Skip to main content

BSI C5 (Cloud Computing Compliance Controls Catalogue)

Companies are increasingly using cloud services to streamline their business processes. BSI C5 (Cloud Computing Compliance Controls Catalogue), developed by the Federal Office for Information Security (BSI), provides a reliable foundation for security and transparency. The standard defines how security measures should be implemented in the cloud, how risks should be managed, and how anti-fraud mechanisms are integrated. The BSI C5 report serves as proof that appropriate control measures are in place and is an important tool for mitigating risks when using cloud services. It ensures that cloud providers adhere to robust security standards, which are especially critical in sensitive sectors such as healthcare and finance.

How to Obtain BSI C5 Certification

right-dot

1. Understanding the Requirements

Familiarize yourself with the BSI C5 requirements and determine their relevance for your company and your customers.

2. Preparing for the Audit

Select an auditor and define the scope of the audit, including the most critical processes and controls.
right-dot
right-dot

3. Documentation and Analysis

Document existing controls and create a risk control matrix. Perform a GAP analysis to identify weaknesses.

4. Internal Reviews

Conduct internal tests of the controls and update the documentation based on test results.
right-dot
right-dot

5. Performing the External Audit

Prepare the necessary documentation for the auditor and provide access to processes and materials.

6. Analysing Results and Improvements

Receive the auditor’s report, analyze the findings, and implement recommended improvements.
right-dot

Core Elements of a BSI C5 Report

A BSI C5 report typically includes the following:
Auditor’s Opinion:
The auditor documents the scope and time period of the BSI C5 audit and issues either an unqualified or qualified opinion.
System Description:
The documentation covers risk management processes and implemented IT controls such as access management, change management, and physical security.
Additional Information:
This optional section includes further details about the audit, such as specific security requirements or industryspecific considerations.

BSI C5 or ISO 27001 & SOC 2

image
BSI C5 enables cloud providers to demonstrate their security controls through independent audits. The standard systematically evaluates the protective measures in place for cloud services and promotes transparency for customers.
ISO 27001 and SOC 2 focus more broadly on general security and data protection requirements across all industries. Both standards complement BSI C5 and can be applied in parallel.

The Development of BSI C5

2016

Introduction
The Federal Office for Information Security (BSI) introduced the Cloud Computing Compliance Controls Catalogue (BSI C5) to provide a clear foundation for evaluating security controls in cloud services. The goal is to foster transparency and trust in cloud environments.

2018

Initial Adjustments
BSI C5 is being revised to better align with the growing demands of the cloud security sector and with international standards. These adjustments make the standard more attractive to global cloud providers.

2020

International Recognition
BSI C5 is gaining increasing international recognition and is being adopted as a standard for security controls in cloud environments within the EU and beyond. It reinforces the focus on transparency and security in the digital economy.

Seit 2022

Continuous Development
BSI C5 continues to evolve to meet the challenges of digital transformation and emerging cybersecurity threats. New control requirements and regular updates make it a modern and relevant security standard.