{"id":3064,"date":"2026-02-26T22:30:36","date_gmt":"2026-02-26T22:30:36","guid":{"rendered":"https:\/\/renewasoft.com.tr\/?p=3064"},"modified":"2026-02-28T00:35:29","modified_gmt":"2026-02-28T00:35:29","slug":"kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri","status":"publish","type":"post","link":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/","title":{"rendered":"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi ve SCADA Korumas\u0131<\/h1>\n<p><em>SSDLC, CI\/CD G\u00fcvenli\u011fi, Zero Trust ve HYDROWISE \u00c7\u00f6z\u00fcm\u00fc<\/em><br \/>\n<strong>Renewasoft | 2026<\/strong><\/p>\n<p><span class=\"level-badge\">Seviye: Ileri<\/span> \u00a0 Hedef Kitle: SCADA M\u00fchendisi, HES \u0130\u015fletmecisi, CTO, Altyap\u0131 Yat\u0131r\u0131mc\u0131s\u0131<\/p>\n<h1>Giri\u015f<\/h1>\n<p data-start=\"64\" data-end=\"662\">Hidroelektrik santrallerin dijitalle\u015fmesiyle (SCADA, IIoT) otomatize sistemler enerji \u00fcretimini optimize ederken, bu sistemlerdeki k\u00fc\u00e7\u00fck bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bile fiziki hasar, verim d\u00fc\u015f\u00fc\u015f\u00fc veya operasyonel kesintilere yol a\u00e7abilir. 2025\u2019te Norve\u00e7\u2019teki Bremanger Baraj\u0131\u2019na yap\u0131lan siber sald\u0131r\u0131da, kontrol sistemi \u00fczerinden vanalar a\u00e7\u0131larak d\u00f6rt saat boyunca fazla su sal\u0131nd\u0131\u011f\u0131 tespit edilmi\u015ftir [1]. NIST\u2019e g\u00f6re OT\/ICS ortamlar\u0131 y\u00fcksek g\u00fcvenilirlik, s\u00fcreklilik ve emniyet gereksinimi ta\u015f\u0131r [1]; bu nedenle hem a\u011f hem de yaz\u0131l\u0131m katman\u0131nda katmanl\u0131 savunma ve proaktif g\u00fcvenlik \u00f6nlemleri \u015fartt\u0131r.<\/p>\n<p data-start=\"664\" data-end=\"962\">Bu blog yaz\u0131s\u0131nda; SCADA\/OT mimarisindeki zay\u0131fl\u0131klar, savunma katmanlar\u0131, yaz\u0131l\u0131m geli\u015ftirme g\u00fcvenli\u011fi (SSDLC), CI\/CD pipeline g\u00fcvenlik kontrolleri, tedarik zinciri sald\u0131r\u0131lar\u0131, risk skorlama modeli ve Renewasoft HYDROWISE platformunun bu sorunlara sundu\u011fu \u00e7\u00f6z\u00fcmler u\u00e7tan uca ele al\u0131nmaktad\u0131r.<\/p>\n<p>\u25ba\u00a0<a href=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/hizmetimiz\/\">https:\/\/renewasoft.com.tr\/index.php\/tr\/hizmetimiz\/<\/a><\/p>\n<h2>TL;DR &#8212; Y\u00f6netici \u00d6zeti<\/h2>\n<div class=\"callout\">\n<ol>\n<li><strong>IT\/OT Ayr\u0131m\u0131:<\/strong> HES&#8217;ler ger\u00e7ek zamanl\u0131 kontrol ve y\u00fcksek s\u00fcreklilik \u00f6nceliklidir. Purdue modeli segmentasyonu OT\/IT izolasyonu sa\u011flar<sup>[1]<\/sup>.<\/li>\n<li><strong>Sald\u0131r\u0131 Y\u00fczeyi:<\/strong> Modbus, DNP3, IEC-104 gibi eski protokoller kimlik do\u011frulama veya \u015fifreleme i\u00e7ermez. A\u00e7\u0131k portlar ve m\u00fchendislik istasyonlar\u0131 zay\u0131f konfig\u00fcrasyon riski ta\u015f\u0131r<sup>[1][2]<\/sup>.<\/li>\n<li><strong>Savunma Katmanlar\u0131:<\/strong> DMZ, a\u011f segmentasyonu, Zero Trust ve derin paket inceleme ile OT a\u011f\u0131 korunur<sup>[1][2]<\/sup>.<\/li>\n<li><strong>SSDLC + CI\/CD:<\/strong> Yaz\u0131l\u0131m geli\u015ftirme s\u00fcrecine entegre g\u00fcvenlik; SAST, DAST, container scan, SBOM ve imza do\u011frulama<sup>[3][4]<\/sup>.<\/li>\n<li><strong>HYDROWISE:<\/strong>\u00a0Renewasoft&#8217;un AI destekli anomali tespiti, ag segmentasyonu ve guvenli yazilim gelistirme prensipleriyle HES korumasi<sup>[1]<\/sup>.<\/li>\n<\/ol>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3241 size-full\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png\" alt=\"\" width=\"1400\" height=\"900\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png 1400w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-300x193.png 300w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1024x658.png 1024w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-768x494.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-350x225.png 350w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-540x347.png 540w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-778x500.png 778w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-622x400.png 622w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-600x386.png 600w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<p class=\"caption\" style=\"text-align: center\"><em>\u0130nfografik: HES Yaz\u0131l\u0131m G\u00fcvenli\u011fi &#8212; Sald\u0131r\u0131 Y\u00fczeyi, Savunma Katmanlar\u0131 ve SSDLC Pipeline [1][2][3]<\/em><\/p>\n<h1>Paradigma De\u011fi\u015fimi: Purdue Modeli I\u015f\u0131g\u0131nda IT\/OT Ayr\u0131m\u0131<\/h1>\n<p>Endustriyel kontrol sistemlerinin temel ag mimarisi Purdue modeline gore katmanlidir. Bu modelde, seviye 0-1 fiziksel surec ve PLC\/RTU katmanlari; seviye 2 ise SCADA\/HMI\/DCS katmanidir. Ust seviyeler (3-5) kontrol merkezi ve kurumsal IT&#8217;yi icerir. Bu ayrim, OT\/IT arasinda bir hava boslugu yaratarak etkin erisim kontrolune olanak tanir<sup>[1]<\/sup>.