{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T05:47:24Z","timestamp":1695275244069},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11623-023-1831-8","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:01:46Z","timestamp":1695200506000},"page":"617-622","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Zero Trust: Die letzte Bastion f\u00fcr die IT-Sicherheit deutscher Beh\u00f6rden"],"prefix":"10.1007","volume":"47","author":[{"given":"Silvia","family":"Knittl","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"1831_CR1","unstructured":"BMI, \u201eMehr Angriffe auf Politik, Beh\u00f6rden & Wirtschaft durch Cyber-Spionace,\u201c 2023. [Online]. [Zugriff am 20 06 2023]."},{"key":"1831_CR2","unstructured":"BSI, \u201eRansomware \u2013 Fakten und Abwerhstrategien,\u201c [Online]. [Zugriff am 20 06 2023]."},{"key":"1831_CR3","unstructured":"PwC, \u201eCyber Threats 2021: A Year in a Retrospect,\u201c 2022. [Online]. [Zugriff am 20 06 2023]."},{"key":"1831_CR4","unstructured":"Crowdstrike, \u201eGeschichte der Ransomware,\u201c [Online]. [Zugriff am 20 06 2023]."},{"key":"1831_CR5","unstructured":"Crowdstrike, \u201eBig Game Hunting durch Cyberangreifer,\u201c 02 11 2022. [Online]. Available: https:\/\/www.crowdstrike.de\/cybersecurity-101\/cyber-big-game-hunting\/. [Zugriff am 20 06 2023]."},{"key":"1831_CR6","unstructured":"Tagesschau, \u201eBundesregierung best\u00e4tigt Hacker-Angriffe,\u201c 09 05 2022. [Online]. [Zugriff am 20 06 2023]."},{"key":"1831_CR7","unstructured":"\u201eBundesweite Cyberattacken auf Ministerien und Beh\u00f6rden,\u201c 04 04 2023. [Online]. [Zugriff am 20 06 2023]."},{"key":"1831_CR8","unstructured":"C. Gr\u00fckov, A. Meyer-F\u00fcnffinger und M. Zierer, IT-Dienstleister des Bundes im Visier, 2023."},{"key":"1831_CR9","unstructured":"H. Wieler, \u201eWie Cyberkriminalit\u00e4t als Waffe im Ukraine-Krieg eingesetzt wird,\u201c 26 09 2022. [Online]. Available: https:\/\/www.infopoint-security.de\/wie-cyberkriminalitaet-als-waffe-im-ukraine-krieg-eingesetzt-wird\/a32283\/. [Zugriff am 20 06 2023]."},{"key":"1831_CR10","unstructured":"PwC, \u201eCyber Security in Germany,\u201c [Online]. Available: https:\/\/www.strategyand.pwc.com\/de\/en\/industries\/public-sector\/cyber-security-in-germany.html. [Zugriff am 27 06 2023]."},{"key":"1831_CR11","unstructured":"M. Hein, \u201eMehr Cybercrime durch Krieg in der Ukraine,\u201c DW, 09 05 2022. [Online]. Available: https:\/\/www.dw.com\/de\/wie-der-krieg-in-der-ukraine-mit-cybercrime-zusammenh%C3%A4ngt\/a-61739052. [Zugriff am 20 06 2023]."},{"key":"1831_CR12","unstructured":"Executive Office of the President, \u201eMemorandum for the Heads of Executive Departments and Agencies,\u201c Whitehouse Gov, 2022."},{"key":"1831_CR13","unstructured":"PwC, \u201eZero Trust Assessment & Architecture,\u201c 2023. [Online]. Available: https:\/\/www.pwc.de\/de\/im-fokus\/cyber-security\/enterprise-security-architecture\/zero-trust-assessment-and-architecture.html. [Zugriff am 20 06 2023]."},{"key":"1831_CR14","unstructured":"S. Rose, O. Borchert, S. Mitchell und S. Connelly, \u201eZero Trust Architecture,\u201c NIST, 2023."},{"key":"1831_CR15","unstructured":"NIST, \u201eAn Introduction to Information Security,\u201c NIST, 2023."},{"key":"1831_CR16","first-page":"494","volume":"60","author":"C Buck","year":"2023","unstructured":"C. Buck, T. Eymann und D. Jelito, \u201eCyber-Sicherheit f\u00fcr kritische Energieinfrastrukturen \u2013 Handlungsempfehlungen zur Umsetzung einer Zero-Trust-Architektur,\u201c HMFD, Bd. 60, p. 494\u2013509, 2023.","journal-title":"HMFD"},{"key":"1831_CR17","doi-asserted-by":"crossref","unstructured":"C. Buck, C. Olenberger, A. Schweizer, F. V\u00f6lter und T. Eymann, \u201eNever Trust, Always Verify: A Multivocal Literature Review on Current Knowledge and Research Gaps of Zero-trust,\u201c in Computers & Security, 2021.","DOI":"10.1016\/j.cose.2021.102436"},{"key":"1831_CR18","unstructured":"A. R. Alsoud, Towards a Life-Event Oriented Governement-to-Citizen E-Service Provision in Jordan: The NoBLE Framework, 2012."},{"key":"1831_CR19","unstructured":"CISA, \u201eZero Trust Maturity Model,\u201c Cybersecurity & Infrastructure Security Agency, 2023."