{"id":10618,"date":"2020-09-24T09:07:58","date_gmt":"2020-09-24T07:07:58","guid":{"rendered":"https:\/\/news.save.ch\/?p=10618"},"modified":"2023-03-14T08:56:34","modified_gmt":"2023-03-14T07:56:34","slug":"sechs-tipps-fuer-eine-sichere-ot-umgebung","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/","title":{"rendered":"Six tips for a secure OT environment"},"content":{"rendered":"<figure id=\"attachment_10620\" aria-describedby=\"caption-attachment-10620\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10620\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-10620\" class=\"wp-caption-text\">\u00a9 depositphotos, Imilian<\/figcaption><\/figure>\n<p><span style=\"font-family: 'Arial',sans-serif;\">Networking is a prerequisite of digital transformation: The areas of IT (information technology), OT (operational technology) and ICS (industrial control systems), which are moving ever closer together, are no longer isolated from the rest of the company. As a result, the exposure to cyber threats in running systems is growing and a successful attack could mean massive damage to production, security and system availability. The specialists from <a href=\"https:\/\/www.kudelskisecurity.com\/de\/\" target=\"_blank\" rel=\"noopener\">Kudelski Security<\/a> have therefore compiled six recommendations for action that lay a solid foundation for effective risk mitigation and a secure OT environment.<\/span><\/p>\n<p><strong>Strategy 1 - Raise end-user hazard awareness\u00a0<\/strong><\/p>\n<p><span style=\"font-family: 'Arial',sans-serif;\">Users in IT environments face the same security threats as in OT environments: Phishing attacks, weak passwords, lack of hardware device security. However, the main focus of an OT engineer is to keep the system running. This means that cybersecurity threats are not the focus for him.<br \/>\nAgainst this background, it proves useful to focus on the risk to the overall business. Companies should frame the discussion of cybersecurity in the OT context in terms of the risk of production disruption. It can be helpful to give OT engineers and operations managers access to security tools so they can visualize all of their assets and see how a single vulnerability could affect production overall.<\/span><\/p>\n<p><strong>Strategy 2 - Identify the true assets in the company<\/strong><\/p>\n<p><span style=\"font-family: 'Arial',sans-serif;\">Asset discovery is a critical security component for IT and OT environments, and also one of the most difficult. OT systems notoriously lack visibility. Many organizations simply do not know their assets.<br \/>\nThe first step is therefore comparatively simple: companies should develop a detailed understanding of the resources that exist in the OT network. This means documenting the operating systems, the firmware layers, the software installed, the libraries present, how the individual assets communicate with each other, and - perhaps most importantly - the importance of the assets to the overall OT system.<\/span><\/p>\n<p><strong>Strategy 3 - Systematic network segmentation<\/strong><\/p>\n<p><span style=\"font-family: 'Arial',sans-serif;\">As more IT elements are introduced into the OT environment, the air-gap model that so many OT networks depend on as the primary security element is eroding. For example, an OT engineer might want to check email via a Human-Machine Interface (HMI) on the factory floor, so he adds a second Network Information Center (NIC).<\/span><\/p>\n<p>To enable secure interaction between IT and OT infrastructure, it is important to think through network segmentation requirements before access becomes necessary. In an emergency, it is better not to create new connections, but to establish system-to-system connectivity in a Purdue model. It's also a good idea to set up firewalls and firewall controls to create a hierarchy in the network. The Purdue model for controlling hierarchy is a framework commonly used by vendors in various industries. It is helpful in understanding how data typically flows through networks and how to secure each of the network zones and their respective elements accordingly.<\/p>\n<p><strong>Strategy 4 - Consistent threat monitoring and\u00a0<\/strong><br \/>\n<strong>Incident Management<\/strong><\/p>\n<p><span style=\"font-family: 'Arial',sans-serif;\">Visibility is the critical first step to effective real-time cyber threat monitoring. It is essential for organizations to know what assets are in their environment, how assets are connected, how network segmentation is or is not set up, and what vulnerabilities exist. Once visibility is established, it is important to determine how the network will be seamlessly monitored around the clock. The following questions need to be answered: What to do if there is an alarm? What standards should be used to validate and intervene? What should be done in the event of a security incident?<br \/>\nGiven the security challenges of an OT environment, an incident can be extremely damaging in a short period of time. IT security strategies such as threat monitoring and tracking and incident management can help, but they require real-time collaboration and coordination between security and OT teams. From the third-party security operations center (SOC) or managed security service provider (MSSP) to the operations manager to the OT engineer, roles and responsibilities must be clearly defined.<\/span><\/p>\n<p><strong>Strategy 5 - Connectivity and access controls<\/strong><\/p>\n<p><span style=\"font-family: 'Arial',sans-serif;\">While there are established practices for identity and access management for IT environments, there is a need to catch up in many places in the OT area. Credentials are often shared internally and externally, and access is not limited to specific network devices or segments.<br \/>\nIt is essential to assume \"hyperconnectivity\" and plan for it in advance to safeguard productivity and operations. The following basic principles apply here: Identity management, password requirements, multi-factor authentication, synchronization of access to Active Directory. Remote access capabilities can also be helpful. However, it should be avoided to use the same remote access solution for both IT and OT to reduce the attack surface and avoid downtime. In the event of an emergency, this makes it possible to clearly identify who had access to the affected system and cut the connection if necessary.