{"id":2401,"date":"2021-07-07T11:11:37","date_gmt":"2021-07-07T09:11:37","guid":{"rendered":"https:\/\/ddpsan.com\/?p=2401"},"modified":"2022-01-03T16:35:16","modified_gmt":"2022-01-03T15:35:16","slug":"security-auditing-and-encryption","status":"publish","type":"post","link":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/","title":{"rendered":"Security, Auditing and Encryption"},"content":{"rendered":"\n\t\t<div id=\"fws_69d58cfc09dec\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-3 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"img-with-aniamtion-wrap \" data-max-width=\"100%\" data-max-width-mobile=\"default\" data-shadow=\"none\" data-animation=\"fade-in\" >\n      <div class=\"inner\">\n        <div class=\"hover-wrap\"> \n          <div class=\"hover-wrap-inner\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"img-with-animation skip-lazy\" data-delay=\"0\" height=\"295\" width=\"245\" data-animation=\"fade-in\" src=\"https:\/\/ddpsan.com\/wp-content\/smush-webp\/2021\/07\/Encryption-icon.jpg.webp\" alt=\"\"  \/>\n          <\/div>\n        <\/div>\n        \n      <\/div>\n    <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-9 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<p>Ma\u00dfnahmen zum Schutz Ihrer Daten vor menschlichen Fehlern und\u00a0 b\u00f6swilligen Angriffen sind unerl\u00e4sslich. Deshalb hat Ardis Technologies<br \/>\nzus\u00e4tzlich zu den bestehenden Sicherheitsm\u00f6glichkeiten wie HTTPS-Login, Zwei-Faktor-Authentifizierung und der Erneuerung des Linux-Betriebssystems auf Debian 10 seine Audit- und Verschl\u00fcsselungsm\u00f6glichkeiten erweitert.<\/p>\n<p>Die Audit-Funktionalit\u00e4t ist in das Scale-Out AVFS Single File System integriert. Wenn sie aktiviert ist, werden Auditing-Informationen als Teil der Metadaten-Aktivit\u00e4t des Dateisystems generiert. Der Vorteil besteht darin, dass die Ausgabe in Echtzeit erfolgt und auf die relevanten Metadaten des Dateisystems beschr\u00e4nkt ist.<\/p>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d58cfc0b78f\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-3 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"img-with-aniamtion-wrap \" data-max-width=\"100%\" data-max-width-mobile=\"default\" data-shadow=\"none\" data-animation=\"fade-in\" >\n      <div class=\"inner\">\n        <div class=\"hover-wrap\"> \n          <div class=\"hover-wrap-inner\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"img-with-animation skip-lazy\" data-delay=\"0\" height=\"295\" width=\"245\" data-animation=\"fade-in\" src=\"https:\/\/ddpsan.com\/wp-content\/smush-webp\/2021\/07\/Auditing-icon.jpg.webp\" alt=\"\"  \/>\n          <\/div>\n        <\/div>\n        \n      <\/div>\n    <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-9 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<p><strong>Analyse von Audit-Dateien<\/strong><\/p>\n<p>Es wird eine Standard-Audit-Datei erstellt. Eine solche Datei listet auf, welcher Benutzer an welchem Arbeitsplatz auf welche Datei und welchen Pfad im Dateisystem zugreift, auf welche Art von Zugriff in welchem Verzeichnis. Sie listet auch das Verbindungs- und Trennungsverhalten der Benutzer auf. Eine Datei kann erstellt, gelesen, geschrieben, verschoben\/kopiert und gel\u00f6scht werden. Diese Befehle werden aufgelistet. Sie werden mit Tag und Uhrzeit aufgezeichnet. Solche Dateien k\u00f6nnen jederzeit nachtr\u00e4glich auf Muster und Verhalten \u00fcberpr\u00fcft und analysiert werden. Die meisten Audits sind erforderlich, um ein Sicherheitsproblem zu l\u00f6sen, das versehentlich verursacht wurde. Es wird jedoch Situationen geben, in denen ein Fehlverhalten vermutet wird, die Tat aber bereits erfolgt und der Schuldige verschwunden ist.<\/p>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d58cfc0c66e\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<p><strong>Echtzeit-Auditing<\/strong><\/p>\n<p>Daher erm\u00f6glicht das Auditing auch eine sofortige Echtzeit\u00fcberwachung dar\u00fcber, welche Benutzer Zugriff haben, welche Art von Zugriff an welchem Desktop auf welche Datei in welchem Verzeichnis und mit welchem Laufwerk der Benutzer sich verbindet und trennt. Da die Menge an Echtzeit-Informationen \u00fcberw\u00e4ltigend sein kann, sind im Handbuch einige Beispiele f\u00fcr Filteroptionen wie f\u00fcr einen Desktop, einen Pfad und einen Dateityp enthalten. Weitere Filter k\u00f6nnen konfiguriert werden.