{"id":1928,"date":"2022-07-28T09:22:33","date_gmt":"2022-07-28T07:22:33","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1928"},"modified":"2022-07-28T09:22:33","modified_gmt":"2022-07-28T07:22:33","slug":"how-it-security-policies-help-satisfy-security-requirements","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/","title":{"rendered":"How IT security policies help you satisfy your security requirements"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1929 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-300x194.jpg\" alt=\"SAST Blog: How IT security policies help you satisfy your security requirements \" width=\"300\" height=\"194\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-300x194.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-1024x662.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-768x496.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-1536x993.jpg 1536w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien.jpg 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Do you know what you have to do when your company faces security incidents? Do you have documents where you can look up what you need to do? If so, are they up to date? Security policies are neglected in many areas, although they are a cornerstone for maintaining IT compliance and improving enterprise security.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Security concepts contain rules and policies that all employees have to follow. You can define password policies, for example, or emphasize safe usage patterns. You can also define persons responsible for different areas, who act as the first point of contact and can make decisions in case of an emergency. We recommend defining areas of responsibility for crisis situations, for policy breaches, and for general questions, for example.<\/p>\n<p>Security policies\u00a0can also be guidelines for employees, by specifying a framework and defining requirements clearly, with important objectives that involve all stakeholders.<\/p>\n<h2>Security policies in SAP<\/h2>\n<p>Documentations and guidelines are especially important where SAP applications are involved, because every SAP module contains critical functions that have to be protected. Therefore, make sure that your risk mitigation measures are documented in writing. An authorization concept lets you define how users can be restricted in the system, for example, to ensure the correctness, completeness, and transparency of the SAP data.<\/p>\n<h2>SAST authorization concepts for SAP ERP and SAP S\/4HANA systems<\/h2>\n<p>We will be happy to raise your security concepts to the state of the art with our concept templates. Our <a href=\"https:\/\/sast-solutions.com\/sap-authorization-consulting.html\" target=\"_blank\" rel=\"noopener\">authorization concepts<\/a> are the foundation for the following:<\/p>\n<ul>\n<li>Minimize both inadvertent and intentional manipulation of company data<\/li>\n<li>Ensure that the applications can be checked<\/li>\n<li>Protect confidential data against unauthorized disclosure, to satisfy the legal requirements for data protection<\/li>\n<li>Keep the authorization procedure transparent and comprehensible<\/li>\n<li>Implement the internal control system<\/li>\n<li>Prevent malicious acts<\/li>\n<\/ul>\n<p>A well-conceived authorization concept is the cornerstone for protecting your SAP systems \u2013 and a major contributor to your business success.<\/p>\n<p>A redesign of your SAP authorizations, for example, gives you the opportunity to try new ways of doing things and to introduce transparent authorization assignments from start to finish.\u00a0The <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener\">SAST SUITE<\/a> supports you in all phases of your projects and ensures a high level of quality\u00a0\u2013 and our agile project models can be custom-tailored to your needs. Thanks to our security experts\u2019 years of experience and our Safe Go-Live approach, you do not have to worry about any constraints on your day-to-day business.<\/p>\n<p>We\u2019ll also help you implement an extensive security concept that protects your system against unauthorized access at the database, network, and front end levels.<\/p>\n<p>For more information, visit <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">our website<\/a> or <a href=\"mailto:mail@sast-solutions.de\" target=\"_blank\" rel=\"noopener\">e-mail us<\/a>.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1730\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/09\/Foto_Richard_kleiner-278x300.jpg\" alt=\"Richard Hildebrandt (SAST SOLUTIONS)\" width=\"278\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/09\/Foto_Richard_kleiner-278x300.jpg 278w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/09\/Foto_Richard_kleiner.jpg 303w\" sizes=\"auto, (max-width: 278px) 100vw, 278px\" \/><br \/>\n<\/strong><strong>Richard Hildebrandt (Junior SAP Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More helpful articles:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"YpfXhM5ILd\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/12\/framework-and-application-authorization-concepts-for-sap-erp-and-s4hana\/\">Speed up development of framework and application authorization concepts for SAP ERP and S\/4HANA<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Speed up development of framework and application authorization concepts for SAP ERP and S\/4HANA&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/12\/framework-and-application-authorization-concepts-for-sap-erp-and-s4hana\/embed\/#?secret=ef12NXpgvm#?secret=YpfXhM5ILd\" data-secret=\"YpfXhM5ILd\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"qVnZxD8RD5\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/07\/think-about-updating-authorization-roles-in-sap-s-4hana-project\/\">Think about updating your authorization roles in your SAP S\/4HANA project!