{"id":42694,"date":"2023-07-26T12:30:50","date_gmt":"2023-07-26T10:30:50","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=42694"},"modified":"2023-12-13T10:19:32","modified_gmt":"2023-12-13T09:19:32","slug":"internal-audit","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-audits\/internal-audit\/","title":{"rendered":"Internal Audit"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-interne-audits-header-1.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px|15px|62px|15px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 class=\"x-text-content-text-primary\" style=\"text-align: center\">Internal Audit<\/h1>\n<p style=\"text-align: center\">Check your IT security measures.<br \/>Reliably and individually.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"||-23px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Your company needs to conduct an internal audit due to a regulatory requirement or you want to check whether your IT security measures are being implemented consistently throughout the organization? Use an internal audit to uncover any need for action.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"5px||20px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>More transparency through an Internal Audit<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>The specific reasons for an internal audit are many and varied. Among the most common are, for example:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" custom_margin=\"11px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Supplement to the internal revision<\/li>\n<li>Component of an external audit (e.g. according to ISO 27001)<\/li>\n<li>Uniform risk assessment of different business units of a global corporation<\/li>\n<li>Review of the security level of new organizational units after mergers<\/li>\n<li>Harmonization of security levels within organizational groups<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>No matter what reasons apply to you: An internal audit is always an opportunity to create transparency, identify potential risks and implement measures to reduce these risks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" custom_margin=\"-23px||||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" custom_margin=\"||20px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Benefit from an external auditor<\/h2>\n<p>[\/et_pb_text][et_pb_slider disabled_on=\"on|off|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" body_text_align=\"center\" background_color=\"RGBA(0,0,0,0)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/internes-audit-vorteile-2.jpg\" background_size=\"contain\" custom_margin=\"0px||||false|false\" custom_padding=\"58px||58px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slide _builder_version=\"4.21.0\" _module_preset=\"default\" body_text_align=\"center\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-pentest-vorteile-standards.svg\" width=\"80\" height=\"102\" class=\"wp-image-20779 size-full\" style=\"margin-left: auto;margin-right: auto\" \/><\/p>\n<p style=\"color: white;font-size: 20px;font-weight: 300;line-height: 140%;text-align: center\">Greater acceptance of the audit result due to the independence and objectivity of the auditors<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.21.0\" _module_preset=\"default\" body_text_align=\"center\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/pci-vorteile-kundenvertrauen-2.svg\" width=\"80\" height=\"102\" class=\"wp-image-20779 size-full\" style=\"margin-left: auto;margin-right: auto\" \/><\/p>\n<p style=\"color: white;font-size: 20px;font-weight: 300;line-height: 140%;text-align: center\">Relieve the workload of your internal audit department and other employees<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-pentest-vorteile.svg\" width=\"80\" height=\"102\" class=\"wp-image-20779 size-full\" style=\"margin-left: auto;margin-right: auto\" \/><\/p>\n<p style=\"color: white;font-size: 20px;font-weight: 300;line-height: 140%;text-align: center\">Auditors have expertise in the state-of-the-art technology<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.21.0\" _module_preset=\"default\" body_text_align=\"center\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-pentest-vorteile-anforderungen.svg\" width=\"80\" height=\"102\" class=\"wp-image-20779 size-full\" style=\"margin-left: auto;margin-right: auto\" \/><\/p>\n<p style=\"color: white;font-size: 20px;font-weight: 300;line-height: 140%;text-align: center\">Pragmatic recommendations for measures through combined experience in consulting and audits<\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" custom_margin=\"28px||20px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>usd AG - The right partner for your Internal Audit<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Since 2005, we are authorized by the Payment Card Industry Security Standards Council (PCI SSC) to perform security audits according to a variety of standards within the credit card payment industry. We also use our extensive experience and deep technical knowledge as a reliable partner in other audit areas, such as SWIFT, C5 or KRITIS.