},{"key":"1831_CR20","doi-asserted-by":"crossref","unstructured":"K. Ismailji, C. Mosler und S. Knittl, \u201eAnwendbarkeit von Enterprise Security Assessments sowie Enterprise Architecture Tools f\u00fcr KMU,\u201c in 35. AKWI-Jahrestagung, 2022.","DOI":"10.30844\/AKWI_2022_03"},{"key":"1831_CR21","unstructured":"T. O. Group, \u201eTOGAF Definitions,\u201c The Open Group, [Online]. Available: https:\/\/pubs.opengroup.org\/architecture\/togaf91-doc\/arch\/chap03.html."},{"key":"1831_CR22","unstructured":"e-Estonia, \u201eFacts & Figures\u201c."},{"key":"1831_CR23","unstructured":"\u201eEstonian eID card: entering the contactless world,\u201c 14 June 2017. [Online]. Available: https:\/\/e-estonia.com\/estonian-eid-card-entering-the-contactless-world\/. [Zugriff am 12 July 2023]."},{"key":"1831_CR24","unstructured":"Bare.ID, \u201eBund forciert Zero-Trust Architektur,\u201c 2022. [Online]. Available: https:\/\/www.bare.id\/ressourcen\/blog\/zerotrust-bund\/. [Zugriff am 06 2023]."},{"key":"1831_CR25","unstructured":"S. Scheuer, \u201eZero Trust: Diese Technologie ver\u00e4ndert Sicherheit \u2013 und die Arbeitswelt,\u201c Handelsblatt, 13 08 2022. [Online]. Available: https:\/\/www.handelsblatt.com\/technik\/cybersecurity\/insight-innovation-zero-trust-diese-technologie-veraendert-cybersicherheit-und-die-arbeitswelt\/28569546.html. [Zugriff am 12 07 2023]."},{"key":"1831_CR26","unstructured":"S. Krempl, \u201eZero Trust: Bund will bei IT-Sicherheit niemanden mehr vertrauen,\u201c heise online, 28 06 2022."},{"key":"1831_CR27","unstructured":"ENISA, \u201eBuilding Trust in the Digital Era: ENISA boosts the uptake of the eIDAS regulation,\u201c 11 03 2021. [Online]. Available: https:\/\/www.enisa.europa.eu\/news\/enisa-news\/building-trust-in-the-digital-era-enisa-boosts-the-uptake-of-the-eidas-regulation. [Zugriff am 20 06 2023]."},{"key":"1831_CR28","unstructured":"H. Strack, S. Karius, M. Gollnick, M. Lips, S. Wefel und R. Altschaffel, \u201ePreservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDAS,\u201c in Open Identiy Summit, 2022."},{"key":"1831_CR29","unstructured":"M. M. Roca, New Innovations in eIDAS-compliant Trust Services: Anomaly detection on log data, Universitat Polit\u00e8cnica de Catalunya, 2020."},{"key":"1831_CR30","doi-asserted-by":"crossref","unstructured":"D. G. Berbecaru, A. Lioy und C. Cameroni, \u201eProviding Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach,\u201c IEEE ACCESS, pp. 126186-126200, 2020.","DOI":"10.1109\/ACCESS.2020.3007998"},{"key":"1831_CR31","unstructured":"EUROPEAN COMMISSION, \u201eIMPLEMENTING REGULATION (EU) 2015\/1502,\u201c Official Journal of the European Union, 08 09 2015."},{"key":"1831_CR32","unstructured":"J. Jung, \u201eEffektive Zero-Trust Initiativen,\u201c zdnet, 02 08 2022. [Online]. Available: https:\/\/www.zdnet.de\/88402689\/effektive-zero-trust-initiativen\/. [Zugriff am 20 06 2023]."},{"key":"1831_CR33","unstructured":"S. Scheuer, \u201eZero Trust: Diese Technologie ver\u00e4ndert Cybersicherheit \u2013 und die Arbeitswelt,\u201c Handelsblatt, 13 08 2022."},{"key":"1831_CR34","unstructured":"Merlin, \u201eMore than 90 Percent of Federal Cybersecurity Decision Makers Have Increased Confidence in Implementing Zero Trust following Government Mandates,\u201c 25 01 2022. [Online]. Available: https:\/\/www.businesswire.com\/news\/home\/20220125005864\/en\/More-than-90-Percent-of-Federal-Cybersecurity-Decision-Makers-Have-Increased-Confidence-in-Implementing-Zero-Trust-following-Government-Mandates. [Zugriff am 20 06 2023]."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1831-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1831-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1831-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:35:54Z","timestamp":1695202554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1831-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":34,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1831"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1831-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,20]]},"assertion":[{"value":"20 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}