<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Think about updating your authorization roles in your SAP S\/4HANA project!&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/07\/think-about-updating-authorization-roles-in-sap-s-4hana-project\/embed\/#?secret=EKjdMckPhW#?secret=qVnZxD8RD5\" data-secret=\"qVnZxD8RD5\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know what you have to do when your company faces security incidents? Do you have documents where you can look up what you need to do? If so, are they up to date? Security policies are neglected in many areas, although they are a cornerstone for maintaining IT compliance and improving enterprise security.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[67,64,153,68,80],"class_list":["post-1928","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-identity-management","tag-role-management","tag-s-4hana","tag-sap-authorizations","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Operate SAP applications more securely with security policies<\/title>\n<meta name=\"description\" content=\"Use extensive security concepts and guidelines to protect your enterprise security! Our IT experts provide helpful solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operate SAP applications more securely with security policies\" \/>\n<meta property=\"og:description\" content=\"Use extensive security concepts and guidelines to protect your enterprise security! Our IT experts provide helpful solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-28T07:22:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-300x194.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"How IT security policies help you satisfy your security requirements\",\"datePublished\":\"2022-07-28T07:22:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/\"},\"wordCount\":469,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/SAST-Blog_Motiv_Richtlinien-300x194.jpg\",\"keywords\":[\"Identity Management\",\"Role Management\",\"S\\\/4HANA\",\"SAP Authorizations\",\"SAP Security\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/\",\"name\":\"Operate SAP applications more securely with security policies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/SAST-Blog_Motiv_Richtlinien-300x194.jpg\",\"datePublished\":\"2022-07-28T07:22:33+00:00\",\"description\":\"Use extensive security concepts and guidelines to protect your enterprise security! Our IT experts provide helpful solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/SAST-Blog_Motiv_Richtlinien.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/SAST-Blog_Motiv_Richtlinien.jpg\",\"width\":1920,\"height\":1241,\"caption\":\"SAST Blog: How IT security policies help you satisfy your security requirements\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/07\\\/28\\\/how-it-security-policies-help-satisfy-security-requirements\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How IT security policies help you satisfy your security requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Operate SAP applications more securely with security policies","description":"Use extensive security concepts and guidelines to protect your enterprise security! Our IT experts provide helpful solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/","og_locale":"en_US","og_type":"article","og_title":"Operate SAP applications more securely with security policies","og_description":"Use extensive security concepts and guidelines to protect your enterprise security! Our IT experts provide helpful solutions.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/","og_site_name":"SAST BLOG","article_published_time":"2022-07-28T07:22:33+00:00","og_image":[{"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-300x194.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"How IT security policies help you satisfy your security requirements","datePublished":"2022-07-28T07:22:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/"},"wordCount":469,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-300x194.jpg","keywords":["Identity Management","Role Management","S\/4HANA","SAP Authorizations","SAP Security"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/","name":"Operate SAP applications more securely with security policies","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien-300x194.jpg","datePublished":"2022-07-28T07:22:33+00:00","description":"Use extensive security concepts and guidelines to protect your enterprise security! Our IT experts provide helpful solutions.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/07\/SAST-Blog_Motiv_Richtlinien.jpg","width":1920,"height":1241,"caption":"SAST Blog: How IT security policies help you satisfy your security requirements"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/07\/28\/how-it-security-policies-help-satisfy-security-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"How IT security policies help you satisfy your security requirements"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1928"}],"version-history":[{"count":1,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1928\/revisions"}],"predecessor-version":[{"id":1930,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1928\/revisions\/1930"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}