{"id":1174,"date":"2020-05-19T08:24:18","date_gmt":"2020-05-19T06:24:18","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1174"},"modified":"2021-05-27T11:34:53","modified_gmt":"2021-05-27T09:34:53","slug":"plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/","title":{"rendered":"How to plan and carry out your SAP System Audit with SAST Risk and Compliance Management"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1175 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1-300x188.png\" alt=\"SAST Blog: How to Plan and Carry Out Your SAP System Audit with SAST Risk and Compliance Management\" width=\"300\" height=\"188\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1-300x188.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1-768x480.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1.png 787w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The complexity of SAP systems often makes it difficult for administrators to keep track of all their facets. How can an SAP system audit be planned constructively, for example? The SAST SUITE gives you sophisticated analysis methods to identify vulnerabilities quickly, before they can be exploited. The SAST SUITE also offers a wide variety of functions for analyzing and increasing the security of your SAP systems.<\/p>\n<p><!--more--><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>SAST Risk and Compliance Management<\/strong><\/h2>\n<p>With the <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Risk and Compliance Management<\/a> module, the SAST SUITE enables you to make fast, qualified decisions within your IT risk management framework:<\/p>\n<ul>\n<li>Create and manage risks with criticality categories from very high to strictly informative<\/li>\n<li>Create and maintain checks<\/li>\n<li>Create and maintain policies<\/li>\n<li>Schedule automated and cyclical audit runs<\/li>\n<li>Handling of audit results:\n<ul>\n<li>Work lists for securing (hardening) systems<\/li>\n<li>Create and manage mitigation measures<\/li>\n<li>Delta comparison between different audit runs<\/li>\n<li>Export of results lists in standard office formats<\/li>\n<li>Archiving of audit results<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The checking rules contained in the SAST SUITE include more than 2,200 risks and 3,600 checks, providing an excellent source for your comprehensive SAP system audit.<\/p>\n<h2><strong>Planning and execution of your SAP system audit<\/strong><\/h2>\n<p>Your first step for creating an audit plan is the <strong>generation of variants<\/strong> for the three types of checks, using the <a href=\"https:\/\/sast-solutions.com\/sap-platform-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST System Security Validation<\/a> and <a href=\"https:\/\/sast-solutions.com\/sap-identity-and-user-access-management.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Authorization Management<\/a> modules.<\/p>\n<h6><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1172\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik1_EN.jpg\" alt=\"SAST Blog: How to Plan and Carry Out Your SAP System Audit with SAST Risk and Compliance Management\" width=\"715\" height=\"622\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik1_EN.jpg 902w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik1_EN-300x261.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik1_EN-768x668.jpg 768w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><br \/>\n<strong>Figure 1: <\/strong>Example \u00a0of creating a variant in SSV<\/h6>\n<p>In the next step, you maintain the scope and frequency of the cyclical system and authorization check in the Risk &amp; Compliance Management module, under the <strong>Audit Scheduling<\/strong> function.<\/p>\n<h6><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1173\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik2_EN-1024x759.jpg\" alt=\"SAST Blog: How to Plan and Carry Out Your SAP System Audit with SAST Risk and Compliance Management\" width=\"738\" height=\"547\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik2_EN-1024x759.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik2_EN-300x222.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik2_EN-768x569.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Systemaudit_Grafik2_EN.jpg 1196w\" sizes=\"auto, (max-width: 738px) 100vw, 738px\" \/><br \/>\n<strong>Figure 2:<\/strong> Maintain audit plan ID in SAST Risk &amp; Compliance Management<\/h6>\n<p>You only need to enter a few values to <strong>create an audit plan<\/strong>: An appropriate name in the &#8220;Audit Plan ID&#8221; field, a brief description, and the person responsible for the current audit plan (SAP user name or e-mail address). Checkboxes control which options are activated for e-mail notifications and enable you to configure reminders.<\/p>\n<p>The <strong>Scope and frequence<\/strong> section controls the content and scheduling of the audit plan.<\/p>\n<p>There are two selection options under &#8220;Org. Level ID&#8221;: ALL (all SAP organizational levels are included in the check) and NONE (all SAP organizational levels are ignored in the check). NONE is the default selection.<\/p>\n<p>The &#8220;Policy ID&#8221; for performing the check must also be specified. An SAST policy can be used here or you can use your own company policy. The checkboxes indicating which audit types will be carried out are initially inactive. They are activated when the systems and variants to be checked are entered under <strong>Assigned systems<\/strong>. Last but not least, you specify the start date, start time, and interval in the <strong>Scope and frequence<\/strong> area.<\/p>\n<p>You have to schedule an hourly batch job for an audit plan to run regularly at the specified time. You do this in transaction SM36, with a special batch user that has to be assigned the suitable SAST roles.<\/p>\n<p>Alternatively, you can also start an audit run directly with the <strong>Start Audit Cycle<\/strong> button.<\/p>\n<p>Last but not least, you can click the <strong>List Audit Cycles <\/strong>button to find the status of current audit runs and those already performed.<\/p>\n<p>You also have the option of saving audit results locally via <strong>Download<\/strong> or adding a list to your audit results via <strong>Upload<\/strong>.