{"id":1169,"date":"2025-11-17T08:24:41","date_gmt":"2025-11-17T07:24:41","guid":{"rendered":"https:\/\/addyet.xyz\/it-security\/application-security\/threat-modeling"},"modified":"2025-12-22T11:46:57","modified_gmt":"2025-12-22T10:46:57","slug":"threat-modeling","status":"publish","type":"page","link":"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling","title":{"rendered":"Threat Modeling"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column]<style>.vcex-heading.vcex_69dcfb934a21e{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:1.2em;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h1 vcex_69dcfb934a21e\"><span class=\"vcex-heading-inner wpex-inline-block\">Threat Modeling<\/span><\/h1>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]Threat modeling is a structured process that identifies potential security threats in systems, applications or processes at an early stage. Possible attack paths are analyzed, vulnerabilities assessed, and countermeasures developed to ensure security by design.[\/vc_column_text]<style>.vcex-button.vcex_69dcfb934bd1e{font-size:1.2rem;}<\/style><a href=\"#form\" class=\"vcex-button theme-button inline header-button vcex_69dcfb934bd1e\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Get free advice now<\/span><\/a> [\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-heading.vcex_69dcfb934c6eb{color:#00056e;font-size:2.3rem;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center vc_custom_1763363689999 vcex_69dcfb934c6eb\"><span class=\"vcex-heading-inner wpex-inline-block\">Why choose @-yet for Threat Modeling<\/span><\/h1>[vc_row_inner gap=&#8221;35&#8243;][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dcfb934d6cf .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dcfb934d6cf .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dcfb934d6cf .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dcfb934d6cf .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dcfb934d6cf\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Professional<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><div class=\"order-2 w-md-100 w-70\">\n<div class=\"teaser-text\">\n<p>The application security team at @-yet consists exclusively of experienced software developers and security experts.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dcfb934f387 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dcfb934f387 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dcfb934f387 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dcfb934f387 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dcfb934f387\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Future-oriented<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><div class=\"order-2 w-md-100 w-70\">\n<div class=\"teaser-text\">\n<p>Continuous protection of your applications by reinforcing the concept of security in the software development process.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dcfb935046f .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dcfb935046f .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dcfb935046f .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dcfb935046f .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dcfb935046f\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Cost saving<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><div class=\"order-2 w-md-100 w-70\">\n<div class=\"teaser-text\">\n<p>Increased efficiency in software development through fewer corrections and early consideration of security.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]In the first step,\u00a0<a class=\"link-only-underlined\" href=\"https:\/\/www.at-yet.de\/en\/\">@-yet<\/a>\u00a0analyzes your system or architecture in detail to gain a comprehensive understanding. Possible threats and attack paths are identified, and vulnerabilities localized. Their criticality is then evaluated based on their probability and potential impact. Finally, @-yet uses the results of the analysis to develop targeted security strategies and measures that effectively protect your systems.<\/p>\n<p>Threat modeling is proactive security. You recognize and eliminate potential risks before they can cause damage. You save time and costs associated with time-consuming remedial work. At the same time, threat modeling increases your team&#8217;s awareness of security risks and supports you in meeting regulatory requirements.<\/p>\n<p>With the threat modeling solution, @-yet makes security an integral part of your processes. You create a stable foundation for your company. Protect your systems &#8211; we will support you![\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1759849686291{background-color: #FFFFFF !important;}&#8221;][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;24px&#8221;]How @-yet works[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb9352159{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb9352159\"><span class=\"vcex-heading-inner wpex-inline-block\">Methodology<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb935291a .vcex-bullets-icon{color:#00056e;}.vcex-bullets.vcex_69dcfb935291a{font-size:var(--wpex-text-lg);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon wpex-text-lg bullet-liste vcex_69dcfb935291a\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Analysis of the company&#8217;s own assets and attack vectors<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Creation of data flow diagrams<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Threat analysis from the perspective of the system under test<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Classification of identified threats according to the STRIDE risk model<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1759849669873{background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;24px&#8221;]How @-yet can help you[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb9352f68{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb9352f68\"><span class=\"vcex-heading-inner wpex-inline-block\">Your advantages<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb9353599 .vcex-bullets-icon{color:#00056e;}.vcex-bullets.vcex_69dcfb9353599{font-size:var(--wpex-text-lg);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon wpex-text-lg bullet-liste vcex_69dcfb9353599\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Better understanding of your own threat situation<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Advice on dealing with the identified threats<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Risk reduction in relation to compliance violations and cyber attacks<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Establishment of concrete measures to close potential security gaps<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Minimizing later changes and expensive