{"id":10440,"date":"2020-08-03T11:09:21","date_gmt":"2020-08-03T09:09:21","guid":{"rendered":"https:\/\/news.save.ch\/?p=10440"},"modified":"2023-03-14T08:56:35","modified_gmt":"2023-03-14T07:56:35","slug":"mit-7-schritten-sicher-in-die-wolke","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/mit-7-schritten-sicher-in-die-wolke\/","title":{"rendered":"7 steps safely into the cloud"},"content":{"rendered":"<figure id=\"attachment_10441\" aria-describedby=\"caption-attachment-10441\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10441 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg\" alt=\"Cloud Security\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-10441\" class=\"wp-caption-text\">\u00a9 depositphotos, welcomia<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>However, a pragmatic, data-centric approach can make the path to the cloud clearly actionable. Below is a 7-step framework for an effective cloud security program:<\/p>\n<ol>\n<li><strong><em> Securing endpoints that have access to cloud applications:<\/em><\/strong> Cloud applications reside outside of an organization's IT environment and therefore outside of the protection offered by many network or perimeter-based security technologies. Before organizations use cloud services, it is important to secure the devices used to access the cloud. These endpoints should be protected by security technologies such as data loss prevention (DLP) with controls for data exfiltration, end-to-end encryption and secure access. This prevents the unauthorized upload of sensitive data to the cloud and ensures that data is encrypted prior to upload.Data should remain encrypted in the cloud and only be decrypted once it reaches an authorized user's device. Once data enters the cloud, it is no longer under the direct control of the organization. Therefore, encrypting sensitive data and preventing certain types of data from being uploaded is fundamental to protecting mission-critical information from cybercriminals.\n<p><strong><em>2. monitoring access to cloud data and services: <\/em><\/strong>Transparency of data access and usage is also critical to effective data security in the cloud. In addition to securing the endpoints used to access cloud data, organizations must ensure they have visibility into who is accessing the cloud and what data is being uploaded or downloaded there. This visibility increases the effectiveness of endpoint security controls and enables the security team to quickly identify and respond to risky or suspicious behavior related to cloud data.<\/p>\n<p><strong><em>3. use of cloud<a href=\"https:\/\/de.wikipedia.org\/wiki\/Programmierschnittstelle\">API<\/a>s to expand data security:<\/em><\/strong> If an organization allows the use of cloud-based email services or storage services such as Box or Dropbox, it should leverage the providers' APIs to extend existing data security measures to these platforms. This can optimize visibility into cloud data access and enable greater control through encryption or access management over data in the cloud. Many network security devices offer cloud integrations via APIs. Enterprises should therefore ask their provider which cloud platforms they are integrated with and take advantage of these features where available.<\/p>\n<p><strong><em>4. securing the cloud applications:<\/em><\/strong> In addition to endpoints and networks, cloud security also depends on the security of the applications running in the cloud. Far too often, security takes a back seat during cloud application development, especially for cloud apps created by individual developers or small teams.<\/p>\n<p>Enterprises should therefore test their cloud applications for commonly exploited security vulnerabilities and ask third-party cloud application vendors to share the results of application security testing (such as static or dynamic analysis or penetration testing) with them. Any vulnerabilities discovered during application testing should be patched securely before the apps are used.<\/p>\n<p><strong><em>5. implementation of guidelines and controls for <a href=\"https:\/\/de.wikipedia.org\/wiki\/Bring_your_own_device\">BYOD<\/a>s:<\/em><\/strong> If organizations want to allow access to cloud data via employee-owned mobile devices (laptops, smartphones or tablets), it is imperative that they first create a BYOD (bring your own device) policy and implement controls to enforce proper data access by BYOD users. Organizations should consider using two-factor authentication, end-to-end encryption and mobile device management (MDM) software to secure BYOD use in the cloud. Two-factor authentication helps prevent unauthorized access, while encryption ensures that sensitive cloud data accessed by BYOD users is visible only to authorized individuals. Mobile device management software is a good last line of defense if a device is lost or stolen, as MDM allows IT departments to restrict access to BYODs or remotely wipe the data on the device if needed.<\/p>\n<p><strong><em>6. regular backups of the cloud data:<\/em><\/strong> As cloud providers and applications are increasingly targeted by cyber-attacks, organizations must prepare for the worst-case scenario: the permanent loss of cloud-based data. Although this does not protect against consequences such as financial loss or legal penalties, performing regular backups at least ensures that any critical data lost in a cloud data breach, ransomware attack or destructive malware infection can be recovered.<\/p>\n<p><strong><em>7. safety training of employees:<\/em><\/strong> Regardless of how secure endpoints, applications and network connections are, their security also depends on the employees who use them. Social engineering tactics such as spear phishing remain among the most common, easiest and successful methods used by cybercriminals. Regular training is critical to ensure employees can effectively recognize social engineering attacks and build safe web habits. Organizations should therefore regularly conduct simulated social engineering attacks to test their employees' ability to identify and remediate vulnerabilities.