{"id":1956,"date":"2022-10-27T08:27:14","date_gmt":"2022-10-27T06:27:14","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1956"},"modified":"2022-10-27T08:29:27","modified_gmt":"2022-10-27T06:29:27","slug":"attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/","title":{"rendered":"Attribute-based data masking for SAP \u2013 protect your ERP data better and reduce your compliance risks significantly"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1957 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-300x200.jpeg\" alt=\"SAST BLOG: Attribute-based data masking for SAP\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-300x200.jpeg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-1024x681.jpeg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-768x511.jpeg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-1536x1022.jpeg 1536w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-2048x1363.jpeg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>SAP applications contain large amounts of sensitive data. From protected personal information to privileged financial data, this data always harbors risks that companies must deal with, because SAP ERP does not have any built-in masking functions for custom-tailored anonymization in views. As such, the unchecked disclosure of data represents a potential leak, opening up a huge target for potential exploitation. Although add-ons and solutions from SAP and third parties are available to tackle this problem, significant challenges still remain. This is where the concept of attribute-based data masking comes in.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>\u201cIT\u2019S ABOUT PROTECTING DATA THAT IS NEEDED AND AVAILABLE, BUT SHOULDN\u2019T BE SEEN BY EVERYONE, TO LIMIT THE VIEWS TO THE RELEVANT INFORMATION FOR THE GIVEN SITUATION.\u201d<\/em><\/strong><\/p>\n<p>With increasing internationalization, the coronavirus pandemic, and more employees working from home, sensitive process-relevant data is at greater risk than ever of being disclosed to casual observers \u2013 whether internal or external \u2013 who do not need to see it, neither in the specific context nor in general. In other words, when an employee in HR is working from abroad and maintaining master data, neither passersby who glance over her shoulder nor the person sitting next to her should get an unimpeded view of this sensitive data. A packer needs to know material master numbers so he takes the right package, but doesn\u2019t need to know the package contents in detail. When a salesperson works with master data to create quotations, she needs to be able to find the right product, identify the right packaging units, and see the container \u2013 but doesn\u2019t have to know all the cost prices.<\/p>\n<h2><strong>Data loss prevention<\/strong><\/h2>\n<p>What all of this means: Data masking isn\u2019t only limited to reducing unauthorized access to personal data (fraud) and involves much more than the mere anonymization or pseudonymization of personal information and address data. In fact, all conceivable data types can be masked. Data loss prevention is always the objective of masking the original data. Problems with data theft, data abuse, and other forms of cybercrime can be mitigated by changing the views of the dataset directly: \u201cTo put it simply,\u201d says Ralf Kempf, CTO of SAP security specialist <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">SAST SOLUTIONS<\/a> and Vice President ABAP Architecture of the new, multinational <a href=\"https:\/\/pathlock.com\/about\/\" target=\"_blank\" rel=\"noopener\">Pathlock Group<\/a>, \u201cit\u2019s about protecting data that is needed and is available, but shouldn\u2019t be seen by everyone, to limit the views to the relevant information for each situation.\u201d<\/p>\n<h2><strong>Data masking in a rule set<\/strong><\/h2>\n<p>In this regard, most data masking solutions from SAP and third-party providers still face challenges, because they work strictly at the authorization level. But static masking guidelines do not take the context of access risk into account and demand a compromise between data security and accessibility. Privileged users can access sensitive data fields even if this is unnecessary or undesired in the specific context. Add-ons for data masking also require modifications that have to be replicated in every field of the application, resulting an a non-scalable ad hoc solution. In contrast to standard masking solutions, the Pathlock approach from SAST SOLUTIONS centralizes enforcement of data masking in SAP in a single rule set, to define and mask data in the entire application, and also uses dynamic policies that include the risk context, to protect sensitive data more accurately without requiring the implementation of additional modifications in the SAP system.<\/p>\n<p>This attribute-based masking function gives you highly granular control over which information should be masked for a specific user in a specific situation. This is especially important for multinational companies that want to prevent improper views, for example. Data can be masked for access from countries that do not host a company location, for instance; that originate from remote workplaces outside of the network, unknown IP addresses, or VPNs; or that take place outside of regular working hours or at implausible times. As a result, content that would otherwise be readable for the role involved can be rendered invisible, based on freely configurable attributes such as user, IP address, time, countries\/locations, access type \u2013 remote work from outside the network or access from within, or the network type (such as VPN). \u201cIf access is made with unusual parameters, then data that is not needed for the specific case will not be readable, depending on the defined attributes,\u201d summarizes Kempf.<\/p>\n<h2><strong>Minimize risks<\/strong><\/h2>\n<p>This cannot be achieved through user authorizations alone and also takes the criticality of the master data into account \u2013 depending on the industry sector \u2013 such as HR, location, and logistics data, as well as BOMs, cost prices, and recipes. Attribute-based data masking significantly improves the protection of sensitive enterprise data through finely grained restrictions of views. A policy-based, dynamic masking function of the centralized, scalable masking solutions also gives companies \u2013 in addition to authorization protection \u2013 individually customizable control over which sensitive data fields they want to mask for specific users in specific situations. By implementing full or partial masking of a dataset, you can minimize the risks of data leaks and also meet requirements for encryption and anonymization from supervisory authorities, for example.