[{"data":1,"prerenderedAt":782},["ShallowReactive",2],{"/de-de/topics/devsecops/what-is-developer-first-security/":3,"navigation-de-de":127,"banner-de-de":545,"footer-de-de":557,"next-steps-de-de":767},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"seo":8,"content":13,"_id":121,"_type":122,"title":7,"_source":123,"_file":124,"_stem":125,"_extension":126},"/de-de/topics/devsecops/what-is-developer-first-security","devsecops",false,"",{"title":9,"description":10,"config":11},"Was ist Sicherheit, die Entwickler(innen) in den Mittelpunkt stellt?","GitLab Topics | What is developer-first security?",{"ignoreTitleCharLimit":12},true,[14,28,34,86,119],{"type":15,"componentName":15,"componentContent":16},"CommonBreadcrumbs",{"crumbs":17},[18,22,26],{"title":19,"config":20},"Industry topics",{"href":21},"/topics/",{"title":23,"config":24},"Devsecops",{"href":25},"/de-de/topics/devsecops/",{"title":27},"What is developer first security",{"type":29,"componentName":29,"componentContent":30},"TopicsHero",{"title":9,"text":31,"config":32},"DevSecOps ist eine Softwareentwicklungsmethodik, die Entwicklung, Sicherheit und Betrieb in einem einzigen Team vereint. Die Anwendungssicherheit spielt seit langem in der Softwareentwicklung eine nachrangige Rolle. Daher ist es ein Kernaspekt von DevSecOps, die Sicherheit im Vorfeld zu kontrollieren, also viel näher an der Entwicklung als je zuvor. Sicherheit, die Entwickler(innen) in den Mittelpunkt stellt, ist ein relativ neues Konzept, das den ultimativen Schritt hin zur Kontrolle der Sicherheit im Vorfeld darstellt: Dabei bekommen nämlich Entwickler(innen) die nötigen Sicherheitstools zur Seite gestellt, damit ein großer Teil der Sicherheitsscans, Tests und Behebung bereits in der integrierten Entwicklungsumgebung (IDE) erfolgt.\n",{"id":33,"twoColumns":6},"was-ist-sicherheit,-die-entwickler(innen)-in-den-mittelpunkt-stellt?",{"type":35,"componentName":35,"componentContent":36},"CommonSideNavigationWithTree",{"anchors":37,"components":56},{"text":38,"data":39},"On this page",[40,44,48,52],{"text":41,"config":42},"Warum ist Anwendungssicherheit wichtig?",{"href":43},"#why-application-security-matters",{"text":45,"config":46},"Der traditionelle Sicherheitsansatz",{"href":47},"#the-traditional-approach-to-security",{"text":49,"config":50},"Auftritt für DevSecOps",{"href":51},"#enter-dev-sec-ops",{"text":53,"config":54},"Sicherheit, die Entwickler(innen) in den Mittelpunkt stellt bzw. kontextbezogene Sicherheit",{"href":55},"#developer-first-or-in-context-security",[57,63,68,73,78],{"type":58,"componentName":58,"componentContent":59},"TopicsCopy",{"header":41,"text":60,"config":61},"Eine aktuelle Umfrage von Forrester Research, „Breaches By The Numbers: Adapting To Regional Challenges Is Imperative“, vom 12. April 2022 zeigte, dass [63 % der Unternehmen im letzten Jahr von einem Sicherheitsvorfall betroffen waren](https://www.forrester.com/blogs/breaches-by-the-numbers-adapting-to-regional-challenges-is-imperative/){data-ga-name=\"forrester security breaches blog post\" data-ga-location=\"body\"}, was 4 % mehr als im Jahr davor sind. Wichtig ist auch zu wissen, dass [Code derzeit das primäre Ziel](/blog/why-security-champions/){data-ga-name=\"security champions blog post\" data-ga-location=\"body\"} ist und nicht mehr die Infrastruktur. Um das Ganze noch komplizierter zu machen, deuten einige Schätzungen darauf hin, dass gut [60 % aller Anwendungen aus Open-Source-Code bestehen](https://www.helpnetsecurity.com/2018/05/22/open-source-code-security-risk/){data-ga-name=\"open source code security risk\" data-ga-location=\"body\"} – andere Schätzungen gehen gar von 80 % oder 90 % aus. Open-Source-Code enthält von Natur aus eher Schwachstellen oder bösartigen Code als Code, der von