[{"data":1,"prerenderedAt":1210},["ShallowReactive",2],{"/en-us/blog/tags/security":3,"navigation-de-de":18,"banner-de-de":422,"footer-de-de":432,"security-tag-posts-de-de":637},{"id":4,"title":5,"body":6,"category":6,"config":7,"content":9,"description":6,"extension":11,"meta":12,"navigation":13,"path":14,"seo":15,"slug":6,"stem":16,"testContent":6,"type":6,"__hash__":17},"blogTags/en-us/blog/tags/security.yml","Security",null,{"template":8},"BlogTag",{"tag":10,"tagSlug":10},"security","yml",{},true,"/en-us/blog/tags/security",{},"en-us/blog/tags/security","srIxfbWda5gSbk8d4iJ7JFhzybqI_nv6VxWkV59SqPs",{"data":19},{"logo":20,"freeTrial":25,"sales":30,"login":35,"items":40,"search":349,"minimal":384,"duo":402,"pricingDeployment":412},{"config":21},{"href":22,"dataGaName":23,"dataGaLocation":24},"/de-de/","gitlab logo","header",{"text":26,"config":27},"Kostenlose Testversion anfordern",{"href":28,"dataGaName":29,"dataGaLocation":24},"https://gitlab.com/-/trial_registrations/new?glm_source=about.gitlab.com&glm_content=default-saas-trial/","free trial",{"text":31,"config":32},"Vertrieb kontaktieren",{"href":33,"dataGaName":34,"dataGaLocation":24},"/de-de/sales/","sales",{"text":36,"config":37},"Anmelden",{"href":38,"dataGaName":39,"dataGaLocation":24},"https://gitlab.com/users/sign_in/","sign in",[41,68,164,169,270,330],{"text":42,"config":43,"cards":45},"Plattform",{"dataNavLevelOne":44},"platform",[46,52,60],{"title":42,"description":47,"link":48},"Die intelligente Orchestrierungsplattform für DevSecOps",{"text":49,"config":50},"Erkunde unsere Plattform",{"href":51,"dataGaName":44,"dataGaLocation":24},"/de-de/platform/",{"title":53,"description":54,"link":55},"GitLab Duo Agent Platform","Agentische KI für den gesamten Softwareentwicklungszyklus",{"text":56,"config":57},"Lerne GitLab Duo kennen",{"href":58,"dataGaName":59,"dataGaLocation":24},"/de-de/gitlab-duo-agent-platform/","gitlab duo agent platform",{"title":61,"description":62,"link":63},"Gründe, die für GitLab sprechen","Erfahre, warum Unternehmen auf GitLab setzen",{"text":64,"config":65},"Mehr erfahren",{"href":66,"dataGaName":67,"dataGaLocation":24},"/de-de/why-gitlab/","why gitlab",{"text":69,"left":13,"config":70,"link":72,"lists":76,"footer":146},"Produkt",{"dataNavLevelOne":71},"solutions",{"text":73,"config":74},"Alle Lösungen anzeigen",{"href":75,"dataGaName":71,"dataGaLocation":24},"/de-de/solutions/",[77,102,124],{"title":78,"description":79,"link":80,"items":85},"Automatisierung","CI/CD und Automatisierung zur Beschleunigung der Bereitstellung",{"config":81},{"icon":82,"href":83,"dataGaName":84,"dataGaLocation":24},"AutomatedCodeAlt","/de-de/solutions/delivery-automation/","automated software delivery",[86,90,93,98],{"text":87,"config":88},"CI/CD",{"href":89,"dataGaLocation":24,"dataGaName":87},"/de-de/solutions/continuous-integration/",{"text":53,"config":91},{"href":58,"dataGaLocation":24,"dataGaName":92},"gitlab duo agent platform - product menu",{"text":94,"config":95},"Quellcodeverwaltung",{"href":96,"dataGaLocation":24,"dataGaName":97},"/de-de/solutions/source-code-management/","Source Code Management",{"text":99,"config":100},"Automatisierte Softwarebereitstellung",{"href":83,"dataGaLocation":24,"dataGaName":101},"Automated software delivery",{"title":103,"description":104,"link":105,"items":110},"Sicherheit","Entwickle schneller, ohne die Sicherheit zu gefährden",{"config":106},{"href":107,"dataGaName":108,"dataGaLocation":24,"icon":109},"/de-de/solutions/application-security-testing/","security and compliance","ShieldCheckLight",[111,115,120],{"text":112,"config":113},"Application Security Testing",{"href":107,"dataGaName":114,"dataGaLocation":24},"Application security testing",{"text":116,"config":117},"Schutz der Software-Lieferkette",{"href":118,"dataGaLocation":24,"dataGaName":119},"/de-de/solutions/supply-chain/","Software supply chain security",{"text":121,"config":122},"Software Compliance",{"href":123,"dataGaName":121,"dataGaLocation":24},"/de-de/solutions/software-compliance/",{"title":125,"link":126,"items":131},"Bewertung",{"config":127},{"icon":128,"href":129,"dataGaName":130,"dataGaLocation":24},"DigitalTransformation","/de-de/solutions/visibility-measurement/","visibility and measurement",[132,136,141],{"text":133,"config":134},"Sichtbarkeit und Bewertung",{"href":129,"dataGaLocation":24,"dataGaName":135},"Visibility and Measurement",{"text":137,"config":138},"Wertstrommanagement",{"href":139,"dataGaLocation":24,"dataGaName":140},"/de-de/solutions/value-stream-management/","Value Stream Management",{"text":142,"config":143},"Analysen und Einblicke",{"href":144,"dataGaLocation":24,"dataGaName":145},"/de-de/solutions/analytics-and-insights/","Analytics and insights",{"title":147,"items":148},"GitLab für",[149,154,159],{"text":150,"config":151},"Enterprise",{"href":152,"dataGaLocation":24,"dataGaName":153},"/de-de/enterprise/","enterprise",{"text":155,"config":156},"Kleinunternehmen",{"href":157,"dataGaLocation":24,"dataGaName":158},"/de-de/small-business/","small business",{"text":160,"config":161},"den öffentlichen Sektor",{"href":162,"dataGaLocation":24,"dataGaName":163},"/de-de/solutions/public-sector/","public sector",{"text":165,"config":166},"Preise",{"href":167,"dataGaName":168,"dataGaLocation":24,"dataNavLevelOne":168},"/de-de/pricing/","pricing",{"text":170,"config":171,"link":173,"lists":177,"feature":257},"Ressourcen",{"dataNavLevelOne":172},"resources",{"text":174,"config":175},"Alle Ressourcen anzeigen",{"href":176,"dataGaName":172,"dataGaLocation":24},"/de-de/resources/",[178,211,229],{"title":179,"items":180},"Erste Schritte",[181,186,191,196,201,206],{"text":182,"config":183},"Installieren",{"href":184,"dataGaName":185,"dataGaLocation":24},"/de-de/install/","install",{"text":187,"config":188},"Kurzanleitungen",{"href":189,"dataGaName":190,"dataGaLocation":24},"/de-de/get-started/","quick setup checklists",{"text":192,"config":193},"Lernen",{"href":194,"dataGaLocation":24,"dataGaName":195},"https://university.gitlab.com/","learn",{"text":197,"config":198},"Produktdokumentation",{"href":199,"dataGaName":200,"dataGaLocation":24},"https://docs.gitlab.com/","product documentation",{"text":202,"config":203},"Best-Practice-Videos",{"href":204,"dataGaName":205,"dataGaLocation":24},"/de-de/getting-started-videos/","best practice videos",{"text":207,"config":208},"Integrationen",{"href":209,"dataGaName":210,"dataGaLocation":24},"/de-de/integrations/","integrations",{"title":212,"items":213},"Entdecken",[214,219,224],{"text":215,"config":216},"Kundenerfolge",{"href":217,"dataGaName":218,"dataGaLocation":24},"/de-de/customers/","customer success