{"id":2974,"date":"2022-05-18T15:21:00","date_gmt":"2022-05-18T13:21:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=2974"},"modified":"2026-04-01T16:00:40","modified_gmt":"2026-04-01T14:00:40","slug":"notes-and-thoughts-around-the-gentle-art-of-assessing-atms","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","title":{"rendered":"Notes and thoughts around the gentle art of assessing ATMs"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns2974_4a47f9-3c\"><a class=\"kb-button kt-button button kb-btn2974_18355d-df kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading2974_e405a7-49 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_e405a7-49\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading2974_63bd3e-d3 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_63bd3e-d3\">Notes and thoughts around the gentle art of assessing ATMs<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tMay 18, 2022\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading2974_8eab55-05 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading2974_8eab55-05\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">9 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image2974_aff8c8-ac size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-scaled.png\" alt=\"image showing a hand giving an online vote\" class=\"kb-img wp-image-80186\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-scaled.png 2560w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-300x169.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-1024x576.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-768x432.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-1536x864.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-2048x1152.png 2048w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/ATM-04-edited-18x10.png 18w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-s0z99k is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<p class=\"kt-adv-heading2974_b3953f-f1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_b3953f-f1\">I must confess that ATMs have always intrigued me. Don\u2019t misunderstand me though. I know that, in most cases, that would sound like a rather suspicious statement for obvious reasons, but trust me when I say that it is not about the money they hold. I genuinely find them fascinating devices for the way they are built, and not particularly for what they do.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_9d6602-47 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_9d6602-47\">This is why I couldn\u2019t have been happier when I recently was given a chance to put my hands on a fairly broad set of ATM machines. It was in the context of a broad security auditing project aimed at evaluating the overall network and application security posture of the ATM base for one of the most important and renowned banks in the world. I thought it would be nice to share at least some notes from this fun and rewarding experience, since it is not exactly an everyday business case.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-d5eu2q is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_888193-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_888193-ad\">Determining the surface of exposure<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_d6c49f-6b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_d6c49f-6b\">As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are. More specifically, it is key to define what determines a target\u2019s actual surface of exposure, which is why I started with the basics and studied the main elements of an ATM.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1gb25wx is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_111708-02 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_111708-02\">Front-End Components<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_0a6439-07 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_0a6439-07\">From a front end perspective, most ATMs have two main inputs, card reader and keypad, and four outputs, screen, receipt printer, cash dispenser, and speaker. However, hacking into an ATM through these user interfaces would not be a recommended approach, unless there are significant logical flaws in the ATM application.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1l092h4 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_a7c587-8b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_a7c587-8b\">Back-End Components<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_8f9139-b5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_8f9139-b5\">The picture changes when looking at the back end. There are many additional input and output interfaces and connection points, such as connections to the financial host, administration systems, software updates, monitoring systems, and anti fraud mechanisms.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_04e42c-62 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_04e42c-62\">Ultimately, ATMs are not that different from any other network connected device. Any exposed service or interface could potentially be attacked by someone with access to the network. This was the core of my role as an ATM security assessor, identifying and testing these interfaces to determine whether unauthorized access could lead to cash being dispensed.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-165d7tp is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_c2d76b-4b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_c2d76b-4b\">XFS and overall architecture<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_1487cc-35 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_1487cc-35\">Before moving forward, I needed to understand the ATM specific architecture. Typically, the ATM application does not run directly on top of the operating system. Instead, there are intermediate layers involved.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_6e2e92-fe wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_6e2e92-fe\">A key component is the XFS, Extensions for Financial Services, middleware layer. This provides a client server architecture for financial applications running on Windows platforms.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-mq0904 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_7a1526-e7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_7a1526-e7\">The Role of XFS Middleware<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_bed0f5-b0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_bed0f5-b0\">An ATM architecture typically involves an XFS (eXtensions for Financial Services) middleware layer. This middleware provides a client-server architecture for financial applications on Windows platforms, specifically designed for devices like ATMs.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_1f016c-8a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_1f016c-8a\">XFS is an international standard promoted by the European Committee for Standardization (CEN\/XFS). It provides a common API for interacting with hardware regardless of manufacturer.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_234e34-b0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_234e34-b0\">Understanding XFS was a crucial part of the preparation, and also one of the most time consuming, due to its complexity and often proprietary nature.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1x5eg4 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_912eaa-05 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_912eaa-05\">Why XFS Matters for Security<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_88ffae-8c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_88ffae-8c\">The ATM application communicates through the XFS layer, which is responsible for sending commands to hardware components such as the cash dispenser.<\/p>\n\n\n\n<p class=\"kt-adv-heading2974_f43ffb-90 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_f43ffb-90\">Because of this:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-8xvyvp has-manrope-font-family\">\n<li>Access to XFS commands must be tightly controlled<\/li>\n\n\n\n<li>Compromising XFS could allow direct hardware manipulation<\/li>\n\n\n\n<li>Understanding XFS is critical for ATM security assessments<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_44e8c1-d1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_44e8c1-d1\">This part of the preparation was by far the most time-consuming due to proprietary implementations and extensive documentation.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-p5xtow is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_27641b-c3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_27641b-c3\">Pentest approaches<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1ixxrmz is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_c31c45-3c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_c31c45-3c\">White-Box vs Grey\/Black-Box<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-z2atq has-manrope-font-family\">\n<li>White-box testing: Requires deep architectural knowledge<\/li>\n\n\n\n<li>Grey\/black-box testing: Depends on whether access to the ATM OS or application is achievable<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1b3sr7u is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_15fb74-94 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_15fb74-94\">Standard Testing Mindset<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_6176dc-b7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_6176dc-b7\">Ultimately, ATMs should be treated like any network-connected device. This means testers often rely on standard techniques such as:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1ne88ex has-manrope-font-family\">\n<li>Port scanning<\/li>\n\n\n\n<li>Vulnerability scanning<\/li>\n\n\n\n<li>Exploitation attempts<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_18f167-a7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_18f167-a7\">However, ATMs come with specific threat models that must be considered.