<\/p>\n<p>With SAST Risk and Compliance Management, your IT risk management will no longer be a reactive process. And after you have successfully planned a system audit, the next step involves assessing the risk potential of your SAP landscapes and implementing security precautions.<\/p>\n<p>Would you like to take a look at the <strong>audit results<\/strong> and <strong>how they are handled<\/strong> with the SAST SUITE? If so, you can look forward to <strong>part 2<\/strong> of our blog post &#8220;SAP System Audit with SAST Risk and Compliance Management&#8221;, in which we will show you how this module gives you full mitigation reporting.<\/p>\n<p>Until then, you&#8217;ll find helpful information on our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or feel free to <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">just get in touch<\/a> with us directly.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1092\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz-244x300.jpg\" alt=\"Matthias Anst\u00f6tz (SAST SOLUTIONS)\" width=\"244\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz-244x300.jpg 244w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz.jpg 297w\" sizes=\"auto, (max-width: 244px) 100vw, 244px\" \/><br \/>\n<strong>Matthias Anst\u00f6tz (SAP Security Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>That might also be interesting for you:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/02\/20\/sap-security-audit-log-recommendations-optimal-monitoring\/\">SAP Security Audit Log \u2013 Recommendations for Optimal Monitoring<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/\">Detect and Eliminate Vulnerabilities in SAP Systems \u2013 Thanks to Security Audit and RFC Interface Analysis<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The complexity of SAP systems often makes it difficult for administrators to keep track of all their facets. How can an SAP system audit be planned constructively, for example? The SAST SUITE gives you sophisticated analysis methods to identify vulnerabilities quickly, before they can be exploited. The SAST SUITE also offers a wide variety of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[156,97,80,114],"class_list":["post-1174","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-cyber-security","tag-sap-audit","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Planning your SAP System Audit | SAST Risk &amp; Compliance Management<\/title>\n<meta name=\"description\" content=\"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Planning your SAP System Audit | SAST Risk &amp; Compliance Management\" \/>\n<meta property=\"og:description\" content=\"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T06:24:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-27T09:34:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"492\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Planning your SAP System Audit | SAST Risk &amp; Compliance Management\" \/>\n<meta name=\"twitter:description\" content=\"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"How to plan and carry out your SAP System Audit with SAST Risk and Compliance Management\",\"datePublished\":\"2020-05-19T06:24:18+00:00\",\"dateModified\":\"2021-05-27T09:34:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/\"},\"wordCount\":719,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Motiv_SAST_Teil1-300x188.png\",\"keywords\":[\"Cyber Security\",\"SAP Audit\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/\",\"name\":\"Planning your SAP System Audit | SAST Risk & Compliance Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Motiv_SAST_Teil1-300x188.png\",\"datePublished\":\"2020-05-19T06:24:18+00:00\",\"dateModified\":\"2021-05-27T09:34:53+00:00\",\"description\":\"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Motiv_SAST_Teil1-300x188.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Motiv_SAST_Teil1-300x188.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/19\\\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to plan and carry out your SAP System Audit with SAST Risk and Compliance Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Planning your SAP System Audit | SAST Risk & Compliance Management","description":"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/","og_locale":"en_US","og_type":"article","og_title":"Planning your SAP System Audit | SAST Risk & Compliance Management","og_description":"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/","og_site_name":"SAST BLOG","article_published_time":"2020-05-19T06:24:18+00:00","article_modified_time":"2021-05-27T09:34:53+00:00","og_image":[{"width":787,"height":492,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Planning your SAP System Audit | SAST Risk & Compliance Management","twitter_description":"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"How to plan and carry out your SAP System Audit with SAST Risk and Compliance Management","datePublished":"2020-05-19T06:24:18+00:00","dateModified":"2021-05-27T09:34:53+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/"},"wordCount":719,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1-300x188.png","keywords":["Cyber Security","SAP Audit","SAP Security","Threat Detection"],"articleSection":["SAST SUITE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/","name":"Planning your SAP System Audit | SAST Risk & Compliance Management","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1-300x188.png","datePublished":"2020-05-19T06:24:18+00:00","dateModified":"2021-05-27T09:34:53+00:00","description":"With our SAST SUITE we give you sophisticated analysis methods so that you can constructively plan and carry out your SAP system audit.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1-300x188.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Motiv_SAST_Teil1-300x188.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"How to plan and carry out your SAP System Audit with SAST Risk and Compliance Management"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1174"}],"version-history":[{"count":18,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1174\/revisions"}],"predecessor-version":[{"id":1665,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1174\/revisions\/1665"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}