{"id":1875,"date":"2022-05-06T10:40:27","date_gmt":"2022-05-06T08:40:27","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1875"},"modified":"2022-05-06T10:40:27","modified_gmt":"2022-05-06T08:40:27","slug":"security-projects-do-not-stop-at-the-authorization-concept","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/","title":{"rendered":"Security projects do not stop at the authorization concept"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-964 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" alt=\"Expert talk of IT-Onlinemagazin with SAST\" width=\"267\" height=\"200\" \/>An end-to-end security strategy must also include regular checks, maintenance, and protection of authorizations, installations, and proprietary developments against internal and external threats \u2013 especially in an SAP landscape. But what roles do project organization and project management play when it comes to improving SAP security?<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><strong>The following interview between Helge Sanden (Editor in Chief of IT-Onlinemagazin) and Ralf Kempf (CTO SAST SOLUTIONS) was published in <a href=\"https:\/\/it-onlinemagazin.de\/\" target=\"_blank\" rel=\"noopener\">IT-Onlinemagazin<\/a> on April 26, 2022.<\/strong><\/p>\n<h3><strong>What do you think are the greatest challenges that CIOs and CISOs face right now?<\/strong><\/h3>\n<p>One challenge that all IT executives probably face is the shortage of experienced specialists and the resulting competition for new talents. Targeted efforts at further education and training can only partially compensate for this, however. Well-conceived automation steps in the cybersecurity area are crucial to countering the huge lack of resources.<\/p>\n<p>At the same time, it is also important to give end-to-end consideration of security in hybrid IT environments. The trend continues to move away from classic, standalone ERP solutions and toward fully integrated, intermeshed IT system networks that include both SAP and non-SAP solutions.<\/p>\n<p>Another challenge that we repeatedly see in security projects is how companies deal with shadow IT. Employees often install new software \u2013 often freeware \u2013 to handle specific needs, without obtaining prior approval. Such implementations are almost never compliant, to say nothing of based on a utilization concept. In such cases, vulnerabilities are all but certain.<strong>\u00a0<\/strong><\/p>\n<h2>SAP know-how and awareness of security needed<\/h2>\n<h3><strong>Nearly four of five SAP customers intend to invest in improving their cybersecurity, according to the DSAG Investment Report 2022. What do they have to watch out for here?<\/strong><\/h3>\n<p>Companies often try to start with identifying vulnerabilities through automated processes. Recognition isn\u2019t easy to learn, however, and often results in \u201coverlearning\u201d or incorrect learning, with the result that the algorithm fails to respond to actual threats.<\/p>\n<p>We primarily advise our customers to automate and optimize the provisioning of information. A common, end-to-end, enterprise-wide baseline for IT security is decisive here, because it is the only way for SIEM and SOC teams to include SAP systems in their efforts. Dedicated security dashboards offer a key benefit, in that they make the current security situation transparent. Results can be clearly visualized for security teams and changes to the threat situation can be identified and acted upon quickly.<\/p>\n<p>Here, in particular, the targeted expansion of knowledge for internal security efforts has one of the greatest impacts. After all, attack scenarios have to be truly understood in order to be prevented effectively.<strong>\u00a0<\/strong><\/p>\n<h3><strong>How important are the project organization and project management in security projects?<\/strong><\/h3>\n<p>Like the IT environments they protect, security projects have become much more complex. Well-conceived user and authorization management alone is no longer enough for successful security projects. In addition to the authorization concept, the infrastructure, system interfaces, databases, and customer ABAP developments also have to be scrutinized.<\/p>\n<p>All of these factors have to be considered using state-of-the-art technology. What\u2019s more, spot checks have long lost their effectiveness even if the content is correct \u2013 this applies to the source code in particular. New vulnerabilities arise every day, with varying levels of relevance, making continuous checks essential \u2013 ideally in real time. All of this means that modern security projects essentially never end; they are subject to constant evolution.<\/p>\n<p>Another factor, particularly in the SAP area, is that areas such as SAP Basis, authorizations, and source code are often separated, both organizationally and in terms of responsibility. All of these areas have to be joined within the project and all activities have to be coordinated, for the benefit of everyone involved. As such, overcoming barriers to communication and enabling the departments to talk with one another are essential to success.<\/p>\n<h2>Case story on the SAP system hardening project<\/h2>\n<h3><strong>What will you be talking about at the IT online conference in May?<\/strong><\/h3>\n<p>We are happy to have enlisted Sven Ruffersh\u00f6fer as a speaker for this conference. He will provide exclusive insights into the SAP system hardening project at DATEV eG and describe the obstacles that they underestimated, as well as how they ultimately succeeded in executing the security project across all departments \u2013 including Basis, authorizations, and source code \u2013 through targeted collaboration.<\/p>\n<p>As part of its all-encompassing SAP security strategy, DATEV eG also checked its authorizations, installations, and proprietary developments for internal and external threats. Its lack of internal expertise in functional and organizational matters was no reason for the company to procrastinate in matters of SAP security and we were engaged to provide expert support to the project at a very early stage.<\/p>\n<h3><strong>What do you expect the dominating security topic to be among the SAP community in the next 12 months?<\/strong><\/h3>\n<p>Given the current risk situation in Eastern Europe, as well as worldwide, hacking attacks aimed at sabotage \u2013 rather than espionage and monetization (ransomware) \u2013 are an increasing focus. This applies to highly critical enterprise areas in particular.<\/p>\n<p>While ransomware has been used primarily for extortion attempts and financial gain in the past, it could be deployed more for political purposes in future, with the aim of rendering companies permanently unable to conduct business.<\/p>\n<p>As such, when it comes to cybersecurity, it is more important than ever to not only pursue quick wins and try to balance the costs of security measures against the probability of suffering damages, but instead to give top priority to safeguarding your ability to do business and protecting the continuing existence of a company.<\/p>\n<p><strong>Thank you for the interview.