[{"data":1,"prerenderedAt":1282},["ShallowReactive",2],{"/en-us/blog/tags/security":3,"navigation-de-de":18,"banner-de-de":421,"footer-de-de":431,"security-tag-posts-de-de":636},{"id":4,"title":5,"body":6,"category":6,"config":7,"content":9,"description":6,"extension":11,"meta":12,"navigation":13,"path":14,"seo":15,"slug":6,"stem":16,"testContent":6,"type":6,"__hash__":17},"blogTags/en-us/blog/tags/security.yml","Security",null,{"template":8},"BlogTag",{"tag":10,"tagSlug":10},"security","yml",{},true,"/en-us/blog/tags/security",{},"en-us/blog/tags/security","srIxfbWda5gSbk8d4iJ7JFhzybqI_nv6VxWkV59SqPs",{"data":19},{"logo":20,"freeTrial":25,"sales":30,"login":35,"items":40,"search":349,"minimal":384,"duo":402,"pricingDeployment":411},{"config":21},{"href":22,"dataGaName":23,"dataGaLocation":24},"/de-de/","gitlab logo","header",{"text":26,"config":27},"Kostenlose Testversion anfordern",{"href":28,"dataGaName":29,"dataGaLocation":24},"https://gitlab.com/-/trial_registrations/new?glm_source=about.gitlab.com/de-de&glm_content=default-saas-trial/","free trial",{"text":31,"config":32},"Vertrieb kontaktieren",{"href":33,"dataGaName":34,"dataGaLocation":24},"/de-de/sales/","sales",{"text":36,"config":37},"Anmelden",{"href":38,"dataGaName":39,"dataGaLocation":24},"https://gitlab.com/users/sign_in/","sign in",[41,68,164,169,270,330],{"text":42,"config":43,"cards":45},"Plattform",{"dataNavLevelOne":44},"platform",[46,52,60],{"title":42,"description":47,"link":48},"Die intelligente Orchestrierungsplattform für DevSecOps",{"text":49,"config":50},"Erkunde unsere Plattform",{"href":51,"dataGaName":44,"dataGaLocation":24},"/de-de/platform/",{"title":53,"description":54,"link":55},"GitLab Duo Agent Platform","Agentische KI für den gesamten Softwareentwicklungszyklus",{"text":56,"config":57},"Lerne GitLab Duo kennen",{"href":58,"dataGaName":59,"dataGaLocation":24},"/de-de/gitlab-duo-agent-platform/","gitlab duo agent platform",{"title":61,"description":62,"link":63},"Gründe, die für GitLab sprechen","Erfahre, warum Unternehmen auf GitLab setzen",{"text":64,"config":65},"Mehr erfahren",{"href":66,"dataGaName":67,"dataGaLocation":24},"/de-de/why-gitlab/","why gitlab",{"text":69,"left":13,"config":70,"link":72,"lists":76,"footer":146},"Produkt",{"dataNavLevelOne":71},"solutions",{"text":73,"config":74},"Alle Lösungen anzeigen",{"href":75,"dataGaName":71,"dataGaLocation":24},"/de-de/solutions/",[77,102,124],{"title":78,"description":79,"link":80,"items":85},"Automatisierung","CI/CD und Automatisierung zur Beschleunigung der Bereitstellung",{"config":81},{"icon":82,"href":83,"dataGaName":84,"dataGaLocation":24},"AutomatedCodeAlt","/de-de/solutions/delivery-automation/","automated software delivery",[86,90,93,98],{"text":87,"config":88},"CI/CD",{"href":89,"dataGaLocation":24,"dataGaName":87},"/de-de/solutions/continuous-integration/",{"text":53,"config":91},{"href":58,"dataGaLocation":24,"dataGaName":92},"gitlab duo agent platform - product menu",{"text":94,"config":95},"Quellcodeverwaltung",{"href":96,"dataGaLocation":24,"dataGaName":97},"/de-de/solutions/source-code-management/","Source Code Management",{"text":99,"config":100},"Automatisierte Softwarebereitstellung",{"href":83,"dataGaLocation":24,"dataGaName":101},"Automated software delivery",{"title":103,"description":104,"link":105,"items":110},"Sicherheit","Entwickle schneller, ohne die Sicherheit zu gefährden",{"config":106},{"href":107,"dataGaName":108,"dataGaLocation":24,"icon":109},"/de-de/solutions/application-security-testing/","security and compliance","ShieldCheckLight",[111,115,120],{"text":112,"config":113},"Application Security Testing",{"href":107,"dataGaName":114,"dataGaLocation":24},"Application security testing",{"text":116,"config":117},"Schutz der Software-Lieferkette",{"href":118,"dataGaLocation":24,"dataGaName":119},"/de-de/solutions/supply-chain/","Software supply chain security",{"text":121,"config":122},"Software Compliance",{"href":123,"dataGaName":121,"dataGaLocation":24},"/de-de/solutions/software-compliance/",{"title":125,"link":126,"items":131},"Bewertung",{"config":127},{"icon":128,"href":129,"dataGaName":130,"dataGaLocation":24},"DigitalTransformation","/de-de/solutions/visibility-measurement/","visibility and measurement",[132,136,141],{"text":133,"config":134},"Sichtbarkeit und Bewertung",{"href":129,"dataGaLocation":24,"dataGaName":135},"Visibility and Measurement",{"text":137,"config":138},"Wertstrommanagement",{"href":139,"dataGaLocation":24,"dataGaName":140},"/de-de/solutions/value-stream-management/","Value Stream Management",{"text":142,"config":143},"Analysen und Einblicke",{"href":144,"dataGaLocation":24,"dataGaName":145},"/de-de/solutions/analytics-and-insights/","Analytics and insights",{"title":147,"items":148},"GitLab für",[149,154,159],{"text":150,"config":151},"Enterprise",{"href":152,"dataGaLocation":24,"dataGaName":153},"/de-de/enterprise/","enterprise",{"text":155,"config":156},"Kleinunternehmen",{"href":157,"dataGaLocation":24,"dataGaName":158},"/de-de/small-business/","small business",{"text":160,"config":161},"den öffentlichen Sektor",{"href":162,"dataGaLocation":24,"dataGaName":163},"/de-de/solutions/public-sector/","public sector",{"text":165,"config":166},"Preise",{"href":167,"dataGaName":168,"dataGaLocation":24,"dataNavLevelOne":168},"/de-de/pricing/","pricing",{"text":170,"config":171,"link":173,"lists":177,"feature":257},"Ressourcen",{"dataNavLevelOne":172},"resources",{"text":174,"config":175},"Alle Ressourcen anzeigen",{"href":176,"dataGaName":172,"dataGaLocation":24},"/de-de/resources/",[178,211,229],{"title":179,"items":180},"Erste Schritte",[181,186,191,196,201,206],{"text":182,"config":183},"Installieren",{"href":184,"dataGaName":185,"dataGaLocation":24},"/de-de/install/","install",{"text":187,"config":188},"Kurzanleitungen",{"href":189,"dataGaName":190,"dataGaLocation":24},"/de-de/get-started/","quick setup checklists",{"text":192,"config":193},"Lernen",{"href":194,"dataGaLocation":24,"dataGaName":195},"https://university.gitlab.com/","learn",{"text":197,"config":198},"Produktdokumentation",{"href":199,"dataGaName":200,"dataGaLocation":24},"https://docs.gitlab.com/","product documentation",{"text":202,"config":203},"Best-Practice-Videos",{"href":204,"dataGaName":205,"dataGaLocation":24},"/de-de/getting-started-videos/","best practice videos",{"text":207,"config":208},"Integrationen",{"href":209,"dataGaName":210,"dataGaLocation":24},"/de-de/integrations/","integrations",{"title":212,"items":213},"Entdecken",[214,219,224],{"text":215,"config":216},"Kundenerfolge",{"href":217,"dataGaName":218,"dataGaLocation":24},"/de-de/customers/","customer success stories",{"text":220,"config":221},"Blog",{"href":222,"dataGaName":223,"dataGaLocation":24},"/de-de/blog/","blog",{"text":225,"config":226},"Remote",{"href":227,"dataGaName":228,"dataGaLocation":24},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"title":230,"items":231},"Vernetzen",[232,237,242,247,252],{"text":233,"config":234},"GitLab-Services",{"href":235,"dataGaName":236,"dataGaLocation":24},"/de-de/services/","services",{"text":238,"config":239},"Community",{"href":240,"dataGaName":241,"dataGaLocation":24},"/community/","community",{"text":243,"config":244},"Forum",{"href":245,"dataGaName":246,"dataGaLocation":24},"https://forum.gitlab.com/","forum",{"text":248,"config":249},"Veranstaltungen",{"href":250,"dataGaName":251,"dataGaLocation":24},"/events/","events",{"text":253,"config":254},"Partner",{"href":255,"dataGaName":256,"dataGaLocation":24},"/de-de/partners/","partners",{"backgroundColor":258,"textColor":259,"text":260,"image":261,"link":265},"#2f2a6b","#fff","Perspektiven