Object types and categories#
The VIVA2 add-on introduces six new object types, all grouped under the "IT-Grundschutz" object type group:
Module#
The "Module" object type represents the modules from the IT-Grundschutz Compendium. In the default configuration, the following categories belong to objects of type Module:
Categories:
- Access (i-doit standard category): The access category links the module to the module description on the BSI IT-Grundschutz Compendium website.
- Contact assignment (i-doit standard category): The relevant contacts for the module must be entered here.
- File assignment (i-doit standard category): Additional files can be linked to this module here.
- General (i-doit standard category): Belongs to every object.
- Module: This category contains the textual descriptions of the module from the IT-Grundschutz Compendium, such as number, title, introduction, objective, and scope.
- Requirements: This is a multivalue category that links all requirements belonging to this module.
- Target objects/groups: This is a multivalue category that links all objects to which this module is assigned (either via the "Process modules" category or the "Assigned modules" category).
- Threat scenario: This is a multivalue category that links all threats belonging to this module.
Requirement#
The "Requirement" object type represents the requirements from the modules of the IT-Grundschutz Compendium. In the default configuration, the following categories belong to objects of type Requirement:
Categories:
- Access (i-doit standard category): The access category links the requirement to the associated module description on the BSI IT-Grundschutz Compendium website.
- General (i-doit standard category): Belongs to every object.
- Modules: This category links the requirement with the associated module. Although this is a multivalue category, assigning it to multiple modules usually does not make sense.
- Requirement: This category contains the textual descriptions of the requirement from the IT-Grundschutz Compendium, such as number, title, requirement type, and description.
Threat#
The "Threat" object type represents the threats from the modules of the IT-Grundschutz Compendium. In the default configuration, the following categories belong to objects of type Threat:
- Access (i-doit standard category): The access category links the threat to the associated module description on the BSI IT-Grundschutz Compendium website.
- General (i-doit standard category): Belongs to every object.
- Modules: This multivalue category links the threat with the associated modules.
- Threat: This category contains the textual descriptions of the threat from the IT-Grundschutz Compendium, such as number (only for elemental threats), title, and description.
Scope#
For each Scope, there is exactly one object of type "Scope". Typically, there is only one Scope object, but the VIVA2 add-on also allows documenting multiple Scopes. In the default configuration, the following categories belong to objects of type Scope:
Categories:
- Contact assignment (i-doit standard category): The relevant roles for the entire Scope must be entered here, especially the information security officer (ISB).
- General (i-doit standard category): Belongs to every object.
- IT-Grundschutz (Scope): This is a category group that includes the following four categories:
- Scope: The basic information for the Scope is documented here, such as the cleaned network diagram and the information security policy.
- Infrastructure analysis: This multivalue category shows all objects linked directly to this Scope via the reverse category "Scopes". See Structural analysis for more.
- IT-Grundschutz Check: The overview page shows all requirements assigned via modules, sorted by module and requirement number. See IT-Grundschutz check for more.
- Process modules: Assign the process modules that apply to the entire Scope here. From a technical perspective, system modules can also be assigned, but in general these are assigned to the respective target objects or target object groups. See Structural analysis for more.
Reports:
- Applications without installation: This variable report shows all applications that are not installed on any machine (according to the documentation in i-doit). It checks all applications that are either directly assigned to this Scope or are members of a target object group assigned to this Scope.
- IT-Grundschutz check: This variable report shows all requirements and their implementation status that are assigned to this Scope via modules. It considers not only the requirements from directly assigned modules, but also those from modules assigned to the assigned target objects/target object groups.
- Physical hardware without location: This variable report shows all objects that have the "Location" category assigned but not maintained. It checks all objects that are either directly assigned to this Scope or are members of a target object group assigned to this Scope.
- Rooms without buildings: This variable report shows all rooms where the location category is not maintained or the location object has no address entered. It checks all rooms that are either directly assigned to this Scope or are members of a target object group assigned to this Scope.
- Rooms without room number: This variable report shows all rooms where no room number is entered. It checks all rooms that are either directly assigned to this Scope or are members of a target object group assigned to this Scope.
- Covered by Scope: This variable report shows all objects that are either directly assigned to this Scope or are members of a target object group assigned to this Scope.
Target object group#
As part of the structural analysis, "similar" target objects should be grouped to reduce complexity. The target object group object type represents this grouping. In the default configuration, the following categories belong to objects of type Target object group:
Categories:
- Contact assignment (i-doit standard category): The relevant contacts or other roles for this target object group can be entered here.
- General (i-doit standard category): Belongs to every object.
- IT-Grundschutz (target objects): This is a category group that includes the following seven categories:
- Scopes: This multivalue category shows all Scopes to which this target object group is assigned (via the reverse category "Infrastructure analysis"). Even though it is technically possible to assign the target object group to multiple Scopes, it should generally be assigned to only one Scope. See Structural analysis for more.
- IT-Grundschutz check: The overview page shows all requirements assigned via modules, sorted by module and requirement number. See IT-Grundschutz check for more.
- Classification of information: This is where information classification is recorded, which according to BSI Standard 200-2 is part of the documentation of the security process.
- Protection needs assessment: The protection needs for this object or object group can be defined and justified here in the defined basic values. See Protection needs assessment for more.
- Assigned modules: Assign the modules that should apply to this object or object group here. Typically system modules are assigned, but you can also assign process modules if there are deviations for this object or object group from the process modules assigned at the Scope. See Structural analysis for more.
- Assigned requirements: This is a virtual category that shows all requirements assigned via the assigned modules.
- Assigned threats: This is a virtual category that shows all threats assigned via the assigned modules.
- Object group (i-doit standard category): Defines which objects are assigned to this target object group. Note that the type must be set to "static" for the reports to work.
Communication link#
The "Communication link" object type is used to document communication links relevant to the Scope. In the default configuration, the following categories belong to objects of type Communication link:
Categories:
- Contact assignment (i-doit standard category): The main contacts for the communication link should be documented here.
- General (i-doit standard category): Belongs to every object.
- IT-Grundschutz (target objects): This category grouping is used for assignment to the Scope, protection needs assessment, module assignment, and the IT-Grundschutz check (see target object group for a more detailed description).
- Communication link: Document which objects or object groups use this communication link. The protection needs from these objects are inherited (using the maximum principle) to the communication link. You can also link the network diagram with the communication link highlighted for illustration.