stories",{"text":220,"config":221},"Blog",{"href":222,"dataGaName":223,"dataGaLocation":24},"/de-de/blog/","blog",{"text":225,"config":226},"Remote",{"href":227,"dataGaName":228,"dataGaLocation":24},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"title":230,"items":231},"Vernetzen",[232,237,242,247,252],{"text":233,"config":234},"GitLab-Services",{"href":235,"dataGaName":236,"dataGaLocation":24},"/de-de/services/","services",{"text":238,"config":239},"Community",{"href":240,"dataGaName":241,"dataGaLocation":24},"/community/","community",{"text":243,"config":244},"Forum",{"href":245,"dataGaName":246,"dataGaLocation":24},"https://forum.gitlab.com/","forum",{"text":248,"config":249},"Veranstaltungen",{"href":250,"dataGaName":251,"dataGaLocation":24},"/events/","events",{"text":253,"config":254},"Partner",{"href":255,"dataGaName":256,"dataGaLocation":24},"/de-de/partners/","partners",{"backgroundColor":258,"textColor":259,"text":260,"image":261,"link":265},"#2f2a6b","#fff","Perspektiven für die Softwareentwicklung der Zukunft",{"altText":262,"config":263},"the source promo card",{"src":264},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758208064/dzl0dbift9xdizyelkk4.svg",{"text":266,"config":267},"Lies die News",{"href":268,"dataGaName":269,"dataGaLocation":24},"/de-de/the-source/","the source",{"text":271,"config":272,"lists":274},"Unternehmen",{"dataNavLevelOne":273},"company",[275],{"items":276},[277,282,288,290,295,300,305,310,315,320,325],{"text":278,"config":279},"Über",{"href":280,"dataGaName":281,"dataGaLocation":24},"/de-de/company/","about",{"text":283,"config":284,"footerGa":287},"Karriere",{"href":285,"dataGaName":286,"dataGaLocation":24},"/jobs/","jobs",{"dataGaName":286},{"text":248,"config":289},{"href":250,"dataGaName":251,"dataGaLocation":24},{"text":291,"config":292},"Geschäftsführung",{"href":293,"dataGaName":294,"dataGaLocation":24},"/company/team/e-group/","leadership",{"text":296,"config":297},"Team",{"href":298,"dataGaName":299,"dataGaLocation":24},"/company/team/","team",{"text":301,"config":302},"Handbuch",{"href":303,"dataGaName":304,"dataGaLocation":24},"https://handbook.gitlab.com/","handbook",{"text":306,"config":307},"Investor Relations",{"href":308,"dataGaName":309,"dataGaLocation":24},"https://ir.gitlab.com/","investor relations",{"text":311,"config":312},"Trust Center",{"href":313,"dataGaName":314,"dataGaLocation":24},"/de-de/security/","trust center",{"text":316,"config":317},"AI Transparency Center",{"href":318,"dataGaName":319,"dataGaLocation":24},"/de-de/ai-transparency-center/","ai transparency center",{"text":321,"config":322},"Newsletter",{"href":323,"dataGaName":324,"dataGaLocation":24},"/company/contact/#contact-forms","newsletter",{"text":326,"config":327},"Presse",{"href":328,"dataGaName":329,"dataGaLocation":24},"/press/","press",{"text":331,"config":332,"lists":333},"Kontakt",{"dataNavLevelOne":273},[334],{"items":335},[336,339,344],{"text":31,"config":337},{"href":33,"dataGaName":338,"dataGaLocation":24},"talk to sales",{"text":340,"config":341},"Support-Portal",{"href":342,"dataGaName":343,"dataGaLocation":24},"https://support.gitlab.com","support portal",{"text":345,"config":346},"Kundenportal",{"href":347,"dataGaName":348,"dataGaLocation":24},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"close":350,"login":351,"suggestions":358},"Schließen",{"text":352,"link":353},"Um Repositories und Projekte zu durchsuchen, melde dich an bei",{"text":354,"config":355},"gitlab.com",{"href":38,"dataGaName":356,"dataGaLocation":357},"search login","search",{"text":359,"default":360},"Vorschläge",[361,363,368,370,375,380],{"text":53,"config":362},{"href":58,"dataGaName":53,"dataGaLocation":357},{"text":364,"config":365},"Code Suggestions (KI)",{"href":366,"dataGaName":367,"dataGaLocation":357},"/de-de/solutions/code-suggestions/","Code Suggestions (AI)",{"text":87,"config":369},{"href":89,"dataGaName":87,"dataGaLocation":357},{"text":371,"config":372},"GitLab auf AWS",{"href":373,"dataGaName":374,"dataGaLocation":357},"/de-de/partners/technology-partners/aws/","GitLab on AWS",{"text":376,"config":377},"GitLab auf Google Cloud",{"href":378,"dataGaName":379,"dataGaLocation":357},"/de-de/partners/technology-partners/google-cloud-platform/","GitLab on Google Cloud",{"text":381,"config":382},"Warum GitLab?",{"href":66,"dataGaName":383,"dataGaLocation":357},"Why GitLab?",{"freeTrial":385,"mobileIcon":390,"desktopIcon":395,"secondaryButton":398},{"text":386,"config":387},"Kostenlos testen",{"href":388,"dataGaName":29,"dataGaLocation":389},"https://gitlab.com/-/trials/new/","nav",{"altText":391,"config":392},"GitLab-Symbol",{"src":393,"dataGaName":394,"dataGaLocation":389},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203874/jypbw1jx72aexsoohd7x.svg","gitlab icon",{"altText":391,"config":396},{"src":397,"dataGaName":394,"dataGaLocation":389},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203875/gs4c8p8opsgvflgkswz9.svg",{"text":179,"config":399},{"href":400,"dataGaName":401,"dataGaLocation":389},"https://gitlab.com/-/trial_registrations/new?glm_source=about.gitlab.com/de-de/compare/gitlab-vs-github/","get started",{"freeTrial":403,"mobileIcon":408,"desktopIcon":410},{"text":404,"config":405},"Erfahre mehr über GitLab Duo",{"href":406,"dataGaName":407,"dataGaLocation":389},"/de-de/gitlab-duo/","gitlab duo",{"altText":391,"config":409},{"src":393,"dataGaName":394,"dataGaLocation":389},{"altText":391,"config":411},{"src":397,"dataGaName":394,"dataGaLocation":389},{"freeTrial":413,"mobileIcon":418,"desktopIcon":420},{"text":414,"config":415},"Zurück zur Preisübersicht",{"href":167,"dataGaName":416,"dataGaLocation":389,"icon":417},"back to pricing","GoBack",{"altText":391,"config":419},{"src":393,"dataGaName":394,"dataGaLocation":389},{"altText":391,"config":421},{"src":397,"dataGaName":394,"dataGaLocation":389},{"title":423,"button":424,"config":429},"Sieh dir an, wie agentische KI die Softwarebereitstellung transformiert",{"text":425,"config":426},"GitLab Transcend jetzt ansehen",{"href":427,"dataGaName":428,"dataGaLocation":24},"/de-de/events/transcend/virtual/","transcend event",{"layout":430,"icon":431},"release","AiStar",{"data":433},{"text":434,"source":435,"edit":441,"contribute":446,"config":451,"items":456,"minimal":629},"Git ist eine Marke von Software Freedom Conservancy und unsere Verwendung von „GitLab“ erfolgt unter Lizenz.",{"text":436,"config":437},"Quelltext der Seite anzeigen",{"href":438,"dataGaName":439,"dataGaLocation":440},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":442,"config":443},"Diese Seite bearbeiten",{"href":444,"dataGaName":445,"dataGaLocation":440},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":447,"config":448},"Beteilige dich",{"href":449,"dataGaName":450,"dataGaLocation":440},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":452,"facebook":453,"youtube":454,"linkedin":455},"https://x.