Weg in die Basis-Absicherung (WiBA) with fuentis
What is WiBA?
WiBA stands for “Weg in die Basis-Absicherung” (“Path to Basic Protection”) and offers a low-threshold entry into information security. It was developed to help organizations – especially small and medium-sized enterprises as well as public authorities – implement recognized security standards such as the IT-Grundschutz with minimal effort.
WiBA focuses on practical measures that offer high security value and can be implemented quickly and efficiently. It includes 19 topic-specific checklists with a total of around 250 audit questions, which can be processed either in Word format or using a specialized tool.
WiBA with fuentis Suite 4
With the fuentis Suite, the “Path to Basic Protection” (WiBA) can be implemented comfortably and efficiently. First, the scope for the organization is created with just a few clicks, before the “Path to Basic Protection” module is added from the catalog within the application. The corresponding questionnaires are clearly structured according to specific requirements, enabling an organized and streamlined processing.
The major advantage is that you can start directly within the fuentis Suite without having to work your way through the extensive BSI guidelines. You immediately get an initial overview and can access all relevant information directly within the tool to continue working seamlessly. This makes the entry into basic protection efficient and goal-oriented.

Basis-Absicherung with the fuentis Suite 4
IT security is essential for companies to protect themselves against cyberattacks and data loss. The BSI-Basis-Absicherung offers a practical approach to systematically implementing fundamental security measures.
This is where the fuentis Suite comes in: It supports organizations in efficiently meeting BSI requirements, managing risks, and ensuring compliance. In this article, we show how the fuentis Suite simplifies the implementation of BSI Basic Protection.
Inventory analysis
To implement an effective security strategy, the organization is mapped using a simplified structure. Individual assets are grouped into target object groups, avoiding redundant documentation and assessments. This ensures a clear and organized representation while minimizing the effort required for further analysis. The subsequent logical linking of structural data results in a coherent overall picture that reflects both organizational processes and security-relevant relationships. The fuentis Suite 4 supports this process with an intuitive user interface and enables structural analysis to be carried out easily, consistently, and efficiently.
Linking
The created structural data is systematically linked so that dependencies and relationships between individual components are immediately visible. The fuentis Suite 4 provides a clear overview at this stage. This structure not only facilitates documentation but also simplifies the later application of security measures. The linking therefore forms the foundation for further analysis steps and enables a consistent security assessment without unnecessary effort.

Protection requirement assessment
In the BSI Basic Protection approach, the protection requirement is generally defined as “normal” by default, eliminating the need for time-consuming individual assessments. Nevertheless, the methodological foundation remains intact, allowing for more detailed evaluations if necessary—without slowing down the overall process. The previously established links support this approach by leveraging existing structures instead of requiring new, time-intensive evaluations.
Modeling
During the modeling phase, the specific requirements of the BSI Basic Protection are directly taken into account. Complex individual customizations are not necessary, ensuring that the focus remains on practical and pragmatic implementation. The model provides clear guidance and enables a structured derivation of the necessary measures—without introducing unnecessary complexity.

Risk analysis
Since the BSI Basic Protection assumes a normal level of protection by default, a detailed risk analysis is not required. Instead, the implementation of security measures begins right away. This allows for quick and effective protection without lengthy preliminary assessments. At the same time, the approach remains transparent and structured, ensuring that all essential security aspects are addressed—without unnecessary administrative overhead.
Conclusion
With the help of the fuentis Suite 4 , the path to Basic Protection (WiBA) is no longer a challenging task. The software supports you throughout the entire process—from structural analysis and linking to modeling and the implementation of required measures. Thanks to its intuitive user interface and well-thought-out structure, the fuentis Suite 4 makes it easy to represent even more complex relationships without requiring in-depth IT knowledge. Especially for small and medium-sized organizations, the combination of WiBA and fuentis offers an efficient, practical solution to establish information security in a structured and sustainable way. In this way, IT baseline protection becomes tangible—and information security becomes routine.