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" custom_padding=\"0px||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-pentest-vorteile.svg\" title_text=\"usd-ag-pentest-vorteile\" align=\"center\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"60%\" module_alignment=\"center\" height=\"100px\" custom_padding=\"15px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" header_3_text_color=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>What our team brings to you<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Many years of experience, industry certifications and broad expertise<\/li>\n<li>Best practices for routine audit execution<\/li>\n<li>Audit catalogs and frameworks tailored to your individual needs and objectives<\/li>\n<li>An understanding of internal auditing as a partnership project at eye level<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"32px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"3px||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-pentest-vorteile-abschlussbericht.svg\" title_text=\"usd-ag-pentest-vorteile-abschlussbericht\" show_bottom_space=\"off\" align=\"center\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"60%\" module_alignment=\"center\" height=\"100px\" custom_padding=\"15px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" header_3_text_color=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>What you will have in your hand at the end<\/h3>\n<p>After completion of your internal audit, you will receive a detailed results report from us. <span data-contrast=\"auto\" xml:lang=\"DE-DE\" lang=\"DE-DE\" class=\"TextRun SCXW55588576 BCX0\"><span class=\"NormalTextRun SCXW55588576 BCX0\">We prepare it in our layout and structure, either in written form or as a presentation for your management level, as desired. The report contains the following information<\/span><span class=\"NormalTextRun SCXW55588576 BCX0\">:<\/span><\/span><\/p>\n<ul>\n<li><span class=\"EOP SCXW55588576 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> A management summary that provides an overview of the current state of cybersecurity, identified risks, and key recommendations<\/span><\/li>\n<li>Documentation of the vulnerabilities found, including corresponding recommendations and actionable measures<\/li>\n<li>Documentation of the identified risks with a classification according to their respective criticality<\/li>\n<\/ul>\n<p><span class=\"EOP SCXW55588576 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\" style=\"color: #f07f1d\">Fitting your needs:<br \/><span class=\"EOP SCXW55588576 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\" style=\"color: #000000\">If you wish to have a report in your template or if you need individual adaptations, we will of course be happy to implement this for you.\u00a0<\/span><span class=\"EOP SCXW55588576 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><\/span><\/span><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"32px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"||-20px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Special Internal Audits<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_margin=\"4px|auto||auto||\" custom_padding=\"14px|7px|14px|7px|true|true\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"rgba(10,10,10,0.4)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-cloud-audit-header.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"27px||-1px||false|false\" custom_padding=\"6px|30px|0px|30px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #86ccd3;font-weight: 400\">Internal Audit accoding to ISO 27001<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>We review the maturity of your ISMS - as a prerequisite for your successful certification.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_text_color=\"#f49525\" button_bg_color=\"RGBA(255,255,255,0)\" button_border_width=\"1px\" button_border_color=\"#f49525\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"rgba(10,10,10,0.4)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-cloud-audit-header.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"27px||-1px||false|false\" custom_padding=\"6px|30px|0px|30px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #86ccd3;font-weight: 400\">Internal Reviews according to PCI DSS<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Requirement 12.11 specifically requires service providers to conduct quarterly internal reviews.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"rgba(10,10,10,0.4)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-cloud-audit-header.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"27px||-1px||false|false\" custom_padding=\"6px|30px|0px|30px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #86ccd3;font-weight: 400\">Cyber Security Check<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" link_option_url=\"https:\/\/www.usd.de\/security-audits\/cloud-security-audit\/\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>This check provides you with transparency regarding the current state of your information security and possible IT risks.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/cyber-security-check\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_text_color=\"#f49525\" button_bg_color=\"RGBA(255,255,255,0)\" button_border_width=\"1px\" button_border_color=\"#f49525\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internal Audit Check your IT security measures.Reliably and individually.Your company needs to conduct an internal audit due to a regulatory requirement or you want to check whether your IT security measures are being implemented consistently throughout the organization? Use an internal audit to uncover any need for action.More transparency through an Internal AuditThe specific reasons [&hellip;]<\/p>\n","protected":false},"author":91,"featured_media":42357,"parent":11896,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-42694","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/42694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=42694"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/42694\/revisions"}],"predecessor-version":[{"id":46995,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/42694\/revisions\/46995"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/42357"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=42694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}