{"id":53144,"date":"2024-10-14T13:56:24","date_gmt":"2024-10-14T21:56:24","guid":{"rendered":"https:\/\/www.sumologic.com\/solutions\/security\/sicherheits-reaktionszentrum"},"modified":"2026-01-27T06:30:58","modified_gmt":"2026-01-27T14:30:58","slug":"response-center","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/de\/solutions\/security\/response-center","title":{"rendered":"Sicherheits-Reaktionszentrum"},"content":{"rendered":"\n<section class=\"e-stn e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 e-stn--main-banner\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-99f84129e8f797639aad86d5ec916c2c\" id=\"security-response-center\">Security Response Center<\/h1>\n\n\n\n<p class=\"description has-chinese-silver-color has-text-color has-link-color wp-elements-ce4cb425f057351d8b4741caf83ec751\">Unternehmen jeder Gr\u00f6\u00dfe sehen sich einer versch\u00e4rften Cyber-Bedrohungslage gegen\u00fcber \u2013 bedingt durch staatliche Akteure, zunehmende Angriffe auf die Lieferkette (Supply Chain Attacks) und Schwachstellen in Open-Source-Software. Kunden umfassend zu informieren, zu unterst\u00fctzen und zu sch\u00fctzen, hat f\u00fcr Sumo Logic oberste Priorit\u00e4t.<\/p>\n\n\n\n<div class=\"e-div e-div-b8650eb23605cc1c3c2b0261ca56a62af47c216e e-div--button-wrapper\"><div class=\"e-btn e-btn--blue-button-with-right-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/feed\/security-response\" target=\"_blank\">\n<p class=\"title\">RSS abonnieren<\/p>\n<\/a><\/div>\n\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"e-div e-div-c798c7a4466427637118b74d5226a20455577ae2 e-div--media-wrapper\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"603\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-continuous_intelligence_platform_hero.png\" alt=\"\" class=\"wp-image-9384\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-continuous_intelligence_platform_hero.png 725w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-continuous_intelligence_platform_hero-300x250.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-continuous_intelligence_platform_hero-575x478.png 575w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><\/figure>\n<\/div>\n\n<div class=\"e-img e-img--section-bg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/main-banner-bg-blur.svg\" alt=\"\" class=\"wp-image-1076\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-7\" class=\"e-stn e-stn-6c51ddd2b8dd9ec12d632c35a61b62586cd316c6 e-stn--faq-accordion\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-029c01502d78b7cff6900cd3b2a145337ca3a946  col-sm-12 col-md-4\">\n<h2 class=\"wp-block-heading has-delft-blue-color has-text-color has-link-color wp-elements-0e6b03f68646f56e67dc64fcc1d5c4c7\" id=\"recent-security-threats-1\">Aktuelle Sicherheitsbedrohungen<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-1535be63930f7ed2ef76cc949c67e8736d5f40d3  col-sm-12 col-md-8\">\n   <div class=\"accordion-block\"><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">Cisco ASA RCE und Privilege Escalation<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>September 29, 2025<\/strong> <\/p>\n                        \n<p>Sumo Logic ist sich der neuen RCE- und Privilegienerweiterungs-Schwachstellen in Cisco ASA (CVE-2025-20333 und CVE-2025-20362) bewusst.\u00a0 Nach einer \u00dcberpr\u00fcfung unseres Systems haben wir best\u00e4tigt, dass Sumo Logic nicht von den Cisco ASA-Sicherheitsl\u00fccken betroffen ist, da dieses Produkt nicht Teil unserer Umgebung ist. Es ist kein Handeln seitens unserer Kunden erforderlich.<\/p>\n<\/div>\n                    <\/div><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">\u201eShai-Hulud\u201c NPM-Supply-Chain-Wurm<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>September 24, 2025<\/strong> <\/p>\n                        \n<p>Sumo Logic ist sich des j\u00fcngsten Angriffs des \u201eShai-Hulud\u201c-NPM-Supply-Chain-Angriffs bewusst.\u00a0Unsere Untersuchung deutet darauf hin, dass Sumo Logic nicht von einem der betroffenen Pakete betroffen ist.\u00a0 Wir verwenden oder referenzieren keine betroffenen NPM-Pakete in unseren Produkten oder Dienstleistungen. F\u00fcr unsere Kunden besteht derzeit kein Handlungsbedarf, aber wir werden die Situation weiter beobachten und gegebenenfalls aktualisieren.