{"id":1667,"date":"2021-05-28T11:18:28","date_gmt":"2021-05-28T09:18:28","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1667"},"modified":"2021-05-28T11:20:20","modified_gmt":"2021-05-28T09:20:20","slug":"hacker-has-already-broken-in-when-it-auditor-is-at-the-door","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/","title":{"rendered":"Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1668 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en-300x181.jpg\" alt=\"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door? \" width=\"300\" height=\"181\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en-300x181.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en-1024x616.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en-768x462.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en.jpg 1143w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The procedure is well-known at SMEs and large companies: Every year, the auditor comes around for the IT audit, which is carried out as part of the annual overall review. The general objective is to ensure the security and integrity of the audited system (usually the SAP system used for accounting) and to identify potential risks. A management letter then describes follow-up measures to mitigate these risks in future. But does this approach still make sense today?<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>An IT audit is a snapshot. What you need is real-time monitoring.<\/strong><\/h2>\n<p>If we ask ourselves whether the audit checks can actually get to the root of the risks and identify and handle them quickly, we realize that this can only be a supplementary measure. It is not a solution-oriented method from the risk perspective, particularly in fast-moving IT landscapes.<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1669\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik1_Audit-Echtzeit_en-1024x496.jpg\" alt=\"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door? \" width=\"764\" height=\"370\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik1_Audit-Echtzeit_en-1024x496.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik1_Audit-Echtzeit_en-300x145.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik1_Audit-Echtzeit_en-768x372.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik1_Audit-Echtzeit_en.jpg 1242w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>A better, more contemporary approach is \u201c360-degree real-time monitoring\u201d \u2013 identifying risks and presenting them transparently in the event that they actually occur. The <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener\">SAST SUITE<\/a> and its <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener\">Security Radar<\/a> meets these requirements. Instead of a one-time, sample-based test whose result is statistically relevant for the general population, the solution implements event-driven real-time monitoring of the SAP system, to identify occurring events directly and implement the necessary subsequent steps.<\/p>\n<h2><strong>SAST helps you find the needle in the haystack.<\/strong><\/h2>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1670\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik2_Audit-Echtzeit_en-1024x429.jpg\" alt=\"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door? \" width=\"764\" height=\"320\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik2_Audit-Echtzeit_en-1024x429.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik2_Audit-Echtzeit_en-300x126.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik2_Audit-Echtzeit_en-768x322.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik2_Audit-Echtzeit_en.jpg 1310w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/h2>\n<p>The SAST Security Radar has out-of-the-box data sources and events that are monitored continuously. If an event occurs, a follow-up task is initiated immediately. This could involve notifying the security officer, for example, as well as blocking a download in process.<\/p>\n<p>The events described as examples below emphasize the possibilities for mitigating the resulting risks immediately:<\/p>\n<ul>\n<li>The SAP system was opened &gt; Immediate notification<\/li>\n<li>Critical data\/prices are downloaded from tables &gt; Block the download process &gt; Notification\/approval<\/li>\n<li>A user is assigned a critical profile (such as SAP_ALL) &gt; Immediate notification<\/li>\n<li>The critical transaction XYZ was called with user ID ABC &gt; Immediate notification<\/li>\n<li>A user assigns roles to their own SAP user &gt; Immediate notification<\/li>\n<\/ul>\n<h2><strong>AKQUINET business Robots as an enhancement to SAST Security Radar.<\/strong><\/h2>\n<p>We have enhanced the SAST Security Radar-based approach from the compliance perspective with <strong>AKQUINET business Robots (bRobots<\/strong><strong>)<\/strong>, which make it possible to analyze specific business processes based on rules and making intelligent decisions whether to allow those processes to advance:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1671\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik3_Audit-Echtzeit_en-1024x475.jpg\" alt=\"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door? \" width=\"764\" height=\"354\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik3_Audit-Echtzeit_en-1024x475.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik3_Audit-Echtzeit_en-300x139.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik3_Audit-Echtzeit_en-768x356.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik3_Audit-Echtzeit_en.jpg 1287w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>If fields defined as \u201ccritical\u201d are changed, for example (such as a supplier\u2019s bank data, prices, inventory levels, and so on), \u201cDecision+\u201d from bRobots recognizes this and triggers a workflow (Workflow+). This enables us to integrate the dual-control principal dynamically and obtain approval for the change via \u201cApp+\u201d:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1672\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik4_Audit-Echtzeit_en-1024x487.jpg\" alt=\"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door? \" width=\"764\" height=\"363\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik4_Audit-Echtzeit_en-1024x487.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik4_Audit-Echtzeit_en-300x143.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik4_Audit-Echtzeit_en-768x366.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik4_Audit-Echtzeit_en.jpg 1273w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>The result is an intelligent, rule-based control system without rigid, cost-intensive and resource-intensive workflows with fixed dual-control principles.