<\/p>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d58cfc0ce01\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-3 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"img-with-aniamtion-wrap \" data-max-width=\"100%\" data-max-width-mobile=\"default\" data-shadow=\"none\" data-animation=\"fade-in\" >\n      <div class=\"inner\">\n        <div class=\"hover-wrap\"> \n          <div class=\"hover-wrap-inner\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"img-with-animation skip-lazy\" data-delay=\"0\" height=\"295\" width=\"245\" data-animation=\"fade-in\" src=\"https:\/\/ddpsan.com\/wp-content\/smush-webp\/2021\/07\/AVFS-icon.jpg.webp\" alt=\"\"  \/>\n          <\/div>\n        <\/div>\n        \n      <\/div>\n    <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-9 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<p><strong>Wo l\u00e4uft das Auditing-Programm?<\/strong><\/p>\n<p>Das Programm ist Teil des AVFS-Dateisystems, f\u00fcr DDPs l\u00e4uft es auf dem DDP und f\u00fcr AVFS l\u00e4uft es auf dem HA Dual AVFS Head und ben\u00f6tigt die Software V5.03.005 mit Debian 10 als Linux-Betriebssystem. Durch die Integration in AVFS ist es einfach, die Datenmenge auf die relevanten Metadaten auf einer Standardzeitskala von 5 Sekunden zu begrenzen. Die Befehle sind READ, WRITE, DELETE, MOUNT, UNMOUNT, RENAME. Das Kopieren einer Datei beispielsweise ist dann eine Abfolge von CREATE, READ, WRITE, w\u00e4hrend ein MOVE in AVFS meist ein RENAME ist, bei dem die Daten selbst nicht bewegt werden.<\/p>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d58cfc0dd46\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-3 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"img-with-aniamtion-wrap \" data-max-width=\"100%\" data-max-width-mobile=\"default\" data-shadow=\"none\" data-animation=\"fade-in\" >\n      <div class=\"inner\">\n        <div class=\"hover-wrap\"> \n          <div class=\"hover-wrap-inner\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"img-with-animation skip-lazy\" data-delay=\"0\" height=\"295\" width=\"245\" data-animation=\"fade-in\" src=\"https:\/\/ddpsan.com\/wp-content\/smush-webp\/2021\/07\/Terminal-icon.jpg.webp\" alt=\"\"  \/>\n          <\/div>\n        <\/div>\n        \n      <\/div>\n    <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-9 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<p><strong>Wie wird das angezeigt?<\/strong><\/p>\n<p>Ein ordnungsgem\u00e4\u00dfes Auditing muss eine Echtzeitm\u00f6glichkeit haben. Daher ist eine grafische Benutzeroberfl\u00e4che nicht die beste L\u00f6sung, und es sollte die Befehlszeilenschnittstelle verwendet werden.<\/p>\n<p>Im Terminalfenster sieht ein Kopiervorgang der Datei cp1.mov von fv nach fv\/drama wie folgt aus:<\/p>\n<pre class=\"p4\">2021-05-25 15:02:32.799029007 CONNECT <span class=\"Apple-converted-space\">\u00a0 <\/span>iqn.mini<span class=\"Apple-converted-space\">\u00a0 <\/span>MOUNT volume \u2018fv\u2019 to \r\niqn.mini(172.16.5.4) user \u2018jan\u2019\u2026\r\n2021-05-25 15:13:06.139037187 CREATE<span class=\"Apple-converted-space\">\u00a0 \u00a0 <\/span>iqn.mini<span class=\"Apple-converted-space\">\u00a0 <\/span>|drama\/cp1.mov\r\n2021-05-25 15:13:06.205854374 READ<span class=\"Apple-converted-space\">\u00a0 \u00a0 \u00a0 <\/span>iqn.mini<span class=\"Apple-converted-space\">\u00a0 <\/span>|\/cp1.mov\r\n2021-05-25 15:13:08.142345253 WRITE <span class=\"Apple-converted-space\">\u00a0 \u00a0 <\/span>iqn.mini<span class=\"Apple-converted-space\">\u00a0 <\/span>|drama\/cp1.mov<\/pre>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d58cfc0ed27\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<p class=\"p1\"><strong>Organisationen mit Sicherheitsempfehlungen<\/strong><\/p>\n<p class=\"p5\">Organisationen wie die Motion Pictures Association of America und die Content Delivery and Security Association haben Dokumente mit den besten\u00a0 Sicherheitspraktiken f\u00fcr Produktions-, Postproduktions- und\u00a0 Musikaufnahmestudios ver\u00f6ffentlicht.