{"id":17464,"date":"2024-10-04T08:28:44","date_gmt":"2024-10-04T06:28:44","guid":{"rendered":"https:\/\/sits.com\/verschluesselung-in-den-griff-bekommen\/"},"modified":"2024-11-06T10:42:56","modified_gmt":"2024-11-06T09:42:56","slug":"getting-a-grip-on-cryptography","status":"publish","type":"post","link":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/","title":{"rendered":"Getting a Grip on Cryptography"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<h2  class=\"h2 smx-headline \">Getting a Grip on Cryptography<\/h2>[vc_column_text]<strong>Cryptography isn\u2019t usually considered a \u2018sexy\u2019 subject in the complex field of cybersecurity. When cryptography is included in an IT security roadmap, it\u2019s often only as a box that needs to be ticked off; a red flag as part of an audit, or an overdue update for a component that doesn\u2019t want to return to an older standard. And more and more often, we come across something in the cloud that simply refuses to work if you leave out the cryptography. That seems to occur more frequently these days and putting it off today doesn\u2019t make it go away. This issue causes a lot of headaches in every corner of the security world, driven in part by confusing regulations and incomprehensible technical instructions. It\u2019s always a chore, without obvious added value, which doesn\u2019t make it any easier to convince the people in charge of the money.<\/strong><\/p>\n<p>This lamentation among security professionals is mostly justified. But... When you consider that almost every modern security product has a big stack of cryptography under the hood \u2013 with all the complexity that entails \u2013 then it\u2019s only logical that the topic keeps popping up again and again. And now that you\u2019ve put your infrastructure in the cloud, you can\u2019t simply slap something substandard together - or leave out the crypto entirely, like before. It wasn\u2019t so long ago that organizations forbade encryption on their own network, \u2018for security reasons\u2019. That was almost standard practice up to 2015. The idea still lives on today in some corners because encryption makes inspection impossible. There goes your antivirus and your Intrusion Protection.<br \/>\nIt\u2019s a complicated puzzle, and when you think you\u2019re done there are always some pieces left over. The topic is so universal that you can almost call it a vital technology. That means knowledge and control of cryptography is essential for effective security.<br \/>\nWithin the field of computer security, crypto is de facto one of the most important issues, because it\u2019s hidden below the surface in so many places, but there are very few organizations that give it an explicit administrative owner. So, ownership is commonly left floating between Security and IT. That causes friction and inertia, and things start to break down.<br \/>\nConsidering that, now is the time for us all to swallow that bitter pill and sink our teeth into the topic.<br \/>\nWhat we\u2019ve noticed are the side effects of three fundamental developments:<\/p>\n<ol>\n<li><strong>Upscaling:<\/strong>: The number of applications of cryptography is constantly growing due to Zero Trust and the expansion of mobile working, telecommuting and the cloud; data stored outside your own infrastructure requires encryption for storage and transport (in our typical technical jargon: deperimiterization). But at the same time, cryptographic keys are valid for shorter and shorter periods, which forces more frequent rotation and other maintenance, just for availability. This increase in scale has made the issue unavoidable for supervisory bodies (hence compliance obligations like NIS2 and DORA) and operational IT (forced by disruptions and migrations).<\/li>\n<li><strong>Shift of security <\/strong>from the network and infrastructure layers (applications, directories, RBAC, firewalls and proxies) increasingly to the data layer (storage and transport). This process is accelerating because a larger proportion of the data is stored in separate files, instead of a logical collection in applications and databases. Since we don\u2019t know exactly what and\/or where these \u2018unstructured\u2019 data are or where they are located (and thus can\u2019t quantify the risks), we must reinforce the generic security safety nets: we encrypt the locations where the data are stored (\u2018data at rest\u2019, or the file system) and those they move through (the network, or \u2018data in transit\u2019). More complexity.The security industry also promises futuristic encryption of \u2018data in use\u2019, sometimes in combination with encryption at the level of the individual file; in DLP, enclaves, and above all the \u2018Sovereign Cloud \u2013 to keep foreign intelligence services and Big Tech from spying on us. They also like to talk about C2PA \u2013 new crypto for proving the authenticity of digital content; a logical solution in the time of deepfakes and AI disinformation. This sounds complicated and it is: it guarantees extra complexity that your organization will have to deal with.