{"id":8717,"date":"2017-05-05T16:42:35","date_gmt":"2017-05-05T16:42:35","guid":{"rendered":"https:\/\/www.wallix.com\/the-role-of-privileged-access-management-in-industry-4-0\/"},"modified":"2025-11-17T16:29:47","modified_gmt":"2025-11-17T15:29:47","slug":"the-role-of-privileged-access-management-in-industry-4-0","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/","title":{"rendered":"Privileged Access Management &#038; Industrie 4.0"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lsabc860-04992cf97c19a6773842a8be6daaf652 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><li  class='avia-slideshow-slide av-lsabc860-04992cf97c19a6773842a8be6daaf652__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-40329 avia-img-lazy-loading-not-40329\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-1210x423.jpeg\" width=\"1210\" height=\"423\" title='OT SECURITY' alt='Image showing Operational Technology (OT) systems being monitored by a cybersecurity professional. The visual emphasizes the protection of critical industrial infrastructure and the importance of securing OT environments against cyber threats.'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-8717'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsa9znla-1d5f6d1fbde5b6f0c7d7f8b59ac3284e\">\n#top .av-special-heading.av-lsa9znla-1d5f6d1fbde5b6f0c7d7f8b59ac3284e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsa9znla-1d5f6d1fbde5b6f0c7d7f8b59ac3284e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsa9znla-1d5f6d1fbde5b6f0c7d7f8b59ac3284e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsa9znla-1d5f6d1fbde5b6f0c7d7f8b59ac3284e av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Privileged Access Management <span class='special_amp'>&amp;<\/span> Industrie 4.0<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/de\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >November 17, 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/de\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/de\/category\/blogpost\/industrie-de-de\/\" >INDUSTRIE<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lsaa1rsi-4796cc282fa58943170fb17853d5c19c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Industrie 4.0 nutzt F\u00e4higkeiten wie Interoperabilit\u00e4t, Datenkompatibilit\u00e4t und M2M-Kommunikation f\u00fcr industrielle Prozesse. Die neue Innovation liegt in der Vernetzung physische Systeme, Cloud-Computing und das Internets der Dinge \u00fcber die Grenzen von Unternehmen hinaus. Die Offenheit sowie die selbstverwaltende und vernetzte Natur stellen neue Anforderungen an die Sicherheit. Privileged Access Management (PAM)-L\u00f6sungen spielen dabei eine Schl\u00fcsselrolle, da sie Risiken deutlich eind\u00e4mmen.<\/p>\n<h2>Was bedeutet Industrie 4.0?<\/h2>\n<p><strong>\u00a0<\/strong>Der erste Schritt w\u00e4hrend des 18. Jahrhunderts brachte Mechanisierung mithilfe von Dampf- und Wasserkraft mit sich. Im fr\u00fchen 20. Jahrhundert leiteten Massenproduktion, Elektrizit\u00e4t und Fertigungslinien den n\u00e4chsten Level ein. Im Zuge des dritten Umbruchs, der immer noch andauert, setzt die Industrie Computer und Automatisierung ein.<\/p>\n<p>Jetzt sind wir an der Schwelle zum vierten Zeitalter: Industrie 4.0, oder \u201eintelligente Fabriken\u201c \u00e4ndern Produktionsabl\u00e4ufe und erlauben einen drastischen Sprung in den Produktionsf\u00e4higkeiten. Es handelt sich dabei um computergest\u00fctzte Ger\u00e4te (Maschinen, Sensoren, Appliances, etc.), die Prozesse \u00fcberwachen und virtuelle Kopien nicht nur von Daten, sondern auch von ihrer physischen Umgebung und dar\u00fcber hinaus, erstellen. Diese Systeme kommunizieren \u00fcber das Internet der Dinge und sind dezentral vernetzt. Befehle m\u00fcssen nicht von einer zentralen Stelle ausgehen, sondern lassen sich weit weg von operativen Bereichen umsetzen.<\/p>\n<h3>Industrie 4.0 und die Probleme Privilegierter Account Sicherheit<strong><br \/>\n<\/strong><\/h3>\n<p>Vernetzte Systeme k\u00f6nnen ihren eigenen Ausfall vorhersagen. Sie befinden sich in der Lage, automatisch Wartungsarbeiten durchzuf\u00fchren und auf Produktions\u00e4nderungen zu reagieren. Menschen k\u00f6nnen sich an jeder Entscheidung beteiligen, m\u00fcssen es aber nicht. Zuerst einmal klingt das nach erfreulichen, auf den zweiten Blick allerdings auch be\u00e4ngstigenden Nachrichten. Was geschieht im Fall eines sich selbst verwaltenden, kritischen, industriellen Systems, wenn sich jemand unberechtigt administrativen Zugang verschafft? Darin schlummert ein ernsthaftes Risikopotenzial, einschlie\u00dflich der Gefahren f\u00fcr die Maschinen-Sicherheit.<\/p>\n<p>Insgesamt setzt der Trend Industrie 4.0 Unternehmen Bedrohungen aus, indem er industrielle Systeme nach au\u00dfen \u00f6ffnet. Bisher funktionierten diese traditionell als Insell\u00f6sung. Jede Sicherheitsverletzung oder IT-St\u00f6rung in diesem Fall kann den Produktionsprozess zum Stillstand bringen. Das Personal, das diese Systeme verwaltet, ist m\u00f6glicherweise nicht genug mit den Risiken durch Vernetzung vertraut, um eine entsprechende Absicherung zu gew\u00e4hrleisten.<strong><br \/>\n<\/strong><\/p>\n<h3>PAM minimiert Schwachstellen<strong><br \/>\n<\/strong><\/h3>\n<p>Die WALLIX PAM-L\u00f6sung bietet eine Reihe von Funktionen, die sich auf die Risiken privilegierten Zugriffs in Industrie-4.0-Umgebungen beziehen. Der Betrieb vor Ort oder auf Cloud-Ebene automatisiert den Schutzes der Netzwerke vor Hackern und anderen externen Bedrohungen. Zugriffskontrolle spielt eine immer wichtigere Rolle. IT-Administratoren brauchen ein zentrales Werkzeug zur Durchsetzung und Verwaltung von Richtlinien, egal wie viele verbundene Ger\u00e4te und Endpunkte ihr Netzwerk umfasst. WALLIX bietet seinen Kunden genau diesen Ansatz. Die L\u00f6sung enth\u00e4lt einen Password Manager und Session Manager. Beide bieten eine kontinuierliche Verteidigung gegen Bedrohungen auf dem Gebiet der Zugangskontrolle in Verbindung mit Cloud-Diensten, externer Anwendungsnutzung und Nutzern dritter Parteien, die sich \u00fcberall befinden k\u00f6nnen.