{"id":21483,"date":"2025-04-08T15:57:04","date_gmt":"2025-04-08T13:57:04","guid":{"rendered":"https:\/\/xoap.io\/?p=21483"},"modified":"2025-04-08T15:57:04","modified_gmt":"2025-04-08T13:57:04","slug":"ignoring-security-compliance-automation-think-again","status":"publish","type":"post","link":"https:\/\/xoap.io\/de\/ignoring-security-compliance-automation-think-again\/","title":{"rendered":"Ignorieren Sie die Automatisierung der IT-Sicherheitskonformit\u00e4t? Neu denken"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"21483\" class=\"elementor elementor-21483\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-886baa1 e-flex e-con-boxed e-con e-parent\" data-id=\"886baa1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e559b6a elementor-toc--content-ellipsis elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"e559b6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;],&quot;container&quot;:&quot;main&quot;,&quot;exclude_headings_by_selector&quot;:[],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;fas fa-arrow-right&quot;,&quot;library&quot;:&quot;fa-solid&quot;,&quot;rendered_tag&quot;:&quot;&lt;svg class=\\&quot;e-font-icon-svg e-fas-arrow-right\\&quot; viewBox=\\&quot;0 0 448 512\\&quot; xmlns=\\&quot;http:\\\/\\\/www.w3.org\\\/2000\\\/svg\\&quot;&gt;&lt;path d=\\&quot;M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\\&quot;&gt;&lt;\\\/path&gt;&lt;\\\/svg&gt;&quot;},&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__e559b6a\" aria-expanded=\"true\" aria-label=\"Inhaltsverzeichnis \u00f6ffnen\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__e559b6a\" aria-expanded=\"true\" aria-label=\"Inhaltsverzeichnis schlie\u00dfen\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__e559b6a\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec18f28 e-con-full e-flex e-con e-child\" data-id=\"ec18f28\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc62d75 elementor-widget elementor-widget-text-editor\" data-id=\"cc62d75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"137\" data-end=\"464\">Picture this: It\u2019s 4:30 PM on a Friday, and instead of winding down for the weekend, your team is scrambling. A security audit is looming, compliance reports are scattered across spreadsheets and <strong>a missed vulnerability now means potential fines and a late-night emergency fix<\/strong>. Stress levels are high, and the weekend? Canceled.<\/p><p class=\"\" data-start=\"466\" data-end=\"497\">Now, we don\u2019t want that, do we?<\/p><p class=\"\" data-start=\"499\" data-end=\"652\">Failing to automate security compliance isn\u2019t just inefficient\u2014it\u2019s a ticking time bomb. Security gaps widen, audits become nightmares and fines escalate quickly.<\/p><p class=\"\" data-start=\"654\" data-end=\"837\">While security is never simple nor trivial, it can be streamlined, well covered and run like clockwork. Not every company has this control. <em>Maybe you\u2019ve seen some of them in the news.<\/em><\/p><p class=\"\" data-start=\"839\" data-end=\"1098\">If you\u2019re considering <a href=\"https:\/\/xoap.io\/solution-security-compliance\/\" target=\"_blank\" rel=\"noopener\">security compliance automation<\/a> for your IT environment, you know it\u2019ll reduce costs, cut human error and provide system consistency. But where do you start? Specifically, with automating CIS, STIG and, if you\u2019re operating in Germany like us, BSI.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb9709d e-con-full e-flex e-con e-child\" data-id=\"cb9709d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24db6e4 elementor-widget elementor-widget-heading\" data-id=\"24db6e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why automate CIS, STIG and BSI?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b8cff5 elementor-widget elementor-widget-text-editor\" data-id=\"3b8cff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"79\" data-end=\"433\">CIS, STIG and BSI are <strong>critical frameworks<\/strong> for robust security and protecting your systems from real threats. Maintaining them manually? It\u2019s complex, time-consuming and prone to errors due to the sheer monumentality of the task. While CIS is a must, STIG and BSI might not be directly relevant to your organization. We suggest implementing them anyway.<\/p><p class=\"\" data-start=\"435\" data-end=\"882\"><strong>CIS (Center for Internet Security)<\/strong> benchmarks provide global best practices for securing IT systems, covering everything from operating systems to cloud environments. They help minimize vulnerabilities and harden configurations, ensuring systems meet industry security standards. <a href=\"https:\/\/xoap.io\/cis-compliance\/\" target=\"_blank\" rel=\"noopener\">Automating CIS compliance<\/a> gives you continuous security controls, real-time monitoring and quick remediation, boosting your overall security with less manual effort.