<\/p>\n<\/div>\n                    <\/div><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">Salesloft Drift Breach<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>September 2, 2025<\/strong> <\/p>\n                        \n<p>Sumo Logic ist die j\u00fcngste Sicherheitsverletzung bei Salesloft Drift bekannt. Nach einer gr\u00fcndlichen Untersuchung haben wir festgestellt, dass Sumo Logic nicht betroffen ist, da unsere Produkte und Dienste Drift nicht verwenden. Nach unserer derzeitigen Einsch\u00e4tzung besteht f\u00fcr unsere Kunden kein Handlungsbedarf, aber wir werden die Situation weiter beobachten und bei Bedarf Updates ver\u00f6ffentlichen.<\/p>\n<\/div>\n                    <\/div><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">Microsoft SharePoint Zero Day Exploit a.k.a. Toolshell-Schwachstelle und Cisco ISE Critical API-Schwachstelle<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>July 23, 2025<\/strong> <\/p>\n                        \n<p>Sumo Logic ist sich der j\u00fcngsten Zero-Day-Schwachstellen in Microsoft SharePoint, Toolshell (CVE-2025-53770), und der kritischen API-Schwachstellen von Cisco ISE (<a href=\"https:\/\/thehackernews.com\/2025\/06\/critical-rce-flaws-in-cisco-ise-and-ise.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-20281<\/a>,\u00a0<a href=\"https:\/\/thehackernews.com\/2025\/07\/cisco-warns-of-critical-ise-flaw.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-20337<\/a>,\u00a0<a href=\"https:\/\/thehackernews.com\/2025\/06\/critical-rce-flaws-in-cisco-ise-and-ise.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-20282<\/a>) bewusst. Nach einer gr\u00fcndlichen Untersuchung haben wir festgestellt, dass Sumo Logic nicht betroffen ist, da unsere Produkte und Dienste diese Tools\/Technologien nicht verwenden. Nach unserer derzeitigen Einsch\u00e4tzung besteht f\u00fcr unsere Kunden kein Handlungsbedarf, aber werden die Situation weiter beobachten und bei Bedarf Updates ver\u00f6ffentlichen.<\/p>\n<\/div>\n                    <\/div><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">Oracle Cloud Server-Verletzung<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>April 8, 2025<\/strong> <\/p>\n                        \n<p>Sumo Logic ist \u00fcber die j\u00fcngste Datenschutzverletzung bei Oracle Cloud Servern informiert. Nach unserer ersten Untersuchung und System\u00fcberpr\u00fcfung haben wir best\u00e4tigt, dass Sumo Logic nicht betroffen ist, da wir weder die Cloud-Plattform von Oracle noch SSO-\/Identit\u00e4tsmanagement-Produkte verwenden. Zum jetzigen Zeitpunkt gibt es keine Auswirkungen auf unsere Kunden, und es besteht kein Handlungsbedarf. Wir werden die Situation weiter beobachten und bei Bedarf Updates ver\u00f6ffentlichen.<\/p>\n<\/div>\n                    <\/div><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">Ingress-nginx RCE a.k.a. IngressNightmare<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>April 4, 2025<\/strong> <\/p>\n                        \n<p>Sumo Logic ist sich der Schwachstelle in\u00a0<strong>Ingress-nginx<\/strong>\u00a0Controller bewusst, die eine unauthentifizierte Remote-Codeausf\u00fchrung erm\u00f6glicht (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1974\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-1974<\/a>). Nach einer gr\u00fcndlichen Untersuchung haben wir festgestellt, dass Sumo Logic nicht von der Sicherheitsl\u00fccke betroffen ist. Zu diesem Zeitpunkt besteht f\u00fcr unsere Kunden kein Handlungsbedarf. Wir werden die Situation jedoch weiter beobachten und Sie gegebenenfalls auf dem Laufenden halten.<\/p>\n<\/div>\n                    <\/div><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">Github Tj-Aktionen<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>March 20, 2025<\/strong> <\/p>\n                        \n<p>Sumo Logic ist sich des\u00a0<strong>tj-actions\/changed-files<\/strong>\u00a0Supply-Chain-Angriffs (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2025-30066\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-30066<\/a>) bewusst. Unsere umfassende Untersuchung deutet darauf hin, dass Sumo Logic nicht von dem kompromittierten tj-action\/changed-files betroffen ist. Nach unserer derzeitigen Einsch\u00e4tzung besteht f\u00fcr unsere Kunden kein Handlungsbedarf, aber wir werden die Situation weiter beobachten und gegebenenfalls aktualisieren.<\/p>\n<\/div>\n                    <\/div><div class=\"accordion-item\">\n                        <button class=\"accordion-title\">Linguistic Lumberjack: Fluent Bit<span class=\"accordion-icon\">+<\/span><\/button>\n                        <div class=\"accordion-content\">\n                        <p class=\"date\"><strong>May 23, 2024<\/strong> <\/p>\n                        \n<p>Am 20. Mai 2024 entdeckte Tenable Research\u00a0<a href=\"https:\/\/www.tenable.com\/blog\/linguistic-lumberjack-attacking-cloud-services-via-logging-endpoints-fluent-bit-cve-2024-4323\" target=\"_blank\" rel=\"noreferrer noopener\">eine kritische Speicher-Korrumpierungs-Schwachstelle, die als Linguistic Lumberjack bezeichnet wird, in Fluent Bit (CVE-2024-4323), einer Kernkomponente in der \u00dcberwachungsinfrastruktur vieler Cloud-Dienste<\/a>\u00a0. Sumo Logic hat alle betroffenen Systeme aktualisiert, um sicherzustellen, dass wir nicht verwundbar sind, und \u00fcberwacht weiterhin die Sicherheitslage in unserem Unternehmen sowie bei unseren Drittanbietern, um sicherzustellen, dass sie mit der Situation angemessen umgehen.