This document is under active development and has not been finalized.
Skip to content

Access Control & Secure Communication

LEGAL BASIS

§30(2) No. 9 BSIG – Personnel security, access control concepts and asset management

§30(2) No. 10 BSIG – Use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communication, and secured emergency communication systems where appropriate

Access Control Principles

PrincipleImplementation
Least privilegeMinimum rights per task requirement
Need-to-knowData access only on business necessity
Separation of dutiesCritical operations require multiple persons
Four-eyes principleSecurity-relevant changes with review

Authentication

Multi-Factor Authentication (MFA)

MFA is mandatory for:

  • All external access (VPN, web portals)
  • Administrative system access
  • Cloud services and SaaS applications
  • Email access

Preferred MFA methods: hardware tokens (FIDO2/WebAuthn), authenticator app (TOTP). SMS-based MFA is not permitted.

Server Access

  • SSH with key-based authentication (Ed25519)
  • Password-based SSH login disabled
  • Root login disabled, access only via personalized accounts

Password Management

RequirementMinimum Standard
Minimum length16 characters (passphrase recommended)
Password managerMandatory for all employees
Password reuseProhibited
Compromised passwordsAutomatic check against known-breach lists

On-/Offboarding

ProcessMeasureDeadline
OnboardingSet up personalized accounts, MFA setup, basic trainingBefore first working day
Role changeAdjust permissions, review old rightsWithin 5 business days
OffboardingDeactivate all access, return hardware, key rotationOn last working day

Secure Communication

Communication Channels

ChannelSecurityUse
EmailTLS transport encryption, SPF/DKIM/DMARCStandard business communication
Encrypted messengerEnd-to-end encryptionSensitive internal communication
Video conferencingTLS-encrypted, access controlsMeetings, customer calls
VPNIPsec/WireGuardRemote access to internal systems

Email Security

  • SPF – Sender Policy Framework configured for all domains
  • DKIM – DomainKeys Identified Mail for signature verification
  • DMARC – Domain-based Message Authentication, Reporting and Conformance (policy: reject)

Emergency Communication

  • Predefined fallback communication channels (phone, alternative messenger)
  • Current contact lists of key personnel available offline
  • Regular verification of reachability

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT