{"id":1503,"date":"2020-12-03T08:43:25","date_gmt":"2020-12-03T07:43:25","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1503"},"modified":"2021-01-04T12:04:59","modified_gmt":"2021-01-04T11:04:59","slug":"sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/","title":{"rendered":"Why your SAP security and compliance strategy can\u2019t wait for an SAP S\/4HANA migration"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1504 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-300x200.jpg\" alt=\"SAST Blog: Why your SAP security and compliance strategy can\u2019t wait for an SAP S\/4HANA migration.\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-1024x682.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-768x512.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Companies have been sensitized to the risks: According to a recent report by consulting firm Ernst &amp; Young, 97 percent of the surveyed executives expect that they will face an even greater risk of cyberattacks and data leaks in the future. And they also know that they can hardly keep up with the rapid advances. That\u2019s why we recommend that you give thought to end-to-end protection of your SAP systems now \u2013 no matter whether you\u2019re still using SAP ERP or have already migrated to SAP S\/4HANA. The sooner you start with an end-to-end strategy, the better you\u2019ll protect yourself against threats \u2013 both internal and external.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Particularly where SAP S\/4HANA is involved, it is essential to incorporate robust, consistent basic security in your migration strategy from the very start. The migration isn\u2019t the only thing that you can trip over; failure to carefully consider the transfer of authorizations and\/or source code early enough can also require significant additional effort and incur enormous expenses.<\/p>\n<h2>The right strategy of SAP security and compliance<\/h2>\n<p>I recommend a three-phase procedure, starting with an analysis of your current vulnerabilities. Once you have eliminated these vulnerabilities in the order of their priority, you have to make sure that no new vulnerabilities can arise.<\/p>\n<h3><strong>1. Analyze your current weaknesses<\/strong><\/h3>\n<p>The first step involves an in-depth analysis of the current situation with a <a href=\"https:\/\/sast-solutions.com\/sap-security-consulting.html\" target=\"_blank\" rel=\"noopener noreferrer\">security &amp; compliance audit<\/a>. Within days, our experts will determine your actual risk potential and identify potential attack vectors \u2013 in the infrastructure, SAP system parameters and module configuration, and in a review of authorizations and separation-of-duty risks.<\/p>\n<h3><strong>2. Eliminate vulnerabilities<\/strong><\/h3>\n<p>The identified vulnerabilities are then eliminated, with a special focus on databases, networks, and operating systems. After all, hackers often use systems like recruiting portals and web applications to gain access to SAP systems. It is also important to start thinking about the redesign of your authorization management for an SAP S\/4HANA migration.<\/p>\n<h3><strong>3. Stay safe: transparent real-time protection<\/strong><\/h3>\n<p>Once you have made your systems safe, you face the challenge of making sure your SAP landscapes stay that way. A <a href=\"https:\/\/sast-blog.akquinet.com\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">security dashboard<\/a> shows you the big picture here. What\u2019s more, real-time monitoring of the systems gives you end-to-end protection of your SAP landscapes, enabling you to react to acute security problems immediately.<\/p>\n<p>You may find this approach to be complex, but the effort required pales in comparison to the damage that successful manipulation can cause.<\/p>\n<p>Proper security planning will improve your bottom line in the long term. That&#8217;s why you should ultimately see this challenge as an opportunity as well: to improve the security of your SAP target system, streamline your role concepts, and enable use of the new system with all its benefits. With the right strategy and early consideration of SAP security and compliance, you and your company will be optimally equipped to handle whatever comes your way.<\/p>\n<p>Would you like to find out more? Visit our <a href=\"https:\/\/sast-solutions.com\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">just get in touch<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-426\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/abb_bodokahl_akquinet-300x210.jpg\" alt=\"Bodo Kahl from SAST SOLUTIONS\" width=\"300\" height=\"210\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/abb_bodokahl_akquinet-300x210.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/abb_bodokahl_akquinet.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\nBodo Kahl, CEO SAST SOLUTIONS<\/p>\n<p>&nbsp;<\/p>\n<h2>Relevant articles on the topic:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/\">How to plan and carry out yor SAP system audit with SAST Risk and Compliance Management<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/\">Don&#8217;t lose track of the big picture &#8211; a security dashboard provides transparency for all your SAP systems<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies have been sensitized to the risks: According to a recent report by consulting firm Ernst &amp; Young, 97 percent of the surveyed executives expect that they will face an even greater risk of cyberattacks and data leaks in the future. And they also know that they can hardly keep up with the rapid advances. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,163,170,114],"class_list":["post-1503","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-s4hana-migration","tag-security-monitoring","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Do not wait until SAP S\/4HANA migration with your right strategy!<\/title>\n<meta name=\"description\" content=\"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do not wait until SAP S\/4HANA migration with your right strategy!\" \/>\n<meta property=\"og:description\" content=\"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-03T07:43:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-04T11:04:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Do not wait until SAP S\/4HANA migration with your right strategy!\" \/>\n<meta name=\"twitter:description\" content=\"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Why your SAP security and compliance strategy can\u2019t wait for an SAP S\\\/4HANA migration\",\"datePublished\":\"2020-12-03T07:43:25+00:00\",\"dateModified\":\"2021-01-04T11:04:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/\"},\"wordCount\":562,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/time-Uhr_S4-nicht-warten-300x200.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"S\\\/4HANA Migration\",\"Security Monitoring\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/\",\"name\":\"Do not wait until SAP S\\\/4HANA migration with your right strategy!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/time-Uhr_S4-nicht-warten-300x200.jpg\",\"datePublished\":\"2020-12-03T07:43:25+00:00\",\"dateModified\":\"2021-01-04T11:04:59+00:00\",\"description\":\"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/time-Uhr_S4-nicht-warten-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/time-Uhr_S4-nicht-warten-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/12\\\/03\\\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why your SAP security and compliance strategy can\u2019t wait for an SAP S\\\/4HANA migration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Do not wait until SAP S\/4HANA migration with your right strategy!","description":"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/","og_locale":"en_US","og_type":"article","og_title":"Do not wait until SAP S\/4HANA migration with your right strategy!","og_description":"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/","og_site_name":"SAST BLOG","article_published_time":"2020-12-03T07:43:25+00:00","article_modified_time":"2021-01-04T11:04:59+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Do not wait until SAP S\/4HANA migration with your right strategy!","twitter_description":"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Why your SAP security and compliance strategy can\u2019t wait for an SAP S\/4HANA migration","datePublished":"2020-12-03T07:43:25+00:00","dateModified":"2021-01-04T11:04:59+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/"},"wordCount":562,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-300x200.jpg","keywords":["Cyber Attack","Cyber Security","S\/4HANA Migration","Security Monitoring","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/","name":"Do not wait until SAP S\/4HANA migration with your right strategy!","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-300x200.jpg","datePublished":"2020-12-03T07:43:25+00:00","dateModified":"2021-01-04T11:04:59+00:00","description":"Take care of the end-to-end protection of your SAP systems now! With the correct security and compliance strategy you will be optimally equipped to handle.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-300x200.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/12\/time-Uhr_S4-nicht-warten-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Why your SAP security and compliance strategy can\u2019t wait for an SAP S\/4HANA migration"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1503"}],"version-history":[{"count":4,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1503\/revisions"}],"predecessor-version":[{"id":1522,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1503\/revisions\/1522"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}