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[457,480,535,562,596],{"title":42,"links":458,"subMenu":463},[459],{"text":460,"config":461},"DevSecOps-Plattform",{"href":51,"dataGaName":462,"dataGaLocation":440},"devsecops platform",[464],{"title":165,"links":465},[466,470,475],{"text":467,"config":468},"Tarife anzeigen",{"href":167,"dataGaName":469,"dataGaLocation":440},"view plans",{"text":471,"config":472},"Vorteile von Premium",{"href":473,"dataGaName":474,"dataGaLocation":440},"/de-de/pricing/premium/","why premium",{"text":476,"config":477},"Vorteile von Ultimate",{"href":478,"dataGaName":479,"dataGaLocation":440},"/de-de/pricing/ultimate/","why ultimate",{"title":481,"links":482},"Lösungen",[483,488,491,493,498,503,507,510,513,518,520,522,525,530],{"text":484,"config":485},"Digitale Transformation",{"href":486,"dataGaName":487,"dataGaLocation":440},"/de-de/topics/digital-transformation/","digital transformation",{"text":489,"config":490},"Sicherheit und Compliance",{"href":107,"dataGaName":114,"dataGaLocation":440},{"text":99,"config":492},{"href":83,"dataGaName":84,"dataGaLocation":440},{"text":494,"config":495},"Agile Entwicklung",{"href":496,"dataGaName":497,"dataGaLocation":440},"/de-de/solutions/agile-delivery/","agile delivery",{"text":499,"config":500},"Cloud-Transformation",{"href":501,"dataGaName":502,"dataGaLocation":440},"/de-de/topics/cloud-native/","cloud transformation",{"text":504,"config":505},"SCM",{"href":96,"dataGaName":506,"dataGaLocation":440},"source code management",{"text":87,"config":508},{"href":89,"dataGaName":509,"dataGaLocation":440},"continuous integration & delivery",{"text":137,"config":511},{"href":139,"dataGaName":512,"dataGaLocation":440},"value stream management",{"text":514,"config":515},"GitOps",{"href":516,"dataGaName":517,"dataGaLocation":440},"/de-de/solutions/gitops/","gitops",{"text":150,"config":519},{"href":152,"dataGaName":153,"dataGaLocation":440},{"text":155,"config":521},{"href":157,"dataGaName":158,"dataGaLocation":440},{"text":523,"config":524},"Öffentlicher Sektor",{"href":162,"dataGaName":163,"dataGaLocation":440},{"text":526,"config":527},"Bildungswesen",{"href":528,"dataGaName":529,"dataGaLocation":440},"/de-de/solutions/education/","education",{"text":531,"config":532},"Finanzdienstleistungen",{"href":533,"dataGaName":534,"dataGaLocation":440},"/de-de/solutions/finance/","financial services",{"title":170,"links":536},[537,539,541,543,546,548,550,552,554,556,558,560],{"text":182,"config":538},{"href":184,"dataGaName":185,"dataGaLocation":440},{"text":187,"config":540},{"href":189,"dataGaName":190,"dataGaLocation":440},{"text":192,"config":542},{"href":194,"dataGaName":195,"dataGaLocation":440},{"text":197,"config":544},{"href":199,"dataGaName":545,"dataGaLocation":440},"docs",{"text":220,"config":547},{"href":222,"dataGaName":223,"dataGaLocation":440},{"text":215,"config":549},{"href":217,"dataGaName":218,"dataGaLocation":440},{"text":225,"config":551},{"href":227,"dataGaName":228,"dataGaLocation":440},{"text":233,"config":553},{"href":235,"dataGaName":236,"dataGaLocation":440},{"text":238,"config":555},{"href":240,"dataGaName":241,"dataGaLocation":440},{"text":243,"config":557},{"href":245,"dataGaName":246,"dataGaLocation":440},{"text":248,"config":559},{"href":250,"dataGaName":251,"dataGaLocation":440},{"text":253,"config":561},{"href":255,"dataGaName":256,"dataGaLocation":440},{"title":271,"links":563},[564,566,568,570,572,574,576,580,585,587,589,591],{"text":278,"config":565},{"href":280,"dataGaName":273,"dataGaLocation":440},{"text":283,"config":567},{"href":285,"dataGaName":286,"dataGaLocation":440},{"text":291,"config":569},{"href":293,"dataGaName":294,"dataGaLocation":440},{"text":296,"config":571},{"href":298,"dataGaName":299,"dataGaLocation":440},{"text":301,"config":573},{"href":303,"dataGaName":304,"dataGaLocation":440},{"text":306,"config":575},{"href":308,"dataGaName":309,"dataGaLocation":440},{"text":577,"config":578},"Sustainability",{"href":579,"dataGaName":577,"dataGaLocation":440},"/sustainability/",{"text":581,"config":582},"Vielfalt, Inklusion und Zugehörigkeit",{"href":583,"dataGaName":584,"dataGaLocation":440},"/de-de/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":311,"config":586},{"href":313,"dataGaName":314,"dataGaLocation":440},{"text":321,"config":588},{"href":323,"dataGaName":324,"dataGaLocation":440},{"text":326,"config":590},{"href":328,"dataGaName":329,"dataGaLocation":440},{"text":592,"config":593},"Transparenzerklärung zu moderner Sklaverei",{"href":594,"dataGaName":595,"dataGaLocation":440},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":597,"links":598},"Nimm Kontakt auf",[599,602,607,609,614,619,624],{"text":600,"config":601},"Sprich mit einem Experten/einer Expertin",{"href":33,"dataGaName":34,"dataGaLocation":440},{"text":603,"config":604},"Support",{"href":605,"dataGaName":606,"dataGaLocation":440},"/support/","get help",{"text":345,"config":608},{"href":347,"dataGaName":348,"dataGaLocation":440},{"text":610,"config":611},"Status",{"href":612,"dataGaName":613,"dataGaLocation":440},"https://status.gitlab.com/","status",{"text":615,"config":616},"Nutzungsbedingungen",{"href":617,"dataGaName":618,"dataGaLocation":440},"/terms/","terms of use",{"text":620,"config":621},"Datenschutzerklärung",{"href":622,"dataGaName":623,"dataGaLocation":440},"/de-de/privacy/","privacy statement",{"text":625,"config":626},"Cookie-Einstellungen",{"dataGaName":627,"dataGaLocation":440,"id":628,"isOneTrustButton":13},"cookie preferences","ot-sdk-btn",{"items":630},[631,633,635],{"text":615,"config":632},{"href":617,"dataGaName":618,"dataGaLocation":440},{"text":620,"config":634},{"href":622,"dataGaName":623,"dataGaLocation":440},{"text":625,"config":636},{"dataGaName":627,"dataGaLocation":440,"id":628,"isOneTrustButton":13},[638,649,660,671,681,692,702,712,720,730,740,749,760,770,782,791,800,810,820,830,839,849,859,868,879,889,897,908,917,926,936,943,952,961,970,979,988,997,1006,1015,1025,1034,1044,1053,1063,1074,1084,1094,1104,1113,1124,1135,1145,1154,1163,1172,1181,1190,1200],{"content":639,"config":647},{"title":640,"heroImage":641,"category":642,"description":643,"authors":644,"date":646},"KI erkennt Schwachstellen – aber wer verantwortet das Risiko?","https://res.cloudinary.com/about-gitlab-com/image/upload/v1772195014/ooezwusxjl1f7ijfmbvj.png","ai-ml","KI-gestützte Schwachstellenerkennung entwickelt sich schnell, doch Durchsetzung, Governance und Supply-Chain-Sicherheit erfordern eine integrierte Plattform.",[645],"Omer