Grund auf neu erstellt wurde. Dennoch ist er eine verständliche Wahl für vielbeschäftigte Entwickler(innen), die hochwertigen Code liefern und dabei immer kürzere Fristen einhalten müssen.",{"id":62},"why-application-security-matters",{"type":58,"componentName":58,"componentContent":64},{"header":45,"text":65,"config":66},"Jahrelang war Sicherheit ein eigener Teilbereich, der erst ins Spiel kam, nachdem der Code committed wurde, um Sicherheitslücken zu finden und Änderungen von den (verständlicherweise nicht sonderlich begeisterten) Entwickler(innen) zu fordern, die bereits mit dem nächsten Projekt beschäftigt waren. Sicherheit war nicht nur nachgelagert, sie wurde auch von oben herab bestimmt und von Menschen diktiert, die weit weg von den Herausforderungen in der Entwicklung waren. Es ist nicht schwer zu verstehen, warum dieser Ansatz eine große Quelle für Frustration bei allen Beteiligten war.\n",{"id":67},"the-traditional-approach-to-security",{"type":58,"componentName":58,"componentContent":69},{"header":49,"text":70,"config":71},"Das Ziel von [DevSecOps](/solutions/security-compliance/){data-ga-name=\"dev sec ops landing\" data-ga-location=\"body\"} war es, die Silos, die mit der Einführung von DevOps schon langsam ins Wanken kamen, gänzlich aufzubrechen – jetzt [arbeiten Entwicklung, Betrieb und Sicherheit gänzlich zusammen](/topics/devsecops/){data-ga-name=\"devsecops topics landing\" data-ga-location=\"body\"}. Es ist noch nicht lange her, aber unsere [globale DevSecOps-Umfrage von 2022](/developer-survey/){data-ga-name=\"devsecops developer survey\" data-ga-location=\"body\"} zeigte vielversprechende Anzeichen: Fast 29 % der Sicherheitsexpert(inn)en gaben an, dass sie jetzt Teil eines funktionsübergreifenden Sicherheitsteams sind, und 57 % der Mitglieder des Sicherheitsteams gaben an, dass ihre Unternehmen die Sicherheit entweder verlagert haben oder dies in diesem Jahr planen.\n\nDie Spannungen zwischen den Entwickler(inne)n und den Sicherheitsteams bleiben bestehen, aber es gibt Anzeichen dafür, dass sich die Beziehungen verbessern. Im Jahr 2022 beschwerten sich weniger Sicherheitsexpert(inn)en über Sicherheitslücken, die spät im Lebenszyklus der Softwareentwicklung identifiziert wurden, oder über Schwierigkeiten, Entwickler(innen) dazu zu bringen, Sicherheitsrisiken anzugehen.\n\nAuf der Seite der Entwickler(innen) gab über die Hälfte an, dass sie „voll verantwortlich“ für die Sicherheit in ihrem Unternehmen seien, während weitere 39 % sagten, sie fühlen sich als Teil eines größeren Teams für die Sicherheit verantwortlich.\n",{"id":72},"enter-dev-sec-ops",{"type":58,"componentName":58,"componentContent":74},{"header":53,"text":75,"config":76},"Um diesen Teufelskreis zu durchbrechen, sagen Expert(inn)en, dass es an der Zeit ist, über kontextbezogene Sicherheit bzw. Sicherheit, die Entwickler(innen) in den Mittelpunkt stellt, nachzudenken. Kurz gesagt: Bei Sicherheit, die Entwickler(innen) in den Mittelpunkt stellt, erhalten die Entwickler(innen) „entwicklerfreundliche“ Sicherheitstools in der IDE, mit denen sie ganz einfach Sicherheitsprobleme aufdecken und beheben können. Idealerweise sind diese Sicherheitskontrollen automatisiert, sodass vielbeschäftigte Entwickler(innen) nicht einmal über die Sicherheitsanforderungen nachdenken müssen, um sicheren Code zu erstellen – das Ganze erfolgt ganz einfach im Rahmen des Programmierprozesses.\n\nDer Schlüssel zum Erfolg von Sicherheit, die Entwickler(innen) in den Mittelpunkt stellt, ist ein Perspektivenwechsel auf beiden Seiten. Sicherheitsexpert(inn)en müssen sich in Erinnerung rufen, dass Entwickler(innen) viele Aufgaben zu meistern haben (Programmieren, Testen, Sicherheit und sogar einige betriebliche Aufgaben). Angesichts dessen ist es wichtig, dass Sicherheitsprofis sich Zeit nehmen, um zu verstehen, was Entwickler(innen) tun müssen – und vielleicht sogar selbst programmieren lernen – um ihnen die notwendige Schulung, Ermutigung und Empathie zu bieten. Gleichzeitig müssen Entwickler(innen) offen für Änderungen sein und sich auf die Möglichkeit freuen, sinnvoll zur Codesicherheit beizutragen.