<\/p>\n<p>Ancak dijitallesmeyle bu katmanlar giderek ic ice geciyor. Is surecleri bulut, IoT ve uzaktan erisimle butunlesti. Bu durum, OT aglarinin tehlike yuzeyini genisletti. NotPetya saldirisi sirasinda zayif segmentasyon, kotu yazilimin fabrika otomasyon aglarina yayilmasina neden olmustu<sup>[5]<\/sup>. NIST&#8217;in belirttigi gibi, ICS aglari beklenmedik sekilde girilir hale gelirse, fiziki surecler uzerindeki kontrol hizla kaybolabilir<sup>[1]<\/sup>. Bu nedenle HES&#8217;de defense-in-depth stratejisi ve Zero Trust anlayisi kacinilmazdir.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Seviye<\/th>\n<th>Katman<\/th>\n<th>Bilesenler<\/th>\n<th>Guvenlik Onlemi<\/th>\n<\/tr>\n<tr>\n<td><strong>0-1<\/strong><\/td>\n<td>Fiziksel Surec + PLC\/RTU<\/td>\n<td>Turbin, jenerator, sensor, PLC, RTU<\/td>\n<td>Mikro-segmentasyon, fiziksel erisim kontrolu<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td>SCADA \/ HMI \/ DCS<\/td>\n<td>SCADA server, HMI terminal, historian<\/td>\n<td>DPI, ML baseline, oturum izleme<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td>Kontrol Merkezi<\/td>\n<td>Muhendislik istasyonu, patch server<\/td>\n<td>Jump server, MFA, yama yonetimi<\/td>\n<\/tr>\n<tr>\n<td><strong>3.5<\/strong><\/td>\n<td>OT DMZ<\/td>\n<td>Data diode, log broker, proxy<\/td>\n<td>Tek yonlu veri akisi, SIEM entegrasyonu<\/td>\n<\/tr>\n<tr>\n<td><strong>4-5<\/strong><\/td>\n<td>Kurumsal IT \/ Bulut<\/td>\n<td>ERP, SOC\/SIEM, Hydrowise UI<\/td>\n<td>Dogrudan OT erisimi yok; DMZ uzerinden<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Tablo 1: Purdue Modeli Katmanlari ve Guvenlik Onlemleri [1][2]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3242 size-full\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443.png\" alt=\"\" width=\"1400\" height=\"900\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443.png 1400w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-300x193.png 300w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1024x658.png 1024w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-768x494.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-350x225.png 350w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-540x347.png 540w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-778x500.png 778w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-622x400.png 622w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-600x386.png 600w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<p class=\"caption\" style=\"text-align: center\"><em>\u0130nfografik: Purdue Modeli + IEC 62443 G\u00fcvenlik Zonlar\u0131 [1][2]<\/em><\/p>\n<h1>Sald\u0131r\u0131 Y\u00fczeyi Haritalama: HES&#8217;lerdeki Zay\u0131f Noktalar<\/h1>\n<p>HES\u2019lerdeki OT cihazlar\u0131 ve protokoller tarihsel olarak g\u00fcvenlik yerine i\u015flevsellik g\u00f6zetilerek tasarlanm\u0131\u015ft\u0131r. NIST\u2019in vurgulad\u0131\u011f\u0131 gibi, bir\u00e7ok end\u00fcstriyel protokolde kimlik do\u011frulama bulunmamaktad\u0131r [1]. Modbus TCP, DNP3 veya IEC 60870-5-104 gibi yayg\u0131n protokoller; \u015fifreleme, do\u011frulama veya b\u00fct\u00fcnl\u00fck kontrollerinden yoksundur [1]. Bu protokoller, a\u011f \u00fczerinde dinlenerek ya da tekrar oynat\u0131larak kolayca manip\u00fcle edilebilir.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Protokol \/ Bilesen<\/th>\n<th>Zay\u0131fl\u0131k<\/th>\n<th>Sald\u0131r\u0131 Vekt\u00f6r\u00fc<\/th>\n<th>\u00d6nlem<\/th>\n<\/tr>\n<tr>\n<td><strong>Modbus TCP (502)<\/strong><\/td>\n<td>Auth\/\u015fifreleme yok<\/td>\n<td>Komut enjeksiyonu, replay<\/td>\n<td>DPI + allowlist, TLS wrapper<\/td>\n<\/tr>\n<tr>\n<td><strong>DNP3 (20000)<\/strong><\/td>\n<td>Auth opsiyonel, seyrek<\/td>\n<td>Man-in-the-middle, spoof<\/td>\n<td>DNP3 Secure Auth, segmentasyon<\/td>\n<\/tr>\n<tr>\n<td><strong>IEC 60870-5-104<\/strong><\/td>\n<td>Sifreleme\/dogrulama yok<\/td>\n<td>Sahte komut, dinleme<\/td>\n<td>IEC 62351 TLS, VPN tunelleme<\/td>\n<\/tr>\n<tr>\n<td><strong>HMI\/RTU (Windows)<\/strong><\/td>\n<td>Yamalanmamis OS, varsayilan parola<\/td>\n<td>Lateral movement, RCE<\/td>\n<td>Yama y\u00f6netimi, uygulama beyaz listesi<\/td>\n<\/tr>\n<tr>\n<td><strong>M\u00fchendislik Ist.