Azaria","2026-02-27",{"slug":648,"externalUrl":-1},"ai-can-detect-vulnerabilities-but-who-governs-risk",{"content":650,"config":658},{"title":651,"heroImage":652,"category":653,"description":654,"authors":655,"date":657},"Passkeys jetzt für passwortlosen Login und 2FA bei GitLab verfügbar","https://res.cloudinary.com/about-gitlab-com/image/upload/v1772029801/qk75nu1eezxa6aiefpup.png","bulletin-board","Passkey für das eigene Konto registrieren und Zwei-Faktor-Authentifizierung als Phishing-resistente Methode nutzen.",[656],"GitLab","2026-02-25",{"slug":659,"externalUrl":-1},"passkeys-now-available-for-passwordless-sign-in-and-2fa-on-gitlab",{"content":661,"config":669},{"title":662,"heroImage":663,"category":10,"description":664,"authors":665,"date":668},"Schwachstellen-Behebung mit dem aktualisierten GitLab Security Dashboard verfolgen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1771438388/t6sts5qw4z8561gtlxiq.png","Behebungsmaßnahmen in risikoreichen Projekten priorisieren und Fortschritte mit Schwachstellen-Insights messen.",[666,667],"Alisa Ho","Mike Clausen","2026-02-19",{"slug":670,"externalUrl":-1},"track-vulnerability-remediation-with-the-updated-gitlab-security-dashboard",{"content":672,"config":679},{"title":673,"heroImage":674,"category":10,"description":675,"authors":676,"date":678},"OWASP Top 10 2025: Was sich geändert hat und warum es wichtig ist","https://res.cloudinary.com/about-gitlab-com/image/upload/v1759320418/xjmqcozxzt4frx0hori3.png","Neue Supply-Chain- und Error-Handling-Risiken, Ranking-Verschiebungen und Remediation-Strategien für alle 10 Kategorien.",[677],"Fernando Diaz","2026-02-17",{"slug":680,"externalUrl":-1},"2025-owasp-top-10-whats-changed-and-why-it-matters",{"content":682,"config":690},{"title":683,"heroImage":684,"category":685,"description":686,"authors":687,"date":689},"KI verändert DevSecOps: Triff GitLab und erfahre, was als Nächstes kommt","https://res.cloudinary.com/about-gitlab-com/image/upload/v1767982271/e9ogyosmuummq7j65zqg.png","devsecops","Komm am 10. Februar 2026 auf die GitLab Transcend in München oder sei online live dabei. Finde heraus, wie du Produktivitätsgewinne mit Qualität, Zuverlässigkeit und Sicherheit in Einklang bringst.",[688],"Manav Khurana","2026-01-12",{"slug":691,"externalUrl":-1},"ai-is-reshaping-devsecops-attend-gitlab-transcend-to-see-whats-next",{"content":693,"config":700},{"title":694,"heroImage":695,"category":10,"description":696,"authors":697,"date":699},"GitLab.com-Sicherheit stärken: Verpflichtende Multi-Faktor-Authentifizierung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664923/Blog/Hero%20Images/security-checklist.png","Erfahre, wie GitLab verpflichtende Multi-Faktor-Authentifizierung als Teil des Secure-by-Design-Commitments umsetzt und was das für Nutzer bedeutet.",[698],"Kim Waters","2026-01-09",{"slug":701,"externalUrl":-1},"strengthening-gitlab-com-security-mandatory-multi-factor-authentication",{"content":703,"config":710},{"title":704,"heroImage":705,"category":10,"description":706,"authors":707,"date":709},"3 Signale: Wann werden Premium-Security-Funktionen für dein Team sinnvoll?","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664299/Blog/Hero%20Images/AdobeStock_887599633.jpg","Permissions-Management kostet mehr Zeit als Entwicklung? Reviews blockieren? Premium-Funktionen automatisieren Zugriffskontrolle und erfüllen NIS2-Anforderungen.",[708],"Julie Griffin","2026-01-07",{"slug":711,"externalUrl":-1},"3-signs-your-team-is-ready-to-uplevel-security-controls-in-gitlab",{"content":713,"config":718},{"title":714,"heroImage":715,"category":10,"description":716,"authors":717,"date":709},"So priorisierst du Schwachstellen intelligent – ein Tutorial","https://res.cloudinary.com/about-gitlab-com/image/upload/v1756122536/akivvcnafog9c4dhhzkp.png","Der GitLab Duo Security Agent automatisiert Vulnerability-Triage mit SAST, DAST und Dependency Scanning, erfüllt ISO 27001.",[677],{"slug":719,"externalUrl":-1},"vulnerability-triage-made-simple-with-gitlab-security-analyst-agent",{"content":721,"config":728},{"title":722,"heroImage":723,"category":10,"description":724,"authors":725,"date":727},"Credential-Leaks in Repositories verhindern – dank systematischer Absicherung mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749665667/Blog/Hero%20Images/built-in-security.jpg","Dreistufige Secret-Absicherung mit GitLab: Push Protection, Pipeline-Detection und Client-Scanning verhindern Credential-Leaks. Plus Incident-Response-Schritte.",[726],"Matt Coons","2026-01-06",{"slug":729,"externalUrl":-1},"best-practices-to-keep-secrets-out-of-gitlab-repositories",{"content":731,"config":738},{"title":732,"heroImage":733,"category":642,"description":734,"authors":735,"date":727},"KI-gestützte Incident-Reports – strukturierte Dokumentation für NIS2- und ISO-Compliance","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098339/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%285%29_1iy516k40hwBDChKcUJ2zb_1750098339103.png","KI-gestützte Incident-Dokumentation für NIS2/ISO-Compliance: Strukturierte Reports, Root-Cause-Analysen und Audit-Trails. Mit Use-Case-Beispielen.",[736,737],"Valentine Mairet","David O'Regan",{"slug":739,"externalUrl":-1},"how-to-leverage-gitlab-duo-for-enhanced-security-reporting",{"content":741,"config":747},{"title":742,"heroImage":743,"category":10,"description":744,"authors":745,"date":727},"Von Compliance-Workflows zu Sicherheitsrichtlinien – wie, warum, wann","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098128/Blog/Hero%20Images/Blog/Hero%20Images/security-checklist_security-checklist.png_1750098128272.png","Migration von Compliance Pipelines zu Pipeline Execution Policies. Systematischer Workflow erfüllt ISO 27001 A.8.32 Änderungsmanagement. Timeline 17.3 bis 19.0.",[746],"Ian Khor",{"slug":748,"externalUrl":-1},"why-gitlab-is-deprecating-compliance-pipelines-in-favor-of-security-policies",{"content":750,"config":758},{"title":751,"heroImage":752,"category":753,"description":754,"authors":755,"date":757},"GitLab 18.7: Kontrollierte KI-Integration für DevSecOps","https://res.cloudinary.com/about-gitlab-com/image/upload/v1766061346/qky0m84chjftwmyk4kml.png","product","GitLab 18.7 erweitert KI-Governance mit Warn Mode, granularer Modellauswahl und Audit-Funktionen. Systematische AI-Adoption für Compliance.",[756],"Bill Staples","2025-12-18",{"slug":759,"externalUrl":-1},"gitlab-18-7-advancing-ai-automation",{"content":761,"config":768},{"title":762,"heroImage":674,"category":763,"description":764,"authors":765,"date":767},"Warnung vor neuer Betrugsmasche: Scammer geben sich als Recruiter aus","news","Informationen zu diesen Scams, die gezielt auf Jobsuchende abzielen, sowie Gegenmaßnahmen von GitLab und Schutzmaßnahmen für mögliche Opfer.",[766],"Hasan