\n\nBei der Integration von Sicherheit ins Entwicklungsteams muss sichergestellt werden, dass die Teams über die richtige Mischung aus Kompetenzen verfügen. Eine kollegiale Umgebung trägt stark dazu bei, dass Bemühungen für einen Sicherheitsansatz, der die Entwickler(innen) in den Mittelpunkt stellt, auch wirklich erfolgreich sind.",{"id":77},"developer-first-or-in-context-security",{"type":79,"componentName":79,"componentContent":80},"TopicsCallToAction",{"subtitle":81,"primaryButton":82},"DevSecOps mit GitLab",{"text":83,"config":84},"Mehr erfahren",{"href":85},"/de-de/solutions/security-compliance/",{"type":87,"componentName":87,"componentContent":88},"CommonResourcesContainer",{"header":89,"tabs":90},"Mehr über DevSecOps erfahren",[91,106],{"name":92,"items":93,"config":105},"Videos",[94],{"header":95,"type":96,"image":97,"link":100},"Bürgernahe Resilienz in herausfordernden Zeiten","Video",{"altText":95,"config":98},{"src":99},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1749158710/Website/Topics/img-fallback-cards-infinity.png",{"text":101,"config":102},"Jetzt ansehen",{"href":103,"icon":104,"modal":6},"https://page.gitlab.com/webcast-citizen-centric-resiliency.html","Webcast",{"key":92},{"name":107,"items":108,"config":118},"Artikels",[109],{"header":110,"type":111,"image":112,"link":114},"Bewährte Methoden für eine DoD-DevSecOps-Kultur","Artikel",{"altText":110,"config":113},{"src":99},{"text":83,"config":115},{"href":116,"icon":117,"modal":6},"https://page.gitlab.com/resources-article-RightPlatformDoD.html","Article",{"key":107},{"type":120,"componentName":120},"CommonNextSteps","content:de-de:topics:devsecops:what-is-developer-first-security:index.yml","yaml","content","de-de/topics/devsecops/what-is-developer-first-security/index.yml","de-de/topics/devsecops/what-is-developer-first-security/index","yml",{"_path":128,"_dir":129,"_draft":6,"_partial":6,"_locale":7,"data":130,"_id":541,"_type":122,"title":542,"_source":123,"_file":543,"_stem":544,"_extension":126},"/shared/de-de/main-navigation","de-de",{"logo":131,"freeTrial":136,"sales":141,"login":146,"items":151,"search":482,"minimal":518,"duo":532},{"config":132},{"href":133,"dataGaName":134,"dataGaLocation":135},"/de-de/","gitlab logo","header",{"text":137,"config":138},"Kostenlose Testversion anfordern",{"href":139,"dataGaName":140,"dataGaLocation":135},"https://gitlab.com/-/trial_registrations/new?glm_source=about.gitlab.com&glm_content=default-saas-trial/","free trial",{"text":142,"config":143},"Vertrieb kontaktieren",{"href":144,"dataGaName":145,"dataGaLocation":135},"/de-de/sales/","sales",{"text":147,"config":148},"Anmelden",{"href":149,"dataGaName":150,"dataGaLocation":135},"https://gitlab.com/users/sign_in/","sign in",[152,195,292,297,403,463],{"text":153,"config":154,"cards":156,"footer":178},"Plattform",{"dataNavLevelOne":155},"platform",[157,163,171],{"title":153,"description":158,"link":159},"Die umfassendste KI-basierte DevSecOps-Plattform",{"text":160,"config":161},"Erkunde unsere Plattform",{"href":162,"dataGaName":155,"dataGaLocation":135},"/de-de/platform/",{"title":164,"description":165,"link":166},"GitLab Duo (KI)","Entwickle Software schneller mit KI in jeder Phase der Entwicklung",{"text":167,"config":168},"Lerne GitLab Duo kennen",{"href":169,"dataGaName":170,"dataGaLocation":135},"/de-de/gitlab-duo/","gitlab duo ai",{"title":172,"description":173,"link":174},"Gründe, die