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d9bd5 elementor-widget elementor-widget-text-editor\" data-id=\"40d9bd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"884\" data-end=\"1351\">For businesses working with U.S. federal agencies or defense contractors, <strong>STIG (Security Technical Implementation Guidelines)<\/strong> compliance is mandatory. Even if you don\u2019t have a direct connection to the U.S., <a href=\"https:\/\/xoap.io\/stig-security-standards\/\" target=\"_blank\" rel=\"noopener\">implementing STIG<\/a> is a smart move as it provides strict security configurations for systems. Given its notorious complexity when enforced manually, automating STIG implementation helps you stay compliant without getting bogged down in tedious configurations.<\/p><p class=\"\" data-start=\"1353\" data-end=\"1864\">If you&#8217;re based in Germany, you already know that <strong>BSI (Bundesamt f\u00fcr Sicherheit in der Informationstechnik)<\/strong> compliance is crucial. When BSI is automated, security measures are consistently applied and updated, reducing the risk of non-compliance penalties. But there&#8217;s a second benefit to implementing BSI for those operating in or with critical sectors of the European Union\u2014BSI compliance sets you up for the strict and comprehensive EU-wide <strong>NIS2 cybersecurity requirements<\/strong>, covering many of the same areas. &gt;&gt; <a href=\"https:\/\/xoap.io\/nis2-compliance-automation\/\" target=\"_blank\" rel=\"noopener\">More on NIS2 automation<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07ec0ac elementor-widget elementor-widget-image\" data-id=\"07ec0ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer.jpg\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjE0OTEsInVybCI6Imh0dHBzOlwvXC94b2FwLmlvXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI1XC8wNFwvcHJvZ3JhbW1pbmctYmFja2dyb3VuZC13aXRoLXBlcnNvbi13b3JraW5nLXdpdGgtY29kZXMtY29tcHV0ZXIud2VicCJ9\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer-1024x683.webp\" class=\"attachment-large size-large wp-image-21491\" alt=\"Automating IT security compliance\" srcset=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer-1024x683.webp 1024w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer-300x200.webp 300w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer-768x512.webp 768w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer-1536x1024.webp 1536w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer-18x12.webp 18w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/programming-background-with-person-working-with-codes-computer.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c565930 elementor-widget elementor-widget-text-editor\" data-id=\"c565930\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Source: <a href=\"http:\/\/&lt;a href=&quot;https:\/\/www.freepik.com\/free-photo\/programming-background-with-person-working-with-codes-computer_38669445.htm&quot;&gt;Image by freepik&lt;\/a&gt;\" target=\"_blank\" rel=\"noopener\" data-wplink-url-error=\"true\">Freepik<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ea9795 e-con-full e-flex e-con e-child\" data-id=\"8ea9795\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5eb6f2c elementor-widget elementor-widget-heading\" data-id=\"5eb6f2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Challenges of automating across different systems<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a340ff elementor-widget elementor-widget-text-editor\" data-id=\"2a340ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"62\" data-end=\"471\">While automation can be the deciding factor when it comes to security, automating across different systems comes with its own set of challenges. And there are plenty. You may have<strong> a mix of legacy infrastructure, cloud environments, on-premise systems and third-party tools<\/strong> in your infrastructure. Each of these systems has its own quirks, configurations and security requirements, making integration tricky.<\/p><p class=\"\" data-start=\"473\" data-end=\"688\">Legacy systems are often rigid, outdated and weren\u2019t built for automation. This makes introducing modern automated compliance tough and leads to <strong>compatibility issues, gaps in coverage and even unexpected downtime<\/strong>.