{"id":40839,"date":"2025-08-18T12:40:41","date_gmt":"2025-08-18T12:40:41","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=105353"},"modified":"2025-08-18T12:50:12","modified_gmt":"2025-08-18T12:50:12","slug":"autosar-zugriffskontrolle","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/","title":{"rendered":"AUTOSAR-Zugriffskontrolle"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"40839\" class=\"elementor elementor-40839\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-57fa48a gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"57fa48a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d55f79 gg-tablet-view\" data-id=\"7d55f79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cce7a0b gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"cce7a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Mit der zunehmenden Vernetzung von <\/span><a href=\"https:\/\/expleo.com\/global\/de\/einblicke\/kampagnen\/software-definierte-fahrzeug\/\"><b><span data-contrast=\"none\">Software-Defined Vehicles (SDVs<\/span><\/b><\/a><b><span data-contrast=\"auto\">)<\/span><\/b><span data-contrast=\"auto\"> und <\/span><a href=\"https:\/\/expleo.com\/global\/de\/einblicke\/kampagnen\/autonomous-driving-adas\/\"><b><span data-contrast=\"none\">autonomem Fahren<\/span><\/b><\/a><span data-contrast=\"auto\"> wird die Sicherheit moderner Fahrzeugarchitekturen zur Schl\u00fcsselherausforderung. Sie sind zu vernetzten Systemen geworden, die st\u00e4ndig mit Cloud-Plattformen, mobilen Apps und anderen Fahrzeugen kommunizieren. Das macht sie aber auch anf\u00e4lliger f\u00fcr Cyberangriffe.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">AUTOSAR<\/span><\/b><span data-contrast=\"auto\">, eine f\u00fchrende Softwarearchitektur im Automotive-Bereich, bietet die Grundlage, um zentrale Sicherheitsanforderungen zu erf\u00fcllen \u2013 darunter Kryptografie, sichere Kommunikation, Zugriffskontrolle, Erkennung von Angriffen und mehr.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-007a007 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"007a007\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">In diesem Beitrag, der auf unserem Vortrag auf der <\/span><a href=\"https:\/\/www.autosar.org\/news-events\/detail\/16th-autosar-open-conference\"><span data-contrast=\"none\">16. AUTOSAR Open Conference<\/span><\/a><span data-contrast=\"auto\"> basiert, zeigen wir, wie Zugriffskontrollfunktionen wie <\/span><b><span data-contrast=\"auto\">IAM<\/span><\/b><span data-contrast=\"auto\">, <\/span><b><span data-contrast=\"auto\">SOME\/IP-ACL<\/span><\/b><span data-contrast=\"auto\"> und <\/span><b><span data-contrast=\"auto\">Firewall-Integration<\/span><\/b><span data-contrast=\"auto\"> als Teil einer umfassenden Sicherheitsstrategie genutzt werden k\u00f6nnen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:45,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e21643 elementor-widget elementor-widget-image\" data-id=\"4e21643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-1024x576.jpg\" class=\"attachment-large size-large wp-image-40697\" alt=\"A smartphone screen displays &quot;AUTOSAR Access Control&quot; with a lock icon. Next to it is a digital wireframe illustration of a car, conveying smart vehicle security and access control via mobile device.\" srcset=\"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-300x169.jpg 300w, https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-768x432.jpg 768w, https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b48c41 gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"7b48c41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Zugriffskontrolle in AUTOSAR verstehen\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4901856 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"4901856\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Sowohl in der <\/span><b><span data-contrast=\"auto\">Classic- als auch in der Adaptive-Plattform<\/span><\/b><span data-contrast=\"auto\"> von AUTOSAR werden Zugriffskontrollmechanismen stetig weiterentwickelt, um den Anforderungen von SDVs und autonomen Fahrzeugen gerecht zu werden.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Diese Mechanismen sorgen daf\u00fcr, dass nur vertrauensw\u00fcrdige Systeme auf sicherheitskritische Dienste und Daten zugreifen k\u00f6nnen. So lassen sich unautorisierte Zugriffe und Rechteausweitungen vermeiden \u2013 beides kann erhebliche Auswirkungen auf Sicherheit und Betrieb haben.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Zugriffskontrolle bezeichnet dabei die Regeln und technischen Mittel, die steuern, <\/span><b><span data-contrast=\"auto\">wer<\/span><\/b><span data-contrast=\"auto\"> auf <\/span><b><span data-contrast=\"auto\">was<\/span><\/b> <b><span data-contrast=\"auto\">unter welchen Bedingungen<\/span><\/b><span data-contrast=\"auto\"> zugreifen darf. AUTOSAR unterst\u00fctzt einen mehrschichtigen Ansatz \u2013 mit Kontrolle auf Anwendungsebene, an Dienstschnittstellen oder am Netzwerkrand.