C5: benchmark for secure cloud services in Germany

The introduction of the C5 by the German Federal Office for Information Security (BSI) has created a central standard for information security and data protection in German cloud computing.

Schloss das aus Laptop herausragt.

Especially for the public sector, for municipalities, federal states and the federal government as well as for companies in the healthcare sector, the C5 certificate is a decisive proof: It guarantees that cloud providers meet the highest standards for the protection of sensitive data and the security of information – and only apply current criteria that are recognized in Germany.


What is the C5?

The C5 certificate stands for tested security, transparency and reliability in cloud services. It offers public clients and health companies a clear advantage: the selection and awarding of a cloud service is made easier by comprehensible test reports and the disclosure of relevant information. Compared to other certificates, the C5 certificate specifically focuses on German standards and thus creates trust in the security and protection of the processed data.

Added value for the public sector and health

The secure processing and storage of large volumes of data is essential for public authorities, local authorities and companies in the healthcare sector. The C5 certificate helps them to comply with legal requirements and ensure information security for all cloud services. This means that citizens, patients and customers all benefit from modern, secure and reliable digital services.


Definition: Everything you need to know about the Cloud Computing Compliance Criteria Catalogue (C5)


STACKIT and the C5 certificate: Systematic security – advantages at a glance

STACKIT not only meets the formal requirements of the C5 certificate – it also creates real added value for companies, authorities and organizations. The following advantages show why working with STACKIT is worthwhile.


C5 in detail: security with traceable standards

The BSI’s C5 certificate is regarded as the authoritative standard for assessing cloud security in Germany. It defines binding guidelines in various control areas – from technical security measures to organizational processes. The underlying catalog of criteria covers all relevant aspects for trustworthy cloud operations.

The focus is on the following areas, among others


Certification: The testing process at a glance

Before a cloud provider receives the C5, it undergoes a multi-stage testing process. This ensures that not only individual objectives are met, but also that the entire security concept is comprehensibly documented and effectively implemented.

1. Gap analysis

The first step is to take stock: a gap analysis is carried out to determine the differences between the current security level and the requirements of the C5 catalog. The cloud provider’s existing documentation serves as the central basis for this.

2. Catalog of measures

Based on the analysis, a concrete action plan is drawn up. The aim is to systematically fulfill all outstanding requirements. The process is often tackled with the help of external consultants or auditors, for example through workshops or technical recommendations.

3. Audit and testing

The actual audit is carried out by independent, qualified auditors in accordance with the internationally recognized ISAE 3000 auditing standard, checking whether the defined security controls are effective and whether all evidence has been fully and comprehensibly documented.

4. The different types of attestation

Depending on the scope of the audit, you can choose between two types:

Version 1: Confirmation that all requirements were met at the time of the audit (key date audit).

Version 2: Proof that the requirements have been consistently met over a longer period of time – usually 6 to 12 months.

After successful completion, the C5 certificate is awarded. It is limited in time and must be renewed regularly. For customers, it is transparent proof of the provider’s security quality – and an important tool for their own risk and compliance assessment.


Practical tips and information about the C5 test report: find out what you should look out for

We offer you audited cloud services that meet the highest standards of security and compliance.

Our tip: The BSI offers further information and topics relating to cloud computing standards on its website.


Get started in the cloud with certified security

The C5 certificate is the binding benchmark for a secure, trustworthy and legally compliant cloud service in Germany – and is therefore a key selection criterion, especially for the public sector and regulated industries such as healthcare.

With STACKIT, you are choosing a cloud provider that not only fulfills the current C5 objectives, but also accompanies you competently and in partnership on your way to the secure cloud – from implementation to support.


FAQ – frequently asked questions about the C5 certificate

What is the difference between the different certificate variants?

Type 1 confirms that the requirements were met at the time of the audit (key date audit). Type 2 goes further and proves that the requirements have been consistently met over a longer period of time – usually 6 to 12 months.

Is the C5 certificate mandatory for cloud providers?

No, it is not a legal requirement, but it is increasingly becoming a prerequisite – for example in public tenders or for companies with high security and compliance requirements.

How long is a C5 audit valid for?

As a rule, the certificate is valid for one year. After that, a new audit is required to keep the status up to date.

What are the benefits of the C5 audit report for me as a customer?

The certificate creates transparency and legal certainty. It helps you to strengthen your company’s cloud compliance – and shows that your provider meets high data protection and information security standards.

As a customer, what do I need to be aware of despite the C5 certificate?

Even with a C5 certificate, you still bear responsibility – for example, for the secure configuration of your services or identity management. Use STACKIT’s support to implement all requirements in the best possible way.


STACKIT Support Headset

Please contact us for your

individual consulting

To the contact form