für GitLab sprechen","10 Gründe, warum Unternehmen sich für GitLab entscheiden",{"text":83,"config":175},{"href":176,"dataGaName":177,"dataGaLocation":135},"/de-de/why-gitlab/","why gitlab",{"title":179,"items":180},"Erste Schritte mit",[181,186,191],{"text":182,"config":183},"Platform Engineering",{"href":184,"dataGaName":185,"dataGaLocation":135},"/de-de/solutions/platform-engineering/","platform engineering",{"text":187,"config":188},"Entwicklererfahrung",{"href":189,"dataGaName":190,"dataGaLocation":135},"/de-de/developer-experience/","Developer experience",{"text":192,"config":193},"MLOps",{"href":194,"dataGaName":192,"dataGaLocation":135},"/de-de/topics/devops/the-role-of-ai-in-devops/",{"text":196,"left":12,"config":197,"link":199,"lists":203,"footer":274},"Produkt",{"dataNavLevelOne":198},"solutions",{"text":200,"config":201},"Alle Lösungen anzeigen",{"href":202,"dataGaName":198,"dataGaLocation":135},"/de-de/solutions/",[204,230,252],{"title":205,"description":206,"link":207,"items":212},"Automatisierung","CI/CD und Automatisierung zur Beschleunigung der Bereitstellung",{"config":208},{"icon":209,"href":210,"dataGaName":211,"dataGaLocation":135},"AutomatedCodeAlt","/de-de/solutions/delivery-automation/","automated software delivery",[213,217,221,226],{"text":214,"config":215},"CI/CD",{"href":216,"dataGaLocation":135,"dataGaName":214},"/de-de/solutions/continuous-integration/",{"text":218,"config":219},"KI-unterstützte Entwicklung",{"href":169,"dataGaLocation":135,"dataGaName":220},"AI assisted development",{"text":222,"config":223},"Quellcodeverwaltung",{"href":224,"dataGaLocation":135,"dataGaName":225},"/de-de/solutions/source-code-management/","Source Code Management",{"text":227,"config":228},"Automatisierte Softwarebereitstellung",{"href":210,"dataGaLocation":135,"dataGaName":229},"Automated software delivery",{"title":231,"description":232,"link":233,"items":237},"Sicherheit","Entwickle schneller, ohne die Sicherheit zu gefährden",{"config":234},{"href":85,"dataGaName":235,"dataGaLocation":135,"icon":236},"security and compliance","ShieldCheckLight",[238,242,247],{"text":239,"config":240},"Sicherheit und Compliance",{"href":85,"dataGaLocation":135,"dataGaName":241},"Security & Compliance",{"text":243,"config":244},"Schutz der Software-Lieferkette",{"href":245,"dataGaLocation":135,"dataGaName":246},"/de-de/solutions/supply-chain/","Software supply chain security",{"text":248,"config":249},"Compliance und Governance",{"href":250,"dataGaLocation":135,"dataGaName":251},"/de-de/solutions/continuous-software-compliance/","Compliance and governance",{"title":253,"link":254,"items":259},"Bewertung",{"config":255},{"icon":256,"href":257,"dataGaName":258,"dataGaLocation":135},"DigitalTransformation","/de-de/solutions/visibility-measurement/","visibility and measurement",[260,264,269],{"text":261,"config":262},"Sichtbarkeit und Bewertung",{"href":257,"dataGaLocation":135,"dataGaName":263},"Visibility and Measurement",{"text":265,"config":266},"Wertstrommanagement",{"href":267,"dataGaLocation":135,"dataGaName":268},"/de-de/solutions/value-stream-management/","Value Stream Management",{"text":270,"config":271},"Analysen und Einblicke",{"href":272,"dataGaLocation":135,"dataGaName":273},"/de-de/solutions/analytics-and-insights/","Analytics and insights",{"title":275,"items":276},"GitLab für",[277,282,287],{"text":278,"config":279},"Enterprise",{"href":280,"dataGaLocation":135,"dataGaName":281},"/de-de/enterprise/","enterprise",{"text":283,"config":284},"Kleinunternehmen",{"href":285,"dataGaLocation":135,"dataGaName":286},"/de-de/small-business/","small business",{"text":288,"config":289},"den öffentlichen Sektor",{"href":290,"dataGaLocation":135,"dataGaName":291},"/de-de/solutions/public-sector/","public