{"version":"1.0","provider_name":"permSECURE GmbH - development","provider_url":"https:\/\/permsecure.com\/en\/","author_name":"tenfold Software GmbH","author_url":"https:\/\/permsecure.com\/en\/author\/tenfold-software-gmbh\/","title":"Whitepaper \u2013 Identity & Access Management in der BSI-Kritisverordnung - permSECURE GmbH - development","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"XrQhQ9WFnG\"><a href=\"https:\/\/permsecure.com\/en\/whitepaper-identity-access-management-in-der-bsi-kritisverordnung\/\">Whitepaper \u2013 Identity &#038; Access Management in der BSI-Kritisverordnung<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/permsecure.com\/en\/whitepaper-identity-access-management-in-der-bsi-kritisverordnung\/embed\/#?secret=XrQhQ9WFnG\" width=\"600\" height=\"338\" title=\"&#8220;Whitepaper \u2013 Identity &#038; Access Management in der BSI-Kritisverordnung&#8221; &#8212; permSECURE GmbH - development\" data-secret=\"XrQhQ9WFnG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/permsecure.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/12\/Whitepaper_IAM_BSI-Kritis.jpg.webp","thumbnail_width":600,"thumbnail_height":400,"description":"Als Kritische Infrastrukturen (KRITIS) bezeichnet das Bundesministerium des Inneren (BMI) jene Organisationen und Einrichtungen, deren ernsthafte Beeintr\u00e4chtigung oder Ausfall dramatische Folgen f\u00fcr das staatliche Gemeinwohl h\u00e4tten (z.B. Versorgungsengp\u00e4sse und St\u00f6rungen der \u00f6ffentlichen Sicherheit). Die BSI-Kritisverordnung beschreibt die einzelnen Sektoren und die Schwellenwerte, die dar\u00fcber entscheiden, ob es sich bei einer Einrichtung um eine Kritische Infrastruktur handelt. Einrichtungen, die per Definition&hellip;"}