<\/p><p class=\"\" data-start=\"690\" data-end=\"1086\">Then, there\u2019s the fact that different systems often use <strong>different security protocols and tools<\/strong>. You might be running one system with a firewall solution that\u2019s highly specific to your environment, while another is using a cloud-native solution with its own security framework. Ensuring compatibility between these security controls often requires custom configurations and careful coordination.<\/p><p class=\"\" data-start=\"1088\" data-end=\"1408\">Another challenge comes when systems are highly customized or rely on vendor-specific tools. In this case, automation tools might need to be fine-tuned\u2014or even completely reworked\u2014to adapt. <strong>Vendor lock-in can complicate matters even more<\/strong>, as you\u2019re limited by the functionality and flexibility of your chosen solution.<\/p><p class=\"\" data-start=\"1410\" data-end=\"1799\">Automation also relies heavily on effective cross-system communication. To ensure that all systems are in sync, especially when patching vulnerabilities, monitoring compliance and generating reports, your systems need to &#8220;talk&#8221; to each other. If there are mismatched data formats or integration barriers, this can cause automation workflows to break down and require manual intervention.<\/p><p class=\"\" data-start=\"1801\" data-end=\"2067\">Finally, as your organization grows, so do your automation needs. What worked for a small environment might need adjustments as your infrastructure scales. It\u2019s crucial to have <strong>flexible, scalable automation<\/strong> to manage evolving infrastructure and compliance demands.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16f60ba e-con-full e-flex e-con e-child\" data-id=\"16f60ba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6ea5c0 elementor-widget elementor-widget-heading\" data-id=\"d6ea5c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to handle all this<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3be440 elementor-widget elementor-widget-text-editor\" data-id=\"c3be440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If this seems a bit daunting, that&#8217;s because it is. From legacy infrastructure to cloud environments, the complexities involved in <a href=\"https:\/\/xoap.io\/solution-security-compliance\/\" target=\"_blank\" rel=\"noopener\">automating compliance across different systems<\/a> can be a lot. There is a solution, though. We designed XOAP to <strong>solve these exact challenges and make security compliance automation smooth, scalable and reliable<\/strong>. On top of automating anything in your IT infrastructure, XOAP takes the headache out of managing STIG, CIS and BSI compliance\u2014all from a single, unified platform.<\/p><p><a href=\"https:\/\/xoap.io\/why-xoap\/\" target=\"_blank\" rel=\"noopener\">XOAP<\/a> seamlessly integrates with various systems, whether legacy or cloud, maintaining consistent security policies with minimal manual effort. Even if your setup is highly customized or uses vendor-specific tools, XOAP adapts without the need for major adjustments. <strong>No vendor lock-ins, just flexible automation<\/strong> that fits your needs.<\/p><p>What really sets XOAP apart is its<strong> real-time monitoring and automated remediation<\/strong>. When a vulnerability is detected, XOAP not only flags it but also applies the necessary fix, keeping your systems compliant and reducing downtime. It also solves the problem of cross-system communication, eliminating integration barriers and making sure that patch management and vulnerability assessments run smoothly across all your systems.<\/p><p>As your business grows, XOAP scales with the evolving infrastructure, ensuring that the compliance processes stay up to date and efficient as your needs change.<\/p><p>Automating STIG, CIS and BSI compliance this way becomes straightforward, leaving you free to focus on your business while XOAP takes care of the security details.<\/p><p>And those security audits? <strong>With XOAP\u2019s automated reports, your only worry will be picking the report cover.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a03c1f elementor-widget elementor-widget-image\" data-id=\"8a03c1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/02\/deploy-and-install-citrix-vaad-packages-on-xoap-13.webp\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTg3ODMsInVybCI6Imh0dHBzOlwvXC94b2FwLmlvXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI1XC8wMlwvZGVwbG95LWFuZC1pbnN0YWxsLWNpdHJpeC12YWFkLXBhY2thZ2VzLW9uLXhvYXAtMTMud2VicCJ9\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/02\/deploy-and-install-citrix-vaad-packages-on-xoap-13-1024x576.webp\" class=\"attachment-large size-large wp-image-18783\" alt=\"Check nodes details\" srcset=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/02\/deploy-and-install-citrix-vaad-packages-on-xoap-13-1024x576.webp 1024w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/02\/deploy-and-install-citrix-vaad-packages-on-xoap-13-300x169.webp 300w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/02\/deploy-and-install-citrix-vaad-packages-on-xoap-13-768x432.webp 768w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/02\/deploy-and-install-citrix-vaad-packages-on-xoap-13-1536x864.webp 1536w, https:\/\/xoap.io\/wp-content\/uploads\/2025\/02\/deploy-and-install-citrix-vaad-packages-on-xoap-13.