Chawich","2025-12-10",{"slug":769,"externalUrl":-1},"new-wave-of-fake-job-scams-impersonating-recruiters",{"content":771,"config":780},{"title":772,"heroImage":773,"category":10,"description":774,"authors":775,"date":779},"RBAC mit GitLab und Keycloak automatisieren","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659561/Blog/Hero%20Images/securitycheck.png","Rollenbasierte Zugriffskontrolle – Docker-Setup und NIS2-konforme Governance-Automatisierung.",[776,777,778],"James Wormwell","Paul Meresanu","Kees Valkhof","2025-12-09",{"slug":781,"externalUrl":-1},"automating-role-based-access-control-rbac-at-scale",{"content":783,"config":789},{"title":784,"heroImage":785,"category":10,"description":786,"authors":787,"date":779},"Mit CI-Integration Python-Pakete sichern & publizieren","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749662080/Blog/Hero%20Images/AdobeStock_1097303277.jpg","Implementierung einer sicheren CI/CD-Pipeline über sechs Stufen mit der GitLab-DevSecOps-Plattform.",[788],"Tim Rizzi",{"slug":790,"externalUrl":-1},"secure-and-publish-python-packages-a-guide-to-ci-integration",{"content":792,"config":798},{"title":793,"heroImage":794,"category":10,"description":795,"authors":796,"date":797},"Personenbezogene Daten im Code erkennen – Custom PII-Detection mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097701/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%285%29_1iy516k40hwBDChKcUJ2zb_1750097700983.png","Personenbezogene Daten im Quellcode automatisch erkennen: Custom Rulesets in 5 Schritten erstellen, testen und mit GitLab Duo Chat optimieren.",[677],"2025-12-01",{"slug":799,"externalUrl":-1},"enhance-data-security-with-custom-pii-detection-rulesets",{"content":801,"config":808},{"title":802,"heroImage":723,"category":10,"description":803,"authors":804,"date":807},"GitLab identifiziert aktiven Lieferketten-Angriff auf npm","Tutorial zur systematischen Bedrohungsanalyse mit IoC-Tabelle für sofortige Überprüfung deutscher Systeme. Koordinierte Reaktion erforderlich.",[805,806],"Michael Henriksen","Daniel Abeles","2025-11-24",{"slug":809,"externalUrl":-1},"gitlab-discovers-widespread-npm-supply-chain-attack",{"content":811,"config":818},{"title":812,"heroImage":813,"category":10,"description":814,"authors":815,"date":817},"Schwachstellen systematisch managen – mit DevSecOps","https://res.cloudinary.com/about-gitlab-com/image/upload/v1758890538/ct0ffsxm1eyfeppyrnjt.jpg","Schwachstellen systematisch managen – mit GitLab DevSecOps-Workflows für NIS2-konforme Sicherheit und beschleunigte Entwicklung.",[816],"GitLab Germany Team","2025-11-18",{"slug":819,"externalUrl":-1},"what-is-vulnerability-management",{"content":821,"config":828},{"title":822,"heroImage":823,"category":10,"description":824,"authors":825,"date":827},"Verbesserte KI-Sicherheit durch Partnerschaft mit der Security-Forschung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749667636/Blog/Hero%20Images/Dedicated_Screengrab_1800x945.png","GitLab kooperiert mit Sicherheitsforscher(inne)n gegen Bedrohungen wie Prompt Injection. Der Ansatz basiert auf Responsible Disclosure und offener Kommunikation.",[826],"Kymberlee Price","2025-11-10",{"slug":829,"externalUrl":-1},"securing-ai-together-gitlabs-partnership-with-security-researchers",{"content":831,"config":837},{"title":832,"heroImage":674,"category":10,"description":833,"authors":834,"date":836},"Pipeline-Inputs: Sichere Alternative zu Pipeline-Variables","Migration zu Pipeline-Inputs bietet explizite Deklaration, Typ-Sicherheit und Validierung für sichere Pipeline-Anpassung.",[835],"Fabio Pitino","2025-11-04",{"slug":838,"externalUrl":-1},"migrate-from-pipeline-variables-to-pipeline-inputs-for-better-security",{"content":840,"config":847},{"title":841,"heroImage":842,"category":10,"description":843,"authors":844,"date":846},"GUARD-Framework für automatisierte Security-Detections","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659684/Blog/Hero%20Images/AdobeStock_479904468__1_.jpg","GUARD standardisiert Detection-Prozesse bei GitLab: Erstellung, Wartung, Alert-Routing, Metriken-Erfassung – mit Automatisierung für Security-Teams.",[845,736,726],"Harjeet Sharma","2025-11-03",{"slug":848,"externalUrl":-1},"unveiling-the-guard-framework-to-automate-security-detections-at-gitlab",{"content":850,"config":857},{"title":851,"heroImage":852,"category":10,"description":853,"authors":854,"date":856},"Cybersecurity-Bedrohungen mit GitLab CI/CD automatisieren","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749663239/Blog/Hero%20Images/AdobeStock_1023776629.jpg","Erfahre, wie GUARD Bedrohungen durch GitLab CI/CD automatisiert – mit systematischer Validierung, Peer-Review-Prozessen und Quality-Gates für SIEM-Detections.",[855],"Mitra Jozenazemian","2025-10-30",{"slug":858,"externalUrl":-1},"automating-cybersecurity-threat-detections-with-gitlab-ci-cd",{"content":860,"config":866},{"title":861,"heroImage":674,"category":10,"description":862,"authors":863,"date":865},"Schnellere und präzisere Scans mit GitLab Advanced SAST","Neue Verbesserungen in GitLab 18.5 erhöhen Genauigkeit und Geschwindigkeit von Advanced SAST für bessere Workflows.",[864],"Salman Ladha","2025-10-21",{"slug":867,"externalUrl":-1},"delivering-faster-and-smarter-scans-with-advanced-sast",{"content":869,"config":877},{"title":870,"heroImage":871,"category":872,"description":873,"authors":874,"date":876},"Streamlit-Framework: Systematische Infrastruktur-Governance","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097447/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%284%29_3LZkiDjHLjhqEkvOvBsVKp_1750097447404.png","engineering","Das GitLab Data Team zeigt, wie frühzeitige Infrastruktur-Governance exponentiell steigende Wartungskosten verhindert. Ein systematischer Ansatz für Streamlit-Anwendungen in regulierten Umgebungen.",[875],"Radovan Bacovic","2025-10-20",{"slug":878,"externalUrl":-1},"how-we-built-a-structured-streamlit-application-framework-in-snowflake",{"content":880,"config":887},{"title":881,"heroImage":882,"category":642,"description":883,"authors":884,"date":886},"gRPC-Dokumentation automatisieren mit Duo Agent Platform","https://res.cloudinary.com/about-gitlab-com/image/upload/f_auto,q_auto,c_lfill/Blog/Hero%20Images/Workflow_1800x945","GitLab Duo Agent Platform erstellt automatisiert detaillierte gRPC-Architekturdiagramme mit vollständigen Payload-Strukturen – in Minuten statt Stunden.",[885],"Halil Coban","2025-10-10",{"slug":888,"externalUrl":-1},"accelerate-learning-with-gitlab-duo-agent-platform",{"content":890,"config":895},{"title":891,"heroImage":715,"category":10,"description":892,"authors":893,"date":894},"Systematische Anwendungssicherheit mit GitLab DAST: Compliance-Framework für deutsche Unternehmen","Wie