rework<\/div><\/div><\/li>\n<\/ul>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765876353878{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #00056E !important;}&#8221; el_class=&#8221;info-text-section&#8221;][vc_column width=&#8221;1\/5&#8243;]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-icon.vcex_69dcfb9353f95 .vcex-icon-wrap{color:#fefefe;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-xlarge wpex-text-center vcex_69dcfb9353f95\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"vc-material vc-material-info_outline\"><\/span><\/div><\/div>[\/vc_column][vc_column width=&#8221;4\/5&#8243;]<style>.vcex-heading.vcex_69dcfb9354536{color:#ffffff;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dcfb9354536\"><span class=\"vcex-heading-inner wpex-inline-block\">The @-yet Threat Modeling<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;1.2rem&#8221;]\n<p data-start=\"0\" data-end=\"578\">macht Sicherheit planbar und fr\u00fchzeitig steuerbar. Durch eine strukturierte Analyse Ihrer Systeme, Datenfl\u00fcsse und potenziellen Angriffswege werden Schwachstellen bereits in der Konzeptions- oder Entwicklungsphase sichtbar. Auf Basis etablierter Modelle wie STRIDE bewertet @-yet die identifizierten Risiken nach Wahrscheinlichkeit und Auswirkung und priorisiert jene Bedrohungen, die f\u00fcr Ihr Unternehmen am kritischsten sind. Aus dieser Analyse entstehen passgenaue Sicherheitsstrategien und konkrete Ma\u00dfnahmen, die Ihre Systeme nachhaltig sch\u00fctzen.<\/p>\n<p><\/p>\n<p data-start=\"580\" data-end=\"931\" data-is-last-node=\"\" data-is-only-node=\"\">Threat Modeling wirkt proaktiv: Sie verhindern Sicherheitsvorf\u00e4lle, reduzieren sp\u00e4tere kostspielige Nachbesserungen und st\u00e4rken gleichzeitig das Bewusstsein f\u00fcr Risiken in Ihrem Team. Zudem unterst\u00fctzt der Prozess bei der Einhaltung regulatorischer Anforderungen und schafft eine solide, zukunftssichere Sicherheitsbasis f\u00fcr Ihre gesamte Organisation.<\/p>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1759848861664{margin-bottom: 4rem !important;}&#8221;][vc_column]makes security predictable and controllable at an early stage. Through a structured analysis of your systems, data flows, and potential attack vectors, vulnerabilities become visible as early as the design or development phase. Based on established models such as STRIDE, @-yet evaluates the identified risks according to probability and impact and prioritizes those threats that are most critical to your business. This analysis results in tailor-made security strategies and concrete measures that provide lasting protection for your systems.<br \/>Threat modeling is proactive: it prevents security incidents, reduces costly retrofits later on, and at the same time raises awareness of risks within your team. In addition, the process supports compliance with regulatory requirements and creates a solid, future-proof security foundation for your entire organization.[\/vc_column][\/vc_row][vc_row local_scroll_id=&#8221;form&#8221;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<header class=\"ce_contact__header\">\n<p class=\"overline\">With @-yet, you can protect what is most valuable.<\/p>\n<\/header>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-heading.vcex_69dcfb93578c0{color:#00056e;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl vcex_69dcfb93578c0\"><span class=\"vcex-heading-inner wpex-inline-block\">Arrange your free, no-obligation consultation now.<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Arrange your personal appointment now for a non-binding and free consultation. Our security and data protection experts will be happy to answer your questions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Direct contact:<\/strong><\/p>\n<p>Phone: +49 2175 16 55 0<br \/>\nEmail: info@at-yet.de<\/p>\n<p>Or via this form.<\/p>\n<p>We look forward to hearing from you!<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_2' ><form method='post' enctype='multipart\/form-data'  id='gform_2'  action='\/en\/wp-json\/wp\/v2\/pages\/1169' data-formid='2' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_2' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_2_5\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_5'>Salutation<\/label><div class='ginput_container ginput_container_select'><select name='input_5' id='input_2_5' class='large gfield_select'     aria-invalid=\"false\" ><option value='' >Please select<\/option><option value='Herr' >Mr.<\/option><option value='Frau' >Mrs.<\/option><\/select><\/div><\/div><fieldset id=\"field_2_1\" class=\"gfield gfield--type-name gfield--input-type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_2_1'>\n                            \n                            <span id='input_2_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.3' id='input_2_1_3' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_3' class='gform-field-label gform-field-label--type-sub '>First name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_2_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.6' id='input_2_1_6' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_6' class='gform-field-label gform-field-label--type-sub '>Last name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_2_6\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_6'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_2_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_7\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_7'>Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_2_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_3\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_3'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_3' id='input_2_3' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_2_4\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_4'>Phone<\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_2_4' type='tel' value='' class='large'    aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_8\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_8'>Your message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_2_8' class='textarea medium'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_2_10\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Further information<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_2_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_10_1' >Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.<\/label><input type='hidden' name='input_10.2' value='Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_2_9\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Privacy protection<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_9.1' id='input_2_9_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_9_1' >Yes, I have read and understood the contents of the <a href=\"\/en\/privacy-policy\">privacy policy<\/a>.