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Im Fokus stehen dabei drei Funktionen:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><ul><li><strong>IAM (Identity and Access Management)\u00a0<\/strong><\/li><li><strong>SOME\/IP-ACL\u00a0<\/strong><\/li><li><strong>Firewall-Integration\u00a0<\/strong><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8a197b gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"f8a197b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identity and Access Management (IAM) in AUTOSAR Adaptive\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdaae99 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"cdaae99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IAM ist der zentrale Baustein zur Zugriffskontrolle in AUTOSAR Adaptive. Es regelt, wie Anwendungen \u2013 ob lokal oder \u00fcber das Netzwerk \u2013 auf Dienste und Ressourcen zugreifen d\u00fcrfen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef4154 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"2ef4154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Bereits in der Entwicklungsphase definieren Entwickler den geplanten Zugriff in einem sogenannten <\/span><b><span data-contrast=\"auto\">GrantDesign-Modell<\/span><\/b><span data-contrast=\"auto\">. Bei der Systemintegration wird gepr\u00fcft, ob dieser Zugriff erlaubt wird. Danach entstehen konkrete \u201eGrants\u201c: Diese legen genau fest, <\/span><b><span data-contrast=\"auto\">welche Anwendung<\/span><\/b><span data-contrast=\"auto\"> auf <\/span><b><span data-contrast=\"auto\">welchen Dienst<\/span><\/b><span data-contrast=\"auto\"> zugreifen darf.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">IAM unterscheidet dabei:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Lokalen Zugriff<\/span><\/b><span data-contrast=\"auto\"> (innerhalb derselben ECU)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Netzwerkzugriff<\/span><\/b><span data-contrast=\"auto\"> (zwischen ECUs), wobei sichere Protokolle wie <\/span><b><span data-contrast=\"auto\">TLS<\/span><\/b><span data-contrast=\"auto\"> oder <\/span><b><span data-contrast=\"auto\">IPsec<\/span><\/b><span data-contrast=\"auto\"> zur Authentifizierung eingesetzt werden.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">Zudem spielt IAM eine wichtige Rolle bei der Verwaltung kryptografischer Schl\u00fcssel. Die sogenannten <\/span><b><span data-contrast=\"auto\">Keyslots<\/span><\/b><span data-contrast=\"auto\"> \u2013 Speicherbereiche f\u00fcr Schl\u00fcssel \u2013 k\u00f6nnen bestimmten Anwendungen zugewiesen werden. IAM sorgt daf\u00fcr, dass nur berechtigte Programme diese Schl\u00fcssel nutzen d\u00fcrfen \u2013 ein zus\u00e4tzlicher Schutz vor Datenmissbrauch.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f4c7ac gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"2f4c7ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Servicebasierte Zugriffskontrolle mit SOME\/IP-ACL (Classic)\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4fc69f gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"d4fc69f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b><span data-contrast=\"auto\">In AUTOSAR Classic erfolgt der Zugriff auf Dienste \u00fcber das Protokoll SOME\/IP. Um ungewollten Zugriff zu verhindern, nutzt man Access Control Lists (ACL) \u2013 Listen mit erlaubten IP-Adressen.<\/span><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f500de4 elementor-widget elementor-widget-text-editor\" data-id=\"f500de4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p aria-level=\"3\"><span data-contrast=\"auto\">Wenn eine Anwendung einen Dienst nutzen will (z.\u202fB. ein Ereignis abonnieren), pr\u00fcft das System, ob die IP-Adresse auf der Liste steht. Ist das nicht der Fall, wird die Anfrage abgelehnt und protokolliert.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Diese dynamische Zugriffskontrolle stellt sicher, dass nur bekannte, vertrauensw\u00fcrdige ECUs kommunizieren d\u00fcrfen \u2013 selbst wenn andere Ger\u00e4te im Netzwerk kompromittiert wurden. Zus\u00e4tzliche Sicherheit bringen Pr\u00fcfmechanismen wie Portfilter, <\/span><b><span data-contrast=\"auto\">IPsec<\/span><\/b><span data-contrast=\"auto\"> oder <\/span><b><span data-contrast=\"auto\">MACsec<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d621df5 gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"d621df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Plattform\u00fcbergreifende Firewall-Integration\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-907b74f gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"907b74f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Firewalls erg\u00e4nzen die Zugriffskontrolle, indem sie den Datenverkehr auf Netzwerkebene \u00fcberwachen und steuern.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18aa66b elementor-widget elementor-widget-text-editor\" data-id=\"18aa66b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p aria-level=\"3\"><span data-contrast=\"auto\">Sie k\u00f6nnen sowohl auf AUTOSAR Adaptive als auch Classic eingesetzt werden \u2013 oder sogar in intelligenten Switches.