für die Softwareentwicklung der Zukunft",{"altText":262,"config":263},"the source promo card",{"src":264},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758208064/dzl0dbift9xdizyelkk4.svg",{"text":266,"config":267},"Lies die News",{"href":268,"dataGaName":269,"dataGaLocation":24},"/de-de/the-source/","the source",{"text":271,"config":272,"lists":274},"Unternehmen",{"dataNavLevelOne":273},"company",[275],{"items":276},[277,282,288,290,295,300,305,310,315,320,325],{"text":278,"config":279},"Über",{"href":280,"dataGaName":281,"dataGaLocation":24},"/de-de/company/","about",{"text":283,"config":284,"footerGa":287},"Karriere",{"href":285,"dataGaName":286,"dataGaLocation":24},"/jobs/","jobs",{"dataGaName":286},{"text":248,"config":289},{"href":250,"dataGaName":251,"dataGaLocation":24},{"text":291,"config":292},"Geschäftsführung",{"href":293,"dataGaName":294,"dataGaLocation":24},"/company/team/e-group/","leadership",{"text":296,"config":297},"Team",{"href":298,"dataGaName":299,"dataGaLocation":24},"/company/team/","team",{"text":301,"config":302},"Handbuch",{"href":303,"dataGaName":304,"dataGaLocation":24},"https://handbook.gitlab.com/","handbook",{"text":306,"config":307},"Investor Relations",{"href":308,"dataGaName":309,"dataGaLocation":24},"https://ir.gitlab.com/","investor relations",{"text":311,"config":312},"Trust Center",{"href":313,"dataGaName":314,"dataGaLocation":24},"/de-de/security/","trust center",{"text":316,"config":317},"AI Transparency Center",{"href":318,"dataGaName":319,"dataGaLocation":24},"/de-de/ai-transparency-center/","ai transparency center",{"text":321,"config":322},"Newsletter",{"href":323,"dataGaName":324,"dataGaLocation":24},"/company/contact/#contact-forms","newsletter",{"text":326,"config":327},"Presse",{"href":328,"dataGaName":329,"dataGaLocation":24},"/press/","press",{"text":331,"config":332,"lists":333},"Kontakt",{"dataNavLevelOne":273},[334],{"items":335},[336,339,344],{"text":31,"config":337},{"href":33,"dataGaName":338,"dataGaLocation":24},"talk to sales",{"text":340,"config":341},"Support-Portal",{"href":342,"dataGaName":343,"dataGaLocation":24},"https://support.gitlab.com","support portal",{"text":345,"config":346},"Kundenportal",{"href":347,"dataGaName":348,"dataGaLocation":24},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"close":350,"login":351,"suggestions":358},"Schließen",{"text":352,"link":353},"Um Repositories und Projekte zu durchsuchen, melde dich an bei",{"text":354,"config":355},"gitlab.com",{"href":38,"dataGaName":356,"dataGaLocation":357},"search login","search",{"text":359,"default":360},"Vorschläge",[361,363,368,370,375,380],{"text":53,"config":362},{"href":58,"dataGaName":53,"dataGaLocation":357},{"text":364,"config":365},"Code Suggestions (KI)",{"href":366,"dataGaName":367,"dataGaLocation":357},"/de-de/solutions/code-suggestions/","Code Suggestions (AI)",{"text":87,"config":369},{"href":89,"dataGaName":87,"dataGaLocation":357},{"text":371,"config":372},"GitLab auf AWS",{"href":373,"dataGaName":374,"dataGaLocation":357},"/de-de/partners/technology-partners/aws/","GitLab on AWS",{"text":376,"config":377},"GitLab auf Google Cloud",{"href":378,"dataGaName":379,"dataGaLocation":357},"/de-de/partners/technology-partners/google-cloud-platform/","GitLab on Google Cloud",{"text":381,"config":382},"Warum GitLab?",{"href":66,"dataGaName":383,"dataGaLocation":357},"Why GitLab?",{"freeTrial":385,"mobileIcon":390,"desktopIcon":395,"secondaryButton":398},{"text":386,"config":387},"Kostenlos testen",{"href":388,"dataGaName":29,"dataGaLocation":389},"https://gitlab.com/-/trials/new/","nav",{"altText":391,"config":392},"GitLab-Symbol",{"src":393,"dataGaName":394,"dataGaLocation":389},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203874/jypbw1jx72aexsoohd7x.svg","gitlab icon",{"altText":391,"config":396},{"src":397,"dataGaName":394,"dataGaLocation":389},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203875/gs4c8p8opsgvflgkswz9.svg",{"text":179,"config":399},{"href":400,"dataGaName":401,"dataGaLocation":389},"https://gitlab.com/-/trial_registrations/new?glm_source=about.gitlab.com/de-de/get-started/","get started",{"freeTrial":403,"mobileIcon":407,"desktopIcon":409},{"text":404,"config":405},"Erfahre mehr über GitLab Duo",{"href":58,"dataGaName":406,"dataGaLocation":389},"gitlab duo",{"altText":391,"config":408},{"src":393,"dataGaName":394,"dataGaLocation":389},{"altText":391,"config":410},{"src":397,"dataGaName":394,"dataGaLocation":389},{"freeTrial":412,"mobileIcon":417,"desktopIcon":419},{"text":413,"config":414},"Zurück zur Preisübersicht",{"href":167,"dataGaName":415,"dataGaLocation":389,"icon":416},"back to pricing","GoBack",{"altText":391,"config":418},{"src":393,"dataGaName":394,"dataGaLocation":389},{"altText":391,"config":420},{"src":397,"dataGaName":394,"dataGaLocation":389},{"title":422,"button":423,"config":428},"Sieh dir an, wie agentische KI die Softwarebereitstellung transformiert",{"text":424,"config":425},"GitLab Transcend jetzt ansehen",{"href":426,"dataGaName":427,"dataGaLocation":24},"/de-de/events/transcend/virtual/","transcend event",{"layout":429,"icon":430,"disabled":13},"release","AiStar",{"data":432},{"text":433,"source":434,"edit":440,"contribute":445,"config":450,"items":455,"minimal":628},"Git ist eine Marke von Software Freedom Conservancy und unsere Verwendung von „GitLab“ erfolgt unter Lizenz.",{"text":435,"config":436},"Quelltext der Seite anzeigen",{"href":437,"dataGaName":438,"dataGaLocation":439},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":441,"config":442},"Diese Seite bearbeiten",{"href":443,"dataGaName":444,"dataGaLocation":439},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":446,"config":447},"Beteilige dich",{"href":448,"dataGaName":449,"dataGaLocation":439},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":451,"facebook":452,"youtube":453,"linkedin":454},"https://x.