Dynamic Application Security Testing (DAST) deutschen Unternehmen bei der systematischen Implementierung von Sicherheits-Governance und Compliance-Automation hilft.",[677],"2025-09-17",{"slug":896,"externalUrl":-1},"comprehensive-guide-to-gitlab-dast",{"content":898,"config":906},{"title":899,"heroImage":900,"category":10,"description":901,"authors":902,"date":905},"Leitfaden für das Entwickeln sicherer Retail-Apps mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1756989645/fojzxakmfdea6jfqjkrl.png","So hilft die DevSecOps-Plattform Händlern bei der Entwicklung sicherer, konformer Software für komplexe Retail-Umgebungen.",[903,904],"Itzik Gan Baruch","Rebeca Fenoy-Anthony","2025-09-04",{"slug":907,"externalUrl":-1},"a-developers-guide-to-building-secure-retail-apps-with-gitlab",{"content":909,"config":915},{"title":910,"heroImage":911,"category":642,"description":912,"authors":913,"date":914},"GitLab 18.3: KI-Orchestrierung revolutioniert die Softwareentwicklung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1755711502/wuuadis1pza3zehqohcc.png","So transformierst du das Zusammenspiel von Mensch und KI durch verbesserte Flows, Enterprise Governance und nahtlose Tool-Integration.",[756],"2025-08-21",{"slug":916,"externalUrl":-1},"gitlab-13-expanding-ai-orchestration-in-software-engineering",{"content":918,"config":924},{"title":919,"heroImage":920,"category":10,"description":921,"authors":922,"date":923},"GitLab deckt Bittensor-Diebstahlkampagne über PyPI auf","https://res.cloudinary.com/about-gitlab-com/image/upload/f_auto,q_auto,c_lfill/v1750098739/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_282096522_securitycompliance.jpeg_1750098739024.jpg","Das Vulnerability Research Team von GitLab identifizierte eine Supply-Chain-Angriffskampagne, die Typosquatting-PyPI-Pakete verwendet, um Kryptowährung aus Bittensor-Wallets durch Manipulation von Staking-Operationen zu stehlen.",[805],"2025-08-06",{"slug":925,"externalUrl":-1},"gitlab-uncovers-bittensor-theft-campaign-via-pypi",{"content":927,"config":934},{"title":928,"heroImage":929,"category":10,"description":930,"authors":931,"date":933},"Wie du das Management von Compliance-Beobachtungen mit GitLab transformierst","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749675154/Blog/Hero%20Images/blog-image-template-1800x945__8_.png","Erfahre, wie das Security-Compliance-Team von GitLab das Beobachtungsmanagement mithilfe der DevSecOps-Plattform verbessert hat und dabei Transparenz, Zusammenarbeit und Verantwortlichkeit gesteigert hat.",[932],"Madeline Lake","2025-07-24",{"slug":935,"externalUrl":-1},"how-to-transform-compliance-observation-management-with-gitlab",{"content":937,"config":941},{"title":938,"heroImage":794,"category":10,"description":939,"authors":940,"date":933},"Warum Organisationen bei der Software Supply Chain Security kämpfen","Der erste Teil dieser Serie behandelt die wichtigsten Herausforderungen, praktische Lösungsansätze und aktuelle Trends wie KI – Wissen, das jedes Entwicklungsteam braucht.",[903],{"slug":942,"externalUrl":-1},"software-supply-chain-security-guide-why-organizations-struggle",{"content":944,"config":950},{"title":945,"heroImage":946,"category":10,"description":947,"authors":948,"date":949},"Die Sichtbarkeitslücke in der Software Supply Chain Security schließen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749661926/Blog/Hero%20Images/security-patch-blog-image-r2-0506-700x400-fy25_2x.jpg","GitLab 18.2 bietet Unterstützung für umfassende Scanner-Abdeckung und Visualisierung transitiver Abhängigkeiten.",[864],"2025-07-21",{"slug":951,"externalUrl":-1},"bridging-the-visibility-gap-in-software-supply-chain-security",{"content":953,"config":959},{"title":954,"heroImage":955,"category":642,"description":956,"authors":957,"date":958},"3 Best Practices für die Softwareentwicklung im Zeitalter von LLMs","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749662523/Blog/Hero%20Images/Gartner_DevOps_Blog_Post_Cover_Image_1800x945__2_.png","Da KI die Entwicklungsgeschwindigkeit transformiert, brauchen Entwickler(innen) neue Sicherheitsgewohnheiten. Erfahre, welche das sind und wie sie im DevSecOps-Workflow eingesetzt werden.",[864],"2025-07-10",{"slug":960,"externalUrl":-1},"3-best-practices-for-building-software-in-the-era-of-llms",{"content":962,"config":968},{"title":963,"heroImage":964,"category":10,"description":965,"authors":966,"date":967},"GitLab entdeckt MongoDB Go-Modul Supply-Chain-Angriff","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098739/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_282096522_securitycompliance.jpeg_1750098739024.jpg","Erfahre, wie GitLab einen Supply-Chain-Angriff aufgedeckt hat, der Go-Entwickler(innen) durch gefälschte MongoDB-Treiber ins Visier nahm, die persistente Backdoor-Malware bereitstellen.",[805],"2025-06-30",{"slug":969,"externalUrl":-1},"gitlab-catches-mongodb-go-module-supply-chain-attack",{"content":971,"config":977},{"title":972,"heroImage":842,"category":10,"description":973,"authors":974,"date":976},"Letztes Jahr haben wir das Secure by Design-Versprechen unterzeichnet – hier ist unser Fortschritt","Erfahre mehr über GitLabs CISA-konforme Erweiterungen und Verbesserungen bei MFA, Reduzierung von Standardpasswörtern, Patches und Offenlegung von Schwachstellen.",[975],"Joseph Longo","2025-06-09",{"slug":978,"externalUrl":-1},"last-year-we-signed-the-secure-by-design-pledge-heres-our-progress",{"content":980,"config":986},{"title":981,"heroImage":982,"category":10,"description":983,"authors":984,"date":985},"So verwendest du die benutzerdefinierten Compliance Frameworks von GitLab in deiner DevSecOps-Umgebung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097104/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%284%29_3LZkiDjHLjhqEkvOvBsVKp_1750097104092.png","Erfahre, wie sich regulatorische Anforderungen durch neue Frameworks zusammen mit mehr als 50 standardmäßigen Kontrollen von lästigen Checklisten in integrierte, automatisierte Workflow-Komponenten verwandeln.",[677],"2025-04-30",{"slug":987,"externalUrl":-1},"how-to-use-gitlabs-custom-compliance-frameworks-in-your-devsecops",{"content":989,"config":995},{"title":990,"heroImage":991,"category":10,"description":992,"authors":993,"date":994},"90% weniger Audit-Zeit dank Compliance-Automatisierung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750099268/Blog/Hero%20Images/Blog/Hero%20Images/GitLab_Blog_Header_v4_YBzFAgt2EAkqQfqxNFEgj_1750099267940.svg","Custom Compliance Frameworks automatisieren NIS2- und DSGVO-Compliance. Forrester: 90% weniger Audit-Aufwand, 80 Stunden Ersparnis