisch und hören zu. Der Bildschirm zeigt die Phasen von unten nach oben: Phase 1 (Analyse, Scope, Struktur), Phase 2 (Umsetzung im Alltag), Phase 3 (Konsolidierung, Nachweise, Feinschliff) und Phase 4 (Auditvorbereitung und Zertifizierung) – jeweils mit Zeitrahmen und zugehörigen Atlassian-Tools wie Jira, Confluence und Assets. Überschrift: „Ihr Weg zum BSI-Grundschutz".

From Initial Consultation to Certification: Your Path to BSI IT-Grundschutz

ℹ️ tl;dr Initial assessment based on BSI IT-Grundschutz: Scope, relevant modules, and the target certification level are clearly defined. Jira as a control instrument: Requirements, risks, and measures are brought together – with transparent responsibilities, deadlines, and workflows. Confluence as an evidence base: Policies, logs, and documentation are bundled in an audit-proof manner and linked […]

Infografik zum BSI-Standard 200-4: Ein stilisierter grüner Zug fährt über eine Brücke, die eine Schlucht überquert. Die linke Seite der Brücke ist mit ‚Systemstörung' beschriftet, die rechte mit ‚Handlungsfähigkeit'. Der BSI-Standard 200-4 bildet dabei symbolisch die Brücke, die Organisationen im öffentlichen Sektor von der Krise zurück zum Normalbetrieb führt.

BSI Standard 200-4: Business Continuity Management in the Public Sector

ℹ️ tl;dr BSI Standard 200-4 describes Business Continuity Management as a management responsibility and is aligned with ISO 22301:2019 for organizational resilience. The Business Impact Analysis (BIA) identifies critical processes, dependencies, and recovery times as the basis for emergency plans and crisis organization. Honicon integrates BCM directly into digitized end-to-end processes instead of isolated specialist […]

BSI-Grundschutz für öffentliche Verwaltung: Stilisiertes grünes Behördengebäude mit Kuppel und Flagge. Links oben Siegel-Icon mit Text "BSI Standards 200-1, 200-2, 200-3". Rechts unten Schild-Icon mit "ISMS" und Text "Informations-Sicherheits Management-System". Visualisiert die Anwendung von BSI-Standards zum Aufbau eines ISMS in öffentlichen Institutionen.

BSI Baseline Protection for Public Administration

ℹ️ tl;dr BSI Baseline Protection provides the framework for legally compliant information security in authorities – from federal agencies to municipal administrations. The IT Baseline Protection Compendium with 111 modules structures management tasks, organizational rules, and technical safeguards across ten layers. Honicon’s 4-step method connects BSI Baseline Protection with Atlassian tools: Analysis → Concept → […]

BSI-Standard 200-1: Informationssicherheit führen, steuern, nachweisen

BSI Standard 200-1: Lead, govern, and demonstrate information security

ℹ️ tl;dr BSI-Standard 200-1 prioritizes systematic management over individual measures and anchors information security as a leadership responsibility. The executive level decides on risks, resources, and information security objectives and ensures integration into existing structures. Honicon designs processes so that the requirements of BSI Standard 200-1, ISO standards, and legal obligations are met, and an […]

Schaubild "Effizienz durch regelmäßige Audits und ISMS" Zwei Personen betrachten das ISMS durch eine Lupe, von diesem Prozess geht ein stetig steigender Graph mit der Beschriftung "KONSTANTE VERBESSERUNG" aus

Audits and Regular Reviews: How an ISMS Is Continuously Improved

An ISMS is not a project – It is a process The information security management system (ISMS) has already been implemented in many companies or is currently being introduced. But even with a neatly documented system, up-to-date policies, and a completed audit, the work is not done. On the contrary: an ISMS that is not […]