Zum Hauptinhalt springen
Elementary Threat · BSI IT-Grundschutz

G 0.25 — Failure of Devices or Systems

Updated on 4 min Reviewed by: Cenedril Editorial
A.5.10A.5.14A.5.15A.5.16A.5.17A.5.18A.5.19A.5.21A.5.23A.5.24A.5.25A.5.26A.5.27A.5.29A.6.7A.7.5A.7.9A.7.11A.7.12A.7.13A.8.1A.8.2A.8.3A.8.4A.8.5A.8.6A.8.7A.8.8A.8.9A.8.14A.8.15A.8.16A.8.17A.8.18A.8.19A.8.20A.8.21A.8.22A.8.23A.8.24A.8.26A.8.27A.8.28A.8.29A.8.30A.8.31A.8.32 BSI IT-GrundschutzISO 27001ISO 27002

Friday evening, 6:30 p.m.: the central ERP server of a logistics company no longer starts after a failed firmware update. Dispatching is paralysed, truck drivers receive no route plans, and warehouse management falls back to handwritten lists. The system is back up only on Monday morning — three lost business days and six-figure revenue loss.

System failures often hit organisations when they are least prepared. BSI lists the failure of devices or systems as elementary threat G 0.25 — one of the most broadly linked threats in the entire IT-Grundschutz catalogue, with references to more than 200 modules.

What’s behind it?

Every technical device has a finite lifespan and can fail at any time — through wear, defects, misuse or external influences. For time-critical applications with no fallback, a single device failure quickly escalates into a company-wide problem.

Failure scenarios

  • Hardware defects — Hard drives, power supplies, memory modules and mainboards are subject to physical wear. For systems beyond their planned service life, failure probability rises exponentially.
  • Faulty updates — A firmware installed for the wrong system type can leave a device in an unbootable state. The same applies to operating system updates that trigger incompatibilities with existing drivers.
  • Power supply problems — Voltage spikes, interruptions or faulty UPS systems can cause abrupt shutdowns. File system inconsistencies after a hard shutdown often prevent a fast restart.
  • Environmental influences — Overheating due to failed air conditioning, humidity, dust or mechanical shocks affect sensitive components.
  • Dependency chains — When a single storage controller accessed by multiple virtual machines fails, the impact multiplies across the entire infrastructure.

Impact

The damage depends directly on how time-critical the affected application is and whether fallback options exist. Production control, point-of-sale systems, email servers or VoIP systems can cause economic damage by the second. Direct costs (recovery, replacement procurement) are joined by indirect consequences: missed delivery deadlines, contractual penalties, reputational loss.

Practical examples

Storage controller in the data centre. An internet service provider runs its web servers on a central storage system. A power supply fault shuts down the array. Although the actual defect is fixed within an hour, the servers cannot be restarted because of file system inconsistencies. Several customer systems remain unreachable for days.

Firmware update with wrong image. An administrator installs a firmware update intended for a different model on a network switch. The switch no longer starts, and the entire floor loses network connectivity. Because no replacement device is in stock, resolution takes three days.

Air conditioning fails unnoticed. In a medium-sized company’s server room, the air conditioning fails over the weekend. Temperature rises gradually. By Monday, two servers have failed with hard drive errors, and several RAID arrays must be painstakingly reconstructed.

Relevant controls

The following ISO 27001 controls mitigate this threat. (You’ll find the complete list of 47 mapped controls below in the section ‘ISO 27001 Controls Covering This Threat’.)

Prevention:

Detection:

Response:

BSI IT-Grundschutz

G 0.25 is linked by the BSI IT-Grundschutz catalogue to the following modules:

  • OPS.1.1.7 (Systems management) — Requirements for monitoring, capacity planning and incident handling.
  • SYS.1.1 (General server) — Basic server protection, including redundancy and maintenance.
  • INF.2 (Data centre and server room) — Physical protection measures such as climate control, fire protection and power supply.
  • DER.4 (Emergency management) — Planning and execution of measures to maintain operations during failures.

Sources

ISO 27001 Controls Covering This Threat

A.5.10 Acceptable use of information and other associated assets A.5.14 Information transfer A.5.15 Access control A.5.16 Identity management A.5.17 Authentication information A.5.18 Access rights A.5.19 Information security in supplier relationships A.5.21 Managing information security in the ICT supply chain A.5.23 Information security for use of cloud services A.5.24 Information security incident management planning and preparation A.5.25 Assessment and decision on information security events A.5.26 Response to information security incidents A.5.27 Learning from information security incidents A.5.29 Information security during disruption A.6.7 Remote working A.7.5 Protecting against physical and environmental threats A.7.9 Security of assets off-premises A.7.11 Supporting utilities A.7.12 Cabling security A.7.13 Equipment maintenance A.8.1 User endpoint devices A.8.2 Privileged access rights A.8.3 Information access restriction A.8.4 Access to source code A.8.5 Secure authentication A.8.6 Capacity management A.8.7 Protection against malware A.8.8 Management of technical vulnerabilities A.8.9 Configuration management A.8.14 Redundancy of information processing facilities A.8.15 Logging A.8.16 Monitoring activities A.8.17 Clock synchronisation A.8.18 Use of privileged utility programs A.8.19 Installation of software on operational systems A.8.20 Networks security A.8.21 Security of network services A.8.22 Segregation of networks A.8.23 Web filtering A.8.24 Use of cryptography A.8.26 Application security requirements A.8.27 Secure system architecture and engineering principles A.8.28 Secure coding A.8.29 Security testing in development and acceptance A.8.30 Outsourced development A.8.31 Separation of development, test and production environments A.8.32 Change management

Frequently asked questions

What are the most common causes of device failures in IT?

Faulty power supplies, defective firmware updates, overheating due to inadequate cooling and ageing of storage media are among the most common causes. Add to this external factors such as power outages or voltage spikes that can damage sensitive components.

How quickly must a failed system be restored?

That depends on the business impact analysis (BIA). For each system, a Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are defined. Time-critical systems such as ERP or production control typically have RTOs of a few hours, while less critical systems can tolerate longer downtime.

Is a backup sufficient protection against system failures?

Backups protect against data loss but only partially solve the availability problem. Restoring from backup can take hours or days. High availability requirements need additional redundancy -- such as cluster systems, mirrored storage or failover mechanisms.