{"id":24287,"date":"2025-06-05T08:11:37","date_gmt":"2025-06-05T06:11:37","guid":{"rendered":"https:\/\/de.nexis-secure.com\/?p=24287"},"modified":"2025-08-29T14:40:11","modified_gmt":"2025-08-29T12:40:11","slug":"enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter","status":"publish","type":"post","link":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","title":{"rendered":"Enhancing IAM Hygiene &#8211; The Hidden IAM Risks You Can Fix This Quarter"},"content":{"rendered":"\n<p>Orphaned accounts, outdated access rights, and neglected authorization concepts continue to pose serious challenges. Yet addressing them doesn\u2019t require an IAM transformation. With focused effort and the right tools, these risks can be handled swiftly &#8211; and with lasting results.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Still Running on Ghost Accounts?<\/h2>\n\n\n\n<p id=\"ember53\">Many organizations carry orphaned accounts &#8211; identities that remain active even after employees have departed. These accounts might exist in Active Directory, Microsoft Entra ID or SaaS applications and are rarely monitored, especially when they don\u2019t incur license costs. But they do create risk.<\/p>\n\n\n\n<p id=\"ember54\">These orphaned accounts can lead to unauthorized access, potential data breaches, and unnecessary expenses. Even in mature environments, they can represent a significant percentage of active identities.<\/p>\n\n\n\n<p id=\"ember55\">Taking action doesn\u2019t require months of planning. Modern IAM tools can scan directories, correlate with HR data, and highlight orphaned accounts in days &#8211; not weeks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Authorization Concepts That Actually Work<\/h2>\n\n\n\n<p id=\"ember57\">Many organizations still document permissions and other security relevant information in static Word or Excel files. These get uploaded to SharePoint, quickly become outdated, and are rarely revisited. This method isn\u2019t just inefficient &#8211; it\u2019s risky.<\/p>\n\n\n\n<p id=\"ember58\">An up-to-date authorization concept is not only a best practice, it\u2019s increasingly a regulatory requirement. Frameworks like DORA require clear, consistent documentation of roles, entitlements, and access rules &#8211; and evidence that they\u2019re actively maintained.<\/p>\n\n\n\n<p id=\"ember59\">In contrast to outdated manual documentation, a modern IAM approach ties the authorization concept directly into the system. That means continuous updates, risk scoring, structured onboarding, and clear auditing. Critical systems like ERP or HR platforms can be modeled with detailed governance, while less critical apps are managed with leaner structures.<\/p>\n\n\n\n<p id=\"ember60\">This structured approach boosts compliance readiness and improves operational agility &#8211; and makes DORA audits far less painful.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI in IAM: Practical, Not Hype<\/h2>\n\n\n\n<p id=\"ember62\">Artificial Intelligence is proving its value in IAM. By learning from access patterns and comparing role distributions, AI helps clean up permissions and improve governance. More importantly, it does this with transparency.<\/p>\n\n\n\n<p id=\"ember63\">Explainable AI means each recommendation comes with a clear rationale. Whether suggesting role revocations during re-certification or flagging data inconsistencies, AI provides helpful nudges &#8211; not black-box decisions. And when implemented locally, these insights don\u2019t compromise data privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Three IAM Fixes You Can Prioritize Now<\/h2>\n\n\n\n<p>You don\u2019t need a massive transformation to make real progress:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify and remove orphaned accounts to improve hygiene and reduce costs<\/li>\n\n\n\n<li>Replace static documentation with a live, system-connected authorization concept<\/li>\n\n\n\n<li>Use explainable AI to support re-certification and governance reviews<\/li>\n<\/ul>\n\n\n\n<p>Each of these can be delivered in phases, with measurable results.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p id=\"ember69\">IAM isn\u2019t just an IT function anymore &#8211; it\u2019s a shared responsibility across security, compliance, and business operations. The faster it becomes structured, transparent, and intelligent, the more value it delivers.<\/p>\n\n\n\n<p id=\"ember70\">If your IAM feels stuck or reactive, focus on these three areas. With the right guidance, you\u2019ll see improvements in weeks &#8211; not years.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How NEXIS 4 Can Help<\/h2>\n\n\n\n<p>NEXIS 4 by is designed to address these exact challenges. It provides a zero-code platform for managing entitlements, streamlining authorization concepts, and leveraging AI for intelligent access governance. With features like explainable AI, real-time analytics, and seamless integration capabilities, NEXIS 4 empowers organizations to enhance their IAM strategies effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ready to Transform Your IAM Strategy?<\/h2>\n\n\n\n<p id=\"ember74\">Discover how NEXIS 4 can help you identify orphaned accounts, modernize your authorization concept, and leverage AI for smarter access governance.<\/p>\n\n\n\n<p id=\"ember75\">\ud83d\udc49 <a href=\"https:\/\/de.nexis-secure.com\/en\/nexis-4-demo\/\">Request a Demo of NEXIS 4<\/a> and take the first step towards a more secure and compliant IAM framework.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Orphaned accounts, outdated access rights, and neglected authorization concepts continue to pose serious challenges. Yet addressing them doesn\u2019t require an IAM transformation. With focused effort and the right tools, these [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":27113,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-24287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enhancing IAM Hygiene - The Hidden IAM Risks You Can Fix This Quarter - NEXIS - Enter a new level of Enterprise Authorization Governance<\/title>\n<meta name=\"description\" content=\"Get to know our NEXIS 4 Authorization Concept!