<\/strong><\/p>\n<p>Helge Sanden, Editor in Chief of IT-Onlinemagazin, asked the questions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-788\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-300x200.jpg\" alt=\"Helge Sanden IT-Onlinemagazin\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-768x512.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Helge Sanden (Editor in Chief of IT-Onlinemagazin)<\/strong><strong>\u00a0<\/strong><\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1805\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-300x225.jpg\" alt=\"Ralf Kempf (SAST SOLUTIONS)\" width=\"300\" height=\"225\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-300x225.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-1024x768.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-768x576.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi-800x600.jpg 800w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/01\/RalfKempf_Shooting_72dpi.jpg 1155w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<\/strong><strong>Ralf Kempf (CTO SAST SOLUTIONS)<\/strong><\/p>\n<p>Would you like to dive deeper into this subject? We recommend our <a href=\"https:\/\/sast-solutions.de\/events-webinare.html\" target=\"_blank\" rel=\"noopener\"><strong>SAST Expert Talks<\/strong><\/a>, at <strong>10:30 a.m. on May 19, 2022<\/strong> at the <strong><a href=\"https:\/\/it-onlinemagazin.de\/it-onlinekonferenz-mai-2022-mehrwerte-schaffen\/?pk_campaign=MR-Home-ITOK22-Mai\" target=\"_blank\" rel=\"noopener\">IT online conference<\/a><\/strong> (in German). Together with Sven Ruffersh\u00f6fer (instructor in SAP system design | DATEV), Ralf Kempf will report on the successful protection of SAP systems at DATEV. Registration: <strong><a href=\"https:\/\/t1p.de\/u0ryv\" target=\"_blank\" rel=\"noopener\">https:\/\/t1p.de\/u0ryv<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong> Further interviews with Mr Kempf:<\/strong><\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"kAwiD5yF48\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/01\/24\/why-are-siem-tools-blind-to-sap-interesting-question-who-are-migrating-to-sap-s4hana\/\">Why are SIEM tools blind to SAP? An interesting question, and not only for operators of critical infrastructure who are migrating to SAP S\/4HANA.<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Why are SIEM tools blind to SAP? An interesting question, and not only for operators of critical infrastructure who are migrating to SAP S\/4HANA.&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2022\/01\/24\/why-are-siem-tools-blind-to-sap-interesting-question-who-are-migrating-to-sap-s4hana\/embed\/#?secret=AQdw1Aer9c#?secret=kAwiD5yF48\" data-secret=\"kAwiD5yF48\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"U3RmfFc4ca\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/\">Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics: Multinational attacks on the weakest links in the chain<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics: Multinational attacks on the weakest links in the chain&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/embed\/#?secret=b4OicWRjtI#?secret=U3RmfFc4ca\" data-secret=\"U3RmfFc4ca\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An end-to-end security strategy must also include regular checks, maintenance, and protection of authorizations, installations, and proprietary developments against internal and external threats \u2013 especially in an SAP landscape. But what roles do project organization and project management play when it comes to improving SAP security?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[25,156,58,68,80],"class_list":["post-1875","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-sap-authorizations","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security projects should not stop with the authorization concept<\/title>\n<meta name=\"description\" content=\"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security projects should not stop with the authorization concept\" \/>\n<meta property=\"og:description\" content=\"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-06T08:40:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"267\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Security projects should not stop with the authorization concept\" \/>\n<meta name=\"twitter:description\" content=\"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Security projects do not stop at the authorization concept\",\"datePublished\":\"2022-05-06T08:40:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/\"},\"wordCount\":1018,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"SAP Authorizations\",\"SAP Security\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/\",\"name\":\"Security projects should not stop with the authorization concept\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"datePublished\":\"2022-05-06T08:40:27+00:00\",\"description\":\"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"width\":267,\"height\":200,\"caption\":\"Expert talk of IT-Onlinemagazin with SAST\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/05\\\/06\\\/security-projects-do-not-stop-at-the-authorization-concept\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security projects do not stop at the authorization concept\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security projects should not stop with the authorization concept","description":"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/","og_locale":"en_US","og_type":"article","og_title":"Security projects should not stop with the authorization concept","og_description":"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/","og_site_name":"SAST BLOG","article_published_time":"2022-05-06T08:40:27+00:00","og_image":[{"width":267,"height":200,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Security projects should not stop with the authorization concept","twitter_description":"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Security projects do not stop at the authorization concept","datePublished":"2022-05-06T08:40:27+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/"},"wordCount":1018,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","SAP Authorizations","SAP Security"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/","name":"Security projects should not stop with the authorization concept","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","datePublished":"2022-05-06T08:40:27+00:00","description":"A good authorization concept isn\u2019t a cybersecurity strategy on its own. It also depends on the right project organisation!","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","width":267,"height":200,"caption":"Expert talk of IT-Onlinemagazin with SAST"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/05\/06\/security-projects-do-not-stop-at-the-authorization-concept\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Security projects do not stop at the authorization concept"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1875"}],"version-history":[{"count":4,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1875\/revisions"}],"predecessor-version":[{"id":1879,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1875\/revisions\/1879"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}