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1luj3ci is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_e981ef-30 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_e981ef-30\">Network Traffic Sniffing<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_2d459b-b9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_2d459b-b9\">Another important testing activity is analyzing captured network traffic.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1oif4vt is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_ac119a-0e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_ac119a-0e\">Challenges<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_27e793-79 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_27e793-79\">Network traffic analysis can be extremely complex due to:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1ne88ex has-manrope-font-family\">\n<li>Large volumes of data<\/li>\n\n\n\n<li>Proprietary and obscure protocols<\/li>\n\n\n\n<li>Lack of documentation<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-o3q41a is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_f9eba1-de wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_f9eba1-de\">Benefits<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_d15f8d-66 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_d15f8d-66\">Despite the challenges, it provides valuable insights:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1ne88ex has-manrope-font-family\">\n<li>Detection of weak or plaintext communications<\/li>\n\n\n\n<li>Understanding system interactions<\/li>\n\n\n\n<li>Identification of hidden configurations<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_05e416-79 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_05e416-79\">In fact, some of the most interesting findings came from this phase.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-o8ymo is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_1b4632-64 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_1b4632-64\">Defense in depth<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_764188-0c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_764188-0c\">Insights from network analysis led to a broader security consultancy effort.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-r5sgo5 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2974_5098aa-25 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_5098aa-25\">Security Improvements Implemented<\/h3>\n\n\n\n<p class=\"kt-adv-heading2974_0dcdbd-3b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_0dcdbd-3b\">Together with the technical team, we developed tailored patch packages to achieve:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1julsl8 has-manrope-font-family\">\n<li>Enable only necessary system and network services<\/li>\n\n\n\n<li>Prevent the ATM application from being exposed on network interfaces<\/li>\n\n\n\n<li>Harden the operating system and services according to industry standards<\/li>\n\n\n\n<li>Restrict inbound access using firewall policies<\/li>\n\n\n\n<li>Strengthen encryption settings and protocols<\/li>\n\n\n\n<li>Eliminate all plain text communication between systems<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-ekk6t1 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2974_c68bdd-15 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_c68bdd-15\">Happy Ending<\/h2>\n\n\n\n<p class=\"kt-adv-heading2974_cd8e65-66 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_cd8e65-66\">By combining all these measures and adding additional controls such as:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1j5tu4s has-manrope-font-family\">\n<li>IP-based access restrictions<\/li>\n\n\n\n<li>Two-way certificate validation<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2974_9ec700-9b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2974_9ec700-9b\">The network-related attack surface was dramatically reduced. At this point, IT-based attacks became extremely unlikely, even with direct physical access to the ATM. In simple terms: if someone wants unauthorized cash now, they would need to resort to physical methods.<\/p>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\t\t\tAs usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\t\t\t<\/p>","protected":false},"author":2,"featured_media":73550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,113],"class_list":["post-2974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Notes and thoughts around the gentle art of assessing ATMs - Complior<\/title>\n<meta name=\"description\" content=\"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Notes and thoughts around the gentle art of assessing ATMs - Complior\" \/>\n<meta property=\"og:description\" content=\"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-18T13:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T14:00:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"Notes and thoughts around the gentle art of assessing ATMs\",\"datePublished\":\"2022-05-18T13:21:00+00:00\",\"dateModified\":\"2026-04-01T14:00:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\"},\"wordCount\":868,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"keywords\":[\"Blog\",\"news\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\",\"name\":\"Notes and thoughts around the gentle art of assessing ATMs - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"datePublished\":\"2022-05-18T13:21:00+00:00\",\"dateModified\":\"2026-04-01T14:00:40+00:00\",\"description\":\"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ATM-04-scaled.png\",\"width\":2560,\"height\":1340,\"caption\":\"image showing a hand giving an online vote\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Notes and thoughts around the gentle art of assessing ATMs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Notes and thoughts around the gentle art of assessing ATMs - Complior","description":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","og_locale":"en_GB","og_type":"article","og_title":"Notes and thoughts around the gentle art of assessing ATMs - Complior","og_description":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","og_url":"https:\/\/complior.se\/en\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","og_site_name":"Complior","article_published_time":"2022-05-18T13:21:00+00:00","article_modified_time":"2026-04-01T14:00:40+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#article","isPartOf":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"Notes and thoughts around the gentle art of assessing ATMs","datePublished":"2022-05-18T13:21:00+00:00","dateModified":"2026-04-01T14:00:40+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/"},"wordCount":868,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","keywords":["Blog","news"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","url":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/","name":"Notes and thoughts around the gentle art of assessing ATMs - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","datePublished":"2022-05-18T13:21:00+00:00","dateModified":"2026-04-01T14:00:40+00:00","description":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","breadcrumb":{"@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png","width":2560,"height":1340,"caption":"image showing a hand giving an online vote"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/notes-and-thoughts-around-the-gentle-art-of-assessing-atms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"Notes and thoughts around the gentle art of assessing ATMs"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-scaled.png",2560,1340,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-300x157.png",300,157,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-768x402.png",768,402,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-1024x536.png",1024,536,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-1536x804.png",1536,804,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-2048x1072.png",2048,1072,true],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2022\/09\/ATM-04-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=2974"}],"version-history":[{"count":14,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2974\/revisions"}],"predecessor-version":[{"id":80209,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2974\/revisions\/80209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/73550"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=2974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=2974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=2974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}