Skip to main content
All posts
Cybersecurity5 min read

BSI C5 Compliance on Azure: What German Enterprises Need to Know

A practical guide to BSI C5 compliance on Azure — covering the C5 criteria catalogue, Azure's attestation scope, customer responsibilities, and audit preparation for German enterprises.

Published

For German enterprises — particularly in public sector, finance, and critical infrastructure — BSI C5 attestation is not optional. It is a prerequisite for cloud adoption, often mandated by procurement policies, sector-specific regulation, or the organisations own compliance framework.

Azure has C5 attestation. But having a provider with C5 attestation does not make your workload C5-compliant. Understanding the shared responsibility model — what Microsoft covers and what you must implement yourself — is the difference between compliance and a false sense of security.

What BSI C5 Covers

The Cloud Computing Compliance Criteria Catalogue (C5) was published by the Bundesamt für Sicherheit in der Informationstechnik (BSI) in 2016 and updated in 2020. It defines:

  • 17 domains covering organisation, personnel, asset management, cryptography, identity management, operations, and more
  • 121 criteria (basic + extended) that cloud providers must demonstrate
  • Shared responsibility model that distinguishes provider obligations from customer obligations

The 17 C5 Domains

  1. Organisation of information security
  2. Security policies
  3. Personnel
  4. Asset management
  5. Physical security
  6. Operations management
  7. Identity and access management
  8. Cryptography and key management
  9. Communication security
  10. Portability and interoperability
  11. Procurement and supply chain
  12. Compliance
  13. Handling of security incidents
  14. Business continuity
  15. Security assessment and verification
  16. Security in development
  17. Additional criteria (transparency, data location)

Azure's C5 Attestation Scope

What Is Covered

Microsoft's C5 Type 2 attestation covers:

  • Azure infrastructure services (Compute, Storage, Networking)
  • Azure platform services (App Service, Azure SQL, Cosmos DB, Key Vault)
  • Azure data services (Azure Data Factory, Synapse, Databricks)
  • Identity services (Entra ID, Azure AD B2C)
  • Security services (Defender for Cloud, Sentinel, Key Vault)
  • Management services (Azure Monitor, Azure Policy, Azure Resource Manager)

The attestation covers Azure regions in Germany (Frankfurt/Berlin) and broader EU regions.

What Is NOT Covered

  • Your workload's configuration — A misconfigured Azure SQL database is your responsibility
  • Your application code — Security of custom applications running on Azure
  • Your identity policies — Conditional Access, MFA configuration, access reviews
  • Your data classification — Determining what data can be stored where
  • Your operational procedures — Incident response, backup testing, change management

Shared Responsibility Overview

Loading diagram...

Customer Responsibilities by C5 Domain

Domain 7: Identity and Access Management

Microsoft's responsibility: Platform-level identity infrastructure, physical access to data centres, internal access controls.

Your responsibility:

  • Implementing MFA for all users (Conditional Access policies)
  • Privileged access management (PIM, just-in-time access)
  • Regular access reviews (quarterly for privileged roles)
  • Service account governance
  • Offboarding processes (timely deactivation of departed users)

Domain 8: Cryptography and Key Management

Microsoft's responsibility: Encryption of data at rest (platform-managed keys), encryption in transit (TLS 1.2+), HSM infrastructure.

Your responsibility:

  • Customer-managed keys for sensitive workloads (Azure Key Vault with HSM)
  • Key rotation policies
  • Certificate lifecycle management
  • Determining which workloads require BYOK vs. platform-managed keys

Domain 13: Handling of Security Incidents

Microsoft's responsibility: Platform-level incident detection and response, notification of security incidents affecting your tenant within contractual SLAs.

Your responsibility:

  • Application-level incident detection (Sentinel, Defender for Cloud)
  • Incident response procedures and runbooks
  • Regular IR testing and tabletop exercises
  • Communication plans for customer notification
  • Evidence preservation for forensics

Audit Preparation Checklist

When preparing for a C5-related audit (either your own assessment or responding to customer requirements):

Documentation Required

  1. Security concept — Architecture documentation showing how C5 criteria are addressed
  2. Risk assessment — Documented risk analysis for the cloud workload
  3. Access management policy — Who has access to what, how access is granted/revoked
  4. Encryption concept — What is encrypted, with which keys, managed by whom
  5. Incident response plan — Procedures, responsibilities, communication paths
  6. Business continuity plan — RTO/RPO targets, DR configuration, test results
  7. Compliance mapping — Document showing which C5 criteria are addressed by Azure vs. customer

Evidence Collection

For each customer-responsible criterion, prepare evidence:

Loading diagram...

Tools for Continuous Compliance

  • Microsoft Defender for Cloud — Regulatory compliance dashboard with C5 mapping
  • Azure Policy — Enforce C5-relevant configurations (encryption, network isolation, logging)
  • Azure Monitor — Continuous evidence collection for operational criteria
  • Compliance Manager — Assessment workflows and evidence management

C5 and Other Frameworks

C5 does not exist in isolation. Map it to other frameworks your organisation may already follow:

C5 DomainISO 27001SOC 2
IDM (Identity)A.9 Access ControlCC6.1-6.8
CRY (Cryptography)A.10 CryptographyCC6.1, CC6.7
OPS (Operations)A.12 OperationsCC7.1-7.5
BCM (Continuity)A.17 Business ContinuityA1.1-A1.3

If you already have ISO 27001 certification, approximately 70% of C5 evidence overlaps — significantly reducing the additional effort.

Practical Recommendations for German Enterprises

  1. Start with Defender for Cloud's regulatory compliance view — It shows your current C5 posture with specific recommendations
  2. Focus on the gaps — Azure handles the provider side. Your effort goes into customer-responsible controls
  3. Automate evidence collection — Manual evidence gathering does not scale. Use Azure Policy compliance reports and diagnostic settings
  4. Request Azure's C5 attestation report from Microsoft through the Service Trust Portal — share it with your auditor
  5. Consider German regions for regulated workloads — Frankfurt and Berlin regions are explicitly in-scope of the C5 attestation

Preparing for C5 compliance on Azure? Contact us — we help German enterprises navigate BSI requirements and build audit-ready Azure environments.

Topics

BSI C5 complianceAzure C5 attestationGerman cloud securitycloud compliance GermanyBSI cloud criteria

Frequently Asked Questions

BSI C5 (Cloud Computing Compliance Criteria Catalogue) is a German government-backed attestation framework for cloud service providers. It defines 121 security criteria across 17 domains that cloud providers must meet. For German public sector and regulated enterprises, C5 attestation is often a prerequisite for cloud adoption.

Expert engagement

Need expert guidance?

Our team specializes in cloud architecture, security, AI platforms, and DevSecOps. Let's discuss how we can help your organization.

Get in touchNo commitment · No sales pressure

Related articles

All posts