<\/strong><\/td>\n<td>USB, vendor yaz\u0131l\u0131m, dual-homed<\/td>\n<td>PLC program manip\u00fclasyonu<\/td>\n<td>PAM, jump host, USB kontrol\u00fc<\/td>\n<\/tr>\n<tr>\n<td><strong>Uzaktan Eri\u015fim<\/strong><\/td>\n<td>Zay\u0131f VPN, tek fakt\u00f6r<\/td>\n<td>Credential harvesting<\/td>\n<td>MFA + zaman bazl\u0131 + oturum kayd\u0131<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Tablo 2: HES Sald\u0131r\u0131 Y\u00fczeyi Haritas\u0131 ve Kar\u015f\u0131 \u00d6nlemler [1][2]<\/em><\/p>\n<p>NIST uyar\u0131r: ICS bile\u015fenleri g\u00fcncelleme ve yamalama bak\u0131m\u0131ndan s\u0131k\u0131nt\u0131l\u0131d\u0131r, bir\u00e7ok cihaz art\u0131k desteklenmeyen eski i\u015fletim sistemleri \u00fczerinde \u00e7al\u0131\u015f\u0131r<sup>[1]<\/sup>. Dolay\u0131s\u0131yla, HES a\u011f\u0131nda a\u00e7\u0131k portlar, izinsiz uzaktan eri\u015fim kanallar\u0131 ve test edilmemi\u015f \u00fc\u00e7\u00fcnc\u00fc parti uygulamalar a\u011f\u0131r risk ta\u015f\u0131r.<\/p>\n<h1>Savunma Katmanlar\u0131 ve Zero Trust: Asla G\u00fcvenme, Her Zaman Do\u011frula<\/h1>\n<p data-start=\"64\" data-end=\"459\">HES\u2019lerde korunma \u00f6ncelikle \u00e7ok katmanl\u0131 savunma ile sa\u011flan\u0131r. OT a\u011f\u0131na giden trafik katmanlara ayr\u0131l\u0131r ve her seviyede farkl\u0131 \u00f6nlemler uygulan\u0131r. Kontrol a\u011f\u0131 ile kurumsal a\u011f aras\u0131nda DMZ olu\u015fturularak a\u011f eri\u015fimi s\u0131n\u0131rland\u0131r\u0131l\u0131r. End\u00fcstriyel firewall\u2019lar yaln\u0131zca gerekli SCADA trafi\u011fine izin verir. Dahili ICS a\u011f\u0131nda ise zone\/conduit segmentasyonu ile santral b\u00f6l\u00fcmleri izole edilir [1][2].<\/p>\n<p data-start=\"461\" data-end=\"863\">Zero Trust modelinde kullan\u0131c\u0131lar, cihazlar ve uygulamalar hi\u00e7bir zaman otomatik olarak g\u00fcvenilir kabul edilmez; eri\u015fim her seferinde s\u0131nan\u0131r ve k\u0131s\u0131tlan\u0131r. \u00d6rne\u011fin, bir PLC\u2019ye eri\u015fim isteyen m\u00fchendis \u00f6nce kimlik denetimine (MFA) tabi tutulur. A\u011f trafi\u011fi s\u00fcrekli izlenir; anormal hareketlilik alg\u0131land\u0131\u011f\u0131nda an\u0131nda izolasyon sa\u011flan\u0131r. ISA\/IEC 62443 standartlar\u0131 da bu katmanl\u0131 mimariyi \u00f6ng\u00f6r\u00fcr [2].<\/p>\n<table>\n<tbody>\n<tr>\n<th>Katman<\/th>\n<th>Teknik \u0130\u015flem<\/th>\n<th>HES Uygulamas\u0131<\/th>\n<\/tr>\n<tr>\n<td><strong>Perimeter FW<\/strong><\/td>\n<td>deny-all \/ permit-by-exception; stateful + DPI [1]<\/td>\n<td>NGFW: Modbus FC, DNP3, OPC UA parser ile komut filtre<\/td>\n<\/tr>\n<tr>\n<td><strong>DMZ<\/strong><\/td>\n<td>Kurumsal a\u011fdan OT&#8217;ye do\u011frudan eri\u015fimi engeller [1]<\/td>\n<td>Hydrowise OT gateway, log broker, zaman senkron proxy<\/td>\n<\/tr>\n<tr>\n<td><strong>Jump Server<\/strong><\/td>\n<td>OT eri\u015fimini tek kontrollu hop noktas\u0131na yonlendirir [1]<\/td>\n<td>MFA + zaman bazl\u0131 + oturum kayd\u0131; split tunneling kapat\u0131l\u0131r<\/td>\n<\/tr>\n<tr>\n<td><strong>Mikro-Segmentasyon<\/strong><\/td>\n<td>Cell\/area bazl\u0131 segment; PEP ile en az ayr\u0131cal\u0131k [2]<\/td>\n<td>SCADA, sens\u00f6r, PLC grubu ayr\u0131 g\u00fcvenli b\u00f6lgeler<\/td>\n<\/tr>\n<tr>\n<td><strong>Data Diode<\/strong><\/td>\n<td>OT\u2192DMZ tek yonlu veri ak\u0131\u015f\u0131; C2 kanali fiziksel engel [1]<\/td>\n<td>Kritik telemetri disinda tum ters ak\u0131\u015f engellenir<\/td>\n<\/tr>\n<tr>\n<td><strong>IDS\/IPS + SIEM<\/strong><\/td>\n<td>Trafik anomali tespiti, log korelasyonu, playbook [1]<\/td>\n<td>Deterministik baselining + ML anomali skorlama<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Tablo 3: Savunma Katmanlari ve HES Uygulamalari [1][2]<\/p>\n<h1>G\u00fcvenli Yaz\u0131l\u0131m Geli\u015ftirme (SSDLC) ve CI\/CD G\u00fcvenli\u011fi<\/h1>\n<p>Yaz\u0131l\u0131m geli\u015ftirme s\u00fcrecine entegre g\u00fcvenlik kritik \u00f6neme sahiptir. NIST SSDF rehberi, statik analiz ve gizli anahtar taramas\u0131n\u0131 \u015fiddetle \u00f6nermektedir [4]. IEC\/ISA 62443-4-1 standard\u0131 ise end\u00fcstriyel \u00fcr\u00fcnler i\u00e7in g\u00fcvenli \u00fcr\u00fcn geli\u015ftirme ilkelerini tan\u0131mlar [2].