Zum Hauptinhalt springen
Elementary Threat · BSI IT-Grundschutz

G 0.9 — Failure or Disruption of Communication Networks

Updated on 4 min Reviewed by: Cenedril Editorial
A.5.15A.5.23A.6.7A.7.5A.7.11A.7.12A.7.13A.8.1A.8.5A.8.6A.8.14A.8.15A.8.20A.8.21A.8.22A.8.23A.8.31 BSI IT-GrundschutzISO 27001ISO 27002

An excavator severs a fibre-optic cable during road works. Within minutes an entire commercial park loses its internet connection. An online retailer based there can no longer process orders, the VoIP phone system falls silent, and access to the cloud-based ERP system is cut off too. Revenue loss per hour: five figures. Repair takes until the next day.

Failure or disruption of communication networks is among the threats with the highest immediate impact on business operations. The BSI lists this threat as G 0.9 — and with 17 mapped ISO controls it is one of the most comprehensively addressed threats in the Grundschutz catalogue.

What’s behind it?

Modern business processes depend in virtually every step on functioning communication networks — whether telephony, email, database access, cloud services or machine control. The more digitalised an organisation is, the harder a communication outage hits.

Causes of failure

  • Physical damage — Cable damage during excavation work is the most common cause. A single excavator can paralyse the entire communication infrastructure of a commercial park when all lines run through the same cable duct.
  • Equipment failure — Routers, switches, firewalls and other active network components have a limited lifespan. A defective core switch can bring down the entire internal network.
  • Configuration errors — Misconfigurations on routers, DNS servers or firewalls can render networks wholly or partly unreachable. Such errors are frequently introduced during maintenance or updates.
  • Provider disruptions — Outages at the internet provider or at backbone operators lie outside your own control, but can paralyse operations just as thoroughly as a local defect.
  • OverloadDDoS attacks or unexpected load spikes can overload communication networks to the point of unusability.

Impact

Combining voice and data services on the same infrastructure (VoIP, UC) substantially raises the outage risk. If the data network fails, telephony fails at the same time. The organisation loses all communication channels at once — towards customers, partners and internally. In emergency situations this is especially critical.

Practical examples

Fibre-optic cable severed. During excavation work for a new fibre connection in the neighbouring street, the existing fibre cable of the office building is accidentally cut. Internet, VoIP telephony and the VPN connection to headquarters fail simultaneously. The provider dispatches a repair team — but the waiting time is 18 hours. The company has no redundant line.

Misconfiguration after a firewall update. During a routine firmware update of the firewall, a rule is configured incorrectly and blocks outbound DNS traffic. All internal systems can no longer resolve external services — email, cloud services and web access stop working. The cause is found only after three hours, because the connection between the update and the symptoms is not recognised immediately.

VoIP total outage during a power disturbance. An undervoltage in the supply grid (interaction with G 0.8) causes the PoE switches (Power over Ethernet) to restart intermittently. The VoIP phones drop out repeatedly, calls are cut off. Because all telephony runs over VoIP, the company is unreachable to customers for hours.

Relevant controls

The following ISO 27001 controls mitigate this threat. (You’ll find the complete list of 17 mapped controls below in the section ‘ISO 27001 Controls Covering This Threat’.)

Prevention:

Detection:

Response:

BSI IT-Grundschutz

G 0.9 is linked in the BSI IT-Grundschutz catalogue to the following modules:

  • NET.1.1 (Network architecture and design) — Redundant network architecture, segmentation and resilience.
  • NET.3.1 (Routers and switches) — Configuration, hardening and monitoring of active network components.
  • NET.3.2 (Firewall) — High availability and change management for firewall systems.
  • INF.14 (Building automation) — Network connection and resilience of building automation.

Sources

ISO 27001 Controls Covering This Threat

A.5.15 Access control A.5.23 Information security for use of cloud services A.6.7 Remote working A.7.5 Protecting against physical and environmental threats A.7.11 Supporting utilities A.7.12 Cabling security A.7.13 Equipment maintenance A.8.1 User endpoint devices A.8.5 Secure authentication A.8.6 Capacity management A.8.14 Redundancy of information processing facilities A.8.15 Logging A.8.20 Networks security A.8.21 Security of network services A.8.22 Segregation of networks A.8.23 Web filtering A.8.31 Separation of development, test and production environments

Frequently asked questions

How likely is a complete internet outage?

A total loss of internet connectivity is rare, but regional disruptions occur regularly — due to cable damage, router misconfigurations or provider problems. The question is: how long can your organisation work without an internet connection? The answer determines whether you need a redundant connection.

Is a second internet line enough as redundancy?

A second line increases availability considerably, but the redundancy only works when both lines are routed via different physical paths and different providers. Two lines from the same provider via the same cable duct offer little protection against physical damage.

What happens to VoIP telephony when the network fails?

With converged networks (voice and data over the same infrastructure), telephony fails together with the data network. That means: no customer service, no reachability, no emergency calls over the landline. Mobile phones as a fallback and a separate emergency line can mitigate this risk.