{"id":1767,"date":"2021-11-19T10:23:41","date_gmt":"2021-11-19T09:23:41","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1767"},"modified":"2021-11-19T10:23:41","modified_gmt":"2021-11-19T09:23:41","slug":"rectify-your-top-findings-before-the-external-auditors-arrive","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/","title":{"rendered":"Rectify your top findings before the external auditors arrive!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1768 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP-300x200.jpg\" alt=\"Rectify your top findings before the external auditors arrive!\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP-1024x683.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP-768x512.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP.jpg 1515w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Once a year, as every SAP administrator and security manager knows, the annual external audit is a given. Despite this, the current risk situation of the SAP systems is often uncertain. Have all the vulnerabilities from the last audit really been taken care of? Have new risks arisen in the meantime? If you don\u2019t take active countermeasures, you might end up in the same situation again and again.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The next audit is always right around the corner<\/strong><\/h2>\n<p>SAP authorization concepts are subject to continual change, which is why auditors check every year to make sure that authorizations like SAP_ALL and the SAP standard users are protected, along with examining SoD risks. The list of necessary measures is long: from installing security patches to checking and reducing critical authorizations. Security specialists then often get the short-term order of ensuring that the list of findings from the previous year\u2019s external audit has been processed thoroughly and that no serious risks have arisen in the meantime\u00a0\u2013 whether debug and replace, deletion of change documents, or starting all reports that involve individual critical authorizations. One reason for these ad hoc orders: there has been no follow-up of the cleanups from the previous audit due to a lack of resources.<\/p>\n<p>If you limit yourself to this reactive approach, you\u2019re bound to go through the same cycle over and over again.<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1769\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik1_en-1024x389.jpg\" alt=\"AST Blog: Rectify your top findings before the external auditors arrive!\" width=\"764\" height=\"290\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik1_en-1024x389.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik1_en-300x114.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik1_en-768x292.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik1_en.jpg 1155w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><br \/>\nIf the previous findings are eliminated or mitigated just before the next audit, the auditor doesn\u2019t test for them alone; they run additional tests as well, of course, and produce a new list of findings\u00a0\u2013 and the game starts all over again. Although this snapshot-based approach is essential to avoiding short-term damage, it is not a viable future strategy. The compliance status of the system deteriorates immediately whenever new authorizations are assigned; this creep cannot be prevented proactively. New risks often remain undetected over the year, at least until the next audit comes around. The end effect: There is no work aimed at continuous improvement of the situation, nor any ongoing risk monitoring.<\/p>\n<h2><strong>Every external audit is merely a snapshot<\/strong><\/h2>\n<p>A list of findings only reveals a small sample of the risks in an SAP system. But what about analyses of transactions, changes, and system behavior? When and where have employees deviated from the specified working methods? Were differing settings intentionally changed back to the \u201ctarget\u201d state? Still, the solution to this problem is relatively simple: Don\u2019t wait until the next audit! Instead, identify your vulnerabilities today. It\u2019s the only way to guarantee the security of your SAP systems year-round and enable you to react to anomalies quickly.<\/p>\n<h2><strong>Proactive risk management is better than reactive<\/strong><\/h2>\n<p>The easiest, most thorough way to achieve this is by using an end-to-end, tool-supported solution for SAP threat detection and access governance\u00a0\u2013 like the <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener\">SAST SUITE<\/a>. It not only provides extensive real-time monitoring, but also facilitates the integration of cyclical checks, even up to producing an audit plan with a dedicated policy for the auditor\u2019s list of findings. As a result, regular internal audits are used in addition to annual review by external auditors, to check the configuration of SAP landscapes and user authorizations. Their benefits: They analyze individual aspects of the system in shorter time intervals, help with preparation for and follow-up to the annual audits, and support internal control systems.<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1770\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik2_en-1024x458.jpg\" alt=\"AST Blog: Rectify your top findings before the external auditors arrive!\" width=\"764\" height=\"342\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik2_en-1024x458.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik2_en-300x134.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik2_en-768x343.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/WP_Grafik2_en.jpg 1089w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<h2><strong>Take an end-to-end approach <\/strong><\/h2>\n<p>The SAST SUITE enables fast, effective ad hoc cleanup of the external auditor\u2019s findings. Initial activities like this should remain the exception, however, and only represent the starting point, to prevent any gaps in monitoring over time. A reliable IT security concept requires a solution like the SAST SUITE\u00a0\u2013 one that enables proactive risk management and helps you reach a continuous \u201cstay clean\u201d stage through regular analyses and cyclical checks, with a clear audit plan, definition of the audit scope, planning of recurring checks, and automated audit execution. All these factors will help to ensure that cleaned systems stay clean, so you\u2019ll never have to dread an auditor visit again.