<\/li>\n<li><strong>Overdue maintenance. <\/strong>We\u2019re currently going through the transition from the first generation of cryptographic technology (from around 2000) to the introduction of the second generation (starting around 2015, yet far from finished today, in 2024). The transition has been slow, because it\u2019s excruciatingly difficult and we\u2019re already beginning the first migrations to the third generation of crypto. This third generation mainly involves short-term encryption keys and more modern \u2018Post Quantum\u2019 algorithms. Talk about complicated: the looming breakthrough of Quantum computers makes it feasible to crack the keys for older algorithms, so we\u2019ll basically have to replace everything we use today with the new Post Quantum cryptography.<\/li>\n<\/ol>\n<p>Oh Boy.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Getting a grip on crypto<\/h2><div class=\"smx_global_spacer size-s\"><\/div>\n[vc_single_image image=\"17415\" img_size=\"large\" alignment=\"center\" style=\"vc_box_rounded\" add_border_to_image=\"yes\" dont_stretch_image=\"yes\" activate_fancybox=\"yes\" css=\".vc_custom_1728034632356{background-color: #ffffff !important;}\"][vc_column_text]Not everyone has come around to the insight that managing and mastering the use of cryptography (\u2018Crypto transparency\u2019) is an absolute necessity for any meaningful application of cryptography in security. To put it bluntly: if you get the cryptography wrong, you probably break the security of what you are doing. It\u2019s often presented as a low-maintenance technology, especially by the tooling salespeople. But the security it provides is actually the result of the safe handling of keys and the correct organization of processes and systems. As the scale increases and finds ever-wider applications, a thorough understanding of the technology is vital. And that requires a creative and specialized team that can improvise. Unfortunately, only the really big organizations have enough scale to handle that. The rest needs to work with a long-term supplier, that has such a team.<\/p>\n<p>This is the core value that underlies our cryptography services: serving as a sparring partner for innovation and growth, with a clear and familiar process organization, supported with suitable process automation.[\/vc_column_text]<div class=\"smx_global_spacer size-m\"><\/div>\n<h2  class=\"h2 smx-headline \">Our approach<\/h2>[vc_column_text]Getting a grip on cryptography within an organization demands a structural approach. In our experience, that approach consists of Discovery, Onboarding (taking control), and Governance (good management).[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n[vc_single_image image=\"17420\" img_size=\"large\" alignment=\"center\" dont_stretch_image=\"yes\" activate_fancybox=\"yes\"]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Discovery<\/h2>[vc_column_text]Without insight into where you use crypto (and where you don\u2019t yet, but should be), you won\u2019t be able to field to an adequate, contemporary security, much less maintain it. Discovery is a hybrid process between a technical scan of your own network, requesting the customized internet services (provided by the world of OSINT), interviewing IT specialists and suppliers, and analyzing designs. Discovery helps you determine:<\/p>\n<ul>\n<li>Where you use crypto \u2013 and how.<\/li>\n<li>Where you don\u2019t use crypto \u2013 but should, based on your security policy<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> and architecture principles.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Onboarding<\/h2>[vc_column_text]Onboarding involves the various steps you take using what you find during Discovery. Depending on what you find, that may include registration (in asset management), inclusion in monitoring, in continuity planning, initiating improvements, or adding cryptography \u2013 all steps that are included in security management. Onboarding consists of the following steps:<\/p>\n<ol>\n<li>Inclusion in the asset inventory \u2013 the CMDB, with the status (in use\/in management (or not)\/should use crypto, but don\u2019t (or using it incorrectly), plus the date of inclusion.<\/li>\n<li>Filling in the basic data.<\/li>\n<li>The budgetary owner: who pays?\n<ol type=\"a\">\n<li>The responsible administrator (and organization): who maintains?<\/li>\n<li>The function of the system (landscape): who and what uses?<\/li>\n<\/ol>\n<\/li>\n<li>Complete administration and remediate weaknesses.\n<ol type=\"a\">\n<li>Correction of defects and omissions<\/li>\n<li>Monitoring &amp; regular inspections.<\/li>\n<li>Automate, where profitable and feasible.<\/li>\n<li>Allocating expenses.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Ideally, you wouldn\u2019t need Discovery, because the correct organization of the use of cryptographic resources is embedded in the IT tools creation process. But in the real world ... That\u2019s usually not the case. Which is why you need Discovery.<br \/>\nWithin larger organizations, the rapid increase in workloads means there is no way around using a factory-line approach, even in the short term. There\u2019s no time to lose in optimizing this process. Setting a standard for Onboarding is a good place to start.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Governance: keeping a grip<\/h2>[vc_column_text]In technology\u2019s turbulent state today, the most important thing is to stay relevant for the customer organization by offering suitable products, robust services, and the right future-proof support. The term for that today is \u2018Crypto agility\u2019: the ability to move with the current of new developments through anticipation, planning and expertise.