<\/p>\n\n<p>Aus der Perspektive von Open Source sind zwar standardm\u00e4\u00dfig keine unserer L\u00f6sungen dem Internet ausgesetzt, aber einige nutzen die betroffenen Versionen von Fluent Bit. F\u00fcr diese F\u00e4lle haben wir aktualisierte Versionen ver\u00f6ffentlicht. Siehe unten f\u00fcr Details.<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Tailing-Sidecar-Operator Version\u00a0<a href=\"https:\/\/github.com\/SumoLogic\/tailing-sidecar\/releases\/tag\/v0.13.0\" target=\"_blank\" rel=\"noreferrer noopener\">0.13.0<\/a>\u00a0enth\u00e4lt die Korrektur.<\/li>\n\n\n\n<li>Kubernetes Collection Helm Chart\u00a0<a href=\"https:\/\/github.com\/SumoLogic\/sumologic-kubernetes-collection\/releases\/tag\/v4.7.1\" target=\"_blank\" rel=\"noreferrer noopener\">v4.7.1<\/a>\u00a0enth\u00e4lt die obige Korrektur.<\/li>\n\n\n\n<li>Kubernetes Collection Helm Chart\u00a0<a href=\"https:\/\/github.com\/SumoLogic\/sumologic-kubernetes-collection\/releases\/tag\/v3.19.3\" target=\"_blank\" rel=\"noreferrer noopener\">v3.19.3<\/a>\u00a0enth\u00e4lt die obige Korrektur und ein separates Upgrade auf Fluent Bit.<\/li>\n\n\n\n<li>F\u00fcr Kubernetes Collection Helm Chart Version 2 sind keine Upgrades verf\u00fcgbar. Der Support f\u00fcr diese Version endete am 20.07.2023. Kunden wird ein Upgrade auf\u00a0<a href=\"https:\/\/github.com\/SumoLogic\/sumologic-kubernetes-collection\/releases\/tag\/v4.7.1\" target=\"_blank\" rel=\"noreferrer noopener\">v4.7.1<\/a> empfohlen.<\/li>\n\n\n\n<li>Keine Upgrades f\u00fcr Helm Operator verf\u00fcgbar. Ein Upgrade auf Version 4 von Helm Chart (wo es kein Fluent Bit gibt) ist in Arbeit.<\/li>\n<\/ul>\n\n<p>Wir werden die Situation weiterhin beobachten und gegebenenfalls aktualisieren.<\/p>\n<\/div>\n                    <\/div><\/div>\n        \n        <script>\n            document.addEventListener(\"DOMContentLoaded\", function () {\n                var accordionButtons = document.querySelectorAll(\".accordion-title\");\n\n                accordionButtons.forEach(function (btn) {\n                    btn.addEventListener(\"click\", function () {\n                        var faqItem = this.closest(\".accordion-item\"); \/\/ Get the parent FAQ item\n                        var answer = faqItem.querySelector(\".accordion-content\"); \/\/ Find the answer within the same item\n                        var icon = this.querySelector(\".accordion-icon\");\n\n                        \/\/ Close all other open answers and remove active class\n                        document.querySelectorAll(\".accordion-item\").forEach(function (item) {\n                            if (item !== faqItem) {\n                                item.classList.remove(\"active\");\n                                item.querySelector(\".accordion-content\").style.display = \"none\";\n                                item.querySelector(\".accordion-icon\").textContent = \"+\";\n                            }\n                        });\n\n                        \/\/ Toggle the clicked answer and add active class\n                        if (answer.style.display === \"block\") {\n                            answer.style.display = \"none\";\n                            faqItem.classList.remove(\"active\");\n                            icon.textContent = \"+\";\n                        } else {\n                            answer.style.display = \"block\";\n                            faqItem.classList.add(\"active\");\n                            icon.textContent = \"\u2212\";\n                        }\n                    });\n                });\n            });\n        <\/script>\n           \n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-2\" class=\"e-stn e-stn-9594aa7a6ffc8e863a3f9110c090f8a79fdaab3f e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-9594aa7a6ffc8e863a3f9110c090f8a79fdaab3f { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"secure-saas-and-cloud-based-applications\">Aktuelle Sicherheitswarnung: Okta-Zugang kompromittiert<\/h2>\n\n\n\n<p><strong>Zusammenfassung<\/strong><\/p>\n\n\n\n<p>Der Laptop eines Support-Ingenieurs bei der Identit\u00e4ts- und Authentifizierungsfirma (IAM) Okta wurde kompromittiert<\/p>\n\n\n\n<p><strong>Welche Schritte hat Sumo Logic unternommen?