[{"id":"ci_8ef4dfc5ffa8bd7f763b10746530e3a6927cb4fd864c0335c396ffb42da19fad","title":"Sicherheitsgovernance","path":"/de/trust-center/v1/gobierno-de-la-seguridad","children":[{"id":"ci_43d5dbef62db4f1d0795b02d48c4106e635f6a91ed1431af9277c7321632c4d8","title":"Unsere Sicherheitsphilosophie","path":"/de/trust-center/v1/nuestra-filosofia-de-seguridad","children":[]}]},{"id":"ci_f12950149031ebd36a2809d45ae942555a8d67d4257c176266284eb73a5e85fa","title":"Compliance und Risikomanagement","path":"/de/trust-center/v1/compliance-und-risikomanagement","children":[{"id":"ci_f42bed61fd3edf08c564021cf6c31a2830a4870f90d74e57c744cffd6cd71fa3","title":"Zertifizierungen und regulatorische Compliance","path":"/de/trust-center/v1/certificaciones-y-cumplimiento-normativo","children":[]},{"id":"ci_5ceecf859b920c1a4697b11fd05d01b4ca7863740f0a03ba0aa6c19312b7bb47","title":"Verantwortliche für die Verarbeitung personenbezogener Daten","path":"/de/trust-center/v1/subencargados-de-tratamiento","children":[]},{"id":"ci_c0e57105ebb38881752b30e86bb00e5a3e6012f46e932169d631381356658c32","title":"Richtlinien- und Risikomanagement","path":"/de/trust-center/v1/politica-y-gestion-de-riesgos","children":[]}]},{"id":"ci_2de78fe3c1fa7ddfa54a4a1c7d7fe1f4d678e771f386cae5e4304cfd74b35483","title":"Cloud-Infrastruktur","path":"/de/trust-center/v1/cloud-infrastruktur","children":[{"id":"ci_a40a45269492b0852f0b735d252abe60eb6f10adb3663687106a5e74f86be5cc","title":"Multi-Tenant-Architektur","path":"/de/trust-center/v1/arquitectura-multi-tenant","children":[]},{"id":"ci_fbc21fc1569ab6ba35e82210cd76985cfba3cd52aa96aaca8e9efdc2639ebb86","title":"Netzwerksicherheit","path":"/de/trust-center/v1/seguridad-en-la-red","children":[]},{"id":"ci_fc8edeae7c4c4995187a83f98581d6b108d7142823e1dc33d9c1d623e64779bd","title":"Geschäftskontinuität","path":"/de/trust-center/v1/continuidad-de-negocio","children":[]}]},{"id":"ci_d08ee1ea29b25c13159eb3e4a5e1b0688e6bbfd8c7ca63e5f24880165de48181","title":"Schutz unserer Infrastruktur","path":"/de/trust-center/v1/schutz-unserer-infrastruktur","children":[{"id":"ci_7f92ad06a6b09da224a8ec90f95c92b398b726094308c6a5dd2e113cccca2f91","title":"Infrastrukturübersicht","path":"/de/trust-center/v1/descripcion-general-de-la-infraestructura","children":[]},{"id":"ci_3cdacb5a3b11aee492a9a257dd0a5d045c223d01286a2442bf141862788f0aec","title":"Datenmanagement","path":"/de/trust-center/v1/gestion-del-dato","children":[]},{"id":"ci_d7cdf510fad59d6a365177c5d27fa5a7b92fe19b73e46f0d87e15df036c71457","title":"Vorfallmanagement","path":"/de/trust-center/v1/gestion-de-incidentes","children":[]},{"id":"ci_8a94417381efb8583c63b0e14d31adcb5b6c04ded733f4c19a3203d3e3bd6a98","title":"Physische Sicherheit","path":"/de/trust-center/v1/seguridad-fisica","children":[]},{"id":"ci_97452ed7983b67def00cb1471205f4eaa55d1df93f0378d73177457399c7e979","title":"Verschlüsselung","path":"/de/trust-center/v1/cifrado","children":[]},{"id":"ci_44054ba459cfc35d9b439cbd411c039e741e89188a00ec169e8cd855b133b3c0","title":"Zugriffsmanagement","path":"/de/trust-center/v1/gestion-de-acceso","children":[]},{"id":"ci_b4914735b347ba9267e200b8688079c00bbfe4a5fcb920d84850634f50e80356","title":"Schwachstellenmanagement","path":"/de/trust-center/v1/gestion-de-vulnerabilidades","children":[]}]},{"id":"ci_3d70b735702c5f8d3c279240bbaf3f66d702f06d97ebd2d4607c2808bf4effb2","title":"Schutz unserer Menschen","path":"/de/trust-center/v1/protegiendo-nuestras-personas","children":[]},{"id":"ci_e2c2448504d4673a838b6f08c3a1c65d7ecdc1ed93937b091f0fb6050e6c264b","title":"Schutz unserer Produkte","path":"/de/trust-center/v1/protegiendo-nuestros-productos","children":[]}]