sector",{"text":293,"config":294},"Preise",{"href":295,"dataGaName":296,"dataGaLocation":135,"dataNavLevelOne":296},"/de-de/pricing/","pricing",{"text":298,"config":299,"link":301,"lists":305,"feature":390},"Ressourcen",{"dataNavLevelOne":300},"resources",{"text":302,"config":303},"Alle Ressourcen anzeigen",{"href":304,"dataGaName":300,"dataGaLocation":135},"/de-de/resources/",[306,339,362],{"title":307,"items":308},"Erste Schritte",[309,314,319,324,329,334],{"text":310,"config":311},"Installieren",{"href":312,"dataGaName":313,"dataGaLocation":135},"/de-de/install/","install",{"text":315,"config":316},"Kurzanleitungen",{"href":317,"dataGaName":318,"dataGaLocation":135},"/de-de/get-started/","quick setup checklists",{"text":320,"config":321},"Lernen",{"href":322,"dataGaLocation":135,"dataGaName":323},"https://university.gitlab.com/","learn",{"text":325,"config":326},"Produktdokumentation",{"href":327,"dataGaName":328,"dataGaLocation":135},"https://docs.gitlab.com/","product documentation",{"text":330,"config":331},"Best-Practice-Videos",{"href":332,"dataGaName":333,"dataGaLocation":135},"/de-de/getting-started-videos/","best practice videos",{"text":335,"config":336},"Integrationen",{"href":337,"dataGaName":338,"dataGaLocation":135},"/de-de/integrations/","integrations",{"title":340,"items":341},"Entdecken",[342,347,352,357],{"text":343,"config":344},"Kundenerfolge",{"href":345,"dataGaName":346,"dataGaLocation":135},"/de-de/customers/","customer success stories",{"text":348,"config":349},"Blog",{"href":350,"dataGaName":351,"dataGaLocation":135},"/de-de/blog/","blog",{"text":353,"config":354},"Remote",{"href":355,"dataGaName":356,"dataGaLocation":135},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":358,"config":359},"TeamOps",{"href":360,"dataGaName":361,"dataGaLocation":135},"/de-de/teamops/","teamops",{"title":363,"items":364},"Vernetzen",[365,370,375,380,385],{"text":366,"config":367},"GitLab-Services",{"href":368,"dataGaName":369,"dataGaLocation":135},"/de-de/services/","services",{"text":371,"config":372},"Community",{"href":373,"dataGaName":374,"dataGaLocation":135},"/community/","community",{"text":376,"config":377},"Forum",{"href":378,"dataGaName":379,"dataGaLocation":135},"https://forum.gitlab.com/","forum",{"text":381,"config":382},"Veranstaltungen",{"href":383,"dataGaName":384,"dataGaLocation":135},"/events/","events",{"text":386,"config":387},"Partner",{"href":388,"dataGaName":389,"dataGaLocation":135},"/de-de/partners/","partners",{"backgroundColor":391,"textColor":392,"text":393,"image":394,"link":398},"#2f2a6b","#fff","Perspektiven für die Softwareentwicklung der Zukunft",{"altText":395,"config":396},"the source promo card",{"src":397},"/images/navigation/the-source-promo-card.svg",{"text":399,"config":400},"Lies die News",{"href":401,"dataGaName":402,"dataGaLocation":135},"/de-de/the-source/","the source",{"text":404,"config":405,"lists":407},"Unternehmen",{"dataNavLevelOne":406},"company",[408],{"items":409},[410,415,421,423,428,433,438,443,448,453,458],{"text":411,"config":412},"Über",{"href":413,"dataGaName":414,"dataGaLocation":135},"/de-de/company/","about",{"text":416,"config":417,"footerGa":420},"Karriere",{"href":418,"dataGaName":419,"dataGaLocation":135},"/jobs/","jobs",{"dataGaName":419},{"text":381,"config":422},{"href":383,"dataGaName":384,"dataGaLocation":135},{"text":424,"config":425},"Geschäftsführung",{"href":426,"dataGaName":427,"dataGaLocation":135},"/company/team/e-group/","leadership",{"text":429,"config":430},"Team",{"href":431,"dataGaName":432,"dataGaLocation":135},"/company/team/","team",{"text":434,"config":435},"Handbuch",{"href":436,"dataGaName":437,"dataGaLocation":135},"https://handbook.gitlab.com/","handbook",{"text":439,"config":440},"Investor