<\/p>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d58cfc0f4da\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-3 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"img-with-aniamtion-wrap \" data-max-width=\"100%\" data-max-width-mobile=\"default\" data-shadow=\"none\" data-animation=\"fade-in\" >\n      <div class=\"inner\">\n        <div class=\"hover-wrap\"> \n          <div class=\"hover-wrap-inner\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"img-with-animation skip-lazy\" data-delay=\"0\" height=\"295\" width=\"245\" data-animation=\"fade-in\" src=\"https:\/\/ddpsan.com\/wp-content\/smush-webp\/2021\/07\/InLineEnscryption-icon.jpg.webp\" alt=\"\"  \/>\n          <\/div>\n        <\/div>\n        \n      <\/div>\n    <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-9 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<p class=\"p6\"><strong>Inline-Verschl\u00fcsselung<\/strong><\/p>\n<p class=\"p1\">Eine weitere m\u00f6gliche Ma\u00dfnahme ist die Datenverschl\u00fcsselung. Die Verschl\u00fcsselung kann offline oder in Echtzeit erfolgen. F\u00fcr die Offline- Verschl\u00fcsselung kann ein Dienstprogramm verwendet werden, das Dateien oder Ordner als Eingabe nimmt und eine verschl\u00fcsselte Ausgabe erzeugt. Das verschl\u00fcsselte Material mit dem Schl\u00fcssel kann dann z. B. versandt werden. Bei der Inline-Verschl\u00fcsselung werden die Daten verschl\u00fcsselt, w\u00e4hrend sie auf die Festplatte geschrieben werden, und es wird ein Schl\u00fcssel ben\u00f6tigt, um sie f\u00fcr die Wiedergabe zu entschl\u00fcsseln. F\u00fcr die Inline-Verschl\u00fcsselung muss eine Gruppe von Festplatten und\/oder SSDs \u00fcber die\u00a0 Verschl\u00fcsselungsfunktionalit\u00e4t verf\u00fcgen. Sie k\u00f6nnen in einem System mit Gruppen von Festplatten und\/oder SSDs ohne die Verschl\u00fcsselungsoption<br \/>\nkombiniert werden.<\/p>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"Ma\u00dfnahmen zum Schutz Ihrer Daten vor menschlichen Fehlern und\u00a0 b\u00f6swilligen Angriffen sind unerl\u00e4sslich. Deshalb hat Ardis Technologies zus\u00e4tzlich zu den bestehenden Sicherheitsm\u00f6glichkeiten wie HTTPS-Login, Zwei-Faktor-Authentifizierung und der Erneuerung des Linux-Betriebssystems...","protected":false},"author":1,"featured_media":2345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":{"0":"post-2401","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-de"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security, Auditing and Encryption - DDPSAN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security, Auditing and Encryption - DDPSAN\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"DDPSAN\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-07T09:11:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-03T15:35:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ddpsan.com\/wp-content\/uploads\/2021\/07\/News7-fonts-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1824\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Flowingweb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Flowingweb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/\"},\"author\":{\"name\":\"Flowingweb\",\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/#\\\/schema\\\/person\\\/3044221260fa28db00571f94fcb92241\"},\"headline\":\"Security, Auditing and Encryption\",\"datePublished\":\"2021-07-07T09:11:37+00:00\",\"dateModified\":\"2022-01-03T15:35:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/\"},\"wordCount\":2222,\"image\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ddpsan.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/News7-fonts-1.jpg\",\"articleSection\":[\"Information\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/\",\"url\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/\",\"name\":\"Security, Auditing and Encryption - DDPSAN\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ddpsan.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/News7-fonts-1.jpg\",\"datePublished\":\"2021-07-07T09:11:37+00:00\",\"dateModified\":\"2022-01-03T15:35:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/#\\\/schema\\\/person\\\/3044221260fa28db00571f94fcb92241\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ddpsan.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/News7-fonts-1.jpg\",\"contentUrl\":\"https:\\\/\\\/ddpsan.