{"id":11896,"date":"2021-04-28T08:38:52","date_gmt":"2021-04-28T06:38:52","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-audits\/"},"modified":"2025-02-25T16:48:33","modified_gmt":"2025-02-25T15:48:33","slug":"security-audits","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-audits\/","title":{"rendered":"Security Audits"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-header-compliance-audits.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"112px||62px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 class=\"x-text-content-text-primary\" style=\"text-align: center\">Security Audits<\/h1>\n<p style=\"text-align: center\">Transparency. Compliance. More security.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\">Our Services for Businesses<\/h2>\n<div class=\"x-text\">\n<p><span>Regular security audits in the areas of organization, technology and awareness are critical for businesses today. With our security audits, we have been supporting companies for many years in bringing transparency to the security level of their organization and proving their compliance within the scope of a certification.<\/span><\/p>\n<\/div>\n<div class=\"x-text\"><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Our Security Audit Focus<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" disabled_on=\"on|on|off\" sticky_enabled=\"0\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Supplier Audit<\/h3>\n<p style=\"margin-bottom: 4%\">Ensure that your suppliers and service providers comply with internal or external requirements with a supplier audit.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/supplier-audit\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-compliance-audit-dienstleister.jpg\" alt=\"Dienstleister Security Audit\" title_text=\"usd-compliance-audit-dienstleister\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\" disabled_on=\"off|off|on\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-compliance-audit-dienstleister.jpg\" alt=\"Dienstleister Security Audit\" title_text=\"usd-compliance-audit-dienstleister\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Supplier Audit<\/h3>\n<p style=\"margin-bottom: 4%\">Ensure that your suppliers and service providers comply with internal or external requirements with a supplier audit.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/supplier-audit\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\"][et_pb_column _builder_version=\"4.27.4\" _module_preset=\"default\" type=\"4_4\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\" color=\"#D6D6D6\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-services-security-audits.jpg\" title_text=\"usd-services-security-audits\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|phone\" module_alignment=\"center\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>KRITIS Audit<\/h3>\n<p style=\"margin-bottom: 4%\">Are you an operator of critical infrastructures? We accompany you to a successful verification of compliance.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/kritis\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\"][et_pb_column _builder_version=\"4.27.4\" _module_preset=\"default\" type=\"4_4\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\" color=\"#D6D6D6\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" disabled_on=\"on|on|off\" sticky_enabled=\"0\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Cyber Security Check<\/h3>\n<p style=\"margin-bottom: 4%\">This individual audit provides you with transparency regarding the maturity of your information security and potential risks.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/cyber-security-check\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Syber-Security-Check-im-Bereich-Security-Audit.jpg\" alt=\"Syber Security Check im Bereich Security Audit\" title_text=\"Syber Security Check im Bereich Security Audit\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\" disabled_on=\"off|off|on\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Syber-Security-Check-im-Bereich-Security-Audit.jpg\" alt=\"Syber Security Check im Bereich Security Audit\" title_text=\"Syber Security Check im Bereich Security Audit\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Cyber Security Check<\/h3>\n<p style=\"margin-bottom: 4%\">This individual audit provides you with transparency regarding the maturity of your information security and potential risks.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/cyber-security-check\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\"][et_pb_column _builder_version=\"4.27.4\" _module_preset=\"default\" type=\"4_4\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\" color=\"#D6D6D6\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd_security_audits_internes_audit.png\" title_text=\"usd_security_audits_internes_audit\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|phone\" module_alignment=\"center\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Internal Audit<\/h3>\n<p style=\"margin-bottom: 4%\">Requirement or preparation of your successful certification: Through internal audits, we check compliance with internal or external requirements for you - independently and efficiently.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/internal-audit\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\"][et_pb_column _builder_version=\"4.27.4\" _module_preset=\"default\" type=\"4_4\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\" color=\"#D6D6D6\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" disabled_on=\"on|on|off\" sticky_enabled=\"0\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Internal Audit According to ISO 27001<\/h3>\n<p style=\"margin-bottom: 4%\">With an Internal Audit according to ISO\/IEC 27001:2013, we assess the maturity of your ISMS \u2013 as preparation and prerequisite for your successful certification.