<\/strong><\/p>\n\n\n\n<p>Unser Global Operations Center untersuchte die sich entwickelnde Situation bei Okta, da Sumo Logic derzeit die f\u00f6derierte Identit\u00e4tsl\u00f6sung von Okta nutzt.\u00a0<strong>Bisher haben wir keine Hinweise darauf, dass Sumo Logic, unsere Mitarbeiter oder unsere Dienstleistungen in irgendeiner Weise beeintr\u00e4chtigt sind.<\/strong><\/p>\n\n\n\n<p><strong>Was kann ich tun?<\/strong><\/p>\n\n\n\n<p>Kunden und Interessenten, die derzeit eine 30-t\u00e4gige Testphase absolvieren, k\u00f6nnen mit der Okta-App feststellen, ob sie kompromittiert sind, und gezielte Suchvorg\u00e4nge mit Cloud SIEM nutzen.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/blog\/okta-evolving-situation-am-i-impacted\" target=\"_self\">\n<p class=\"title\">Sumo Logic Blog: Die Situation bei Okta entwickelt sich weiter \u2013 bin ich davon betroffen?<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"647\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-okta-access-compromised.png\" alt=\"\" class=\"wp-image-9387\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-okta-access-compromised.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-okta-access-compromised-300x121.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-okta-access-compromised-1024x414.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-okta-access-compromised-768x311.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-okta-access-compromised-1536x621.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-okta-access-compromised-575x233.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"page-section resource-card-section gsbp-585e707 alignfull\" id=\"section-6\">\n<div>\n<div class=\"box-container resource-card-section__container\">\n<div class=\"resource-card-section__heading-wrapper\">\n<h2 class=\"resource-card-section__heading\">Zus\u00e4tzliche Ressourcen<\/h2>\n<\/div>\n\n\n\n<div class=\"grid--l-3 grid--m-2 grid--s-1 gap--l resource-block-wrapper mt-3 grid--4\">\n<a class=\"resource-block\" href=\"https:\/\/www.linkedin.com\/events\/7091843143762923520\/about\/\" target=\"_blank\" rel=\"noopener\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-linkedin-live-v2.jpg\" alt=\"\" width=\"652\" height=\"367\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Video<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">SEC-Regeln f\u00fcr die Offenlegung der Cybersicherheit<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Video ansehen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/blog\/sec-cybersecurity-disclosure-rules\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-SEC-passed-new-cybersecurity-rules-social-v3.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Blog<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">SEC-Regeln zur Offenlegung der Cybersicherheit<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Blog lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/blog\/okta-evolving-situation-am-i-impacted\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-specops-min-1.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Blog<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Okta \u2013 aktuelle Lage: Bin ich davon betroffen?<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Blog lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/app-catalog\/okta\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-sumo-security-analytics-demo-thumb-1.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Integration<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Okta-Integration f\u00fcr Sumo Logic<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Integration ansehen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/blog\/mind-your-single-sign-on-sso-logs\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-platform-security-thumb-1.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Blog<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Achten Sie auf Ihre Single Sign-On (SSO) Protokolle<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Blog lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/de\/solutions\/security\/log4j\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Day-in-the-life-with-Sumo-Logic-Cloud-SIEM-1.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">L\u00f6sung<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Log4j Schwachstellenreaktionszentrum<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Mehr erfahren<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/strengthening-detection-of-software-supply-chain-attacks\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-esentire-brief-card-v2.