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[456,479,534,561,595],{"title":42,"links":457,"subMenu":462},[458],{"text":459,"config":460},"DevSecOps-Plattform",{"href":51,"dataGaName":461,"dataGaLocation":439},"devsecops platform",[463],{"title":165,"links":464},[465,469,474],{"text":466,"config":467},"Tarife anzeigen",{"href":167,"dataGaName":468,"dataGaLocation":439},"view plans",{"text":470,"config":471},"Vorteile von Premium",{"href":472,"dataGaName":473,"dataGaLocation":439},"/de-de/pricing/premium/","why premium",{"text":475,"config":476},"Vorteile von Ultimate",{"href":477,"dataGaName":478,"dataGaLocation":439},"/de-de/pricing/ultimate/","why ultimate",{"title":480,"links":481},"Lösungen",[482,487,490,492,497,502,506,509,512,517,519,521,524,529],{"text":483,"config":484},"Digitale Transformation",{"href":485,"dataGaName":486,"dataGaLocation":439},"/de-de/topics/digital-transformation/","digital transformation",{"text":488,"config":489},"Sicherheit und Compliance",{"href":107,"dataGaName":114,"dataGaLocation":439},{"text":99,"config":491},{"href":83,"dataGaName":84,"dataGaLocation":439},{"text":493,"config":494},"Agile Entwicklung",{"href":495,"dataGaName":496,"dataGaLocation":439},"/de-de/solutions/agile-delivery/","agile delivery",{"text":498,"config":499},"Cloud-Transformation",{"href":500,"dataGaName":501,"dataGaLocation":439},"/de-de/topics/cloud-native/","cloud transformation",{"text":503,"config":504},"SCM",{"href":96,"dataGaName":505,"dataGaLocation":439},"source code management",{"text":87,"config":507},{"href":89,"dataGaName":508,"dataGaLocation":439},"continuous integration & delivery",{"text":137,"config":510},{"href":139,"dataGaName":511,"dataGaLocation":439},"value stream management",{"text":513,"config":514},"GitOps",{"href":515,"dataGaName":516,"dataGaLocation":439},"/de-de/solutions/gitops/","gitops",{"text":150,"config":518},{"href":152,"dataGaName":153,"dataGaLocation":439},{"text":155,"config":520},{"href":157,"dataGaName":158,"dataGaLocation":439},{"text":522,"config":523},"Öffentlicher Sektor",{"href":162,"dataGaName":163,"dataGaLocation":439},{"text":525,"config":526},"Bildungswesen",{"href":527,"dataGaName":528,"dataGaLocation":439},"/de-de/solutions/education/","education",{"text":530,"config":531},"Finanzdienstleistungen",{"href":532,"dataGaName":533,"dataGaLocation":439},"/de-de/solutions/finance/","financial services",{"title":170,"links":535},[536,538,540,542,545,547,549,551,553,555,557,559],{"text":182,"config":537},{"href":184,"dataGaName":185,"dataGaLocation":439},{"text":187,"config":539},{"href":189,"dataGaName":190,"dataGaLocation":439},{"text":192,"config":541},{"href":194,"dataGaName":195,"dataGaLocation":439},{"text":197,"config":543},{"href":199,"dataGaName":544,"dataGaLocation":439},"docs",{"text":220,"config":546},{"href":222,"dataGaName":223,"dataGaLocation":439},{"text":215,"config":548},{"href":217,"dataGaName":218,"dataGaLocation":439},{"text":225,"config":550},{"href":227,"dataGaName":228,"dataGaLocation":439},{"text":233,"config":552},{"href":235,"dataGaName":236,"dataGaLocation":439},{"text":238,"config":554},{"href":240,"dataGaName":241,"dataGaLocation":439},{"text":243,"config":556},{"href":245,"dataGaName":246,"dataGaLocation":439},{"text":248,"config":558},{"href":250,"dataGaName":251,"dataGaLocation":439},{"text":253,"config":560},{"href":255,"dataGaName":256,"dataGaLocation":439},{"title":271,"links":562},[563,565,567,569,571,573,575,579,584,586,588,590],{"text":278,"config":564},{"href":280,"dataGaName":273,"dataGaLocation":439},{"text":283,"config":566},{"href":285,"dataGaName":286,"dataGaLocation":439},{"text":291,"config":568},{"href":293,"dataGaName":294,"dataGaLocation":439},{"text":296,"config":570},{"href":298,"dataGaName":299,"dataGaLocation":439},{"text":301,"config":572},{"href":303,"dataGaName":304,"dataGaLocation":439},{"text":306,"config":574},{"href":308,"dataGaName":309,"dataGaLocation":439},{"text":576,"config":577},"Sustainability",{"href":578,"dataGaName":576,"dataGaLocation":439},"/sustainability/",{"text":580,"config":581},"Vielfalt, Inklusion und Zugehörigkeit",{"href":582,"dataGaName":583,"dataGaLocation":439},"/de-de/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":311,"config":585},{"href":313,"dataGaName":314,"dataGaLocation":439},{"text":321,"config":587},{"href":323,"dataGaName":324,"dataGaLocation":439},{"text":326,"config":589},{"href":328,"dataGaName":329,"dataGaLocation":439},{"text":591,"config":592},"Transparenzerklärung zu moderner Sklaverei",{"href":593,"dataGaName":594,"dataGaLocation":439},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":596,"links":597},"Nimm Kontakt auf",[598,601,606,608,613,618,623],{"text":599,"config":600},"Sprich mit einem Experten/einer Expertin",{"href":33,"dataGaName":34,"dataGaLocation":439},{"text":602,"config":603},"Support",{"href":604,"dataGaName":605,"dataGaLocation":439},"https://support.gitlab.com/hc/en-us/articles/11626483177756-GitLab-Support","get help",{"text":345,"config":607},{"href":347,"dataGaName":348,"dataGaLocation":439},{"text":609,"config":610},"Status",{"href":611,"dataGaName":612,"dataGaLocation":439},"https://status.gitlab.com/","status",{"text":614,"config":615},"Nutzungsbedingungen",{"href":616,"dataGaName":617,"dataGaLocation":439},"/terms/","terms of use",{"text":619,"config":620},"Datenschutzerklärung",{"href":621,"dataGaName":622,"dataGaLocation":439},"/de-de/privacy/","privacy statement",{"text":624,"config":625},"Cookie-Einstellungen",{"dataGaName":626,"dataGaLocation":439,"id":627,"isOneTrustButton":13},"cookie preferences","ot-sdk-btn",{"items":629},[630,632,634],{"text":614,"config":631},{"href":616,"dataGaName":617,"dataGaLocation":439},{"text":619,"config":633},{"href":621,"dataGaName":622,"dataGaLocation":439},{"text":624,"config":635},{"dataGaName":626,"dataGaLocation":439,"id":627,"isOneTrustButton":13},[637,647,658,669,678,688,698,708,717,728,738,748,759,768,778,787,795,804,814,823,833,843,855,864,873,883,893,903,912,922,932,940,951,961,969,980,989,998,1008,1015,1024,1033,1042,1051,1060,1069,1078,1087,1097,1106,1116,1125,1135,1146,1156,1166,1176,1185,1196,1207,1217,1226,1235,1244,1253,1262,1272],{"content":638,"config":645},{"title":639,"heroImage":640,"category":10,"description":641,"authors":642,"date":644},"KI entdeckt Zero-Days schneller, als Teams reagieren können: So bereitet man die Pipeline vor","https://res.cloudinary.com/about-gitlab-com/image/upload/v1772195014/ooezwusxjl1f7ijfmbvj.png","KI findet Schwachstellen schneller als Teams sie schließen können. Wie Pipeline-Enforcement, Triage-Automatisierung und KI-Remediation die Lücke schließen.",[643],"Omer Azaria","2026-04-20",{"slug":646,"externalUrl":-1},"prepare-your-pipeline-for-ai-discovered-zero-days",{"content":648,"config":656},{"title":649,"heroImage":650,"category":651,"description":652,"authors":653,"date":655},"GitLab 18.11: KI behebt SAST-Schwachstellen – automatisch und 'ready-to-merge'","https://res.cloudinary.com/about-gitlab-com/image/upload/v1776259080/cakqnwo5ecp255lo8lzo.png","product","GitLab 18.11 macht Agentic SAST Vulnerability Resolution allgemein verfügbar und behebt SAST-Schwachstellen per KI-Code-Fix automatisch.",[654],"Alisa Ho","2026-04-17",{"slug":657,"externalUrl":-1},"automate-remediation-with-ready-to-merge-ai-code-fixes",{"content":659,"config":667},{"title":660,"heroImage":661,"category":662,"description":663,"authors":664,"date":666},"Pipeline-Sicherheit: Lehren aus den Supply-Chain-Angriffen im März","https://res.cloudinary.com/about-gitlab-com/image/upload/v1772630163/akp8ly2mrsfrhsb0liyb.png","security-labs","Erfahre, wie zentrale Pipeline-Policies die Angriffsmuster hinter einer Reihe aktueller Supply-Chain-Attacken erkennen und blockieren können.",[665],"Grant Hickman","2026-04-07",{"slug":668,"externalUrl":-1},"pipeline-security-lessons-from-march-supply-chain-incidents",{"content":670,"config":676},{"title":671,"heroImage":672,"category":10,"description":673,"authors":674,"date":675},"GitLab 18.10 bringt KI-native Triage und Behebung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1773843921/rm35fx4gylrsu9alf2fx.png","Erfahre mehr über die Funktionen von GitLab Duo Agent Platform, die Rauschen reduzieren, echte Schwachstellen identifizieren und Ergebnisse in Lösungsvorschläge