<\/p>\n<table>\n<tbody>\n<tr>\n<th>#<\/th>\n<th>Asama<\/th>\n<th>G\u00fcvenlik Aktivitesi<\/th>\n<th>Ara\u00e7lar \/ Standart<\/th>\n<\/tr>\n<tr>\n<td><strong>1<\/strong><\/td>\n<td><strong>Tasar\u0131m<\/strong><\/td>\n<td>Tehdit modelleme, g\u00fcvenlik gereksinimleri, mimari inceleme<\/td>\n<td>STRIDE, siber-HAZOP, IEC 62443-3-3<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td><strong>Geli\u015ftirme<\/strong><\/td>\n<td>Kod inceleme, statik analiz, ba\u011f\u0131ml\u0131l\u0131k tarama, gizli anahtar tespiti<\/td>\n<td>SAST (SonarQube, Semgrep), Snyk, GitLeaks<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td><strong>Test<\/strong><\/td>\n<td>Dinamik analiz, penetrasyon testi, fuzzing, performans testi<\/td>\n<td>DAST (OWASP ZAP, Burp), fuzzer, load test<\/td>\n<\/tr>\n<tr>\n<td><strong>4<\/strong><\/td>\n<td><strong>Da\u011f\u0131t\u0131m<\/strong><\/td>\n<td>Container zafiyet tarama, imza do\u011frulama, SBOM \u00fcretimi<\/td>\n<td>Trivy, Cosign, SBOM (CycloneDX\/SPDX)<\/td>\n<\/tr>\n<tr>\n<td><strong>5<\/strong><\/td>\n<td><strong>\u0130zleme<\/strong><\/td>\n<td>Runtime anomali tespiti, log denetimi, SIEM entegrasyonu<\/td>\n<td>Falco, ELK\/Splunk, Hydrowise AI<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Tablo 4: SSDLC Pipeline A\u015famalar\u0131 ve G\u00fcvenlik Kontrolleri [2][4]<\/em><\/p>\n<p>Renewasoft, HYDROWISE geli\u015ftirirken bu SSDLC \u00f6nlemlerini uygular: her yaz\u0131l\u0131m bile\u015feni konteynerlere paketlenip zafiyet tarama sistemlerinden ge\u00e7irilir; CI\/CD hatt\u0131ndaki her adim g\u00fcvenlik kontrollerinden ge\u00e7er. Hi\u00e7bir imzas\u0131z yaz\u0131l\u0131m \u00fcretim hatt\u0131na kabul edilmez<sup>[2]<\/sup>.<\/p>\n<h2>Tedarik Zinciri Sald\u0131r\u0131lar\u0131 ve Korunma<\/h2>\n<p>Tedarik zinciri sald\u0131r\u0131s\u0131, yaz\u0131l\u0131m geli\u015ftirici yerine \u00fc\u00e7\u00fcnc\u00fc taraf bile\u015fenlerin veya g\u00fcncelleme kanallar\u0131n\u0131n hedeflenerek sisteme s\u0131z\u0131lmas\u0131d\u0131r. 2020\u2019deki SolarWinds vakas\u0131nda, sald\u0131rganlar me\u015fru Orion y\u00f6netim yaz\u0131l\u0131m\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 kod enjekte etmi\u015f ve bu yaz\u0131l\u0131m\u0131 kullanan binlerce kuruma eri\u015fim sa\u011flam\u0131\u015ft\u0131r [5]. Enerji altyap\u0131s\u0131nda benzer bir durum, sahte PLC firmware g\u00fcncellemesi arac\u0131l\u0131\u011f\u0131yla kontrol sistemine s\u0131z\u0131lmas\u0131 \u015feklinde ya\u015fanabilir.<\/p>\n<div class=\"callout-green\">\n<p><strong>\ud83d\udd12 Tedarik Zinciri Korunma Kontrol Listesi<\/strong><\/p>\n<p data-start=\"53\" data-end=\"172\"><strong data-start=\"53\" data-end=\"91\">SBOM (Software Bill of Materials):<\/strong> T\u00fcm ba\u011f\u0131ml\u0131l\u0131klar\u0131n envanteri tutulur; CycloneDX veya SPDX format\u0131 kullan\u0131l\u0131r.<\/p>\n<p data-start=\"174\" data-end=\"291\"><strong data-start=\"174\" data-end=\"198\">Ba\u011f\u0131ml\u0131l\u0131k \u0130mzalama:<\/strong> Her k\u00fct\u00fcphanenin kriptografik imzas\u0131 do\u011frulan\u0131r; dependency hijacking sald\u0131r\u0131lar\u0131 \u00f6nlenir.<\/p>\n<p data-start=\"293\" data-end=\"415\"><strong data-start=\"293\" data-end=\"313\">S\u00fcr\u00fcm Sabitleme:<\/strong> CI\/CD s\u00fcre\u00e7lerinde ba\u011f\u0131ml\u0131l\u0131k s\u00fcr\u00fcmleri sabitlenir (pinning); beklenmedik g\u00fcncellemeler engellenir.<\/p>\n<p data-start=\"417\" data-end=\"537\"><strong data-start=\"417\" data-end=\"440\">Firmware Do\u011frulama:<\/strong> PLC\/RTU firmware g\u00fcncellemeleri, \u00fcretici sertifikas\u0131 ve hash do\u011frulamas\u0131 ile ger\u00e7ekle\u015ftirilir.<\/p>\n<p data-start=\"539\" data-end=\"672\"><strong data-start=\"539\" data-end=\"557\">G\u00fcvenli Kanal:<\/strong> G\u00fcncellemeler yaln\u0131zca \u015fifreli ve kimlik do\u011frulanm\u0131\u015f kanallar \u00fczerinden sa\u011flan\u0131r (TLS ve mutual authentication).<\/p>\n<\/div>\n<h1>Teknik Risk Skorlama Modeli<\/h1>\n<p data-start=\"53\" data-end=\"155\">Enerji tesislerinde risk analizi nicel olarak yap\u0131lmal\u0131d\u0131r. Yayg\u0131n kullan\u0131lan model \u015fu \u015fekildedir:<\/p>\n<p data-start=\"157\" data-end=\"191\"><strong data-start=\"157\" data-end=\"191\">Risk = Tehdit \u00d7 Zafiyet \u00d7 Etki<\/strong><\/p>\n<p data-start=\"193\" data-end=\"331\"><strong data-start=\"193\" data-end=\"204\">Tehdit:<\/strong> Akt\u00f6r\u00fcn yetenek ve niyeti<br data-start=\"230\" data-end=\"233\" \/><strong data-start=\"233\" data-end=\"245\">Zafiyet:<\/strong> A\u00e7\u0131\u011f\u0131n b\u00fcy\u00fckl\u00fc\u011f\u00fc<br data-start=\"262\" data-end=\"265\" \/><strong data-start=\"265\" data-end=\"274\">Etki:<\/strong> Operasyonel kay\u0131p, donan\u0131m hasar\u0131 veya g\u00fcvenlik ihlali<\/p>\n<p data-start=\"333\" data-end=\"733\">Hidroelektrik projelerde etki kriterleri aras\u0131nda \u00fcretim kayb\u0131, donan\u0131m ar\u0131zas\u0131 ve \u00e7evresel zarar yer al\u0131r. Heluany ve ark., HES\u2019ler i\u00e7in siber-HAZOP y\u00f6ntemiyle detayl\u0131 bir risk de\u011ferlendirme yakla\u015f\u0131m\u0131 \u00f6nermi\u015ftir [5]. Bu kapsamda, her kontrol eleman\u0131na 0\u2013100 aral\u0131\u011f\u0131nda bir risk skoru atanarak yat\u0131r\u0131m ve g\u00fcvenlik kaynaklar\u0131n\u0131n en y\u00fcksek riskli alanlara \u00f6ncelikli olarak y\u00f6nlendirilmesi sa\u011flan\u0131r.