jährlich.",[746,864],"2025-04-17",{"slug":996,"externalUrl":-1},"introducing-custom-compliance-frameworks-in-gitlab",{"content":998,"config":1004},{"title":999,"heroImage":1000,"category":10,"description":1001,"authors":1002,"date":1003},"Bessere Anwendungssicherheit mit GitLab und HackerOne","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097503/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%2810%29_5ET24Q6i8ihqrAOkge7a1R_1750097503214.png","Erfahre mehr über die Zusammenarbeit zwischen GitLab und HackerOne und lerne, wie du eine Integration implementierst, die die Sicherheit der Anwendungen in deinem Unternehmen verbessert.",[677],"2025-04-03",{"slug":1005,"externalUrl":-1},"enhance-application-security-with-gitlab-hackerone",{"content":1007,"config":1013},{"title":1008,"heroImage":1009,"category":10,"description":1010,"authors":1011,"date":1012},"Self Hosting vs. Cloud Hosting: Die Unterschiede erklärt","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664270/Blog/Hero%20Images/AdobeStock_276584891.jpg","Self-Hosting oder Cloud? Wir zeigen dir, welche Vorteile und Nachteile diese Modell haben - und was für eine Rolle GitLab dabei spielt.",[816],"2025-02-27",{"slug":1014,"externalUrl":-1},"self-hosting-vs-cloud",{"content":1016,"config":1023},{"title":1017,"heroImage":1018,"category":10,"description":1019,"authors":1020,"date":1022},"Der ultimative Leitfaden für die Token-Verwaltung mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097408/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_1097303277_6gTk7M1DNx0tFuovupVFB1_1750097407860.jpg","Erfahre Schritt für Schritt, wie du Token identifizierst, verwaltest und schützt, um die Sicherheit in deinem gesamten Software-Entwicklungsprozess zu verbessern.",[1021],"Hakeem Abdul-Razak","2025-02-25",{"slug":1024,"externalUrl":-1},"the-ultimate-guide-to-token-management-at-gitlab",{"content":1026,"config":1032},{"title":1027,"heroImage":1028,"category":10,"description":1029,"authors":1030,"date":1031},"Security-Scanning in Air-Gapped-Umgebungen mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750099301/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_1097303277_6gTk7M1DNx0tFuovupVFB1_1750099300786.jpg","Tutorial für Security-Scanner in luftspaltgesicherten Umgebungen: Offline-Installation und Vulnerability-Detection ohne externe Abhängigkeiten.",[677],"2025-02-05",{"slug":1033,"externalUrl":-1},"tutorial-security-scanning-in-air-gapped-environments",{"content":1035,"config":1042},{"title":1036,"heroImage":1037,"category":10,"description":1038,"authors":1039,"date":1041},"Sicherheitsüberprüfung mittels GitLab Operational Scanning","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664654/Blog/Hero%20Images/AdobeStock_1172300481.jpg","Container-Vulnerabilities nach Deployment überwachen: Tutorial zu GitLab Operational Container Scanning mit Trivy für Kubernetes.",[1040],"Daniel Helfand","2025-01-29",{"slug":1043,"externalUrl":-1},"improve-security-auditing-with-gitlab-operational-container-scanning",{"content":1045,"config":1051},{"title":1046,"heroImage":1047,"category":10,"description":1048,"authors":1049,"date":1050},"GitLab-Leitfaden: SOC-2-Sicherheitsanforderungen erfüllen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750099576/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_1172300481_IGPi3TS4VzFgcqhvEdBlR_1750099575518.jpg","Verstehe die Anwendungssicherheitsfunktionen der DevSecOps-Plattform von GitLab, die den Anforderungen von System and Organization Controls 2 entsprechen.",[677],"2025-01-22",{"slug":1052,"externalUrl":-1},"guide-to-fulfilling-soc-2-security-requirements-with-gitlab",{"content":1054,"config":1061},{"title":1055,"heroImage":1056,"category":10,"description":1057,"authors":1058,"date":1060},"Dank Vulnerability Tracking 30% kürzere Audit-Zeit","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664844/Blog/Hero%20Images/AdobeStock_941867776.jpg","ICSE 2025 peer-reviewed: Syntax-Tree-Deduplizierung reduziert SAST-Audit um 30%. Evaluierung mit 3,7 Mio. Zeilen Code, Effizienz steigt über Zeit.",[1059],"Julian Thome","2025-01-21",{"slug":1062,"externalUrl":-1},"introducing-gitlab-advanced-vulnerability-tracking",{"content":1064,"config":1072},{"title":1065,"heroImage":1066,"category":10,"description":1067,"authors":1068,"date":1071},"DORA für Banken: Anforderungen und Umsetzung mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098149/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%284%29_3LZkiDjHLjhqEkvOvBsVKp_1750098149751.png","DORA-Anforderungen für Banken: Risikomanagement, Testing, Incident-Reporting und Third-Party-Governance mit GitLab systematisch erfüllen.",[1069,1070],"Joshua Carroll","Allie Holland","2025-01-15",{"slug":1073,"externalUrl":-1},"what-the-digital-operational-resilience-act-means-for-banks",{"content":1075,"config":1082},{"title":1076,"heroImage":1077,"category":685,"description":1078,"authors":1079,"date":1081},"Der ultimative CI/CD-Leitfaden: Grundlagen für die erweiterte Implementierung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749660151/Blog/Hero%20Images/blog-image-template-1800x945__26_.png","Erfahre, wie du die kontinuierliche Integration/kontinuierliche Bereitstellung modernisierst und die Entwicklung, Lieferung und Sicherheit von Pipelines automatisierst.",[1080],"Sandra Gittlen","2025-01-06",{"slug":1083,"externalUrl":-1},"ultimate-guide-to-ci-cd-fundamentals-to-advanced-implementation",{"content":1085,"config":1092},{"title":1086,"heroImage":1087,"category":763,"description":1088,"authors":1089,"date":1091},"Wirtschaftliche Gesamtauswirkungen von GitLab Ultimate: 483 % ROI über 3 Jahre","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098354/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%281%29_5XrohmuWBNuqL89BxVUzWm_1750098354056.png","Eine Untersuchung von Forrester Consulting zu GitLab Ultimate zeigte, dass die DevSecOps-Plattform die Sicherheitslage verbesserte und die 5-fache Zeit bei Sicherheitsaktivitäten eingespart werden konnte.