<\/p>\n<p>Durch ihre vereinfachte Installation, Nutzung und Kontrolle profitieren Industriebetriebe von der <strong><span style=\"color: #f4813a;\"><a style=\"color: #f4813a;\" href=\"https:\/\/www.wallix.com\/de\/produkte\/wallix-pam\/\">WALLIX PAM-L\u00f6sung<\/a><\/span><\/strong>. An st\u00e4ndige Ver\u00e4nderung passt sie sich dank ihrer agentenlosen Architektur an. Diese schlie\u00dft zudem Schwierigkeiten bei der Installation von dedizierten Software-Agenten auf einzelnen Systemen aus. Industrie-4.0-Umgebungen sind dynamisch und gegenseitig abh\u00e4ngig. Daher stellt dies einen entscheidenden Vorteil f\u00fcr die Sicherheit dar.<\/p>\n<p>Industrie 4.0 stellt eine echte Revolution bez\u00fcglich Technik und Automatisierung dar. Aber wie viele Fortschritte in der Industrie schafft sie neue Risiken. Die g\u00e4ngige Multi-Entity- oder Multi-Device-Konfiguration von Industrie 4.0 erh\u00f6ht m\u00f6glicherweise die Anf\u00e4lligkeit f\u00fcr nicht autorisierte Benutzer und unerlaubten Zugriff.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-5673408492043cfc0448520a00f34cb4 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Diesen Artikel teilen<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Privileged%20Access%20Management%20%26%20Industrie%204.0&#038;url=https:\/\/www.wallix.com\/de\/?p=8717' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Privileged%20Access%20Management%20%26%20Industrie%204.0&#038;url=https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Privileged%20Access%20Management%20%26%20Industrie%204.0&#038;body=https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-19d5f8f5267b794b148a7e582db0308a\">\n#top .av-special-heading.av-av_heading-19d5f8f5267b794b148a7e582db0308a{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-19d5f8f5267b794b148a7e582db0308a .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-19d5f8f5267b794b148a7e582db0308a .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-19d5f8f5267b794b148a7e582db0308a av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >verwandter Inhalt<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-lsaa0sg8-a466994cca4b5d7d1fd71a35015bb4c5  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-72240 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Herausforderungen bei der Implementierung: Zero Trust in OT-Umgebungen\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-17T13:57:02+01:00\" >April 17, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ot-blogpost-de\/herausforderungen-bei-der-implementierung-zero-trust-in-ot-umgebungen\/' title='Link zu: Herausforderungen bei der Implementierung: Zero Trust in OT-Umgebungen'>Herausforderungen bei der Implementierung: Zero Trust in OT-Umgebungen<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68460 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Universal Tunneling: Sichere und einfache OT-Verbindungen\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T16:11:41+01:00\" >Februar 12, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/universal-tunneling-sichere-einfache-ot-verbindungen\/' title='Link zu: Universal Tunneling: Sichere und einfache OT-Verbindungen'>Universal Tunneling: Sichere und einfache OT-Verbindungen<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68354 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Industrie 4.0: Die Absicherung der vernetzten Zukunft\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:31:03+01:00\" >Februar 12, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/industrie-4-0-die-bedeutung-der-sicherung-einer-vernetzten-zukunft-2\/' title='Link zu: Industrie 4.0: Die Absicherung der vernetzten Zukunft'>Industrie 4.0: Die Absicherung der vernetzten Zukunft<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68335 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:27:57+01:00\" >Februar 12, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-pam-die-implementierung-von-iec-62443-ermoeglicht\/' title='Link zu: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt'>Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68309 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:45:11+01:00\" >Februar 12, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/das-entscheidende-bindeglied-iec-62443-standards-zum-schutz-industrieller-cyber-oekosysteme\/' title='Link zu: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme'>Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973\">\n#top .av-special-heading.av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Ressourcen<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-lsaa0le8-51d6e5db8c93e9629d8a7781fb2ba98f  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-67431 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-30T11:55:34+01:00\" >Dezember 30, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/3-strategien-fuer-den-sicheren-fernzugriff\/' title='Link zu: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff'>Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-69406 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Download Vital Link: Implementierung der Norm IEC-62443 mit WALLIX PAM4OT\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-29T13:54:15+01:00\" >April 29, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/implementierung-norm-iec-62443-mit-wallix-pam4ot\/' title='Link zu: Download Vital Link: Implementierung der Norm IEC-62443 mit WALLIX PAM4OT'>Download Vital Link: Implementierung der Norm IEC-62443 mit WALLIX PAM4OT<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":40329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1641,1751],"tags":[],"class_list":["post-8717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-industrie-de-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privileged