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Bericht<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Verst\u00e4rkung der Erkennung von Angriffen auf die Software-Lieferkette<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Bericht herunterladen<\/div>\n<\/div>\n<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\" id=\"section-5\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h3 class=\"wp-block-heading has-text-align-center\" id=\"best-in-class-economics\">Externe Ressourcen<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-139\" target=\"_blank\" rel=\"noreferrer noopener\">SEC verabschiedet Regeln f\u00fcr Cybersecurity-Risikomanagement, -Strategie, -Governance und Offenlegung von Vorf\u00e4llen durch Aktiengesellschaften<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/sec-cyberincident-disclosure-four\/\" target=\"_blank\" rel=\"noreferrer noopener\">SEC fordert Offenlegung von Cyber-Vorf\u00e4llen innerhalb von vier Tagen<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/03\/21\/statement-by-president-biden-on-our-nations-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Erkl\u00e4rung von Pr\u00e4sident Biden zur Cybersicherheit unserer Nation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/news.yahoo.com\/exclusive-ransomware-attacks-on-us-supply-chain-are-undermining-national-security-customs-and-border-protection-bulletin-warns-191403260.html\" target=\"_blank\" rel=\"noreferrer noopener\">Exklusiv: Ransomware-Angriffe auf die US-Lieferkette untergraben die nationale Sicherheit, CBP-Bulletin warnt<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n<section id=\"section-4\" class=\"e-stn e-stn-10a351e6bb5969caf72fbed0d6d835aabc660dd1 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-10a351e6bb5969caf72fbed0d6d835aabc660dd1 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #ffffff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-pure-black-color has-text-color has-link-color wp-elements-07fc4fd484c82ca786505243017d4252\" id=\"the-advantage-of-sumo-logic-cloud-soar\">Wie kann Sumo Logic helfen?<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row justify-content-center e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"45\" height=\"45\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-security-2-color.svg\" alt=\"\" class=\"wp-image-9388\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-pure-black-color has-text-color has-link-color wp-elements-c3c3b398e1b8fdc748794bc6890f1fb5\"><strong>Aktive \u00dcberwachung aktueller Bedrohungen in Echtzeit, um sicherzustellen, dass Kunden nicht beeintr\u00e4chtigt werden<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-manage-2-color-icon.svg\" alt=\"\" class=\"wp-image-9389\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-pure-black-color has-text-color has-link-color wp-elements-519fb48fa8cbe4a49b21851687b5ec9c\"><strong>Erstellen von einfach zu kopierenden Suchanfragen und Filtern, mit denen Kunden feststellen k\u00f6nnen, ob sie einem Risiko ausgesetzt sind<\/strong>.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-queries-2-color-icon.svg\" alt=\"\" class=\"wp-image-9390\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-pure-black-color has-text-color has-link-color wp-elements-d827086b05ac2131eaf54cf8888b5720\"><strong>Bereitstellung von sicherheitsspezifischem Onboarding f\u00fcr potenzielle Kunden in unserer 30-Tage-Testphase, damit sie feststellen k\u00f6nnen, ob sie gef\u00e4hrdet sind.<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\" id=\"section-5\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"best-in-class-economics\">Ergreifen Sie diese Schritte, um Ihre Sicherheitslage zu verbessern<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n<section id=\"section-2\" class=\"e-stn e-stn-5deb0a4d3ac7bfa1b90a05c3a814ce3c00d0f60d e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"secure-saas-and-cloud-based-applications\">Starten Sie eine 30-Tage-Testversion<\/h2>\n\n\n\n<p>Nutzen Sie unsere Anwendungsintegrationen und Log-Ingesting-Funktionen, um festzustellen, ob Ihr Unternehmen kompromittiert wurde<\/p>\n\n\n<div class=\"e-btn e-btn--black-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/sign-up\" target=\"_blank\">\n<p class=\"title\">Kostenlose Testversion starten<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2092\" height=\"1448\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2.png\" alt=\"\" class=\"wp-image-9393\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2.png 2092w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2-300x208.