<\/p>\n<p>Getting a grip on cryptography \u2013 and keeping it \u2013 involves every level of service:[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">The CA landscape level<\/h3>[vc_column_text]The most familiar PKI customers have existing Certificate Authorities (CAs), both internal and public. The former serves the internal namespace \u2013 the LAN- and is often a \u2018side job\u2019 for IT. The latter deals with certificates procured for the internet and is contracted out. But that doesn\u2019t automatically mean that it\u2019s done well, nor is it always secure. Often, departments and projects do it on the side. They call that \u2018best effort\u2019, which means that sometimes it turns out fine.<\/p>\n<p>But most of the time, it doesn't.<\/p>\n<p>The internal CA is responsible for consolidating, embedding, and improving where necessary. Replacement is only needed when improvement is no longer feasible, the end of the economic service life approaches, or the supplier stops offering support. Consolidating into a single infrastructure may be a good plan, but too often it\u2019s seen as an end, rather than a means. It may be more practical to give the different CAs a single front end in a portal. That can be a separate site, but you could also consider making it part of an Identity Governance application or a helpdesk portal.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">The RA facilities level<\/h3>[vc_column_text]We sometimes refer to the process side of cryptography as the Registration Authority (RA), and to the field as Certificate Governance. The RA is where Security, IT and the Business come together for day-to-day operations \u2013 where keys are requested and issued, and where the necessary authorizations are processed in an online workflow (request and attestation), if possible.<\/p>\n<p>The back end of the RA should be automated as much as possible. That means after a client system is onboarded, the cryptographic keys should be replaced automatically and on time. That saves a lot of time and effort, especially now that the keys are valid for shorter and shorter periods. Unfortunately, this integration doesn\u2019t happen on its own, so it should be a standard step in the Onboarding process. Support for the available protocols is becoming more and more common, but it certainly isn\u2019t standard practice now. The cryptographic service will have to take on its share of the workload in this area.<\/p>\n<p>A fixed element of the Onboarding process involves organizing the monitoring service (red and blue teams from both IT and Security) for the crypto user. That way you can keep a structural eye on current usage, notify users when certificates that are not renewed automatically are about to expire, and revoke certificates and access to specialist knowledge to support SOC analysts.<\/p>\n<p>And finally \u2013 especially with regard to NIS2 \u2013 Onboarding allocates the cryptography user to Disaster Recovery and Emergency Management. That naturally applies to both the core internal systems (CA and RA) and the linked clients. This is far from trivial; certificates grant privileged access to systems like APIs, RDP and SSH, but they are seldom top-of-mind among many security professionals, so that makes them a primary target of attacks. It\u2019s therefore vital for you to implement effective emergency procedures, maintain them, and test them.[\/vc_column_text]<h2  class=\"h2 smx-headline \">Conclusion<\/h2>[vc_column_text]It\u2019s clear that we have a lot of work ahead of us. So, make a plan, select an effective owner, and brace yourself: this is a tough job, and you\u2019re sure to pull a lot of skeletons out of the closet along the way. But there\u2019s no way around it and putting it off today will only make it more urgent tomorrow.<\/p>\n<p>If you need help, please don\u2019t hesitate to reach out![\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"btn-wrapper btn-center\">\n    <div class=\"btn btn btn--green\">\n        <a href=\"\/en\/request-consultation\/\" class=\"btn-text\" title=\"Beratung anfragen\">\n            Request consultation        <\/a>\n        <div><\/div>\n    <\/div> \n<\/div>[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Cryptography isn\u2019t usually considered a \u2018sexy\u2019 subject in the complex field of cybersecurity. When cryptography is included in an IT security roadmap, it\u2019s often only as a box that needs to be ticked off; a red flag as part of an audit, or an overdue update for a component that doesn\u2019t want to return to [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":9756,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[189],"tags":[],"class_list":["post-17464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iam-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Getting a Grip on Cryptography<\/title>\n<meta name=\"description\" content=\"This is the core value that underlies our cryptography services: serving as a sparring partner for innovation and growth, with a clear and familiar process organization, supported with suitable process automation.