<\/p>\n<p>In a second use case, we focus on critical changes to prices:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1673\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik5_Audit-Echtzeit_en-1024x443.jpg\" alt=\"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door? \" width=\"764\" height=\"331\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik5_Audit-Echtzeit_en-1024x443.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik5_Audit-Echtzeit_en-300x130.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik5_Audit-Echtzeit_en-768x332.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Graphik5_Audit-Echtzeit_en.jpg 1314w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>When users who theoretically have a separation-of-duties conflict change prices beyond a certain percentage, dependent on other decision-making parameters (such as the material type), the bRobot triggers a workflow dynamically and waits to implement the price change in the system until it has been reviewed and approved.<\/p>\n<p>Combining <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener\">SAST Security Radar<\/a> and <a href=\"https:\/\/brobots.info\/en\/\" target=\"_blank\" rel=\"noopener\">business Robots (bRobots<\/a>) makes it possible to identify critical events in the security and compliance concept dynamically and intelligently, make them transparent, and initiate relevant follow-up steps.<\/p>\n<p>Tip: You gain get deeper insights into this topic in the webinar of the same name: \u201cWhat if a hacker has already broken in when your IT auditor is at the door? How to actually protect your SAP systems.\u201d Simply request the <a href=\"https:\/\/sast-solutions.com\/webinars-on-demand-en.html\" target=\"_blank\" rel=\"noopener\">link to the recording<\/a> to find out more \u2013 preferably before your next audit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-928\" src=\"https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2018\/04\/michaelmc3bcller_akquinet-e1522919740773-226x300.png\" alt=\"\" width=\"226\" height=\"300\" \/><br \/>\n<strong>Michael M\u00fcllner (Head of Security &amp; Compliance Services, AKQUINET Austria)\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>This could also interest you:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"tR9JTI3YqA\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/\">The importance of reliably monitoring transactions in SAP systems<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The importance of reliably monitoring transactions in SAP systems&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/embed\/#?secret=tR9JTI3YqA\" data-secret=\"tR9JTI3YqA\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"IUQdya1WO2\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/\">SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/embed\/#?secret=IUQdya1WO2\" data-secret=\"IUQdya1WO2\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The procedure is well-known at SMEs and large companies: Every year, the auditor comes around for the IT audit, which is carried out as part of the annual overall review. The general objective is to ensure the security and integrity of the audited system (usually the SAP system used for accounting) and to identify potential [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[151,58,97,80,114],"class_list":["post-1667","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-grc","tag-real-time-monitoring","tag-sap-audit","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>An IT audit is only a snapshot | Securing your SAP systems in real time<\/title>\n<meta name=\"description\" content=\"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An IT audit is only a snapshot | Securing your SAP systems in real time\" \/>\n<meta property=\"og:description\" content=\"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-28T09:18:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-28T09:20:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1143\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"An IT audit is only a snapshot | Securing your SAP systems in real time\" \/>\n<meta name=\"twitter:description\" content=\"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?\",\"datePublished\":\"2021-05-28T09:18:28+00:00\",\"dateModified\":\"2021-05-28T09:20:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/\"},\"wordCount\":642,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Headerbild_Audit-Echtzeit_en-300x181.jpg\",\"keywords\":[\"GRC\",\"Real-time monitoring\",\"SAP Audit\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/\",\"name\":\"An IT audit is only a snapshot | Securing your SAP systems in real time\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Headerbild_Audit-Echtzeit_en-300x181.jpg\",\"datePublished\":\"2021-05-28T09:18:28+00:00\",\"dateModified\":\"2021-05-28T09:20:20+00:00\",\"description\":\"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Headerbild_Audit-Echtzeit_en.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Headerbild_Audit-Echtzeit_en.jpg\",\"width\":1143,\"height\":688,\"caption\":\"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/28\\\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An IT audit is only a snapshot | Securing your SAP systems in real time","description":"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/","og_locale":"en_US","og_type":"article","og_title":"An IT audit is only a snapshot | Securing your SAP systems in real time","og_description":"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/","og_site_name":"SAST BLOG","article_published_time":"2021-05-28T09:18:28+00:00","article_modified_time":"2021-05-28T09:20:20+00:00","og_image":[{"width":1143,"height":688,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"An IT audit is only a snapshot | Securing your SAP systems in real time","twitter_description":"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?","datePublished":"2021-05-28T09:18:28+00:00","dateModified":"2021-05-28T09:20:20+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/"},"wordCount":642,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en-300x181.jpg","keywords":["GRC","Real-time monitoring","SAP Audit","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/","name":"An IT audit is only a snapshot | Securing your SAP systems in real time","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en-300x181.jpg","datePublished":"2021-05-28T09:18:28+00:00","dateModified":"2021-05-28T09:20:20+00:00","description":"Transform an IT audit into real-time monitoring! This allows risks to be identified and addressed immediately.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Headerbild_Audit-Echtzeit_en.jpg","width":1143,"height":688,"caption":"SAST Blog: What if a hacker has already broken in when your IT auditor is at the door?"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1667"}],"version-history":[{"count":5,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1667\/revisions"}],"predecessor-version":[{"id":1678,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1667\/revisions\/1678"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}