Relations",{"href":441,"dataGaName":442,"dataGaLocation":135},"https://ir.gitlab.com/","investor relations",{"text":444,"config":445},"Trust Center",{"href":446,"dataGaName":447,"dataGaLocation":135},"/de-de/security/","trust center",{"text":449,"config":450},"AI Transparency Center",{"href":451,"dataGaName":452,"dataGaLocation":135},"/de-de/ai-transparency-center/","ai transparency center",{"text":454,"config":455},"Newsletter",{"href":456,"dataGaName":457,"dataGaLocation":135},"/company/contact/","newsletter",{"text":459,"config":460},"Presse",{"href":461,"dataGaName":462,"dataGaLocation":135},"/press/","press",{"text":464,"config":465,"lists":466},"Kontakt",{"dataNavLevelOne":406},[467],{"items":468},[469,472,477],{"text":142,"config":470},{"href":144,"dataGaName":471,"dataGaLocation":135},"talk to sales",{"text":473,"config":474},"Support",{"href":475,"dataGaName":476,"dataGaLocation":135},"/support/","get help",{"text":478,"config":479},"Kundenportal",{"href":480,"dataGaName":481,"dataGaLocation":135},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"close":483,"login":484,"suggestions":491},"Schließen",{"text":485,"link":486},"Um Repositories und Projekte zu durchsuchen, melde dich an bei",{"text":487,"config":488},"gitlab.com",{"href":149,"dataGaName":489,"dataGaLocation":490},"search login","search",{"text":492,"default":493},"Vorschläge",[494,497,502,504,509,514],{"text":164,"config":495},{"href":169,"dataGaName":496,"dataGaLocation":490},"GitLab Duo (AI)",{"text":498,"config":499},"Code Suggestions (KI)",{"href":500,"dataGaName":501,"dataGaLocation":490},"/de-de/solutions/code-suggestions/","Code Suggestions (AI)",{"text":214,"config":503},{"href":216,"dataGaName":214,"dataGaLocation":490},{"text":505,"config":506},"GitLab auf AWS",{"href":507,"dataGaName":508,"dataGaLocation":490},"/de-de/partners/technology-partners/aws/","GitLab on AWS",{"text":510,"config":511},"GitLab auf Google Cloud",{"href":512,"dataGaName":513,"dataGaLocation":490},"/de-de/partners/technology-partners/google-cloud-platform/","GitLab on Google Cloud",{"text":515,"config":516},"Warum GitLab?",{"href":176,"dataGaName":517,"dataGaLocation":490},"Why GitLab?",{"freeTrial":519,"mobileIcon":524,"desktopIcon":529},{"text":520,"config":521},"Kostenlos testen",{"href":522,"dataGaName":140,"dataGaLocation":523},"https://gitlab.com/-/trials/new/","nav",{"altText":525,"config":526},"GitLab-Symbol",{"src":527,"dataGaName":528,"dataGaLocation":523},"/images/brand/gitlab-logo-tanuki.svg","gitlab icon",{"altText":525,"config":530},{"src":531,"dataGaName":528,"dataGaLocation":523},"/images/brand/gitlab-logo-type.svg",{"freeTrial":533,"mobileIcon":537,"desktopIcon":539},{"text":534,"config":535},"Erfahre mehr über GitLab Duo",{"href":169,"dataGaName":536,"dataGaLocation":523},"gitlab duo",{"altText":525,"config":538},{"src":527,"dataGaName":528,"dataGaLocation":523},{"altText":525,"config":540},{"src":531,"dataGaName":528,"dataGaLocation":523},"content:shared:de-de:main-navigation.yml","Main Navigation","shared/de-de/main-navigation.yml","shared/de-de/main-navigation",{"_path":546,"_dir":129,"_draft":6,"_partial":6,"_locale":7,"title":547,"button":548,"config":552,"_id":554,"_type":122,"_source":123,"_file":555,"_stem":556,"_extension":126},"/shared/de-de/banner","Die GitLab Duo Agent Platform ist jetzt in der öffentlichen Beta-Phase!",{"text":83,"config":549},{"href":550,"dataGaName":551,"dataGaLocation":135},"/gitlab-duo/agent-platform/","duo banner",{"layout":553},"release","content:shared:de-de:banner.yml","shared/de-de/banner.yml","shared/de-de/banner",{"_path":558,"_dir":129,"_draft":6,"_partial":6,"_locale":7,"data":559,"_id":763,"_type":122,"title":764,"_source":123,"_file":765,"_stem":766,"_extension":126},"/shared/de-de/main-footer",{"text":560,"source":561,"edit":567,"contribute":572,"config":577,"items":582,"minimal":755},"Git