<\/span><\/p>\n<p><strong>Strategy 6 - Vulnerability and Patch Management<\/strong><\/p>\n<p><span style=\"font-family: 'Arial',sans-serif;\">Legacy systems, mission-critical frameworks, and the limited patch windows of OT environments typically make it difficult to develop a holistic threat mitigation and patch management strategy. Rather than patching through hundreds of vulnerabilities, users need to understand which potentially vulnerable systems are most critical to production. Ideally, security vulnerabilities are closed during the next regular maintenance - with the knowledge in mind that for many OT vulnerabilities, no patch or firmware update fix is available at all. This is where the use of compensating control mechanisms comes into play to limit the impact of a vulnerability in the event of an attack. These mechanisms include network segmentation and isolation, password management, and continuous threat monitoring and tracking (deep packet inspection). Ultimately, it's about balancing security effort and return on investment.<\/span><\/p>\n<p><em>Source: <\/em><a href=\"https:\/\/kudelskisecurity.com\/solutions\/by-need\/secure-ot-ics-networks\/\"><em><span style=\"font-size: 10.5pt; font-family: 'Arial',sans-serif;\">Kudelski Security<\/span><\/em><\/a><\/p>\n<p><em>Interested parties can also find out more about effective risk minimization and a secure OT environment in the <a href=\"https:\/\/resources.kudelskisecurity.com\/ot-visibility-webinar-emea\">Operational Technology Webinar<\/a> October 6.<\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Vernetzung ist eine Voraussetzung der digitalen Transformation: Die Bereiche IT (Informationstechnologie), OT (Operational Technology) und ICS (industrielle Kontrollsysteme), die immer n\u00e4her zusammenr\u00fccken, sind nicht mehr von den \u00fcbrigen Unternehmensbereichen abgeschottet. Dadurch w\u00e4chst die Gef\u00e4hrdung durch Cyberbedrohungen in den laufenden Systemen und ein erfolgreicher Angriff k\u00f6nnte massiven Schaden f\u00fcr die Produktion, Sicherheit und Systemverf\u00fcgbarkeit bedeuten. Die [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":10620,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[543,1003,683],"class_list":["post-10618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-operational-technology","tag-ot-umgebung","tag-risikominimierung"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"OT-Umgebung","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sechs Tipps f\u00fcr eine sichere OT-Umgebung - Save<\/title>\n<meta name=\"description\" content=\"Wer sechs Handlungsempfehlungen befolgt, hat eine solide Basis f\u00fcr eine wirksame Risikominimierung und eine sichere OT-Umgebung gelegt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sechs Tipps f\u00fcr eine sichere OT-Umgebung - Save\" \/>\n<meta property=\"og:description\" content=\"Wer sechs Handlungsempfehlungen befolgt, hat eine solide Basis f\u00fcr eine wirksame Risikominimierung und eine sichere OT-Umgebung gelegt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-24T07:07:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Sechs Tipps f\u00fcr eine sichere OT-Umgebung\",\"datePublished\":\"2020-09-24T07:07:58+00:00\",\"dateModified\":\"2023-03-14T07:56:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/\"},\"wordCount\":944,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Depositphotos_75040581_s-2019-1.jpg\",\"keywords\":[\"Operational Technology\",\"OT-Umgebung\",\"Risikominimierung\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/\",\"name\":\"Sechs Tipps f\u00fcr eine sichere OT-Umgebung - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Depositphotos_75040581_s-2019-1.jpg\",\"datePublished\":\"2020-09-24T07:07:58+00:00\",\"dateModified\":\"2023-03-14T07:56:34+00:00\",\"description\":\"Wer sechs Handlungsempfehlungen befolgt, hat eine solide Basis f\u00fcr eine wirksame Risikominimierung und eine sichere OT-Umgebung gelegt.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Depositphotos_75040581_s-2019-1.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Depositphotos_75040581_s-2019-1.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos, Imilian\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-eine-sichere-ot-umgebung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sechs Tipps f\u00fcr eine sichere OT-Umgebung\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six tips for a secure OT environment - Save","description":"Those who follow six recommended actions will have laid a solid foundation for effective risk mitigation and a secure OT environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/","og_locale":"en_US","og_type":"article","og_title":"Sechs Tipps f\u00fcr eine sichere OT-Umgebung - Save","og_description":"Wer sechs Handlungsempfehlungen befolgt, hat eine solide Basis f\u00fcr eine wirksame Risikominimierung und eine sichere OT-Umgebung gelegt.","og_url":"https:\/\/news.save.ch\/en\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/","og_site_name":"Save","article_published_time":"2020-09-24T07:07:58+00:00","article_modified_time":"2023-03-14T07:56:34+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Sechs Tipps f\u00fcr eine sichere OT-Umgebung","datePublished":"2020-09-24T07:07:58+00:00","dateModified":"2023-03-14T07:56:34+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/"},"wordCount":944,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg","keywords":["Operational Technology","OT-Umgebung","Risikominimierung"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/","url":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/","name":"Six tips for a secure OT environment - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg","datePublished":"2020-09-24T07:07:58+00:00","dateModified":"2023-03-14T07:56:34+00:00","description":"Those who follow six recommended actions will have laid a solid foundation for effective risk mitigation and a secure OT environment.","breadcrumb":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/09\/Depositphotos_75040581_s-2019-1.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos, Imilian"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-eine-sichere-ot-umgebung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Sechs Tipps f\u00fcr eine sichere OT-Umgebung"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=10618"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10618\/revisions"}],"predecessor-version":[{"id":17308,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10618\/revisions\/17308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/10620"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=10618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=10618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=10618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}