Security
IT security at ELSTER
The federal and state fiscal authorities are committed to their responsibility for IT security in the ELSTER process. The protection of confidential information and the availability and integrity of all data to be processed by ELSTER and their processing systems must be ensured.
The ELSTER procedure is subject to various legal requirements for IT security. The electronic transmission of data requires a large number of statutory provisions as well as various letters from the BMF which make the proper handling of electronic data a challenging task. The most important legal regulations include:
- Fiscal Code (AO)
- Tax Data Collection Ordinance (StDAV)
- Federal Data Protection Act (BDSG)
- Bavarian Data Protection Act (BayDSG)
- Data Protection Law North Rhine-Westphalia (DSG NRW)
The ELSTER services are provided in there own IT infrastructure, certified according to ISO 27001on the basis of the BSI IT Grundschutz Catalogues. The certification should document both that the IT Baseline Protection according to ISO 27001 has been fully implemented for these services, provided by the Bavarian State Office for Taxation and the Data Centre of the Financial Administration of the State of North Rhine-Westphalia, and that the discussion of IT security issues has become a reality is an essential part of the philosophy of the authorities.
Security of the data
Electronic transmission takes place with the ELSTER client software via the Internet. To protect tax secrecy, the tax data is encrypted and transmitted by the user to the data centres of the federal states. For this purpose, a hybrid encryption was selected, which corresponds to the current state of security technology. The integrity of the data is ensured by a hash code.
Security of the software
An overall statement on the security of the ELSTER procedure, in particular with regard to the confidentiality of the tax data vis-à-vis third parties in the user's environment, must take into account any security functions of the tax declarations programs used. These are usually third-party software solutions. These are synonymous for the safety and quality of the tax declaration software they distribute. In this context, the responsibility of the fiscal authorities extends only to the provision of trustworthy, tamper-resistant modules.
Transmission paths
Electronic transmission takes place with the ELSTER clientsoftware via the Internet.
Download the Elster HTTPS Servlet certificate
SHA1 Fingerprint
SHA256 Fingerprint
Registration
The ELSTER procedure allows the taxpayer to securely transfer his sensitive tax data to the fiscal authorities. The procedure thereby ensures the confidentiality, authenticity and integrity of the data sent. The electronic certificates used for authentication and the corresponding key pairs
are stored in the user package Personal Security Environment (PSE) Show glossary related to the term Personal Security Environment (PSE) of the Authentication method Show glossary related to the term Authentication method . As part of your registration, the authentication method has been defined depending on the selected login option (certificate file, security stick, signature card) and the associated security level.
Authentication
The different authentication methods differ in the level of security and available features. Access to the electronic certificate is secured by a password that you must set yourself. Authenticating a registered user for My ELSTER is based on a Public Key Infrastructure (PKI) Show glossary related to the term Public key infrastructure (PKI) . Owners of a signature card supported by ELSTER can register with it. In this case, the PKI of the card issuer is used. Alternatively, as part of the registration process, the user receives a key pair and an electronic certificate. These data are stored in the Personal Security Environment (PSE) Show glossary related to the term Personal Security Environment (PSE) .
Handling electronic certificates
The user is responsible for the safe handling of the certificate file, security stick or signature card and the associated password. Please note the following important information regarding the transfer or storage of the PSE:
- Choose a secure password. A combination of numbers and letters increases security. Please note that a distinction is made between upper and lower case.
- Handle your password carefully. Do not pass this on to third parties.
- Make a note of your password and answer to the security prompt and keep both notes in a safe place.
The password is only known to you and cannot be renewed if lost. - Never give your electronic certificate to third parties. Exceptions are described below.
- Signature cards may never be shared with third parties. They are always tied to one person.
More detailed information on handling the authentication means can be found here:
Passing on of certifcates
You may entrust third parties with the transmission of your data. However, you should never pass on your personal certificates to third parties, regardless of whether you, as a private person or an entrepreneur, entrust another person with the transmission of your tax data. For a data transfer by commissioned third parties depending on whether you are in possession of a personal certificate or in possession of organizational certificates, the following courses of action are recommended:
- Never give your personal certificate to third parties. In a transmission by third parties the actual data transmitter should always register themselves. If the data supplier has registered with My ELSTER, he can submit tax returns on your behalf. I
- f you are an entrepreneur, you can also register for an organization certificate. In ontrast to personal certificates, organizational certificates are not tied to individual persons but to a tax organization (e.g. company, society, association, institution). Therefore, organizational certificate can be passed on to employees of the company for data transmission. However, the transfer should be controlled and only to trustworthy persons.