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Varl\u0131k \/ Senaryo<\/th>\n<th>Tehdit<\/th>\n<th>Zafiyet<\/th>\n<th>Etki<\/th>\n<th>Risk Skoru<\/th>\n<\/tr>\n<tr>\n<td><strong>SCADA Server (yamalanmam\u0131\u015f)<\/strong><\/td>\n<td>0.8<\/td>\n<td>0.9<\/td>\n<td>0.9<\/td>\n<td><strong>0.648 \u2192 Kritik<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>PLC (Modbus, auth yok)<\/strong><\/td>\n<td>0.7<\/td>\n<td>0.8<\/td>\n<td>0.9<\/td>\n<td><strong>0.504 \u2192 Y\u00fcksek<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Muhendislik Ist. (dual-homed)<\/strong><\/td>\n<td>0.6<\/td>\n<td>0.7<\/td>\n<td>0.8<\/td>\n<td><strong>0.336 \u2192 Orta-Y\u00fcksek<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Hydrowise Gateway (DMZ, TLS)<\/strong><\/td>\n<td>0.5<\/td>\n<td>0.2<\/td>\n<td>0.7<\/td>\n<td><strong>0.070 \u2192 D\u00fc\u015f\u00fck<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Tablo 5: HES Varl\u0131k Bazl\u0131 Risk Skorlama \u00f6rne\u011fi [1][5]<\/em><\/p>\n<h1>Vaka Analizi: Ger\u00e7ek Senaryolar<\/h1>\n<div class=\"callout-red\">\n<p><strong>\ud83d\udca5 Kan\u0131ta Dayal\u0131 Arka Plan<\/strong><\/p>\n<p data-start=\"53\" data-end=\"241\"><strong data-start=\"53\" data-end=\"90\">Bowman Avenue Baraj\u0131 (2013, ABD):<\/strong> \u0130ran kaynakl\u0131 hackerlar\u0131n baraj\u0131n SCADA sistemine s\u0131zd\u0131\u011f\u0131 tespit edilmi\u015ftir. Fiziksel bir hasar olu\u015fmam\u0131\u015f, ancak yetkisiz eri\u015fim kan\u0131tlanm\u0131\u015ft\u0131r [5].<\/p>\n<p data-start=\"243\" data-end=\"449\"><strong data-start=\"243\" data-end=\"290\">Bremanger\/Risevatnet Baraj\u0131 (2025, Norve\u00e7):<\/strong> Zay\u0131f bir parola nedeniyle kontrol sistemi ele ge\u00e7irilmi\u015f; vanalar tamamen a\u00e7\u0131larak d\u00f6rt saat boyunca su \u00e7\u0131k\u0131\u015f\u0131 normalin 497 L\/s \u00fczerinde art\u0131r\u0131lm\u0131\u015ft\u0131r [1].<\/p>\n<p data-start=\"451\" data-end=\"593\"><strong data-start=\"451\" data-end=\"471\">NotPetya (2017):<\/strong> Tedarik zinciri \u00fczerinden yay\u0131lan sald\u0131r\u0131, zay\u0131f a\u011f segmentasyonu nedeniyle fabrika otomasyon a\u011flar\u0131na bula\u015fm\u0131\u015ft\u0131r [5].<\/p>\n<p data-start=\"595\" data-end=\"714\"><strong data-start=\"595\" data-end=\"617\">SolarWinds (2020):<\/strong> Me\u015fru Orion yaz\u0131l\u0131m\u0131na enjekte edilen k\u00f6t\u00fc ama\u00e7l\u0131 kod, binlerce kuruma eri\u015fim sa\u011flam\u0131\u015ft\u0131r [5].<\/p>\n<p data-start=\"716\" data-end=\"1197\"><strong data-start=\"716\" data-end=\"752\">Tipik bir HES sald\u0131r\u0131 senaryosu:<\/strong> Sald\u0131rgan, oltalama (phishing) e-postas\u0131 ile m\u00fchendislik istasyonuna eri\u015fim kazan\u0131r, PLC kimlik bilgilerini ele ge\u00e7irir ve su debisini yanl\u0131\u015f verilere g\u00f6re ayarlayan kumanda komutlar\u0131n\u0131 de\u011fi\u015ftirir. Sonu\u00e7 olarak t\u00fcrbinlerin aniden durmas\u0131, enerji \u00fcretiminde kesinti ve mekanik sistemlerde ani y\u00fck de\u011fi\u015fimine ba\u011fl\u0131 hasar meydana gelebilir. Bu nedenle erken uyar\u0131 ve anomali alg\u0131lama sistemleri ile h\u0131zl\u0131 m\u00fcdahale yetene\u011fi hayati \u00f6neme sahiptir.<\/p>\n<h3 data-start=\"1204\" data-end=\"1261\"><strong data-start=\"1208\" data-end=\"1261\">HYDROWISE G\u00fcvenlik Mimarisi: Renewasoft\u2019un \u00c7\u00f6z\u00fcm\u00fc<\/strong><\/h3>\n<p data-start=\"1263\" data-end=\"1783\">Renewasoft\u2019un HYDROWISE platformu, yukar\u0131da belirtilen t\u00fcm risk ve g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 ele almak \u00fczere tasarlanm\u0131\u015ft\u0131r. Bulut tabanl\u0131 ve \u00f6l\u00e7eklenebilir bir mimariye sahip olan HYDROWISE; SCADA sistemleri, IoT sens\u00f6rleri ve meteorolojik veri kaynaklar\u0131 d\u00e2hil olmak \u00fczere t\u00fcm operasyonel verileri merkezi bir platformda toplar. Bu birle\u015fik veri katman\u0131 \u00fczerinde \u00e7al\u0131\u015fan ileri d\u00fczey yapay zek\u00e2 algoritmalar\u0131 sayesinde \u00fcretim tahminleri, tahmine dayal\u0131 bak\u0131m senaryolar\u0131 ve erken uyar\u0131lar otomatik olarak olu\u015fturulur [1].