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.nexis-secure.com\/de\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing IAM Hygiene - The Hidden IAM Risks You Can Fix This Quarter - NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"og:description\" content=\"Get to know our NEXIS 4 Authorization Concept!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-05T06:11:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T12:40:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Academy-Nexis-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Verena Steinberger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Verena Steinberger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\"},\"author\":{\"name\":\"Verena Steinberger\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40\"},\"headline\":\"Enhancing IAM Hygiene &#8211; The Hidden IAM Risks You Can Fix This Quarter\",\"datePublished\":\"2025-06-05T06:11:37+00:00\",\"dateModified\":\"2025-08-29T12:40:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\"},\"wordCount\":596,\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\",\"url\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\",\"name\":\"Enhancing IAM Hygiene - The Hidden IAM Risks You Can Fix This Quarter - NEXIS - Enter a new level of Enterprise Authorization Governance\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"datePublished\":\"2025-06-05T06:11:37+00:00\",\"dateModified\":\"2025-08-29T12:40:11+00:00\",\"description\":\"Get to know our NEXIS 4 Authorization Concept!\",\"breadcrumb\":{\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/de.nexis-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing IAM Hygiene &#8211; The Hidden IAM Risks You Can Fix This Quarter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"width\":2820,\"height\":622,\"caption\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40\",\"name\":\"Verena Steinberger\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/author\/nexis_steinberger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhancing IAM Hygiene - The Hidden IAM Risks You Can Fix This Quarter - NEXIS - Enter a new level of Enterprise Authorization Governance","description":"Get to know our NEXIS 4 Authorization Concept!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.nexis-secure.com\/de\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing IAM Hygiene - The Hidden IAM Risks You Can Fix This Quarter - NEXIS - Enter a new level of Enterprise Authorization Governance","og_description":"Get to know our NEXIS 4 Authorization Concept!","og_url":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","og_site_name":"NEXIS - Enter a new level of Enterprise Authorization Governance","article_published_time":"2025-06-05T06:11:37+00:00","article_modified_time":"2025-08-29T12:40:11+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Academy-Nexis-1-scaled.jpg","type":"image\/jpeg"}],"author":"Verena Steinberger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Verena Steinberger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#article","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/"},"author":{"name":"Verena Steinberger","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40"},"headline":"Enhancing IAM Hygiene &#8211; The Hidden IAM Risks You Can Fix This Quarter","datePublished":"2025-06-05T06:11:37+00:00","dateModified":"2025-08-29T12:40:11+00:00","mainEntityOfPage":{"@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/"},"wordCount":596,"publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"image":{"@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","url":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","name":"Enhancing IAM Hygiene - The Hidden IAM Risks You Can Fix This Quarter - NEXIS - Enter a new level of Enterprise Authorization Governance","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage"},"image":{"@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","datePublished":"2025-06-05T06:11:37+00:00","dateModified":"2025-08-29T12:40:11+00:00","description":"Get to know our NEXIS 4 Authorization Concept!","breadcrumb":{"@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/de.nexis-secure.com\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/de.nexis-secure.com\/"},{"@type":"ListItem","position":2,"name":"Enhancing IAM Hygiene &#8211; The Hidden IAM Risks You Can Fix This Quarter"}]},{"@type":"WebSite","@id":"https:\/\/de.nexis-secure.com\/de\/#website","url":"https:\/\/de.nexis-secure.com\/de\/","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","description":"","publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.nexis-secure.com\/de\/#organization","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","url":"https:\/\/de.nexis-secure.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","width":2820,"height":622,"caption":"NEXIS - Enter a new level of Enterprise Authorization Governance"},"image":{"@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40","name":"Verena Steinberger","url":"https:\/\/de.nexis-secure.com\/de\/author\/nexis_steinberger\/"}]}},"_links":{"self":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/24287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/comments?post=24287"}],"version-history":[{"count":3,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/24287\/revisions"}],"predecessor-version":[{"id":24313,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/24287\/revisions\/24313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media\/27113"}],"wp:attachment":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media?parent=24287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/categories?post=24287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/tags?post=24287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}