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/News7-fonts-1.jpg\",\"width\":1824,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/2021\\\/07\\\/security-auditing-and-encryption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security, Auditing and Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/\",\"name\":\"DDPSAN\",\"description\":\"Dynamic Drive Pool by Ardistech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/#\\\/schema\\\/person\\\/3044221260fa28db00571f94fcb92241\",\"name\":\"Flowingweb\",\"url\":\"https:\\\/\\\/ddpsan.com\\\/de\\\/author\\\/flowingweb_c53vlu69\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security, Auditing and Encryption - DDPSAN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/","og_locale":"de_DE","og_type":"article","og_title":"Security, Auditing and Encryption - DDPSAN","og_url":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/","og_site_name":"DDPSAN","article_published_time":"2021-07-07T09:11:37+00:00","article_modified_time":"2022-01-03T15:35:16+00:00","og_image":[{"width":1824,"height":550,"url":"https:\/\/ddpsan.com\/wp-content\/uploads\/2021\/07\/News7-fonts-1.jpg","type":"image\/jpeg"}],"author":"Flowingweb","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Flowingweb","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/#article","isPartOf":{"@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/"},"author":{"name":"Flowingweb","@id":"https:\/\/ddpsan.com\/de\/#\/schema\/person\/3044221260fa28db00571f94fcb92241"},"headline":"Security, Auditing and Encryption","datePublished":"2021-07-07T09:11:37+00:00","dateModified":"2022-01-03T15:35:16+00:00","mainEntityOfPage":{"@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/"},"wordCount":2222,"image":{"@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/ddpsan.com\/wp-content\/uploads\/2021\/07\/News7-fonts-1.jpg","articleSection":["Information"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/","url":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/","name":"Security, Auditing and Encryption - DDPSAN","isPartOf":{"@id":"https:\/\/ddpsan.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/#primaryimage"},"image":{"@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/ddpsan.com\/wp-content\/uploads\/2021\/07\/News7-fonts-1.jpg","datePublished":"2021-07-07T09:11:37+00:00","dateModified":"2022-01-03T15:35:16+00:00","author":{"@id":"https:\/\/ddpsan.com\/de\/#\/schema\/person\/3044221260fa28db00571f94fcb92241"},"breadcrumb":{"@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/#primaryimage","url":"https:\/\/ddpsan.com\/wp-content\/uploads\/2021\/07\/News7-fonts-1.jpg","contentUrl":"https:\/\/ddpsan.com\/wp-content\/uploads\/2021\/07\/News7-fonts-1.jpg","width":1824,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/ddpsan.com\/de\/2021\/07\/security-auditing-and-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ddpsan.com\/de\/"},{"@type":"ListItem","position":2,"name":"Security, Auditing and Encryption"}]},{"@type":"WebSite","@id":"https:\/\/ddpsan.com\/de\/#website","url":"https:\/\/ddpsan.com\/de\/","name":"DDPSAN","description":"Dynamic Drive Pool by Ardistech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ddpsan.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/ddpsan.com\/de\/#\/schema\/person\/3044221260fa28db00571f94fcb92241","name":"Flowingweb","url":"https:\/\/ddpsan.com\/de\/author\/flowingweb_c53vlu69\/"}]}},"_links":{"self":[{"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/posts\/2401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/comments?post=2401"}],"version-history":[{"count":4,"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/posts\/2401\/revisions"}],"predecessor-version":[{"id":2510,"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/posts\/2401\/revisions\/2510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/media\/2345"}],"wp:attachment":[{"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/media?parent=2401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/categories?post=2401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ddpsan.com\/de\/wp-json\/wp\/v2\/tags?post=2401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}