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Getting a Grip on Cryptography\" \/>\n<meta property=\"og:description\" content=\"This is the core value that underlies our cryptography services: serving as a sparring partner for innovation and growth, with a clear and familiar process organization, supported with suitable process automation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T06:28:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T09:42:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"mertensteinke_thomas_u\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mertensteinke_thomas_u\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/\"},\"author\":{\"name\":\"mertensteinke_thomas_u\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/f64402b74f651226b5432886dc6f1f1d\"},\"headline\":\"Getting a Grip on Cryptography\",\"datePublished\":\"2024-10-04T06:28:44+00:00\",\"dateModified\":\"2024-11-06T09:42:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/\"},\"wordCount\":2253,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\",\"articleSection\":[\"Identity &amp; Access Management\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/\",\"name\":\"Getting a Grip on Cryptography\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\",\"datePublished\":\"2024-10-04T06:28:44+00:00\",\"dateModified\":\"2024-11-06T09:42:56+00:00\",\"description\":\"This is the core value that underlies our cryptography services: serving as a sparring partner for innovation and growth, with a clear and familiar process organization, supported with suitable process automation.\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\",\"width\":1440,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Getting a Grip on Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/f64402b74f651226b5432886dc6f1f1d\",\"name\":\"mertensteinke_thomas_u\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6e74659f1801afa1ec4ef9d082a78528?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6e74659f1801afa1ec4ef9d082a78528?s=96&d=mm&r=g\",\"caption\":\"mertensteinke_thomas_u\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Getting a Grip on Cryptography","description":"This is the core value that underlies our cryptography services: serving as a sparring partner for innovation and growth, with a clear and familiar process organization, supported with suitable process automation.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Getting a Grip on Cryptography","og_description":"This is the core value that underlies our cryptography services: serving as a sparring partner for innovation and growth, with a clear and familiar process organization, supported with suitable process automation.","og_url":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/","og_site_name":"SITS","article_published_time":"2024-10-04T06:28:44+00:00","article_modified_time":"2024-11-06T09:42:56+00:00","og_image":[{"width":1440,"height":1440,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg","type":"image\/jpeg"}],"author":"mertensteinke_thomas_u","twitter_card":"summary_large_image","twitter_misc":{"Written by":"mertensteinke_thomas_u","Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#article","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/"},"author":{"name":"mertensteinke_thomas_u","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/f64402b74f651226b5432886dc6f1f1d"},"headline":"Getting a Grip on Cryptography","datePublished":"2024-10-04T06:28:44+00:00","dateModified":"2024-11-06T09:42:56+00:00","mainEntityOfPage":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/"},"wordCount":2253,"commentCount":0,"publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg","articleSection":["Identity &amp; Access Management"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/","url":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/","name":"Getting a Grip on Cryptography","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg","datePublished":"2024-10-04T06:28:44+00:00","dateModified":"2024-11-06T09:42:56+00:00","description":"This is the core value that underlies our cryptography services: serving as a sparring partner for innovation and growth, with a clear and familiar process organization, supported with suitable process automation.","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg","width":1440,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/en\/"},{"@type":"ListItem","position":2,"name":"Getting a Grip on Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/en\/#website","url":"https:\/\/sits.friendventure.dev\/en\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/en\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/f64402b74f651226b5432886dc6f1f1d","name":"mertensteinke_thomas_u","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6e74659f1801afa1ec4ef9d082a78528?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e74659f1801afa1ec4ef9d082a78528?s=96&d=mm&r=g","caption":"mertensteinke_thomas_u"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts\/17464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/comments?post=17464"}],"version-history":[{"count":14,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts\/17464\/revisions"}],"predecessor-version":[{"id":17481,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts\/17464\/revisions\/17481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media\/9756"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media?parent=17464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/categories?post=17464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/tags?post=17464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}