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2-1024x709.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2-768x532.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2-1536x1063.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2-2048x1418.png 2048w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-application_monitoring-2-575x398.png 575w\" sizes=\"auto, (max-width: 2092px) 100vw, 2092px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-1\" class=\"e-stn e-stn-43b62cf0c372c16d54653566af4e2ae40e9f466f e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-43b62cf0c372c16d54653566af4e2ae40e9f466f { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2092\" height=\"1448\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1.png\" alt=\"\" class=\"wp-image-9395\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1.png 2092w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1-300x208.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1-1024x709.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1-768x532.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1-1536x1063.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1-2048x1418.png 2048w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Kubernetes_monitoring-1-575x398.png 575w\" sizes=\"auto, (max-width: 2092px) 100vw, 2092px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"talk-to-our-security-experts\">Sprechen Sie mit unseren Sicherheitsexperten<\/h2>\n\n\n\n<p>Machen Sie einen Rundgang durch unsere Sicherheitsfunktionen und Cloud SIEM. Unser Team f\u00fchrt Sie durch g\u00e4ngige Bedrohungsszenarien und zeigt Ihnen, wie Sie eine proaktive Bedrohungs\u00fcberwachung aufbauen k\u00f6nnen.<\/p>\n\n\n<div class=\"e-btn e-btn--black-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_blank\">\n<p class=\"title\">Demo buchen<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Externe Ressourcen Ergreifen Sie diese Schritte, um Ihre Sicherheitslage zu verbessern<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":52365,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":".gsbp-de6fb79{display:flex;justify-content:center;flex-direction:column;align-items:center;padding-right:var(--wp--custom--spacing--side, min(3vw, 20px));padding-left:var(--wp--custom--spacing--side, min(3vw, 20px));margin-top:0;margin-bottom:0;position:relative;padding-top:var(--cf-space-xl);padding-bottom:var(--cf-space-xl)}.gsbp-26a38c9{max-width:100%;width:1380px}.related-items__left-col{display:flex;flex-direction:column;column-gap:var(--cf-space-m);row-gap:var(--cf-space-3xs)}body .related-items__heading:is(h1,h2,h3,h4,h5,h6){font-size:var(--cf-text-2xl)}.related-items__right-col{display:flex;column-gap:var(--space-l);row-gap:var(--space-l)}.related-items__item{padding-top:var(--cf-space-s);padding-bottom:var(--cf-space-s);padding-left:var(--cf-space-s);padding-right:var(--cf-space-s);display:flex;flex-direction:column;row-gap:var(--cf-space-xs);text-decoration:none;border-width:1px;border-style:solid;border-color:var(--cf-primary-30)}.related-items__item .relate-items__item-img{max-width:100%;height:auto;object-fit:cover}.gsbp-272627e,.gsbp-29cd881,.gsbp-5c7c4b3,.gsbp-7023b7d,.gsbp-7fe00f2,.gsbp-a1fdc5e,.gsbp-ff98567{object-fit:contain}body .relate-items__item-title:is(h1,h2,h3,h4,h5,h6){text-decoration:none;color:var(--cf-primary)}.related-items__item .relate-items__item-img{text-decoration:none;margin-bottom:var(--cf-space-4xs)}.related-items__item .relate-items__item-title{text-decoration:none;font-size:var(--cf-text-l)}.related-items__item .related-items__item-btn{color:var(--cf-primary);padding-top:var(--cf-space-xs);padding-bottom:var(--cf-space-xs);padding-left:var(--cf-space-xs);padding-right:var(--cf-space-xs);border-width:1px;border-style:solid;max-width:150px;display:flex;justify-content:center}.related-items__item .related-items__item-text{color:var(--cf-primary)}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-53144","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/53144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/comments?post=53144"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/53144\/revisions"}],"predecessor-version":[{"id":67825,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/53144\/revisions\/67825"}],"up":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/52365"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=53144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}