umwandeln.",[654],"2026-03-19",{"slug":677,"externalUrl":-1},"gitlab-18-10-brings-ai-native-triage-and-remediation",{"content":679,"config":686},{"title":680,"heroImage":681,"category":10,"description":682,"authors":683,"date":685},"SSO und SCIM mit Azure Entra ID – Zentralisiertes Identity-Management","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098047/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_1097303277_6gTk7M1DNx0tFuovupVFB1_1750098046895.jpg","Single Sign-On und SCIM-Benutzerbereitstellung einrichten – SAML-Konfiguration für GitLab mit Azure Entra ID.",[684],"Rob Jackson","2026-03-16",{"slug":687,"externalUrl":-1},"how-to-gitlab-single-sign-on-with-saml-scim-and-azures-entra-id",{"content":689,"config":696},{"title":690,"heroImage":691,"category":692,"description":693,"authors":694,"date":685},"Wachsende Compliance-Anforderungen meistern: bol setzt auf GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749665465/Blog/Hero%20Images/blog-image-template-1800x945__15_.png","customer-stories","Wie bol mit GitLab-Compliance-Automatisierung DSGVO, ISO und den EU AI Act erfüllt – ohne Entwicklungsgeschwindigkeit einzubüßen.",[695],"Julie Griffin",{"slug":697,"externalUrl":-1},"online-retailer-bol-tackles-growing-compliance-needs-with-gitlab",{"content":699,"config":706},{"title":700,"heroImage":701,"category":662,"description":702,"authors":703,"date":705},"Detection-Gaps automatisch analysieren mit GitLab Duo Agent Platform","https://res.cloudinary.com/about-gitlab-com/image/upload/v1773147991/op5xyroonltdwqix0x3u.png","GitLab zeigt, wie zwei KI-Agenten die Gap-Analyse nach Sicherheitsvorfällen reproduzierbar und konsistent machen – direkt im GitLab-Workflow.",[704],"Matt Coons","2026-03-10",{"slug":707,"externalUrl":-1},"automating-detection-gap-analysis-with-gitlab-duo-agent-platform",{"content":709,"config":715},{"title":710,"heroImage":640,"category":711,"description":712,"authors":713,"date":714},"KI erkennt Schwachstellen – aber wer verantwortet das Risiko?","ai-ml","KI-gestützte Schwachstellenerkennung entwickelt sich schnell, doch Durchsetzung, Governance und Supply-Chain-Sicherheit erfordern eine integrierte Plattform.",[643],"2026-02-27",{"slug":716,"externalUrl":-1},"ai-can-detect-vulnerabilities-but-who-governs-risk",{"content":718,"config":726},{"title":719,"heroImage":720,"category":721,"description":722,"authors":723,"date":725},"Passkeys jetzt für passwortlosen Login und 2FA bei GitLab verfügbar","https://res.cloudinary.com/about-gitlab-com/image/upload/v1772029801/qk75nu1eezxa6aiefpup.png","bulletin-board","Passkey für das eigene Konto registrieren und Zwei-Faktor-Authentifizierung als Phishing-resistente Methode nutzen.",[724],"GitLab","2026-02-25",{"slug":727,"externalUrl":-1},"passkeys-now-available-for-passwordless-sign-in-and-2fa-on-gitlab",{"content":729,"config":736},{"title":730,"heroImage":731,"category":10,"description":732,"authors":733,"date":735},"Schwachstellen-Behebung mit dem aktualisierten GitLab Security Dashboard verfolgen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1771438388/t6sts5qw4z8561gtlxiq.png","Behebungsmaßnahmen in risikoreichen Projekten priorisieren und Fortschritte mit Schwachstellen-Insights messen.",[654,734],"Mike Clausen","2026-02-19",{"slug":737,"externalUrl":-1},"track-vulnerability-remediation-with-the-updated-gitlab-security-dashboard",{"content":739,"config":746},{"title":740,"heroImage":741,"category":10,"description":742,"authors":743,"date":745},"OWASP Top 10 2025: Was sich geändert hat und warum es wichtig ist","https://res.cloudinary.com/about-gitlab-com/image/upload/v1759320418/xjmqcozxzt4frx0hori3.png","Neue Supply-Chain- und Error-Handling-Risiken, Ranking-Verschiebungen und Remediation-Strategien für alle 10 Kategorien.",[744],"Fernando Diaz","2026-02-17",{"slug":747,"externalUrl":-1},"2025-owasp-top-10-whats-changed-and-why-it-matters",{"content":749,"config":757},{"title":750,"heroImage":751,"category":752,"description":753,"authors":754,"date":756},"KI verändert DevSecOps: Triff GitLab und erfahre, was als Nächstes kommt","https://res.cloudinary.com/about-gitlab-com/image/upload/v1767982271/e9ogyosmuummq7j65zqg.png","devsecops","Komm am 10. Februar 2026 auf die GitLab Transcend in München oder sei online live dabei. Finde heraus, wie du Produktivitätsgewinne mit Qualität, Zuverlässigkeit und Sicherheit in Einklang bringst.",[755],"Manav Khurana","2026-01-12",{"slug":758,"externalUrl":-1},"ai-is-reshaping-devsecops-attend-gitlab-transcend-to-see-whats-next",{"content":760,"config":766},{"title":761,"heroImage":762,"category":10,"description":763,"authors":764,"date":756},"Exploitierbare Schwachstellen priorisieren – Supply-Chain-Risiken senken","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749674528/Blog/Hero%20Images/blog-image-template-1800x945__5_.png","Risikobasierte Intelligence unterscheidet zwischen 36.000 CVEs und tatsächlich exploitierbaren Bedrohungen – schnellere Triage, gezielte Remediation.",[765],"Salman Ladha",{"slug":767,"externalUrl":-1},"reduce-supply-chain-risk-with-smarter-vulnerability-prioritization",{"content":769,"config":776},{"title":770,"heroImage":771,"category":10,"description":772,"authors":773,"date":775},"GitLab.com-Sicherheit stärken: Verpflichtende Multi-Faktor-Authentifizierung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664923/Blog/Hero%20Images/security-checklist.png","Erfahre, wie GitLab verpflichtende Multi-Faktor-Authentifizierung als Teil des Secure-by-Design-Commitments umsetzt und was das für Nutzer bedeutet.",[774],"Kim Waters","2026-01-09",{"slug":777,"externalUrl":-1},"strengthening-gitlab-com-security-mandatory-multi-factor-authentication",{"content":779,"config":785},{"title":780,"heroImage":781,"category":10,"description":782,"authors":783,"date":784},"3 Signale: Wann werden Premium-Security-Funktionen für dein Team sinnvoll?","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664299/Blog/Hero%20Images/AdobeStock_887599633.jpg","Permissions-Management kostet mehr Zeit als Entwicklung? Reviews blockieren? Premium-Funktionen automatisieren Zugriffskontrolle und erfüllen NIS2-Anforderungen.",[695],"2026-01-07",{"slug":786,"externalUrl":-1},"3-signs-your-team-is-ready-to-uplevel-security-controls-in-gitlab",{"content":788,"config":793},{"title":789,"heroImage":790,"category":10,"description":791,"authors":792,"date":784},"So priorisierst du Schwachstellen intelligent – ein Tutorial","https://res.cloudinary.com/about-gitlab-com/image/upload/v1756122536/akivvcnafog9c4dhhzkp.png","Der GitLab Duo Security Agent automatisiert Vulnerability-Triage mit SAST, DAST und Dependency Scanning, erfüllt ISO 27001.",[744],{"slug":794,"externalUrl":-1},"vulnerability-triage-made-simple-with-gitlab-security-analyst-agent",{"content":796,"config":802},{"title":797,"heroImage":798,"category":10,"description":799,"authors":800,"date":801},"Credential-Leaks in Repositories verhindern – dank systematischer Absicherung mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749665667/Blog/Hero%20Images/built-in-security.jpg","Dreistufige Secret-Absicherung mit GitLab: Push Protection, Pipeline-Detection und Client-Scanning verhindern Credential-Leaks. Plus Incident-Response-Schritte.",[704],"2026-01-06",{"slug":803,"externalUrl":-1},"best-practices-to-keep-secrets-out-of-gitlab-repositories",{"content":805,"config":812},{"title":806,"heroImage":807,"category":711,"description":808,"authors":809,"date":801},"KI-gestützte