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33ccbe1 elementor-widget elementor-widget-text-editor\" data-id=\"33ccbe1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\ud83d\udcda More on security automation:<\/strong><br \/>\u00a0 \u00a0&gt;&gt; <a href=\"https:\/\/xoap.io\/cis-compliance\/\" target=\"_blank\" rel=\"noopener\">Achieving up to 98% CIS compliance<\/a><br \/>\u00a0 \u00a0&gt;&gt; <a href=\"https:\/\/xoap.io\/stig-security-standards\/\" target=\"_blank\" rel=\"noopener\">STIG security across all systems<\/a><br \/>\u00a0 \u00a0&gt;&gt; <a href=\"https:\/\/xoap.io\/solution-security-compliance\/\" target=\"_blank\" rel=\"noopener\">Security compliance made easy<\/a><br \/>\u00a0 \u00a0&gt;&gt; <a href=\"https:\/\/xoap.io\/why-xoap\/\" target=\"_blank\" rel=\"noopener\">Why XOAP<\/a><\/p><p><em>Still not sure about automating your IT security? Let&#8217;s talk! You can book a timeslot below. <\/em><em style=\"font-weight: inherit; text-align: var(--text-align); font-family: var( --e-global-typography-36dc6db-font-family ), Sans-serif; background-color: var(--ast-global-color-5); color: var(--ast-global-color-3);\">If you&#8217;d like to explore XOAP yourself, start with a free account.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-395b72e e-con-full e-flex e-con e-child\" data-id=\"395b72e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-2d2a813 e-con-full e-flex e-con e-child\" data-id=\"2d2a813\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-6842c4f e-con-full e-flex e-con e-child\" data-id=\"6842c4f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-355b52e elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"355b52e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_tablet&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/auth.xoap.io\/auth\/realms\/my.xoap.io\/protocol\/openid-connect\/registrations?client_id=portal&#038;response_type=code&#038;scope=openid%20email&#038;redirect_uri=https:\/\/my.xoap.io&#038;kc_locale=en&#038;_ga=2.120291981.440170699.1710334465-1088457358.1705491014\" target=\"_blank\">Automate security compliance benchmarks<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40703c3 e-con-full e-flex e-con e-child\" data-id=\"40703c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e961353 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-widget elementor-widget-global elementor-global-18898 elementor-widget-button\" data-id=\"e961353\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_mobile&quot;:&quot;none&quot;}\" title=\"Get lifetime access\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/auth.xoap.io\/auth\/realms\/my.xoap.io\/protocol\/openid-connect\/registrations?client_id=portal&#038;response_type=code&#038;scope=openid%20email&#038;redirect_uri=https:\/\/my.xoap.io&#038;kc_locale=en\" target=\"_blank\" title=\"Start for free\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start for free<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d68c72f elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-widget elementor-widget-global elementor-global-18905 elementor-widget-button\" data-id=\"d68c72f\" data-element_type=\"widget\" data-e-type=\"widget\" title=\"Get lifetime access\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/calendly.com\/xoap\/30min\" target=\"_blank\" title=\"Book a demo\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book a demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Wenn die Einhaltung von Sicherheitsvorschriften nicht automatisiert wird, ist das nicht nur ineffizient - es ist eine tickende Zeitbombe. Sicherheitsl\u00fccken werden gr\u00f6\u00dfer, Audits werden zum Albtraum und Geldstrafen eskalieren schnell.