<\/p>\n<p>For more information, visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">SAST SOLUTIONS website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener\">just get in touch<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Further articles on the topic:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"v8Dm6u9Cz0\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/\">Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Knock, knock! What if a hacker has already broken in when your IT auditor is at the door?&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/28\/hacker-has-already-broken-in-when-it-auditor-is-at-the-door\/embed\/#?secret=v8Dm6u9Cz0\" data-secret=\"v8Dm6u9Cz0\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"H9T2FiA3fp\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/\">How to plan and carry out your SAP System Audit with SAST Risk and Compliance Management<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to plan and carry out your SAP System Audit with SAST Risk and Compliance Management&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/19\/plan-and-carry-out-sap-system-audit-with-sast-risk-and-compliance-management\/embed\/#?secret=H9T2FiA3fp\" data-secret=\"H9T2FiA3fp\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Once a year, as every SAP administrator and security manager knows, the annual external audit is a given. Despite this, the current risk situation of the SAP systems is often uncertain. Have all the vulnerabilities from the last audit really been taken care of? Have new risks arisen in the meantime? If you don\u2019t take [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[58,97,68,80,114],"class_list":["post-1767","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-real-time-monitoring","tag-sap-audit","tag-sap-authorizations","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rectify your vulnerabilities in good time before the next external audit<\/title>\n<meta name=\"description\" content=\"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rectify your vulnerabilities in good time before the next external audit\" \/>\n<meta property=\"og:description\" content=\"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-19T09:23:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1515\" \/>\n\t<meta property=\"og:image:height\" content=\"1010\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Rectify your vulnerabilities in good time before the next external audit\" \/>\n<meta name=\"twitter:description\" content=\"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Rectify your top findings before the external auditors arrive!\",\"datePublished\":\"2021-11-19T09:23:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Motiv_Blog_WP-300x200.jpg\",\"keywords\":[\"Real-time monitoring\",\"SAP Audit\",\"SAP Authorizations\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/\",\"name\":\"Rectify your vulnerabilities in good time before the next external audit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Motiv_Blog_WP-300x200.jpg\",\"datePublished\":\"2021-11-19T09:23:41+00:00\",\"description\":\"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Motiv_Blog_WP.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Motiv_Blog_WP.jpg\",\"width\":1515,\"height\":1010,\"caption\":\"Rectify your top findings before the external auditors arrive!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/11\\\/19\\\/rectify-your-top-findings-before-the-external-auditors-arrive\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rectify your top findings before the external auditors arrive!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rectify your vulnerabilities in good time before the next external audit","description":"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/","og_locale":"en_US","og_type":"article","og_title":"Rectify your vulnerabilities in good time before the next external audit","og_description":"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/","og_site_name":"SAST BLOG","article_published_time":"2021-11-19T09:23:41+00:00","og_image":[{"width":1515,"height":1010,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Rectify your vulnerabilities in good time before the next external audit","twitter_description":"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Rectify your top findings before the external auditors arrive!","datePublished":"2021-11-19T09:23:41+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/"},"wordCount":716,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP-300x200.jpg","keywords":["Real-time monitoring","SAP Audit","SAP Authorizations","SAP Security","Threat Detection"],"articleSection":["SAST SUITE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/","name":"Rectify your vulnerabilities in good time before the next external audit","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP-300x200.jpg","datePublished":"2021-11-19T09:23:41+00:00","description":"SAST SUITE enables proactive risk management. With our Stay Clean approach, you\u2019ll never have to dread an external audit again.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/11\/Motiv_Blog_WP.jpg","width":1515,"height":1010,"caption":"Rectify your top findings before the external auditors arrive!"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/11\/19\/rectify-your-top-findings-before-the-external-auditors-arrive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Rectify your top findings before the external auditors arrive!"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1767"}],"version-history":[{"count":1,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1767\/revisions"}],"predecessor-version":[{"id":1771,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1767\/revisions\/1771"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}