Incident-Reports – strukturierte Dokumentation für NIS2- und ISO-Compliance","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098339/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%285%29_1iy516k40hwBDChKcUJ2zb_1750098339103.png","KI-gestützte Incident-Dokumentation für NIS2/ISO-Compliance: Strukturierte Reports, Root-Cause-Analysen und Audit-Trails. Mit Use-Case-Beispielen.",[810,811],"Valentine Mairet","David O'Regan",{"slug":813,"externalUrl":-1},"how-to-leverage-gitlab-duo-for-enhanced-security-reporting",{"content":815,"config":821},{"title":816,"heroImage":817,"category":10,"description":818,"authors":819,"date":801},"Von Compliance-Workflows zu Sicherheitsrichtlinien – wie, warum, wann","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098128/Blog/Hero%20Images/Blog/Hero%20Images/security-checklist_security-checklist.png_1750098128272.png","Pipeline Execution Policies sind der Nachfolger von Compliance  Pipelines – flexibler, zentraler, zukunftssicher. Zeitplan,  Hintergründe und Migrations-Workflow in vier Schritten.",[820],"Ian Khor",{"slug":822,"externalUrl":-1},"why-gitlab-is-deprecating-compliance-pipelines-in-favor-of-security-policies",{"content":824,"config":831},{"title":825,"heroImage":826,"category":651,"description":827,"authors":828,"date":830},"GitLab 18.7: Kontrollierte KI-Integration für DevSecOps","https://res.cloudinary.com/about-gitlab-com/image/upload/v1766061346/qky0m84chjftwmyk4kml.png","GitLab 18.7 erweitert KI-Governance mit Warn Mode, granularer Modellauswahl und Audit-Funktionen. Systematische AI-Adoption für Compliance.",[829],"Bill Staples","2025-12-18",{"slug":832,"externalUrl":-1},"gitlab-18-7-advancing-ai-automation",{"content":834,"config":841},{"title":835,"heroImage":741,"category":836,"description":837,"authors":838,"date":840},"Warnung vor neuer Betrugsmasche: Scammer geben sich als Recruiter aus","news","Informationen zu diesen Scams, die gezielt auf Jobsuchende abzielen, sowie Gegenmaßnahmen von GitLab und Schutzmaßnahmen für mögliche Opfer.",[839],"Hasan Chawich","2025-12-10",{"slug":842,"externalUrl":-1},"new-wave-of-fake-job-scams-impersonating-recruiters",{"content":844,"config":853},{"title":845,"heroImage":846,"category":10,"description":847,"authors":848,"date":852},"RBAC mit GitLab und Keycloak automatisieren","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659561/Blog/Hero%20Images/securitycheck.png","Rollenbasierte Zugriffskontrolle – Docker-Setup und NIS2-konforme Governance-Automatisierung.",[849,850,851],"James Wormwell","Paul Meresanu","Kees Valkhof","2025-12-09",{"slug":854,"externalUrl":-1},"automating-role-based-access-control-rbac-at-scale",{"content":856,"config":862},{"title":857,"heroImage":858,"category":10,"description":859,"authors":860,"date":852},"Mit CI-Integration Python-Pakete sichern & publizieren","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749662080/Blog/Hero%20Images/AdobeStock_1097303277.jpg","Implementierung einer sicheren CI/CD-Pipeline über sechs Stufen mit der GitLab-DevSecOps-Plattform.",[861],"Tim Rizzi",{"slug":863,"externalUrl":-1},"secure-and-publish-python-packages-a-guide-to-ci-integration",{"content":865,"config":871},{"title":866,"heroImage":867,"category":10,"description":868,"authors":869,"date":870},"Personenbezogene Daten im Code erkennen – Custom PII-Detection mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097701/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%285%29_1iy516k40hwBDChKcUJ2zb_1750097700983.png","Personenbezogene Daten im Quellcode automatisch erkennen: Custom Rulesets in 5 Schritten erstellen, testen und mit GitLab Duo Chat optimieren.",[744],"2025-12-01",{"slug":872,"externalUrl":-1},"enhance-data-security-with-custom-pii-detection-rulesets",{"content":874,"config":881},{"title":875,"heroImage":798,"category":662,"description":876,"authors":877,"date":880},"GitLab identifiziert aktiven Lieferketten-Angriff auf npm","Tutorial zur systematischen Bedrohungsanalyse mit IoC-Tabelle für sofortige Überprüfung deutscher Systeme. Koordinierte Reaktion erforderlich.",[878,879],"Michael Henriksen","Daniel Abeles","2025-11-24",{"slug":882,"externalUrl":-1},"gitlab-discovers-widespread-npm-supply-chain-attack",{"content":884,"config":891},{"title":885,"heroImage":886,"category":10,"description":887,"authors":888,"date":890},"Schwachstellen systematisch managen – mit DevSecOps","https://res.cloudinary.com/about-gitlab-com/image/upload/v1758890538/ct0ffsxm1eyfeppyrnjt.jpg","Schwachstellen systematisch managen – mit GitLab DevSecOps-Workflows für NIS2-konforme Sicherheit und beschleunigte Entwicklung.",[889],"GitLab Germany Team","2025-11-18",{"slug":892,"externalUrl":-1},"what-is-vulnerability-management",{"content":894,"config":901},{"title":895,"heroImage":896,"category":10,"description":897,"authors":898,"date":900},"Verbesserte KI-Sicherheit durch Partnerschaft mit der Security-Forschung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749667636/Blog/Hero%20Images/Dedicated_Screengrab_1800x945.png","GitLab kooperiert mit Sicherheitsforscher(inne)n gegen Bedrohungen wie Prompt Injection. Der Ansatz basiert auf Responsible Disclosure und offener Kommunikation.",[899],"Kymberlee Price","2025-11-10",{"slug":902,"externalUrl":-1},"securing-ai-together-gitlabs-partnership-with-security-researchers",{"content":904,"config":910},{"title":905,"heroImage":741,"category":10,"description":906,"authors":907,"date":909},"Pipeline-Inputs: Sichere Alternative zu Pipeline-Variables","Migration zu Pipeline-Inputs bietet explizite Deklaration, Typ-Sicherheit und Validierung für sichere Pipeline-Anpassung.",[908],"Fabio Pitino","2025-11-04",{"slug":911,"externalUrl":-1},"migrate-from-pipeline-variables-to-pipeline-inputs-for-better-security",{"content":913,"config":920},{"title":914,"heroImage":915,"category":10,"description":916,"authors":917,"date":919},"GUARD-Framework für automatisierte Security-Detections","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659684/Blog/Hero%20Images/AdobeStock_479904468__1_.jpg","GUARD standardisiert Detection-Prozesse bei GitLab: Erstellung, Wartung, Alert-Routing, Metriken-Erfassung – mit Automatisierung für Security-Teams.",[918,810,704],"Harjeet Sharma","2025-11-03",{"slug":921,"externalUrl":-1},"unveiling-the-guard-framework-to-automate-security-detections-at-gitlab",{"content":923,"config":930},{"title":924,"heroImage":925,"category":10,"description":926,"authors":927,"date":929},"Cybersecurity-Bedrohungen mit GitLab CI/CD automatisieren","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749663239/Blog/Hero%20Images/AdobeStock_1023776629.jpg","Erfahre, wie GUARD Bedrohungen durch GitLab CI/CD automatisiert – mit systematischer Validierung, Peer-Review-Prozessen und Quality-Gates für SIEM-Detections.",[928],"Mitra Jozenazemian","2025-10-30",{"slug":931,"externalUrl":-1},"automating-cybersecurity-threat-detections-with-gitlab-ci-cd",{"content":933,"config":938},{"title":934,"heroImage":741,"category":10,"description":935,"authors":936,"date":937},"Schnellere und präzisere Scans mit GitLab Advanced SAST","Neue Verbesserungen in GitLab 18.5 erhöhen Genauigkeit und Geschwindigkeit von Advanced SAST für