<\/p>\n<\/div>\n<table>\n<tbody>\n<tr>\n<th>G\u00fcvenlik Katman\u0131<\/th>\n<th>HYDROWISE Uygulamas\u0131<\/th>\n<th>Referans Standart<\/th>\n<\/tr>\n<tr>\n<td><strong>A\u011f G\u00fcvenli\u011fi<\/strong><\/td>\n<td>A\u011f segmentasyonu, TLS \u015fifreleme, DMZ konumland\u0131rma<\/td>\n<td>NIST SP 800-82, IEC 62443<\/td>\n<\/tr>\n<tr>\n<td><strong>Yaz\u0131l\u0131m G\u00fcvenli\u011fi<\/strong><\/td>\n<td>SSDLC, SAST\/DAST, container scan, SBOM, imza do\u011frulama<\/td>\n<td>NIST SSDF, IEC 62443-4-1<\/td>\n<\/tr>\n<tr>\n<td><strong>Erisim Kontrolu<\/strong><\/td>\n<td>RBAC, MFA, oturum kaydi, PAM entegrasyonu<\/td>\n<td>Zero Trust, IEC 62443-3-3<\/td>\n<\/tr>\n<tr>\n<td><strong>AI Anomali Tespiti<\/strong><\/td>\n<td>Ger\u00e7ek zamanl\u0131 anomali skorlama, erken uyar\u0131 aksiyon \u00f6nerisi<\/td>\n<td>NIST SP 800-82, MITRE ICS<\/td>\n<\/tr>\n<tr>\n<td><strong>Log \/ Denetim<\/strong><\/td>\n<td>T\u00fcm i\u015flemler loglan\u0131r, SIEM entegrasyonu, forensik destek<\/td>\n<td>IEC 62443, SOC 2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Tablo 6: HYDROWISE G\u00fcvenlik Katmanlar\u0131 ve Referans Standartlar [1][2][4]<\/em><\/p>\n<div class=\"callout\">\n<p><strong>\ud83d\udd0d Hydrowise AI Yetenekleri<\/strong><\/p>\n<p><strong>Su Ak\u0131\u015f\u0131 Tahmini:<\/strong> Meteorolojik veri + havza parametreleri + tarihsel akim kay\u0131tlar\u0131 ile ML modeli. 72 saatlik tahmin penceresi.<\/p>\n<p><strong>\u00dcretim Tahmini:<\/strong> Rezervuar seviye + su ak\u0131\u015f\u0131 + t\u00fcrbin verim + piyasa fiyat sinyalleri entegre tahmin.<\/p>\n<p><strong>Kestirimci Bak\u0131m:<\/strong> T\u00fcrbin titre\u015fim, rulman s\u0131cakl\u0131k, ya\u011f kalitesi, sarg\u0131 yal\u0131t\u0131m direnci \u00e7ok de\u011fi\u015fkenli anomali skorlama.<\/p>\n<p><strong>EPIAS Entegrasyonu:<\/strong>\u00a0GOP\/GIP fiyat sinyalleri ile optimizasyon. Otomatik teklif, dengesizlik risk analizi.<\/p>\n<\/div>\n<h1>S\u0131k Sorulan Sorular (FAQ)<\/h1>\n<p data-start=\"64\" data-end=\"460\"><strong data-start=\"64\" data-end=\"153\">S1: Enerji santrali yaz\u0131l\u0131mlar\u0131 neden di\u011fer sekt\u00f6rlere g\u00f6re daha kritik kabul edilir?<\/strong><br data-start=\"153\" data-end=\"156\" \/>Enerji santralleri, kesintisiz g\u00fc\u00e7 sa\u011flama g\u00f6revi nedeniyle ger\u00e7ek zamanl\u0131 kontrol ve y\u00fcksek g\u00fcvenilirlik gerektirir. NIST\u2019e g\u00f6re ICS\/OT sistemleri anl\u0131k yan\u0131t s\u00fcreleri ve s\u00fcrekli \u00e7al\u0131\u015fma gereksinimine tabidir. Bir yaz\u0131l\u0131m hatas\u0131 fiziksel s\u00fcre\u00e7leri etkileyebilir ve ciddi mali kay\u0131plara yol a\u00e7abilir [1].<\/p>\n<p data-start=\"462\" data-end=\"823\"><strong data-start=\"462\" data-end=\"540\">S2: HES\u2019lerdeki yayg\u0131n ICS protokollerinin g\u00fcvenlik zay\u0131fl\u0131klar\u0131 nelerdir?<\/strong><br data-start=\"540\" data-end=\"543\" \/>Modbus, DNP3 ve IEC-104 gibi eski protokoller kimlik do\u011frulama ve \u015fifreleme i\u00e7ermez. Bu nedenle veriler dinlenebilir veya sahte komutlar g\u00f6nderilebilir. SCADA cihazlar\u0131 genellikle standart portlar kullan\u0131r; kontrols\u00fcz b\u0131rak\u0131ld\u0131klar\u0131nda komut enjeksiyonuna f\u0131rsat verebilir [1][2].<\/p>\n<p data-start=\"825\" data-end=\"1182\"><strong data-start=\"825\" data-end=\"870\">S3: HES\u2019lerde Zero Trust nas\u0131l uygulan\u0131r?<\/strong><br data-start=\"870\" data-end=\"873\" \/>OT a\u011f\u0131 segmentlere b\u00f6l\u00fcn\u00fcr ve segmentler aras\u0131 ge\u00e7i\u015f firewall\u2019lar ile s\u0131n\u0131rland\u0131r\u0131l\u0131r. Kritik cihazlara eri\u015fim \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA) ile do\u011frulan\u0131r. A\u011f trafi\u011fi s\u00fcrekli izlenir; anormallik tespit edildi\u011finde sistem an\u0131nda izole edilir. ISA\/IEC 62443 standartlar\u0131 bu katmanl\u0131 mimariyi \u00f6ng\u00f6r\u00fcr [2].<\/p>\n<p data-start=\"1184\" data-end=\"1460\"><strong data-start=\"1184\" data-end=\"1229\">S4: Teknik risk skorlama nas\u0131l uygulan\u0131r?<\/strong><br data-start=\"1229\" data-end=\"1232\" \/>Risk = Tehdit \u00d7 Zafiyet \u00d7 Etki form\u00fcl\u00fc kullan\u0131l\u0131r. Her varl\u0131\u011f\u0131n riski 0\u2013100 aral\u0131\u011f\u0131nda puanlan\u0131r. Siber-HAZOP y\u00f6ntemi ile detayl\u0131 senaryolar olu\u015fturulur ve g\u00fcvenlik yat\u0131r\u0131mlar\u0131 en y\u00fcksek riskli alanlara \u00f6nceliklendirilir [1][5].<\/p>\n<p data-start=\"1462\" data-end=\"1795\"><strong data-start=\"1462\" data-end=\"1535\">S5: SSDLC ve CI\/CD s\u00fcre\u00e7lerinde hangi g\u00fcvenlik \u00f6nlemleri al\u0131nmal\u0131d\u0131r?<\/strong><br data-start=\"1535\" data-end=\"1538\" \/>Kod inceleme, SAST, ba\u011f\u0131ml\u0131l\u0131k tarama, DAST, container g\u00fcvenlik taramas\u0131, SBOM olu\u015fturma ve imza do\u011frulama uygulanmal\u0131d\u0131r. NIST SSDF, statik analiz ve gizli anahtar taramas\u0131n\u0131 \u00f6nerir. \u0130mzas\u0131 do\u011frulanmam\u0131\u015f hi\u00e7bir yaz\u0131l\u0131m \u00fcretim ortam\u0131na al\u0131nmamal\u0131d\u0131r [3][4].