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Firewalls erm\u00f6glichen unterschiedliche Pr\u00fcfmethoden:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Stateless\/Stateful Inspection<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Deep Packet Inspection<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Filterregeln je nach Fahrzeugzustand oder Datenlast<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">In der <\/span><b><span data-contrast=\"auto\">Adaptive-Plattform<\/span><\/b><span data-contrast=\"auto\"> steuert ein eigener Funktionsbereich (<\/span><b><span data-contrast=\"auto\">ara::fw<\/span><\/b><span data-contrast=\"auto\">) die Firewall. Er liest Konfigurationsdaten aus dem System und erkennt verd\u00e4chtige Aktivit\u00e4ten. In der <\/span><b><span data-contrast=\"auto\">Classic-Plattform<\/span><\/b><span data-contrast=\"auto\"> sind Firewalls z.\u202fB. mit den Modulen <\/span><b><span data-contrast=\"auto\">LSduR<\/span><\/b><span data-contrast=\"auto\">, <\/span><b><span data-contrast=\"auto\">BswM<\/span><\/b><span data-contrast=\"auto\"> oder <\/span><b><span data-contrast=\"auto\">IdsM<\/span><\/b><span data-contrast=\"auto\"> verbunden.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Die Konfiguration erfolgt standardisiert \u00fcber <\/span><b><span data-contrast=\"auto\">ARXML-Dateien<\/span><\/b><span data-contrast=\"auto\">, wodurch sich Regeln direkt aus der Kommunikationsmatrix ableiten lassen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d66b64a gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"d66b64a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AUTOSAR auf dem Weg in die Zukunft\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f88a638 elementor-widget elementor-widget-text-editor\" data-id=\"f88a638\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Je st\u00e4rker Fahrzeuge vernetzt sind, desto wichtiger wird ein strukturierter, mehrstufiger Ansatz zur Zugriffskontrolle. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c4ca61 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"2c4ca61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IAM, SOME\/IP-ACL und Firewalls sind dabei keine Einzelma\u00dfnahmen \u2013 sie bilden gemeinsam eine umfassende Sicherheitsstrategie vom Softwarecode bis zur Netzwerkschnittstelle.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60862c6 elementor-widget elementor-widget-text-editor\" data-id=\"60862c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Expleo ist als <\/span><a href=\"https:\/\/www.autosar.org\/about\/partners\/premium-partner\"><b><span data-contrast=\"none\">AUTOSAR Premium-Partne<\/span><\/b><\/a><b><span data-contrast=\"auto\">r<\/span><\/b><span data-contrast=\"auto\"> aktiv an der Weiterentwicklung dieser Technologien beteiligt \u2013 insbesondere in der <\/span><a href=\"https:\/\/www.autosar.org\/working-groups\/cross-standard\"><b><span data-contrast=\"none\">AUTOSAR Working Group Security (WG-SEC)<\/span><\/b><\/a><span data-contrast=\"auto\">. Mit unserer Erfahrung in Embedded-Software und globaler Projekterfahrung helfen wir OEMs und Zulieferern, Sicherheitsfunktionen zuverl\u00e4ssig in Serienfahrzeuge zu integrieren.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d03960a gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"d03960a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M\u00f6chten Sie mehr \u00fcber unsere L\u00f6sungen f\u00fcr SDV, autonomes Fahren und ADAS erfahren?\u00a0\u00a0\u00a0\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a607cf gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"7a607cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p aria-level=\"3\"><b><span data-contrast=\"auto\">Kontaktieren Sie uns. W<\/span><\/b><b><span data-contrast=\"auto\">ir unterst\u00fctzen Sie auf dem Weg zu einer sicheren, zukunftsf\u00e4higen Plattform.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:281,&quot;335559739&quot;:281,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dcaf49 elementor-widget elementor-widget-embed-pardot-form\" data-id=\"8dcaf49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embed-pardot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"gg-embed-pardot-form\">\n            <iframe src=\"https:\/\/go.expleo.com\/l\/997821\/2025-08-12\/3m6my\" style=\"width: 100%; border: none;\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" class=\"g-analytics-pardot-form\"><\/iframe>        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Sicherheit f\u00fcr SDVs und autonomes Fahren<\/p>\n","protected":false},"featured_media":40697,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"topic":[120,118],"insights-single-templates":[],"industry-taxonomy":[24],"content-type":[21],"country":[113],"service":[222],"class_list":["post-40839","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-digitale-transformation","topic-mobilitat","industry-taxonomy-automotive","content-type-blog","country-global","service-digital-transformation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AUTOSAR