<\/p>\n<p>Since the sensitive data is filtered at the presentation level, without requiring additional modifications to the SAP system, no additional effort is required for updates, but you will able to significantly improve the protection of ERP data and reduce your compliance risks \u2013 for sensitive data in both production and non-production environments. When attribute-based data masking is combined with a data loss detection concept and good real-time monitoring of violations of compliance rules, data protection can be increased significantly, to a level of quality unattained by hardly any other solution worldwide.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1958 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Blog_Ausschnit_ITSecurity-300x223.jpg\" alt=\"SAST BLOG: Attribute-based data masking for SAP\" width=\"300\" height=\"223\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Blog_Ausschnit_ITSecurity-300x223.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Blog_Ausschnit_ITSecurity.jpg 544w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>This article was originally published in <strong>IT Security magazine, October 2022<\/strong> issue (in German, pages 52+53) and is available free of charge from the online reader service on <a href=\"https:\/\/www.it-daily.net\/\" target=\"_blank\" rel=\"noopener\">it-daily.net<\/a>:<\/p>\n<p><strong><a href=\"https:\/\/www.it-daily.net\/leser-service\" target=\"_blank\" rel=\"noopener\">https:\/\/www.it-daily.net\/leser-service<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1945\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/Ralf-300x214.jpg\" alt=\"Ralf Kempf (CTO SAST SOLUTIONS and Vice President ABAP Pathlock)\" width=\"300\" height=\"214\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/Ralf-300x214.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/09\/Ralf.jpg 485w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\nRalf Kempf (CTO SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More info about data masking:<\/h2>\n<p>Get even deeper insights into the topic in our webinar recording <strong>&#8220;Attribute-based Data Masking: Improve the protection of sensitive data&#8221;<\/strong>. If you are interested, please use our <a href=\"https:\/\/sast-solutions.com\/contact-locations.html\" target=\"_blank\" rel=\"noopener\">contact form<\/a> or visit our <a href=\"https:\/\/sast-solutions.com\/webinars-on-demand-en.html\" target=\"_blank\" rel=\"noopener\">webinar on demand<\/a> website.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP applications contain large amounts of sensitive data. From protected personal information to privileged financial data, this data always harbors risks that companies must deal with, because SAP ERP does not have any built-in masking functions for custom-tailored anonymization in views. As such, the unchecked disclosure of data represents a potential leak, opening up a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[25,156,68,80,114],"class_list":["post-1956","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-cyber-attack","tag-cyber-security","tag-sap-authorizations","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attribute-based data masking for SAP applications<\/title>\n<meta name=\"description\" content=\"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attribute-based data masking for SAP applications\" \/>\n<meta property=\"og:description\" content=\"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-27T06:27:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-27T06:29:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1703\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Attribute-based data masking for SAP applications\" \/>\n<meta name=\"twitter:description\" content=\"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Attribute-based data masking for SAP \u2013 protect your ERP data better and reduce your compliance risks significantly\",\"datePublished\":\"2022-10-27T06:27:14+00:00\",\"dateModified\":\"2022-10-27T06:29:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/\"},\"wordCount\":1032,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Data-Masking_AdobeStock_50984867_300dpi-300x200.jpeg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"SAP Authorizations\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/\",\"name\":\"Attribute-based data masking for SAP applications\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Data-Masking_AdobeStock_50984867_300dpi-300x200.jpeg\",\"datePublished\":\"2022-10-27T06:27:14+00:00\",\"dateModified\":\"2022-10-27T06:29:27+00:00\",\"description\":\"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg\",\"width\":2560,\"height\":1703,\"caption\":\"SAST BLOG: Attribute-based data masking for SAP\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/10\\\/27\\\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attribute-based data masking for SAP \u2013 protect your ERP data better and reduce your compliance risks significantly\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attribute-based data masking for SAP applications","description":"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/","og_locale":"en_US","og_type":"article","og_title":"Attribute-based data masking for SAP applications","og_description":"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/","og_site_name":"SAST BLOG","article_published_time":"2022-10-27T06:27:14+00:00","article_modified_time":"2022-10-27T06:29:27+00:00","og_image":[{"width":2560,"height":1703,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Attribute-based data masking for SAP applications","twitter_description":"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Attribute-based data masking for SAP \u2013 protect your ERP data better and reduce your compliance risks significantly","datePublished":"2022-10-27T06:27:14+00:00","dateModified":"2022-10-27T06:29:27+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/"},"wordCount":1032,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-300x200.jpeg","keywords":["Cyber Attack","Cyber Security","SAP Authorizations","SAP Security","Threat Detection"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/","name":"Attribute-based data masking for SAP applications","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-300x200.jpeg","datePublished":"2022-10-27T06:27:14+00:00","dateModified":"2022-10-27T06:29:27+00:00","description":"Improve the protection of sensitive data with our data masking and learn more about the advantage of dynamic masking policies.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/10\/Data-Masking_AdobeStock_50984867_300dpi-scaled.jpeg","width":2560,"height":1703,"caption":"SAST BLOG: Attribute-based data masking for SAP"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/10\/27\/attribute-based-data-masking-sap-protect-erp-data-better-reduce-compliance-risks-significantly\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Attribute-based data masking for SAP \u2013 protect your ERP data better and reduce your compliance risks significantly"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1956"}],"version-history":[{"count":8,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1956\/revisions"}],"predecessor-version":[{"id":1966,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1956\/revisions\/1966"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}