bessere Workflows.",[765],"2025-10-21",{"slug":939,"externalUrl":-1},"delivering-faster-and-smarter-scans-with-advanced-sast",{"content":941,"config":949},{"title":942,"heroImage":943,"category":944,"description":945,"authors":946,"date":948},"Streamlit-Framework: Systematische Infrastruktur-Governance","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097447/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%284%29_3LZkiDjHLjhqEkvOvBsVKp_1750097447404.png","engineering","Das GitLab Data Team zeigt, wie frühzeitige Infrastruktur-Governance exponentiell steigende Wartungskosten verhindert. Ein systematischer Ansatz für Streamlit-Anwendungen in regulierten Umgebungen.",[947],"Radovan Bacovic","2025-10-20",{"slug":950,"externalUrl":-1},"how-we-built-a-structured-streamlit-application-framework-in-snowflake",{"content":952,"config":959},{"title":953,"heroImage":954,"category":711,"description":955,"authors":956,"date":958},"gRPC-Dokumentation automatisieren mit Duo Agent Platform","https://res.cloudinary.com/about-gitlab-com/image/upload/f_auto,q_auto,c_lfill/Blog/Hero%20Images/Workflow_1800x945","GitLab Duo Agent Platform erstellt automatisiert detaillierte gRPC-Architekturdiagramme mit vollständigen Payload-Strukturen – in Minuten statt Stunden.",[957],"Halil Coban","2025-10-10",{"slug":960,"externalUrl":-1},"accelerate-learning-with-gitlab-duo-agent-platform",{"content":962,"config":967},{"title":963,"heroImage":790,"category":10,"description":964,"authors":965,"date":966},"Systematische Anwendungssicherheit mit GitLab DAST: Compliance-Framework für deutsche Unternehmen","Wie Dynamic Application Security Testing (DAST) deutschen Unternehmen bei der systematischen Implementierung von Sicherheits-Governance und Compliance-Automation hilft.",[744],"2025-09-17",{"slug":968,"externalUrl":-1},"comprehensive-guide-to-gitlab-dast",{"content":970,"config":978},{"title":971,"heroImage":972,"category":10,"description":973,"authors":974,"date":977},"Leitfaden für das Entwickeln sicherer Retail-Apps mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1756989645/fojzxakmfdea6jfqjkrl.png","So hilft die DevSecOps-Plattform Händlern bei der Entwicklung sicherer, konformer Software für komplexe Retail-Umgebungen.",[975,976],"Itzik Gan Baruch","Rebeca Fenoy-Anthony","2025-09-04",{"slug":979,"externalUrl":-1},"a-developers-guide-to-building-secure-retail-apps-with-gitlab",{"content":981,"config":987},{"title":982,"heroImage":983,"category":711,"description":984,"authors":985,"date":986},"GitLab 18.3: KI-Orchestrierung revolutioniert die Softwareentwicklung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1755711502/wuuadis1pza3zehqohcc.png","So transformierst du das Zusammenspiel von Mensch und KI durch verbesserte Flows, Enterprise Governance und nahtlose Tool-Integration.",[829],"2025-08-21",{"slug":988,"externalUrl":-1},"gitlab-13-expanding-ai-orchestration-in-software-engineering",{"content":990,"config":996},{"title":991,"heroImage":992,"category":10,"description":993,"authors":994,"date":995},"GitLab deckt Bittensor-Diebstahlkampagne über PyPI auf","https://res.cloudinary.com/about-gitlab-com/image/upload/f_auto,q_auto,c_lfill/v1750098739/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_282096522_securitycompliance.jpeg_1750098739024.jpg","Das Vulnerability Research Team von GitLab identifizierte eine Supply-Chain-Angriffskampagne, die Typosquatting-PyPI-Pakete verwendet, um Kryptowährung aus Bittensor-Wallets durch Manipulation von Staking-Operationen zu stehlen.",[878],"2025-08-06",{"slug":997,"externalUrl":-1},"gitlab-uncovers-bittensor-theft-campaign-via-pypi",{"content":999,"config":1006},{"title":1000,"heroImage":1001,"category":10,"description":1002,"authors":1003,"date":1005},"Wie du das Management von Compliance-Beobachtungen mit GitLab transformierst","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749675154/Blog/Hero%20Images/blog-image-template-1800x945__8_.png","Erfahre, wie das Security-Compliance-Team von GitLab das Beobachtungsmanagement mithilfe der DevSecOps-Plattform verbessert hat und dabei Transparenz, Zusammenarbeit und Verantwortlichkeit gesteigert hat.",[1004],"Madeline Lake","2025-07-24",{"slug":1007,"externalUrl":-1},"how-to-transform-compliance-observation-management-with-gitlab",{"content":1009,"config":1013},{"title":1010,"heroImage":867,"category":10,"description":1011,"authors":1012,"date":1005},"Warum Organisationen bei der Software Supply Chain Security kämpfen","Der erste Teil dieser Serie behandelt die wichtigsten Herausforderungen, praktische Lösungsansätze und aktuelle Trends wie KI – Wissen, das jedes Entwicklungsteam braucht.",[975],{"slug":1014,"externalUrl":-1},"software-supply-chain-security-guide-why-organizations-struggle",{"content":1016,"config":1022},{"title":1017,"heroImage":1018,"category":10,"description":1019,"authors":1020,"date":1021},"Die Sichtbarkeitslücke in der Software Supply Chain Security schließen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749661926/Blog/Hero%20Images/security-patch-blog-image-r2-0506-700x400-fy25_2x.jpg","GitLab 18.2 bietet Unterstützung für umfassende Scanner-Abdeckung und Visualisierung transitiver Abhängigkeiten.",[765],"2025-07-21",{"slug":1023,"externalUrl":-1},"bridging-the-visibility-gap-in-software-supply-chain-security",{"content":1025,"config":1031},{"title":1026,"heroImage":1027,"category":711,"description":1028,"authors":1029,"date":1030},"3 Best Practices für die Softwareentwicklung im Zeitalter von LLMs","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749662523/Blog/Hero%20Images/Gartner_DevOps_Blog_Post_Cover_Image_1800x945__2_.png","Da KI die Entwicklungsgeschwindigkeit transformiert, brauchen Entwickler(innen) neue Sicherheitsgewohnheiten. Erfahre, welche das sind und wie sie im DevSecOps-Workflow eingesetzt werden.",[765],"2025-07-10",{"slug":1032,"externalUrl":-1},"3-best-practices-for-building-software-in-the-era-of-llms",{"content":1034,"config":1040},{"title":1035,"heroImage":1036,"category":10,"description":1037,"authors":1038,"date":1039},"GitLab entdeckt MongoDB Go-Modul Supply-Chain-Angriff","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098739/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_282096522_securitycompliance.jpeg_1750098739024.jpg","Erfahre, wie GitLab einen Supply-Chain-Angriff aufgedeckt hat, der Go-Entwickler(innen) durch gefälschte MongoDB-Treiber ins Visier nahm, die persistente Backdoor-Malware bereitstellen.",[878],"2025-06-30",{"slug":1041,"externalUrl":-1},"gitlab-catches-mongodb-go-module-supply-chain-attack",{"content":1043,"config":1049},{"title":1044,"heroImage":915,"category":10,"description":1045,"authors":1046,"date":1048},"Letztes Jahr haben wir das Secure by Design-Versprechen unterzeichnet – hier ist unser Fortschritt","Erfahre mehr über GitLabs CISA-konforme Erweiterungen und Verbesserungen bei MFA, Reduzierung von Standardpasswörtern, Patches und Offenlegung von Schwachstellen.",[1047],"Joseph Longo","2025-06-09",{"slug":1050,"externalUrl":-1},"last-year-we-signed-the-secure-by-design-pledge-heres-our-progress",{"content":1052,"config":1058},{"title":1053,"heroImage":1054,"category":10,"description":1055,"authors":1056,"date":1057},"So verwendest du die benutzerdefinierten Compliance Frameworks von GitLab in