<\/p>","protected":false},"author":3,"featured_media":21496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[37],"tags":[36,120,33],"class_list":["post-21483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-library","tag-automation","tag-security","tag-xoap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ignoring IT security compliance automation? Think again | XOAP<\/title>\n<meta name=\"description\" content=\"Failing to automate security compliance isn\u2019t just inefficient\u2014it\u2019s a ticking time bomb. Here&#039;s how to approach it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xoap.io\/de\/ignoring-security-compliance-automation-think-again\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ignoring IT security compliance automation? Think again | XOAP\" \/>\n<meta property=\"og:description\" content=\"Failing to automate security compliance isn\u2019t just inefficient\u2014it\u2019s a ticking time bomb. Here&#039;s how to approach it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xoap.io\/de\/ignoring-security-compliance-automation-think-again\/\" \/>\n<meta property=\"og:site_name\" content=\"XOAP\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XOAP.io\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-08T13:57:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Mario\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@xoap_io\" \/>\n<meta name=\"twitter:site\" content=\"@xoap_io\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/\"},\"author\":{\"name\":\"Mario\",\"@id\":\"https:\/\/xoap.io\/#\/schema\/person\/73e345356d7e3947ab547bb8e68ab7ce\"},\"headline\":\"Ignoring IT security compliance automation? Think again\",\"datePublished\":\"2025-04-08T13:57:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/\"},\"wordCount\":1069,\"publisher\":{\"@id\":\"https:\/\/xoap.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp\",\"keywords\":[\"automation\",\"security\",\"xoap\"],\"articleSection\":[\"Library\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/\",\"url\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/\",\"name\":\"Ignoring IT security compliance automation? Think again | XOAP\",\"isPartOf\":{\"@id\":\"https:\/\/xoap.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp\",\"datePublished\":\"2025-04-08T13:57:04+00:00\",\"description\":\"Failing to automate security compliance isn\u2019t just inefficient\u2014it\u2019s a ticking time bomb. Here's how to approach it.\",\"breadcrumb\":{\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage\",\"url\":\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp\",\"contentUrl\":\"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp\",\"width\":1024,\"height\":600,\"caption\":\"Automating security benchmarks | XOAP Blog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xoap.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ignoring IT security compliance automation? Think again\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xoap.io\/#website\",\"url\":\"https:\/\/xoap.io\/\",\"name\":\"XOAP\",\"description\":\"Platform for IT infrastructure and workplace automation\",\"publisher\":{\"@id\":\"https:\/\/xoap.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xoap.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xoap.io\/#organization\",\"name\":\"XOAP\",\"url\":\"https:\/\/xoap.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/xoap.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg\",\"contentUrl\":\"https:\/\/xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg\",\"width\":250,\"height\":90,\"caption\":\"XOAP\"},\"image\":{\"@id\":\"https:\/\/xoap.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XOAP.io\",\"https:\/\/x.com\/xoap_io\",\"https:\/\/www.linkedin.com\/company\/xoap_io\",\"https:\/\/www.youtube.com\/@xoap_io\",\"https:\/\/github.com\/xoap-io\",\"https:\/\/www.instagram.com\/xoap_io\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xoap.io\/#\/schema\/person\/73e345356d7e3947ab547bb8e68ab7ce\",\"name\":\"Mario\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/xoap.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d268ca366dbe356ec4f55bb746c489ad8aa53a4a6108a9cab7bbf8c5875fa54?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d268ca366dbe356ec4f55bb746c489ad8aa53a4a6108a9cab7bbf8c5875fa54?s=96&d=mm&r=g\",\"caption\":\"Mario\"},\"sameAs\":[\"http:\/\/xoap.io\"],\"url\":\"https:\/\/xoap.io\/de\/author\/mario\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ignoring IT security compliance automation? Think again | XOAP","description":"Failing to automate security compliance isn\u2019t just inefficient\u2014it\u2019s a ticking time bomb. Here's how to approach it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xoap.io\/de\/ignoring-security-compliance-automation-think-again\/","og_locale":"de_DE","og_type":"article","og_title":"Ignoring IT security compliance automation? Think again | XOAP","og_description":"Failing to automate security compliance isn\u2019t just inefficient\u2014it\u2019s a ticking time bomb. Here's how to approach