\n",[1090],"Dave Steer","2024-11-13",{"slug":1093,"externalUrl":-1},"gitlab-ultimates-total-economic-impact-483-roi-over-3-years",{"content":1095,"config":1102},{"title":1096,"heroImage":1097,"category":763,"description":1098,"authors":1099,"date":1101},"Einführung in The Source: Einblicke in die Zukunft der Softwareentwicklung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749674616/Blog/Hero%20Images/blog-image-template-1800x945__1_.png","In unserer neuen Publikation findest du transformative Softwareentwicklungsstrategien und Ratschläge von Expert(inn)en zu neuen Technologien.",[1100],"Chandler Gibbons","2024-10-29",{"slug":1103,"externalUrl":-1},"introducing-the-source-insights-for-the-future-of-software-development",{"content":1105,"config":1111},{"title":1106,"heroImage":1107,"category":10,"description":1108,"authors":1109,"date":1110},"So hilft GitLab dabei, die NIS2-Anforderungen einzuhalten","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659437/Blog/Hero%20Images/AdobeStock_398929148.jpg","Beim NIS2-Cybersicherheitsgesetz der EU geht es um Resilienz, Reaktion auf Vorfälle und Risikomanagement. Erfahre, wie GitLabs DevSecOps-Plattform helfen kann, diese Compliance-Anforderungen einzuhalten.",[975],"2024-08-20",{"slug":1112,"externalUrl":-1},"how-gitlab-helps-meet-nis2-requirements",{"content":1114,"config":1122},{"title":1115,"heroImage":1116,"category":10,"description":1117,"authors":1118,"date":1121},"FinServ: So implementierst du die Funktion zur Aufgabentrennung von GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097688/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%286%29_6vL96ttKF8zJLLqfPpvFs_1750097687913.png","Wie GitLab eine sichere Softwareentwicklung mit Aufgabentrennung im Finanzdienstleistungssektor gewährleistet, einschließlich der Einhaltung regulatorischer Rahmenbedingungen.",[1119,1120],"Cherry Han","Gavin Peltz","2024-08-13",{"slug":1123,"externalUrl":-1},"finserv-how-to-implement-gitlabs-separation-of-duties-features",{"content":1125,"config":1133},{"title":1126,"heroImage":1127,"category":642,"description":1128,"authors":1129,"date":1132},"Die Entwicklung von GitLab Duo: KI zur Behebung von Sicherheitslücken nutzen ","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098106/Blog/Hero%20Images/Blog/Hero%20Images/blog-hero-banner-1-0178-820x470-fy25_7JlF3WlEkswGQbcTe8DOTB_1750098106040.png","Dieses Tutorial zeigt, wie dir die GitLab-Duo-Funktionen zur Erläuterung und Behebung von Sicherheitslücken zusammen mit unseren anderen KI-basierten Funktionen helfen können, Sicherheitslücken schnell zu beheben.",[1130,1131],"Michael Friedrich","Alana Bellucci","2024-07-15",{"slug":1134,"externalUrl":-1},"developing-gitlab-duo-use-ai-to-remediate-security-vulnerabilities",{"content":1136,"config":1143},{"title":1137,"heroImage":1138,"category":1139,"description":1140,"authors":1141,"date":1142},"Drei überraschende Ergebnisse unserer Globalen DevSecOps-Umfrage 2024","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751993603/Blog/Hero%20Images/fy25-global-devsecops-report-blog-image.png","insights","Unsere Umfrage in diesem Jahr hat gezeigt, dass sich die Investitionsprioritäten der Unternehmen im Schatten der KI verändert haben – und wie KI die Arbeitsweise von Teams beeinflusst.",[1090],"2024-06-25",{"slug":1144,"externalUrl":-1},"3-surprising-findings-from-our-2024-global-devsecops-survey",{"content":1146,"config":1152},{"title":1147,"heroImage":1148,"category":642,"description":1149,"authors":1150,"date":1151},"Entwicklung von GitLab Duo: Sicheres und gründliches Testen von KI-generiertem Code","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097183/Blog/Hero%20Images/Blog/Hero%20Images/blog-hero-banner-1-0178-820x470-fy25_7JlF3WlEkswGQbcTe8DOTB_1750097183481.png","Erfahre Schritt für Schritt, wie du die Zuverlässigkeit und Sicherheit von KI-generiertem Code mithilfe von GitLab Duo und GitLab Pages (einschließlich Codebeispielen und Prompts) verbessern kannst.",[737],"2024-05-30",{"slug":1153,"externalUrl":-1},"how-gitlab-duo-helps-secure-and-thoroughly-test-ai-generated-code",{"content":1155,"config":1161},{"title":1156,"heroImage":1157,"category":10,"description":1158,"authors":1159,"date":1160},"GitLab Ultimate vs. GitHub Security: Der vollständige Vergleich und Migrationsleitfaden 2025","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749666187/Blog/Hero%20Images/blog-image-template-1800x945__6_.png","GitHub hat Advanced Security in zwei teure Einzelprodukte aufgeteilt. Entdecke, wie GitLab Ultimate mehr bietet und spare dabei Geld. Inklusive vollständiger Migrationsanleitung und aktuellem Feature-Vergleich 2025.",[677],"2024-05-01",{"slug":1162,"externalUrl":-1},"migration-guide-github-advanced-security-to-gitlab-ultimate",{"content":1164,"config":1170},{"title":1165,"heroImage":1166,"category":10,"description":1167,"authors":1168,"date":1169},"So integrierst du benutzerdefinierte Sicherheitsscanner in GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097082/Blog/Hero%20Images/Blog/Hero%20Images/securitycheck_securitycheck.png_1750097081856.png","Erfahre, wie du die DevSecOps-Plattform erweiterst, indem du benutzerdefinierte Sicherheitsscanner in deine Workflows einfügst (einschließlich Tutorial).",[677],"2024-02-27",{"slug":1171,"externalUrl":-1},"how-to-integrate-custom-security-scanners-into-gitlab",{"content":1173,"config":1179},{"title":1174,"heroImage":1175,"category":10,"description":1176,"authors":1177,"date":1178},"So unterstützt dich GitLab bei deiner ISO-27001-Compliance","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749662877/Blog/Hero%20Images/security-cover-new.png","GitLab ist dein strategischer Partner und hilft mit seinen Software-Sicherheitsfunktionen dabei, deine ISO-27001-Compliance sicherzustellen.",[975],"2023-09-06",{"slug":1180,"externalUrl":-1},"how-gitlab-can-support-your-iso-compliance-journey",{"content":1182,"config":1188},{"title":1183,"heroImage":1184,"category":10,"description":1185,"authors":1186,"date":1187},"Der ultimative Leitfaden zu SBOM","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664571/Blog/Hero%20Images/blog-image-template-1800x945__8_.png","Erfahre, was eine Software Bill of Materials (SBOM) ist und warum sie zu einem integralen Bestandteil der modernen Softwareentwicklung geworden ist.",[1080],"2022-10-25",{"slug":1189,"externalUrl":-1},"the-ultimate-guide-to-sboms",{"content":1191,"config":1198},{"title":1192,"heroImage":1193,"category":872,"description":1194,"authors":1195,"date":1197},"Observability vs. Monitoring in DevOps","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749665484/Blog/Hero%20Images/monitoring-update-feature-image.jpg","Observability sammelt Daten, um Prozesse zu optimieren und Probleme zu beheben. Wir zeigen dir, wie das geht - und warum es dem Monitoring überlegen ist.",[1196],"Mike Vanbuskirk","2022-06-14",{"slug":1199,"externalUrl":-1},"observability-vs-monitoring-in-devops",{"content":1201,"config":1208},{"title":1202,"heroImage":1203,"category":10,"description":1204,"authors":1205,"date":1207},"Mit GitLab Aufgabentrennung und Compliance sicherstellen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098232/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_479904468%20%281%29_4lmOEVlaXP0YC3hSFmOw6i_1750098232241.jpg","Nutze deine DevSecOps-Plattform, um die Compliance aufrechtzuerhalten, ohne die Entwicklungsgeschwindigkeit zu beeinträchtigen.",[1206,677],"Beatriz Barbosa","2022-04-04",{"slug":1209,"externalUrl":-1},"ensuring-compliance",1772652119938]