deiner DevSecOps-Umgebung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097104/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%284%29_3LZkiDjHLjhqEkvOvBsVKp_1750097104092.png","Erfahre, wie sich regulatorische Anforderungen durch neue Frameworks zusammen mit mehr als 50 standardmäßigen Kontrollen von lästigen Checklisten in integrierte, automatisierte Workflow-Komponenten verwandeln.",[744],"2025-04-30",{"slug":1059,"externalUrl":-1},"how-to-use-gitlabs-custom-compliance-frameworks-in-your-devsecops",{"content":1061,"config":1067},{"title":1062,"heroImage":1063,"category":10,"description":1064,"authors":1065,"date":1066},"90% weniger Audit-Zeit dank Compliance-Automatisierung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750099268/Blog/Hero%20Images/Blog/Hero%20Images/GitLab_Blog_Header_v4_YBzFAgt2EAkqQfqxNFEgj_1750099267940.svg","Custom Compliance Frameworks automatisieren NIS2- und DSGVO-Compliance. Forrester: 90% weniger Audit-Aufwand, 80 Stunden Ersparnis jährlich.",[820,765],"2025-04-17",{"slug":1068,"externalUrl":-1},"introducing-custom-compliance-frameworks-in-gitlab",{"content":1070,"config":1076},{"title":1071,"heroImage":1072,"category":10,"description":1073,"authors":1074,"date":1075},"Bessere Anwendungssicherheit mit GitLab und HackerOne","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097503/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%2810%29_5ET24Q6i8ihqrAOkge7a1R_1750097503214.png","Erfahre mehr über die Zusammenarbeit zwischen GitLab und HackerOne und lerne, wie du eine Integration implementierst, die die Sicherheit der Anwendungen in deinem Unternehmen verbessert.",[744],"2025-04-03",{"slug":1077,"externalUrl":-1},"enhance-application-security-with-gitlab-hackerone",{"content":1079,"config":1085},{"title":1080,"heroImage":1081,"category":10,"description":1082,"authors":1083,"date":1084},"Self Hosting vs. Cloud Hosting: Die Unterschiede erklärt","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664270/Blog/Hero%20Images/AdobeStock_276584891.jpg","Self-Hosting oder Cloud? Wir zeigen dir, welche Vorteile und Nachteile diese Modell haben - und was für eine Rolle GitLab dabei spielt.",[889],"2025-02-27",{"slug":1086,"externalUrl":-1},"self-hosting-vs-cloud",{"content":1088,"config":1095},{"title":1089,"heroImage":1090,"category":10,"description":1091,"authors":1092,"date":1094},"Der ultimative Leitfaden für die Token-Verwaltung mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097408/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_1097303277_6gTk7M1DNx0tFuovupVFB1_1750097407860.jpg","Erfahre Schritt für Schritt, wie du Token identifizierst, verwaltest und schützt, um die Sicherheit in deinem gesamten Software-Entwicklungsprozess zu verbessern.",[1093],"Hakeem Abdul-Razak","2025-02-25",{"slug":1096,"externalUrl":-1},"the-ultimate-guide-to-token-management-at-gitlab",{"content":1098,"config":1104},{"title":1099,"heroImage":1100,"category":10,"description":1101,"authors":1102,"date":1103},"Security-Scanning in Air-Gapped-Umgebungen mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750099301/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_1097303277_6gTk7M1DNx0tFuovupVFB1_1750099300786.jpg","Tutorial für Security-Scanner in luftspaltgesicherten Umgebungen: Offline-Installation und Vulnerability-Detection ohne externe Abhängigkeiten.",[744],"2025-02-05",{"slug":1105,"externalUrl":-1},"tutorial-security-scanning-in-air-gapped-environments",{"content":1107,"config":1114},{"title":1108,"heroImage":1109,"category":10,"description":1110,"authors":1111,"date":1113},"Sicherheitsüberprüfung mittels GitLab Operational Scanning","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664654/Blog/Hero%20Images/AdobeStock_1172300481.jpg","Container-Vulnerabilities nach Deployment überwachen: Tutorial zu GitLab Operational Container Scanning mit Trivy für Kubernetes.",[1112],"Daniel Helfand","2025-01-29",{"slug":1115,"externalUrl":-1},"improve-security-auditing-with-gitlab-operational-container-scanning",{"content":1117,"config":1123},{"title":1118,"heroImage":1119,"category":10,"description":1120,"authors":1121,"date":1122},"GitLab-Leitfaden: SOC-2-Sicherheitsanforderungen erfüllen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750099576/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_1172300481_IGPi3TS4VzFgcqhvEdBlR_1750099575518.jpg","Verstehe die Anwendungssicherheitsfunktionen der DevSecOps-Plattform von GitLab, die den Anforderungen von System and Organization Controls 2 entsprechen.",[744],"2025-01-22",{"slug":1124,"externalUrl":-1},"guide-to-fulfilling-soc-2-security-requirements-with-gitlab",{"content":1126,"config":1133},{"title":1127,"heroImage":1128,"category":10,"description":1129,"authors":1130,"date":1132},"Dank Vulnerability Tracking 30% kürzere Audit-Zeit","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664844/Blog/Hero%20Images/AdobeStock_941867776.jpg","ICSE 2025 peer-reviewed: Syntax-Tree-Deduplizierung reduziert SAST-Audit um 30%. Evaluierung mit 3,7 Mio. Zeilen Code, Effizienz steigt über Zeit.",[1131],"Julian Thome","2025-01-21",{"slug":1134,"externalUrl":-1},"introducing-gitlab-advanced-vulnerability-tracking",{"content":1136,"config":1144},{"title":1137,"heroImage":1138,"category":10,"description":1139,"authors":1140,"date":1143},"DORA für Banken: Anforderungen und Umsetzung mit GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098149/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%284%29_3LZkiDjHLjhqEkvOvBsVKp_1750098149751.png","DORA-Anforderungen für Banken: Risikomanagement, Testing, Incident-Reporting und Third-Party-Governance mit GitLab systematisch erfüllen.",[1141,1142],"Joshua Carroll","Allie Holland","2025-01-15",{"slug":1145,"externalUrl":-1},"what-the-digital-operational-resilience-act-means-for-banks",{"content":1147,"config":1154},{"title":1148,"heroImage":1149,"category":752,"description":1150,"authors":1151,"date":1153},"Der ultimative CI/CD-Leitfaden: Grundlagen für die erweiterte Implementierung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749660151/Blog/Hero%20Images/blog-image-template-1800x945__26_.png","Erfahre, wie du die kontinuierliche Integration/kontinuierliche Bereitstellung modernisierst und die Entwicklung, Lieferung und Sicherheit von Pipelines automatisierst.",[1152],"Sandra Gittlen","2025-01-06",{"slug":1155,"externalUrl":-1},"ultimate-guide-to-ci-cd-fundamentals-to-advanced-implementation",{"content":1157,"config":1164},{"title":1158,"heroImage":1159,"category":836,"description":1160,"authors":1161,"date":1163},"Wirtschaftliche Gesamtauswirkungen von GitLab Ultimate: 483 % ROI über 3 Jahre","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098354/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%281%29_5XrohmuWBNuqL89BxVUzWm_1750098354056.png","Eine Untersuchung von Forrester Consulting zu GitLab Ultimate zeigte, dass die DevSecOps-Plattform die Sicherheitslage verbesserte und die 5-fache Zeit bei Sicherheitsaktivitäten eingespart werden konnte.