it.","og_url":"https:\/\/xoap.io\/de\/ignoring-security-compliance-automation-think-again\/","og_site_name":"XOAP","article_publisher":"https:\/\/www.facebook.com\/XOAP.io","article_published_time":"2025-04-08T13:57:04+00:00","og_image":[{"width":1024,"height":600,"url":"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp","type":"image\/webp"}],"author":"Mario","twitter_card":"summary_large_image","twitter_image":"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp","twitter_creator":"@xoap_io","twitter_site":"@xoap_io","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#article","isPartOf":{"@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/"},"author":{"name":"Mario","@id":"https:\/\/xoap.io\/#\/schema\/person\/73e345356d7e3947ab547bb8e68ab7ce"},"headline":"Ignoring IT security compliance automation? Think again","datePublished":"2025-04-08T13:57:04+00:00","mainEntityOfPage":{"@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/"},"wordCount":1069,"publisher":{"@id":"https:\/\/xoap.io\/#organization"},"image":{"@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage"},"thumbnailUrl":"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp","keywords":["automation","security","xoap"],"articleSection":["Library"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/","url":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/","name":"Ignoring IT security compliance automation? Think again | XOAP","isPartOf":{"@id":"https:\/\/xoap.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage"},"image":{"@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage"},"thumbnailUrl":"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp","datePublished":"2025-04-08T13:57:04+00:00","description":"Failing to automate security compliance isn\u2019t just inefficient\u2014it\u2019s a ticking time bomb. Here's how to approach it.","breadcrumb":{"@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#primaryimage","url":"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp","contentUrl":"https:\/\/xoap.io\/wp-content\/uploads\/2025\/04\/General-With-image-14.webp","width":1024,"height":600,"caption":"Automating security benchmarks | XOAP Blog"},{"@type":"BreadcrumbList","@id":"https:\/\/xoap.io\/ignoring-security-compliance-automation-think-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xoap.io\/"},{"@type":"ListItem","position":2,"name":"Ignoring IT security compliance automation? Think again"}]},{"@type":"WebSite","@id":"https:\/\/xoap.io\/#website","url":"https:\/\/xoap.io\/","name":"XOAP","description":"Plattform f\u00fcr IT-Infrastruktur und Arbeitsplatzautomatisierung","publisher":{"@id":"https:\/\/xoap.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xoap.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/xoap.io\/#organization","name":"XOAP","url":"https:\/\/xoap.io\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/xoap.io\/#\/schema\/logo\/image\/","url":"https:\/\/xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg","contentUrl":"https:\/\/xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg","width":250,"height":90,"caption":"XOAP"},"image":{"@id":"https:\/\/xoap.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XOAP.io","https:\/\/x.com\/xoap_io","https:\/\/www.linkedin.com\/company\/xoap_io","https:\/\/www.youtube.com\/@xoap_io","https:\/\/github.com\/xoap-io","https:\/\/www.instagram.com\/xoap_io"]},{"@type":"Person","@id":"https:\/\/xoap.io\/#\/schema\/person\/73e345356d7e3947ab547bb8e68ab7ce","name":"Mario","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/xoap.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d268ca366dbe356ec4f55bb746c489ad8aa53a4a6108a9cab7bbf8c5875fa54?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d268ca366dbe356ec4f55bb746c489ad8aa53a4a6108a9cab7bbf8c5875fa54?s=96&d=mm&r=g","caption":"Mario"},"sameAs":["http:\/\/xoap.io"],"url":"https:\/\/xoap.io\/de\/author\/mario\/"}]}},"_links":{"self":[{"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/posts\/21483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/comments?post=21483"}],"version-history":[{"count":15,"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/posts\/21483\/revisions"}],"predecessor-version":[{"id":21586,"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/posts\/21483\/revisions\/21586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/media\/21496"}],"wp:attachment":[{"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/media?parent=21483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/categories?post=21483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xoap.io\/de\/wp-json\/wp\/v2\/tags?post=21483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}