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-consulting-isms-audit-IT-Sicherheit.jpg\" alt=\"Internes Audit nach ISO 27001 - ISMS Security Audit\" title_text=\"Internes Audit nach ISO 27001 - ISMS Security Audit\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\" disabled_on=\"off|off|on\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-consulting-isms-audit-IT-Sicherheit.jpg\" alt=\"Internes Audit nach ISO 27001 - ISMS Security Audit\" title_text=\"Internes Audit nach ISO 27001 - ISMS Security Audit\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Internal Audit According to ISO 27001<\/h3>\n<p style=\"margin-bottom: 4%\">With an Internal Audit according to ISO\/IEC 27001:2013, we assess the maturity of your ISMS \u2013 as preparation and prerequisite for your successful certification.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\"][et_pb_column _builder_version=\"4.27.4\" _module_preset=\"default\" type=\"4_4\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\" color=\"#D6D6D6\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/cloud-security-audit.jpg\" title_text=\"cloud security audit\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|phone\" module_alignment=\"center\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\" alt=\"cloud security audit\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h3>Cloud Security Audit<\/h3>\n<p style=\"margin-bottom: 4%\">You process highly sensitive data in the cloud and want a full investigation of your cloud environment? We perform a comprehensive security review of your cloud environment.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/cloud-security-audit\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\"][et_pb_column _builder_version=\"4.27.4\" _module_preset=\"default\" type=\"4_4\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\" color=\"#D6D6D6\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" disabled_on=\"on|on|off\" sticky_enabled=\"0\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>BSI C5 Audit<\/h3>\n<p style=\"margin-bottom: 4%\">You are a cloud provider and want to prove the level of IT security of your cloud services? We accompany you to the successful audit according to BSI C5.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-security-audits\/\" button_text=\"Contact us\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-cloud-pentest-3.jpeg\" alt=\"Internes Audit nach ISO 27001 - ISMS Security Audit\" title_text=\"usd-herolab-cloud-pentest-3\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\" disabled_on=\"off|off|on\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-cloud-pentest-3.jpeg\" alt=\"Internes Audit nach ISO 27001 - ISMS Security Audit\" title_text=\"usd-herolab-cloud-pentest-3\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>BSI C5 Audit<\/h3>\n<p style=\"margin-bottom: 4%\">You are a cloud provider and want to prove the level of IT security of your cloud services? We accompany you to the successful audit according to BSI C5.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-security-audits\/\" button_text=\"Contact us\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\"][et_pb_column _builder_version=\"4.27.4\" _module_preset=\"default\" type=\"4_4\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.27.4\" _module_preset=\"default\" theme_builder_area=\"post_content\" color=\"#D6D6D6\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-15px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2>We Provide Practical Guidance for Your Security Audit<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.0\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.0\" _module_preset=\"default\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_testimonial author=\"Jan Kemper\" job_title=\"Head of Security Audits\" portrait_url=\"https:\/\/www.usd.de\/wp-content\/uploads\/rund_Jan-Kemper.png\" quote_icon_color=\"#F07F1D\" quote_icon_background_color=\"#FFFFFF\" font_icon=\"&#xe06a;||divi||400\" portrait_width=\"200px\" portrait_height=\"200px\" use_icon_font_size=\"on\" icon_font_size=\"35px\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"3%||2%||false|false\" animation_style=\"fade\" hover_enabled=\"0\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" border_radii_portrait=\"on|100%|100%|100%|100%\" border_color_all_portrait=\"RGBA(255,255,255,0)\" box_shadow_style_image=\"preset4\" box_shadow_horizontal_image=\"0px\" box_shadow_vertical_image=\"0px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" title_text=\"rund_Jan-Kemper\" sticky_enabled=\"0\"]<\/p>\n<p><span style=\"font-size: 18px;font-weight: 300\">Our customers value our practical approach, helpfulness and technical expertise. As auditors, we always act objectively and with the highest standards of quality. We bear a great deal of responsibility in every aspect and are aware of this at all times.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Audits Transparency. Compliance. More security.Our Services for Businesses Regular security audits in the areas of organization, technology and awareness are critical for businesses today. With our security audits, we have been supporting companies for many years in bringing transparency to the security level of their organization and proving their compliance within the scope of [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":18522,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11896","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11896"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11896\/revisions"}],"predecessor-version":[{"id":56628,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11896\/revisions\/56628"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/18522"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}