\n",[1162],"Dave Steer","2024-11-13",{"slug":1165,"externalUrl":-1},"gitlab-ultimates-total-economic-impact-483-roi-over-3-years",{"content":1167,"config":1174},{"title":1168,"heroImage":1169,"category":836,"description":1170,"authors":1171,"date":1173},"Einführung in The Source: Einblicke in die Zukunft der Softwareentwicklung","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749674616/Blog/Hero%20Images/blog-image-template-1800x945__1_.png","In unserer neuen Publikation findest du transformative Softwareentwicklungsstrategien und Ratschläge von Expert(inn)en zu neuen Technologien.",[1172],"Chandler Gibbons","2024-10-29",{"slug":1175,"externalUrl":-1},"introducing-the-source-insights-for-the-future-of-software-development",{"content":1177,"config":1183},{"title":1178,"heroImage":1179,"category":10,"description":1180,"authors":1181,"date":1182},"So hilft GitLab dabei, die NIS2-Anforderungen einzuhalten","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659437/Blog/Hero%20Images/AdobeStock_398929148.jpg","Beim NIS2-Cybersicherheitsgesetz der EU geht es um Resilienz, Reaktion auf Vorfälle und Risikomanagement. Erfahre, wie GitLabs DevSecOps-Plattform helfen kann, diese Compliance-Anforderungen einzuhalten.",[1047],"2024-08-20",{"slug":1184,"externalUrl":-1},"how-gitlab-helps-meet-nis2-requirements",{"content":1186,"config":1194},{"title":1187,"heroImage":1188,"category":10,"description":1189,"authors":1190,"date":1193},"FinServ: So implementierst du die Funktion zur Aufgabentrennung von GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097688/Blog/Hero%20Images/Blog/Hero%20Images/blog-image-template-1800x945%20%286%29_6vL96ttKF8zJLLqfPpvFs_1750097687913.png","Wie GitLab eine sichere Softwareentwicklung mit Aufgabentrennung im Finanzdienstleistungssektor gewährleistet, einschließlich der Einhaltung regulatorischer Rahmenbedingungen.",[1191,1192],"Cherry Han","Gavin Peltz","2024-08-13",{"slug":1195,"externalUrl":-1},"finserv-how-to-implement-gitlabs-separation-of-duties-features",{"content":1197,"config":1205},{"title":1198,"heroImage":1199,"category":711,"description":1200,"authors":1201,"date":1204},"Die Entwicklung von GitLab Duo: KI zur Behebung von Sicherheitslücken nutzen ","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098106/Blog/Hero%20Images/Blog/Hero%20Images/blog-hero-banner-1-0178-820x470-fy25_7JlF3WlEkswGQbcTe8DOTB_1750098106040.png","Dieses Tutorial zeigt, wie dir die GitLab-Duo-Funktionen zur Erläuterung und Behebung von Sicherheitslücken zusammen mit unseren anderen KI-basierten Funktionen helfen können, Sicherheitslücken schnell zu beheben.",[1202,1203],"Michael Friedrich","Alana Bellucci","2024-07-15",{"slug":1206,"externalUrl":-1},"developing-gitlab-duo-use-ai-to-remediate-security-vulnerabilities",{"content":1208,"config":1215},{"title":1209,"heroImage":1210,"category":1211,"description":1212,"authors":1213,"date":1214},"Drei überraschende Ergebnisse unserer Globalen DevSecOps-Umfrage 2024","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751993603/Blog/Hero%20Images/fy25-global-devsecops-report-blog-image.png","insights","Unsere Umfrage in diesem Jahr hat gezeigt, dass sich die Investitionsprioritäten der Unternehmen im Schatten der KI verändert haben – und wie KI die Arbeitsweise von Teams beeinflusst.",[1162],"2024-06-25",{"slug":1216,"externalUrl":-1},"3-surprising-findings-from-our-2024-global-devsecops-survey",{"content":1218,"config":1224},{"title":1219,"heroImage":1220,"category":711,"description":1221,"authors":1222,"date":1223},"Entwicklung von GitLab Duo: Sicheres und gründliches Testen von KI-generiertem Code","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097183/Blog/Hero%20Images/Blog/Hero%20Images/blog-hero-banner-1-0178-820x470-fy25_7JlF3WlEkswGQbcTe8DOTB_1750097183481.png","Erfahre Schritt für Schritt, wie du die Zuverlässigkeit und Sicherheit von KI-generiertem Code mithilfe von GitLab Duo und GitLab Pages (einschließlich Codebeispielen und Prompts) verbessern kannst.",[811],"2024-05-30",{"slug":1225,"externalUrl":-1},"how-gitlab-duo-helps-secure-and-thoroughly-test-ai-generated-code",{"content":1227,"config":1233},{"title":1228,"heroImage":1229,"category":10,"description":1230,"authors":1231,"date":1232},"GitLab Ultimate vs. GitHub Security: Der vollständige Vergleich und Migrationsleitfaden 2025","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749666187/Blog/Hero%20Images/blog-image-template-1800x945__6_.png","GitHub hat Advanced Security in zwei teure Einzelprodukte aufgeteilt. Entdecke, wie GitLab Ultimate mehr bietet und spare dabei Geld. Inklusive vollständiger Migrationsanleitung und aktuellem Feature-Vergleich 2025.",[744],"2024-05-01",{"slug":1234,"externalUrl":-1},"migration-guide-github-advanced-security-to-gitlab-ultimate",{"content":1236,"config":1242},{"title":1237,"heroImage":1238,"category":10,"description":1239,"authors":1240,"date":1241},"So integrierst du benutzerdefinierte Sicherheitsscanner in GitLab","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750097082/Blog/Hero%20Images/Blog/Hero%20Images/securitycheck_securitycheck.png_1750097081856.png","Erfahre, wie du die DevSecOps-Plattform erweiterst, indem du benutzerdefinierte Sicherheitsscanner in deine Workflows einfügst (einschließlich Tutorial).",[744],"2024-02-27",{"slug":1243,"externalUrl":-1},"how-to-integrate-custom-security-scanners-into-gitlab",{"content":1245,"config":1251},{"title":1246,"heroImage":1247,"category":10,"description":1248,"authors":1249,"date":1250},"So unterstützt dich GitLab bei deiner ISO-27001-Compliance","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749662877/Blog/Hero%20Images/security-cover-new.png","GitLab ist dein strategischer Partner und hilft mit seinen Software-Sicherheitsfunktionen dabei, deine ISO-27001-Compliance sicherzustellen.",[1047],"2023-09-06",{"slug":1252,"externalUrl":-1},"how-gitlab-can-support-your-iso-compliance-journey",{"content":1254,"config":1260},{"title":1255,"heroImage":1256,"category":10,"description":1257,"authors":1258,"date":1259},"Der ultimative Leitfaden zu SBOM","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749664571/Blog/Hero%20Images/blog-image-template-1800x945__8_.png","Erfahre, was eine Software Bill of Materials (SBOM) ist und warum sie zu einem integralen Bestandteil der modernen Softwareentwicklung geworden ist.",[1152],"2022-10-25",{"slug":1261,"externalUrl":-1},"the-ultimate-guide-to-sboms",{"content":1263,"config":1270},{"title":1264,"heroImage":1265,"category":944,"description":1266,"authors":1267,"date":1269},"Observability vs. Monitoring in DevOps","https://res.cloudinary.com/about-gitlab-com/image/upload/v1749665484/Blog/Hero%20Images/monitoring-update-feature-image.jpg","Observability sammelt Daten, um Prozesse zu optimieren und Probleme zu beheben. Wir zeigen dir, wie das geht - und warum es dem Monitoring überlegen ist.",[1268],"Mike Vanbuskirk","2022-06-14",{"slug":1271,"externalUrl":-1},"observability-vs-monitoring-in-devops",{"content":1273,"config":1280},{"title":1274,"heroImage":1275,"category":10,"description":1276,"authors":1277,"date":1279},"Mit GitLab Aufgabentrennung und Compliance sicherstellen","https://res.cloudinary.com/about-gitlab-com/image/upload/v1750098232/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_479904468%20%281%29_4lmOEVlaXP0YC3hSFmOw6i_1750098232241.jpg","Nutze deine DevSecOps-Plattform, um die Compliance aufrechtzuerhalten, ohne die Entwicklungsgeschwindigkeit zu beeinträchtigen.",[1278,744],"Beatriz Barbosa","2022-04-04",{"slug":1281,"externalUrl":-1},"ensuring-compliance",1777302687488]