<\/label><input type='hidden' name='input_9.2' value='Yes, I have read and understood the contents of the &lt;a href=&quot;\/en\/privacy-policy&quot;&gt;privacy policy&lt;\/a&gt;.' class='gform_hidden' \/><input type='hidden' name='input_9.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_2_11\" class=\"gfield gfield--type-frcaptcha gfield--input-type-frcaptcha gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_11'>Ohne Titel<\/label><div class='ginput_container ginput_container_frcaptcha'><div class=\"frc-captcha \" data-sitekey=\"FCMKBD0ANB8C39IQ\" data-lang=\"en\" ><\/div>\n\t\t<noscript>You need to enable Javascript for the anti-spam check.<\/noscript><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_2' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit now'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_2' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_2' id='gform_theme_2' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_2' id='gform_style_settings_2' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_2' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='2' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='EUR' value='JdkAOSTg2s\/se+ed\/M5N5AqITO2gdVLC8l1wgPSb1sYlCi7OX+OTyvElblaZV6hQwGyGBNPgtTDODiVaZGOkPrYla3V9hRl99c89gXT892Xou7I=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_2' value='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' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_2' id='gform_target_page_number_2' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_2' id='gform_source_page_number_2' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_2').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_2');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_2').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_2').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_2').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_2').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_2').val();gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [2, current_page]);window['gf_submitting_2'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_2').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [2]);window['gf_submitting_2'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_2').text());}else{jQuery('#gform_2').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"2\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_2\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_2\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_2\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 2, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Threat Modeling Threat modeling is a structured process that identifies potential security threats in systems, applications or processes at an early stage. Possible attack paths are analyzed, vulnerabilities assessed, and countermeasures developed to ensure security by design. Get free advice now Why choose @-yet for Threat ModelingProfessional The application security team at @-yet consists exclusively&hellip;","protected":false},"author":1,"featured_media":0,"parent":892,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1169","page","type-page","status-publish","hentry","entry","no-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Threat Modeling - @-yet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Modeling\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling\" \/>\n<meta property=\"og:site_name\" content=\"@-yet\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T10:46:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/application-security\\\/threat-modeling\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/application-security\\\/threat-modeling\",\"name\":\"Threat Modeling - @-yet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\"},\"datePublished\":\"2025-11-17T07:24:41+00:00\",\"dateModified\":\"2025-12-22T10:46:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/application-security\\\/threat-modeling#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/application-security\\\/threat-modeling\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/application-security\\\/threat-modeling#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Application Security\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/application-security\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Threat Modeling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"name\":\"@-yet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.at-yet.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\",\"name\":\"@-yet\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"caption\":\"@-yet\"},\"image\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/at-yet\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat Modeling - @-yet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling","og_locale":"en_US","og_type":"article","og_title":"Threat Modeling","og_url":"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling","og_site_name":"@-yet","article_modified_time":"2025-12-22T10:46:57+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling","url":"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling","name":"Threat Modeling - @-yet","isPartOf":{"@id":"https:\/\/www.at-yet.de\/en#website"},"datePublished":"2025-11-17T07:24:41+00:00","dateModified":"2025-12-22T10:46:57+00:00","breadcrumb":{"@id":"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.at-yet.de\/en\/it-security\/application-security\/threat-modeling#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.at-yet.de\/en"},{"@type":"ListItem","position":2,"name":"IT security","item":"https:\/\/www.at-yet.de\/en\/it-security"},{"@type":"ListItem","position":3,"name":"Application Security","item":"https:\/\/www.at-yet.de\/en\/it-security\/application-security"},{"@type":"ListItem","position":4,"name":"Threat Modeling"}]},{"@type":"WebSite","@id":"https:\/\/www.at-yet.de\/en#website","url":"https:\/\/www.at-yet.de\/en","name":"@-yet","description":"","publisher":{"@id":"https:\/\/www.at-yet.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.at-yet.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.at-yet.de\/en#organization","name":"@-yet","url":"https:\/\/www.at-yet.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/","url":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","contentUrl":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","caption":"@-yet"},"image":{"@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/at-yet\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/comments?post=1169"}],"version-history":[{"count":4,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1169\/revisions"}],"predecessor-version":[{"id":1780,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1169\/revisions\/1780"}],"up":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/892"}],"wp:attachment":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/media?parent=1169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}