ist eine Marke von Software Freedom Conservancy und unsere Verwendung von „GitLab“ erfolgt unter Lizenz.",{"text":562,"config":563},"Quelltext der Seite anzeigen",{"href":564,"dataGaName":565,"dataGaLocation":566},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":568,"config":569},"Diese Seite bearbeiten",{"href":570,"dataGaName":571,"dataGaLocation":566},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":573,"config":574},"Beteilige dich",{"href":575,"dataGaName":576,"dataGaLocation":566},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":578,"facebook":579,"youtube":580,"linkedin":581},"https://x.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[583,606,661,691,725],{"title":153,"links":584,"subMenu":589},[585],{"text":586,"config":587},"DevSecOps-Plattform",{"href":162,"dataGaName":588,"dataGaLocation":566},"devsecops platform",[590],{"title":293,"links":591},[592,596,601],{"text":593,"config":594},"Tarife anzeigen",{"href":295,"dataGaName":595,"dataGaLocation":566},"view plans",{"text":597,"config":598},"Vorteile von Premium",{"href":599,"dataGaName":600,"dataGaLocation":566},"/de-de/pricing/premium/","why premium",{"text":602,"config":603},"Vorteile von Ultimate",{"href":604,"dataGaName":605,"dataGaLocation":566},"/de-de/pricing/ultimate/","why ultimate",{"title":607,"links":608},"Lösungen",[609,614,617,619,624,629,633,636,639,644,646,648,651,656],{"text":610,"config":611},"Digitale Transformation",{"href":612,"dataGaName":613,"dataGaLocation":566},"/de-de/topics/digital-transformation/","digital transformation",{"text":239,"config":615},{"href":85,"dataGaName":616,"dataGaLocation":566},"security & compliance",{"text":227,"config":618},{"href":210,"dataGaName":211,"dataGaLocation":566},{"text":620,"config":621},"Agile Entwicklung",{"href":622,"dataGaName":623,"dataGaLocation":566},"/de-de/solutions/agile-delivery/","agile delivery",{"text":625,"config":626},"Cloud-Transformation",{"href":627,"dataGaName":628,"dataGaLocation":566},"/de-de/topics/cloud-native/","cloud transformation",{"text":630,"config":631},"SCM",{"href":224,"dataGaName":632,"dataGaLocation":566},"source code management",{"text":214,"config":634},{"href":216,"dataGaName":635,"dataGaLocation":566},"continuous integration & delivery",{"text":265,"config":637},{"href":267,"dataGaName":638,"dataGaLocation":566},"value stream management",{"text":640,"config":641},"GitOps",{"href":642,"dataGaName":643,"dataGaLocation":566},"/de-de/solutions/gitops/","gitops",{"text":278,"config":645},{"href":280,"dataGaName":281,"dataGaLocation":566},{"text":283,"config":647},{"href":285,"dataGaName":286,"dataGaLocation":566},{"text":649,"config":650},"Öffentlicher Sektor",{"href":290,"dataGaName":291,"dataGaLocation":566},{"text":652,"config":653},"Bildungswesen",{"href":654,"dataGaName":655,"dataGaLocation":566},"/de-de/solutions/education/","education",{"text":657,"config":658},"Finanzdienstleistungen",{"href":659,"dataGaName":660,"dataGaLocation":566},"/de-de/solutions/finance/","financial services",{"title":298,"links":662},[663,665,667,669,672,674,677,679,681,683,685,687,689],{"text":310,"config":664},{"href":312,"dataGaName":313,"dataGaLocation":566},{"text":315,"config":666},{"href":317,"dataGaName":318,"dataGaLocation":566},{"text":320,"config":668},{"href":322,"dataGaName":323,"dataGaLocation":566},{"text":325,"config":670},{"href":327,"dataGaName":671,"dataGaLocation":566},"docs",{"text":348,"config":673},{"href":350,"dataGaName":351,"dataGaLocation":566},{"text":343,"config":675},{"href":676,"dataGaName":346,"dataGaLocation":566},"/customers/",{"text":353,"config":678},{"href":355,"dataGaName":356,"dataGaLocation":566},{"text":366,"config":