<\/p>\n<p data-start=\"1797\" data-end=\"2098\"><strong data-start=\"1797\" data-end=\"1857\">S6: Tedarik zinciri sald\u0131r\u0131lar\u0131na kar\u015f\u0131 nas\u0131l korunulur?<\/strong><br data-start=\"1857\" data-end=\"1860\" \/>SBOM envanteri olu\u015fturma, ba\u011f\u0131ml\u0131l\u0131k imzalama, s\u00fcr\u00fcm sabitleme, firmware sertifika do\u011frulama ve g\u00fcvenli g\u00fcncelleme kanallar\u0131 kullan\u0131l\u0131r. SolarWinds vakas\u0131, me\u015fru g\u00fcncelleme kanallar\u0131n\u0131n bile sald\u0131r\u0131 vekt\u00f6r\u00fc olabilece\u011fini g\u00f6stermi\u015ftir [5].<\/p>\n<h1 data-start=\"2105\" data-end=\"2118\"><strong data-start=\"2109\" data-end=\"2118\">Sonu\u00e7<\/strong><\/h1>\n<p data-start=\"2120\" data-end=\"2501\">Kritik enerji tesislerinde g\u00fcvenlik, rekabet \u00fcst\u00fcnl\u00fc\u011f\u00fc kadar operasyonel s\u00fcreklili\u011fi de belirler. Bu yaz\u0131da SCADA\/OT mimarisindeki zay\u0131fl\u0131klar, savunma katmanlar\u0131, risk analiz y\u00f6ntemleri, yaz\u0131l\u0131m geli\u015ftirme g\u00fcvenli\u011fi ve tedarik zinciri korunmas\u0131 ele al\u0131nm\u0131\u015ft\u0131r. T\u00fcm bu a\u015famalarda sorun\u2013\u00e7\u00f6z\u00fcm odakl\u0131, katmanl\u0131 ve proaktif bir yakla\u015f\u0131m benimsenmesi b\u00fcy\u00fck \u00f6nem ta\u015f\u0131maktad\u0131r [1][2][4].<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi ve SCADA Korumas\u0131 SSDLC, CI\/CD G\u00fcvenli\u011fi, Zero Trust ve HYDROWISE \u00c7\u00f6z\u00fcm\u00fc Renewasoft | 2026 Seviye: Ileri \u00a0 Hedef Kitle: SCADA M\u00fchendisi, HES \u0130\u015fletmecisi, CTO, Altyap\u0131 Yat\u0131r\u0131mc\u0131s\u0131 Giri\u015f Hidroelektrik santrallerin dijitalle\u015fmesiyle (SCADA, IIoT) otomatize sistemler enerji \u00fcretimini optimize ederken, bu sistemlerdeki k\u00fc\u00e7\u00fck bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bile fiziki hasar, verim [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1863],"tags":[411,419,413,417,421,415],"class_list":["post-3064","post","type-post","status-publish","format-standard","hentry","category-kritik-altyapi-siber-guvenligi-ve-endustriyel-sistem-guvenligi","tag-enerji-santrali-guvenligi","tag-sbom","tag-scada-protokolleri","tag-ssdlc","tag-tedarik-zinciri-saldirisi","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e<\/title>\n<meta name=\"description\" content=\"HES&#039;lerde OT\/IT entegrasyonu g\u00fcvenlik risklerini artt\u0131r\u0131yor. SCADA zay\u0131fl\u0131klar\u0131, katmanl\u0131 savunma, risk skorlama ve Renewasoft HYDROWISE ile \u00e7\u00f6z\u00fcmler.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"og:description\" content=\"HES&#039;lerde OT\/IT entegrasyonu g\u00fcvenlik risklerini artt\u0131r\u0131yor. SCADA zay\u0131fl\u0131klar\u0131, katmanl\u0131 savunma, risk skorlama ve Renewasoft HYDROWISE ile \u00e7\u00f6z\u00fcmler.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/\" \/>\n<meta property=\"og:site_name\" content=\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T22:30:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-28T00:35:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bayram Kamus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bayram Kamus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/\"},\"author\":{\"name\":\"Bayram Kamus\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba\"},\"headline\":\"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri\",\"datePublished\":\"2026-02-26T22:30:36+00:00\",\"dateModified\":\"2026-02-28T00:35:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/\"},\"wordCount\":2544,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png\",\"keywords\":[\"enerji santrali g\u00fcvenli\u011fi\",\"SBOM\",\"SCADA protokolleri\",\"SSDLC\",\"tedarik zinciri sald\u0131r\u0131s\u0131\",\"Zero Trust\"],\"articleSection\":[\"Kritik Altyap\u0131 Siber G\u00fcvenli\u011fi ve End\u00fcstriyel Sistem G\u00fcvenli\u011fi\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/\",\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/\",\"name\":\"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png\",\"datePublished\":\"2026-02-26T22:30:36+00:00\",\"dateModified\":\"2026-02-28T00:35:29+00:00\",\"description\":\"HES'lerde OT\/IT entegrasyonu g\u00fcvenlik risklerini artt\u0131r\u0131yor. SCADA zay\u0131fl\u0131klar\u0131, katmanl\u0131 savunma, risk skorlama ve Renewasoft HYDROWISE ile \u00e7\u00f6z\u00fcmler.\",\"breadcrumb\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/renewasoft.com.tr\/#website\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/renewasoft.