<\/p>\n<p>Thanks to the numerous benefits, cloud migration will continue to increase in the future - but so will security threats. However, by taking the above security steps, consisting of data-centric technologies and security best practices, enterprises can effectively protect their data in the cloud from attackers.<\/li>\n<\/ol>\n<p><em>Author: Christoph M. Kumpa, Director DACH &amp; EE at <a href=\"https:\/\/digitalguardian.com\/\">Digital Guardian <\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Ein pragmatischer, datenzentrierter Ansatz kann den Weg in die Wolke jedoch \u00fcbersichtlich umsetzbar machen. Im Folgenden ein 7-stufiges Framework f\u00fcr ein effektives Cloud-Security-Programm: Sicherung der Endpunkte, die Zugriff auf Cloud-Anwendungen haben: Cloud-Anwendungen befinden sich ausserhalb der IT-Umgebung eines Unternehmens und damit auch ausserhalb des Schutzes, den viele netzwerk- oder perimeterbasierte Sicherheitstechnologien bieten. Bevor Unternehmen [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":10441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[362,940,941],"class_list":["post-10440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cloud","tag-cloud-security","tag-datensicherheitsprobleme"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Cloud-Security","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mit 7 Schritten sicher in die Wolke - Save<\/title>\n<meta name=\"description\" content=\"Ein datenzentrierter Ansatz kann den Weg in die Wolke \u00fcbersichtlich umsetzbar machen: Ein 7-stufiges Framework f\u00fcr ein effektives Cloud-Security-Programm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/mit-7-schritten-sicher-in-die-wolke\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mit 7 Schritten sicher in die Wolke - Save\" \/>\n<meta property=\"og:description\" content=\"Ein datenzentrierter Ansatz kann den Weg in die Wolke \u00fcbersichtlich umsetzbar machen: Ein 7-stufiges Framework f\u00fcr ein effektives Cloud-Security-Programm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/mit-7-schritten-sicher-in-die-wolke\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-03T09:09:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Mit 7 Schritten sicher in die Wolke\",\"datePublished\":\"2020-08-03T09:09:21+00:00\",\"dateModified\":\"2023-03-14T07:56:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/\"},\"wordCount\":850,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64282809_s-2019.jpg\",\"keywords\":[\"Cloud\",\"Cloud-Security\",\"Datensicherheitsprobleme\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/\",\"name\":\"Mit 7 Schritten sicher in die Wolke - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64282809_s-2019.jpg\",\"datePublished\":\"2020-08-03T09:09:21+00:00\",\"dateModified\":\"2023-03-14T07:56:35+00:00\",\"description\":\"Ein datenzentrierter Ansatz kann den Weg in die Wolke \u00fcbersichtlich umsetzbar machen: Ein 7-stufiges Framework f\u00fcr ein effektives Cloud-Security-Programm.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64282809_s-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64282809_s-2019.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos, welcomia\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mit-7-schritten-sicher-in-die-wolke\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mit 7 Schritten sicher in die Wolke\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securely into the cloud with 7 steps - Save","description":"A data-centric approach can make the path to the cloud clearly actionable: A 7-step framework for an effective cloud security program.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/mit-7-schritten-sicher-in-die-wolke\/","og_locale":"en_US","og_type":"article","og_title":"Mit 7 Schritten sicher in die Wolke - Save","og_description":"Ein datenzentrierter Ansatz kann den Weg in die Wolke \u00fcbersichtlich umsetzbar machen: Ein 7-stufiges Framework f\u00fcr ein effektives Cloud-Security-Programm.","og_url":"https:\/\/news.save.ch\/en\/mit-7-schritten-sicher-in-die-wolke\/","og_site_name":"Save","article_published_time":"2020-08-03T09:09:21+00:00","article_modified_time":"2023-03-14T07:56:35+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Mit 7 Schritten sicher in die Wolke","datePublished":"2020-08-03T09:09:21+00:00","dateModified":"2023-03-14T07:56:35+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/"},"wordCount":850,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg","keywords":["Cloud","Cloud-Security","Datensicherheitsprobleme"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/","url":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/","name":"Securely into the cloud with 7 steps - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg","datePublished":"2020-08-03T09:09:21+00:00","dateModified":"2023-03-14T07:56:35+00:00","description":"A data-centric approach can make the path to the cloud clearly actionable: A 7-step framework for an effective cloud security program.","breadcrumb":{"@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64282809_s-2019.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos, welcomia"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/mit-7-schritten-sicher-in-die-wolke\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Mit 7 Schritten sicher in die Wolke"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=10440"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10440\/revisions"}],"predecessor-version":[{"id":17316,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10440\/revisions\/17316"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/10441"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=10440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=10440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=10440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}