680},{"href":368,"dataGaName":369,"dataGaLocation":566},{"text":358,"config":682},{"href":360,"dataGaName":361,"dataGaLocation":566},{"text":371,"config":684},{"href":373,"dataGaName":374,"dataGaLocation":566},{"text":376,"config":686},{"href":378,"dataGaName":379,"dataGaLocation":566},{"text":381,"config":688},{"href":383,"dataGaName":384,"dataGaLocation":566},{"text":386,"config":690},{"href":388,"dataGaName":389,"dataGaLocation":566},{"title":404,"links":692},[693,695,697,699,701,703,705,709,714,716,718,720],{"text":411,"config":694},{"href":413,"dataGaName":406,"dataGaLocation":566},{"text":416,"config":696},{"href":418,"dataGaName":419,"dataGaLocation":566},{"text":424,"config":698},{"href":426,"dataGaName":427,"dataGaLocation":566},{"text":429,"config":700},{"href":431,"dataGaName":432,"dataGaLocation":566},{"text":434,"config":702},{"href":436,"dataGaName":437,"dataGaLocation":566},{"text":439,"config":704},{"href":441,"dataGaName":442,"dataGaLocation":566},{"text":706,"config":707},"Sustainability",{"href":708,"dataGaName":706,"dataGaLocation":566},"/sustainability/",{"text":710,"config":711},"Vielfalt, Inklusion und Zugehörigkeit",{"href":712,"dataGaName":713,"dataGaLocation":566},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":444,"config":715},{"href":446,"dataGaName":447,"dataGaLocation":566},{"text":454,"config":717},{"href":456,"dataGaName":457,"dataGaLocation":566},{"text":459,"config":719},{"href":461,"dataGaName":462,"dataGaLocation":566},{"text":721,"config":722},"Transparenzerklärung zu moderner Sklaverei",{"href":723,"dataGaName":724,"dataGaLocation":566},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":726,"links":727},"Nimm Kontakt auf",[728,731,733,735,740,745,750],{"text":729,"config":730},"Sprich mit einem Experten/einer Expertin",{"href":144,"dataGaName":145,"dataGaLocation":566},{"text":473,"config":732},{"href":475,"dataGaName":476,"dataGaLocation":566},{"text":478,"config":734},{"href":480,"dataGaName":481,"dataGaLocation":566},{"text":736,"config":737},"Status",{"href":738,"dataGaName":739,"dataGaLocation":566},"https://status.gitlab.com/","status",{"text":741,"config":742},"Nutzungsbedingungen",{"href":743,"dataGaName":744,"dataGaLocation":566},"/terms/","terms of use",{"text":746,"config":747},"Datenschutzerklärung",{"href":748,"dataGaName":749,"dataGaLocation":566},"/de-de/privacy/","privacy statement",{"text":751,"config":752},"Cookie-Einstellungen",{"dataGaName":753,"dataGaLocation":566,"id":754,"isOneTrustButton":12},"cookie preferences","ot-sdk-btn",{"items":756},[757,759,761],{"text":741,"config":758},{"href":743,"dataGaName":744,"dataGaLocation":566},{"text":746,"config":760},{"href":748,"dataGaName":749,"dataGaLocation":566},{"text":751,"config":762},{"dataGaName":753,"dataGaLocation":566,"id":754,"isOneTrustButton":12},"content:shared:de-de:main-footer.yml","Main Footer","shared/de-de/main-footer.yml","shared/de-de/main-footer",{"_path":768,"_dir":129,"_draft":6,"_partial":6,"_locale":7,"header":769,"eyebrow":770,"blurb":771,"button":772,"secondaryButton":776,"_id":778,"_type":122,"title":779,"_source":123,"_file":780,"_stem":781,"_extension":126},"/shared/de-de/next-steps","Stelle jetzt bessere Software schneller bereit","Mehr als 50 % der Fortune-100-Unternehmen vertrauen GitLab","Erlebe, was dein Team mit der intelligenten\n\n\nDevSecOps-Plattform erreichen kann.\n",{"text":137,"config":773},{"href":774,"dataGaName":140,"dataGaLocation":775},"https://gitlab.com/-/trial_registrations/new?glm_content=default-saas-trial&glm_source=about.gitlab.com/","feature",{"text":142,"config":777},{"href":144,"dataGaName":145,"dataGaLocation":775},"content:shared:de-de:next-steps.yml","Next Steps","shared/de-de/next-steps.yml","shared/de-de/next-steps",1754424499396]