<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyberagentur</provider_name><provider_url>https://www.cyberagentur.de/en/</provider_url><author_name>codemacher</author_name><author_url>https://www.cyberagentur.de/en/author/codemacher/</author_url><title>Trusted IT ecosystem - Proven cyber security (&#xD6;vIT) - Cyberagentur</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="WW4KEu6DPZ"&gt;&lt;a href="https://www.cyberagentur.de/en/tenders/ecosystem-trustworthy-it-proven-cybersecurity-oevit/"&gt;Trusted IT ecosystem &#x2013; Proven cyber security (&#xD6;vIT)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberagentur.de/en/tenders/ecosystem-trustworthy-it-proven-cybersecurity-oevit/embed/#?secret=WW4KEu6DPZ" width="600" height="338" title="&#x201C;Trusted IT ecosystem &#x2013; Proven cyber security (&#xD6;vIT)&#x201D; &#x2014; Cyberagentur" data-secret="WW4KEu6DPZ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberagentur.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>Description The purpose of this tender is to have an IT stack researched for which security properties can be formally specified and verified from hardware to software. To this end, the security properties must be taken into account at the design stage of IT systems and hardware and software must be developed in a coordinated [&hellip;]</description></oembed>