Access Management &amp; Industrie 4.0 - WALLIX<\/title>\n<meta name=\"description\" content=\"As digital technology and the Internet undergo constant change, users\u2019 habits shift along with them, magnifying as a result their demands for speed and availability on the objects and tools that they use on a daily basis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privileged Access Management &amp; Industrie 4.0 - WALLIX\" \/>\n<meta property=\"og:description\" content=\"As digital technology and the Internet undergo constant change, users\u2019 habits shift along with them, magnifying as a result their demands for speed and availability on the objects and tools that they use on a daily basis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-05T16:42:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T15:29:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Privileged Access Management &#038; Industrie 4.0\",\"datePublished\":\"2017-05-05T16:42:35+00:00\",\"dateModified\":\"2025-11-17T15:29:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/\"},\"wordCount\":2325,\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"INDUSTRIE\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/\",\"url\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/\",\"name\":\"Privileged Access Management & Industrie 4.0 - WALLIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg\",\"datePublished\":\"2017-05-05T16:42:35+00:00\",\"dateModified\":\"2025-11-17T15:29:47+00:00\",\"description\":\"As digital technology and the Internet undergo constant change, users\u2019 habits shift along with them, magnifying as a result their demands for speed and availability on the objects and tools that they use on a daily basis.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Robotic Process Automation engineer using laptop for smart factory automation software. digital transformation, artificial intelligence, machine learning 5g to control ai robot. Smart factory automation and industry 4.0 concept with connected production robots data with internet of things (IoT) and cloud computing technology, businessman touching interface with icons in gears. Equipment Production. Automated Robot Arm Assembly Line. Ai generated illustration.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wallix.com\/de\/#website\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wallix.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/wallixcom\",\"https:\/\/www.linkedin.com\/company\/wallix\/\",\"https:\/\/www.youtube.com\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\/\/www.wallix.com\/de\/author\/alex\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privileged Access Management & Industrie 4.0 - WALLIX","description":"As digital technology and the Internet undergo constant change, users\u2019 habits shift along with them, magnifying as a result their demands for speed and availability on the objects and tools that they use on a daily basis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/","og_locale":"de_DE","og_type":"article","og_title":"Privileged Access Management & Industrie 4.0 - WALLIX","og_description":"As digital technology and the Internet undergo constant change, users\u2019 habits shift along with them, magnifying as a result their demands for speed and availability on the objects and tools that they use on a daily basis.","og_url":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/","og_site_name":"WALLIX","article_published_time":"2017-05-05T16:42:35+00:00","article_modified_time":"2025-11-17T15:29:47+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Privileged Access Management &#038; Industrie 4.0","datePublished":"2017-05-05T16:42:35+00:00","dateModified":"2025-11-17T15:29:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/"},"wordCount":2325,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg","articleSection":["BLOGPOST","INDUSTRIE"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/","url":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/","name":"Privileged Access Management & Industrie 4.0 - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg","datePublished":"2017-05-05T16:42:35+00:00","dateModified":"2025-11-17T15:29:47+00:00","description":"As digital technology and the Internet undergo constant change, users\u2019 habits shift along with them, magnifying as a result their demands for speed and availability on the objects and tools that they use on a daily basis.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/blogpost\/the-role-of-privileged-access-management-in-industry-4-0\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/OT-scaled.jpeg","width":2560,"height":1707,"caption":"Robotic Process Automation engineer using laptop for smart factory automation software. digital transformation, artificial intelligence, machine learning 5g to control ai robot. Smart factory automation and industry 4.0 concept with connected production robots data with internet of things (IoT) and cloud computing technology, businessman touching interface with icons in gears. Equipment Production. Automated Robot Arm Assembly Line. Ai generated illustration."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/8717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=8717"}],"version-history":[{"count":11,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/8717\/revisions"}],"predecessor-version":[{"id":80374,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/8717\/revisions\/80374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/40329"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=8717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=8717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=8717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}