{"id":2974,"date":"2022-05-18T15:21:00","date_gmt":"2022-05-18T13:21:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=2974"},"modified":"2026-04-01T16:00:40","modified_gmt":"2026-04-01T14:00:40","slug":"notes-and-thoughts-around-the-gentle-art-of-assessing-atms","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","title":{"rendered":"Notes and thoughts around the gentle art of assessing ATMs"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns2974_4a47f9-3c\"><a class=\"kb-button kt-button button kb-btn2974_18355d-df kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading2974_e405a7-49 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_e405a7-49\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading2974_63bd3e-d3 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_63bd3e-d3\">Notes and thoughts around the gentle art of assessing ATMs<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tMay 18, 2022\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading2974_8eab55-05 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading2974_8eab55-05\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">9 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image2974_aff8c8-ac size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-scaled.png\" alt=\"image showing a hand giving an online vote\" class=\"kb-img wp-image-80186\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-scaled.png 2560w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-300x169.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-1024x576.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-768x432.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-1536x864.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-2048x1152.png 2048w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-18x10.png 18w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-1i1sf0g is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<p class=\"kt-adv-heading2974_b3953f-f1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_b3953f-f1\">I must confess that ATMs have always intrigued me. Don\u2019t misunderstand me though. I know that, in most cases, that would sound like a rather suspicious statement for obvious reasons, but trust me when I say that it is not about the money they hold. I genuinely find them fascinating devices for the way they are built, and not particularly for what they do.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_9d6602-47 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_9d6602-47\">This is why I couldn\u2019t have been happier when I recently was given a chance to put my hands on a fairly broad set of ATM machines. It was in the context of a broad security auditing project aimed at evaluating the overall network and application security posture of the ATM base for one of the most important and renowned banks in the world. I thought it would be nice to share at least some notes from this fun and rewarding experience, since it is not exactly an everyday business case.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1nkonol is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_888193-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_888193-ad\">Determining the surface of exposure<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_d6c49f-6b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_d6c49f-6b\">As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are. More specifically, it is key to define what determines a target\u2019s actual surface of exposure, which is why I started with the basics and studied the main elements of an ATM.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-18uyqi6 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_111708-02 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_111708-02\">Front-End Components<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_0a6439-07 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_0a6439-07\">From a front end perspective, most ATMs have two main inputs, card reader and keypad, and four outputs, screen, receipt printer, cash dispenser, and speaker. However, hacking into an ATM through these user interfaces would not be a recommended approach, unless there are significant logical flaws in the ATM application.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1wo7jmn is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_a7c587-8b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_a7c587-8b\">Back-End Components<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_8f9139-b5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_8f9139-b5\">The picture changes when looking at the back end. There are many additional input and output interfaces and connection points, such as connections to the financial host, administration systems, software updates, monitoring systems, and anti fraud mechanisms.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_04e42c-62 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_04e42c-62\">Ultimately, ATMs are not that different from any other network connected device. Any exposed service or interface could potentially be attacked by someone with access to the network. This was the core of my role as an ATM security assessor, identifying and testing these interfaces to determine whether unauthorized access could lead to cash being dispensed.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1gwycy3 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_c2d76b-4b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_c2d76b-4b\">XFS and overall architecture<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_1487cc-35 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_1487cc-35\">Before moving forward, I needed to understand the ATM specific architecture. Typically, the ATM application does not run directly on top of the operating system. Instead, there are intermediate layers involved.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_6e2e92-fe wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_6e2e92-fe\">A key component is the XFS, Extensions for Financial Services, middleware layer. This provides a client server architecture for financial applications running on Windows platforms.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1p6ob6l is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_7a1526-e7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_7a1526-e7\">The Role of XFS Middleware<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_bed0f5-b0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_bed0f5-b0\">An ATM architecture typically involves an XFS (eXtensions for Financial Services) middleware layer. This middleware provides a client-server architecture for financial applications on Windows platforms, specifically designed for devices like ATMs.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_1f016c-8a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_1f016c-8a\">XFS is an international standard promoted by the European Committee for Standardization (CEN\/XFS). It provides a common API for interacting with hardware regardless of manufacturer.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_234e34-b0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_234e34-b0\">Understanding XFS was a crucial part of the preparation, and also one of the most time consuming, due to its complexity and often proprietary nature.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-gpudna is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_912eaa-05 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_912eaa-05\">Why XFS Matters for Security<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_88ffae-8c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_88ffae-8c\">The ATM application communicates through the XFS layer, which is responsible for sending commands to hardware components such as the cash dispenser.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_f43ffb-90 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_f43ffb-90\">Because of this:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-k3g5rx has-manrope-font-family\">\n<li>Access to XFS commands must be tightly controlled<\/li>\n\n\n\n<li>Compromising XFS could allow direct hardware manipulation<\/li>\n\n\n\n<li>Understanding XFS is critical for ATM security assessments<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_44e8c1-d1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_44e8c1-d1\">This part of the preparation was by far the most time-consuming due to proprietary implementations and extensive documentation.