access control features for SDVs<\/title>\n<meta name=\"description\" content=\"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AUTOSAR-Zugriffskontrolle\" \/>\n<meta property=\"og:description\" content=\"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/\" \/>\n<meta property=\"og:site_name\" content=\"Global DE\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T12:50:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/\",\"name\":\"AUTOSAR access control features for SDVs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/autosar-access-control_featured.jpg\",\"datePublished\":\"2025-08-18T12:40:41+00:00\",\"dateModified\":\"2025-08-18T12:50:12+00:00\",\"description\":\"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/autosar-access-control_featured.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/autosar-access-control_featured.jpg\",\"width\":1280,\"height\":720,\"caption\":\"A smartphone screen displays \\\"AUTOSAR Access Control\\\" with a lock icon. Next to it is a digital wireframe illustration of a car, conveying smart vehicle security and access control via mobile device.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/autosar-zugriffskontrolle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Einblicke\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AUTOSAR-Zugriffskontrolle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\",\"name\":\"Expleo | DE\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#organization\",\"name\":\"Expleo | DE\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | DE\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AUTOSAR access control features for SDVs","description":"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/","og_locale":"de_DE","og_type":"article","og_title":"AUTOSAR-Zugriffskontrolle","og_description":"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving","og_url":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/","og_site_name":"Global DE","article_modified_time":"2025-08-18T12:50:12+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/","url":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/","name":"AUTOSAR access control features for SDVs","isPartOf":{"@id":"https:\/\/expleo.com\/global\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","datePublished":"2025-08-18T12:40:41+00:00","dateModified":"2025-08-18T12:50:12+00:00","description":"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/#primaryimage","url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","contentUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","width":1280,"height":720,"caption":"A smartphone screen displays \"AUTOSAR Access Control\" with a lock icon. Next to it is a digital wireframe illustration of a car, conveying smart vehicle security and access control via mobile device."},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/de\/"},{"@type":"ListItem","position":2,"name":"Einblicke","item":"https:\/\/expleo.com\/global\/de\/einblicke\/"},{"@type":"ListItem","position":3,"name":"AUTOSAR-Zugriffskontrolle"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/de\/#website","url":"https:\/\/expleo.com\/global\/de\/","name":"Expleo | DE","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/de\/#organization","name":"Expleo | DE","url":"https:\/\/expleo.com\/global\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/expleo.com\/global\/de\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | DE"},"image":{"@id":"https:\/\/expleo.com\/global\/de\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/einblicke\/blog\/access-control-in-autosar\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/einblicke\/blog\/access-control-in-autosar\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":105353,"url":"https:\/\/expleo.com\/global\/en\/einblicke\/blog\/access-control-in-autosar\/","language":"en","default":true},{"blogId":6,"blogIsHidden":false,"postId":40839,"url":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/autosar-zugriffskontrolle\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights\/40839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/types\/insights"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights\/40839\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/media\/40697"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/media?parent=40839"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/topic?post=40839"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights-single-templates?post=40839"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/industry-taxonomy?post=40839"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/content-type?post=40839"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/country?post=40839"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/service?post=40839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}