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"width\":225,\"height\":225,\"caption\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/renewasoft\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba\",\"name\":\"Bayram Kamus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g\",\"caption\":\"Bayram Kamus\"},\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/author\/bayram\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"HES'lerde OT\/IT entegrasyonu g\u00fcvenlik risklerini artt\u0131r\u0131yor. SCADA zay\u0131fl\u0131klar\u0131, katmanl\u0131 savunma, risk skorlama ve Renewasoft HYDROWISE ile \u00e7\u00f6z\u00fcmler.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/","og_locale":"tr_TR","og_type":"article","og_title":"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","og_description":"HES'lerde OT\/IT entegrasyonu g\u00fcvenlik risklerini artt\u0131r\u0131yor. SCADA zay\u0131fl\u0131klar\u0131, katmanl\u0131 savunma, risk skorlama ve Renewasoft HYDROWISE ile \u00e7\u00f6z\u00fcmler.","og_url":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/","og_site_name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","article_published_time":"2026-02-26T22:30:36+00:00","article_modified_time":"2026-02-28T00:35:29+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png","type":"image\/png"}],"author":"Bayram Kamus","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bayram Kamus","Tahmini okuma s\u00fcresi":"13 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#article","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/"},"author":{"name":"Bayram Kamus","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba"},"headline":"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri","datePublished":"2026-02-26T22:30:36+00:00","dateModified":"2026-02-28T00:35:29+00:00","mainEntityOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/"},"wordCount":2544,"commentCount":0,"publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png","keywords":["enerji santrali g\u00fcvenli\u011fi","SBOM","SCADA protokolleri","SSDLC","tedarik zinciri sald\u0131r\u0131s\u0131","Zero Trust"],"articleSection":["Kritik Altyap\u0131 Siber G\u00fcvenli\u011fi ve End\u00fcstriyel Sistem G\u00fcvenli\u011fi"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/","url":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/","name":"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png","datePublished":"2026-02-26T22:30:36+00:00","dateModified":"2026-02-28T00:35:29+00:00","description":"HES'lerde OT\/IT entegrasyonu g\u00fcvenlik risklerini artt\u0131r\u0131yor. SCADA zay\u0131fl\u0131klar\u0131, katmanl\u0131 savunma, risk skorlama ve Renewasoft HYDROWISE ile \u00e7\u00f6z\u00fcmler.","breadcrumb":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#primaryimage","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc.png","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/kritik-enerji-tesislerinde-yazilim-guvenligi-guvenli-kodlama-cicd-ve-supply-chain-riskleri\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/"},{"@type":"ListItem","position":2,"name":"Kritik Enerji Tesislerinde Yaz\u0131l\u0131m G\u00fcvenli\u011fi G\u00fcvenli Kodlama, CICD ve Supply Chain Riskleri"}]},{"@type":"WebSite","@id":"https:\/\/renewasoft.com.tr\/#website","url":"https:\/\/renewasoft.com.tr\/","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"","publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/renewasoft.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/renewasoft.com.tr\/#organization","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","url":"https:\/\/renewasoft.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","width":225,"height":225,"caption":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e"},"image":{"@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/renewasoft\/"]},{"@type":"Person","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba","name":"Bayram Kamus","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g","caption":"Bayram Kamus"},"url":"https:\/\/renewasoft.com.tr\/index.php\/author\/bayram\/"}]}},"_links":{"self":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=3064"}],"version-history":[{"count":2,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3064\/revisions"}],"predecessor-version":[{"id":3243,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3064\/revisions\/3243"}],"wp:attachment":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=3064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=3064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=3064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}