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-t2a961 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_27641b-c3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_27641b-c3\">Pentest approaches<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-o4zuwo is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_c31c45-3c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_c31c45-3c\">White-Box vs Grey\/Black-Box<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1klj0pb has-manrope-font-family\">\n<li>White-box testing: Requires deep architectural knowledge<\/li>\n\n\n\n<li>Grey\/black-box testing: Depends on whether access to the ATM OS or application is achievable<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-11ztk9l is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_15fb74-94 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_15fb74-94\">Standard Testing Mindset<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_6176dc-b7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_6176dc-b7\">Ultimately, ATMs should be treated like any network-connected device. This means testers often rely on standard techniques such as:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-z7ot60 has-manrope-font-family\">\n<li>Port scanning<\/li>\n\n\n\n<li>Vulnerability scanning<\/li>\n\n\n\n<li>Exploitation attempts<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_18f167-a7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_18f167-a7\">However, ATMs come with specific threat models that must be considered.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1hji8gd is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_e981ef-30 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_e981ef-30\">Network Traffic Sniffing<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_2d459b-b9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_2d459b-b9\">Another important testing activity is analyzing captured network traffic.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-yzuw50 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_ac119a-0e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_ac119a-0e\">Challenges<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_27e793-79 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_27e793-79\">Network traffic analysis can be extremely complex due to:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-z7ot60 has-manrope-font-family\">\n<li>Large volumes of data<\/li>\n\n\n\n<li>Proprietary and obscure protocols<\/li>\n\n\n\n<li>Lack of documentation<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-eg3us2 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_f9eba1-de wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_f9eba1-de\">Benefits<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_d15f8d-66 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_d15f8d-66\">Despite the challenges, it provides valuable insights:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-z7ot60 has-manrope-font-family\">\n<li>Detection of weak or plaintext communications<\/li>\n\n\n\n<li>Understanding system interactions<\/li>\n\n\n\n<li>Identification of hidden configurations<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_05e416-79 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_05e416-79\">In fact, some of the most interesting findings came from this phase.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1a1kjkc is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_1b4632-64 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_1b4632-64\">Defense in depth<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_764188-0c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_764188-0c\">Insights from network analysis led to a broader security consultancy effort.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-gxywtg is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_5098aa-25 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_5098aa-25\">Security Improvements Implemented<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_0dcdbd-3b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_0dcdbd-3b\">Together with the technical team, we developed tailored patch packages to achieve:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-fqs0hg has-manrope-font-family\">\n<li>Enable only necessary system and network services<\/li>\n\n\n\n<li>Prevent the ATM application from being exposed on network interfaces<\/li>\n\n\n\n<li>Harden the operating system and services according to industry standards<\/li>\n\n\n\n<li>Restrict inbound access using firewall policies<\/li>\n\n\n\n<li>Strengthen encryption settings and protocols<\/li>\n\n\n\n<li>Eliminate all plain text communication between systems<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1c2zoih is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_c68bdd-15 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_c68bdd-15\">Happy Ending<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_cd8e65-66 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_cd8e65-66\">By combining all these measures and adding additional controls such as:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-ux8u76 has-manrope-font-family\">\n<li>IP-based access restrictions<\/li>\n\n\n\n<li>Two-way certificate validation<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_9ec700-9b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_9ec700-9b\">The network-related attack surface was dramatically reduced. At this point, IT-based attacks became extremely unlikely, even with direct physical access to the ATM. In simple terms: if someone wants unauthorized cash now, they would need to resort to physical methods.<\/p>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\t\t\tAs usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\t\t\t<\/p>","protected":false},"author":2,"featured_media":73550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,113],"class_list":["post-2974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Notes and thoughts around the gentle art of assessing ATMs - Complior<\/title>\n<meta name=\"description\" content=\"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Notes and thoughts around the gentle art of assessing ATMs - Complior\" \/>\n<meta property=\"og:description\" content=\"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-18T13:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T14:00:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"Notes and thoughts around the gentle art of assessing ATMs\",\"datePublished\":\"2022-05-18T13:21:00+00:00\",\"dateModified\":\"2026-04-01T14:00:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\"},\"wordCount\":868,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"keywords\":[\"Blog\",\"news\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\",\"name\":\"Notes and thoughts around the gentle art of assessing ATMs - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"datePublished\":\"2022-05-18T13:21:00+00:00\",\"dateModified\":\"2026-04-01T14:00:40+00:00\",\"description\":\"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"width\":2560,\"height\":1340,\"caption\":\"image showing a hand giving an online vote\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Notes and thoughts around the gentle art of assessing ATMs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Notes and thoughts around the gentle art of assessing ATMs - Complior","description":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","og_locale":"en_GB","og_type":"article","og_title":"Notes and thoughts around the gentle art of assessing ATMs - Complior","og_description":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","og_url":"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","og_site_name":"Complior","article_published_time":"2022-05-18T13:21:00+00:00","article_modified_time":"2026-04-01T14:00:40+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#article","isPartOf":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"Notes and thoughts around the gentle art of assessing ATMs","datePublished":"2022-05-18T13:21:00+00:00","dateModified":"2026-04-01T14:00:40+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/"},"wordCount":868,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","keywords":["Blog","news"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","url":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","name":"Notes and thoughts around the gentle art of assessing ATMs - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","datePublished":"2022-05-18T13:21:00+00:00","dateModified":"2026-04-01T14:00:40+00:00","description":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","breadcrumb":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","width":2560,"height":1340,"caption":"image showing a hand giving an online vote"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"Notes and thoughts around the gentle art of assessing ATMs"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png",2560,1340,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-300x157.png",300,157,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-768x402.png",768,402,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-1024x536.png",1024,536,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-1536x804.png",1536,804,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-2048x1072.png",2048,1072,true],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=2974"}],"version-history":[{"count":14,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2974\/revisions"}],"predecessor-version":[{"id":80209,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2974\/revisions\/80209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/73550"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=2974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=2974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=2974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}