{"id":1970,"date":"2022-11-15T12:04:52","date_gmt":"2022-11-15T11:04:52","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1970"},"modified":"2022-11-15T12:04:52","modified_gmt":"2022-11-15T11:04:52","slug":"unify-cross-application-sod-across-your-business-landscape","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/","title":{"rendered":"Unify cross-application SoD across your business landscape"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1971 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD-300x201.jpg\" alt=\"SAST BLOG: Unify cross-application SoD across your business landscape\" width=\"300\" height=\"201\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD-300x201.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD-768x514.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD-800x539.jpg 800w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD.jpg 806w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Cross-application business processes have unlocked best-of-breed solutions but are introducing new access risks. The proliferation of these business processes has also shifted how organizations must address Segregation of Duties (SoD). Today\u2019s security models span a variety of applications. This makes it critical for enterprises to identify SoD conflicts across apps and enable continuous controls monitoring to detect actual violations as they occur.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Digital Transformation &amp; Shifting Access Governance Needs: Rethink Your SoD<\/strong><\/h2>\n<p>While traditional application-specific SOD solutions have sufficed in the past, today\u2019s digitized business processes come with more regulations, more sensitive data, complexity, and potential risks (fraud, breach, financial loss). In addition, now you have multiple applications, each having its own security model that makes it extremely difficult to map your SoD risks across applications, let alone continuously monitor them. While some organizations may get by with siloed teams to govern access risk for each application, they can\u2019t avoid the following trade-offs:<\/p>\n<ul>\n<li>Siloed SoD logs will leave you vulnerable.<\/li>\n<li>A siloed approach often creates gaps that are leveraged for data breaches, fraud, and failed audits.<\/li>\n<li>It is difficult to identify cross-app SoD violations from a constant stream of false positives<\/li>\n<\/ul>\n<p>With <a href=\"https:\/\/www.wsj.com\/articles\/employees-are-accessing-more-and-more-business-apps-study-finds-11549580017\" target=\"_blank\" rel=\"noopener\">a 68% increase in the number of software apps<\/a> deployed by global firms, sample testing a high volume of activities will inevitably lead to poor audit findings, leakage in business, and lost revenue.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1972\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Grafik_CrossAppSoD.jpg\" alt=\"SAST BLOG: Unify cross-application SoD across your business landscape\" width=\"813\" height=\"273\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Grafik_CrossAppSoD.jpg 813w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Grafik_CrossAppSoD-300x101.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Grafik_CrossAppSoD-768x258.jpg 768w\" sizes=\"auto, (max-width: 813px) 100vw, 813px\" \/><\/p>\n<p>Attempting to Manage Application Risk at the Individual Application Level is a Losing Proposition.<\/p>\n<h2><strong>Why IGA Solutions Can\u2019t Handle <\/strong><a href=\"https:\/\/pathlock.com\/cross-app-sod\/\" target=\"_blank\" rel=\"noopener\"><strong>Cross-App SoD<\/strong><\/a><strong> Violations<\/strong><\/h2>\n<p>While it makes sense for organizations to try and leverage Identity Governance and Administration (IGA) solutions to handle cross-app SoD, they\u2019ll quickly discover they\u2019re missing the needed granularity. Others might set up specialized teams and additional auditors to compensate. Either way, they end up stuck with manual processes and unaddressed risks that, at best, stifle innovation and, at worst, lead to material weaknesses and audit deficiencies. Moreover, teams opting for IGA solutions focus mainly on the top layers. They don\u2019t invest the time or money to go into the applications for actions and permissions. Therefore, they miss out on the application-specific shortcomings.<\/p>\n<h2><strong>Consolidate, Correlate, Mitigate: A Single Pane Of Glass For Cross-App SoD<\/strong><\/h2>\n<p>Using a siloed app-by-app approach for SoD analysis is only going to multiply your audit and compliance costs. Pathlock enables cross-app SoD control monitoring that lets you bring everything into a centralized location under one dashboard. You now have a single pane of glass that acts as one dashboard to monitor SoD. With cross-app SoD rulesets and correlation, you also have complete coverage of all the SoD activity across your application landscape. Combining a deep understanding of entitlements and user activity for 360-degree risk analysis, Pathlock enables continuous controls monitoring to detect actual SoD violations as they occur.<\/p>\n<p><a href=\"https:\/\/register.gotowebinar.com\/recording\/7585417895947837965\" target=\"_blank\" rel=\"noopener\"><strong>Watch our on-demand webinar<\/strong><\/a>\u00a0to learn how Pathlock helps you:<\/p>\n<ul>\n<li>Identify potential SoD risks within and across business applications\u200b<\/li>\n<li>Automatically sample 100% of your transactions and only review exceptions\u200b<\/li>\n<li>Quantify the financial impact, so you only have to remediate the transactions that matter\u200b<\/li>\n<\/ul>\n<p><a href=\"https:\/\/pathlock.com\/contact\/?tab=request-a-demo\" target=\"_blank\" rel=\"noopener\">Contact us today<\/a>\u00a0to unify cross-application SoD across your business landscape.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1973\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/pathlock_logo.png\" alt=\"Pathlock Logo\" width=\"215\" height=\"47\" \/><br \/>\nEsha Panda (Content Writer, Pathlock)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>SAST and Pathlock have merged to create the industry&#8217;s leading provider of Access Governance and Application Security. For more information visit <a href=\"https:\/\/sast-solutions.com\/about-us.html\" target=\"_blank\" rel=\"noopener\">our website<\/a> or <a href=\"mailto:mail@sast-solutions.de\" target=\"_blank\" rel=\"noopener\">contact us<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cross-application business processes have unlocked best-of-breed solutions but are introducing new access risks. The proliferation of these business processes has also shifted how organizations must address Segregation of Duties (SoD). Today\u2019s security models span a variety of applications. This makes it critical for enterprises to identify SoD conflicts across apps and enable continuous controls monitoring [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[151,67,68,80,103],"class_list":["post-1970","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-grc","tag-identity-management","tag-sap-authorizations","tag-sap-security","tag-sod"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unify cross-application SoD across your business landscape<\/title>\n<meta name=\"description\" content=\"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unify cross-application SoD across your business landscape\" \/>\n<meta property=\"og:description\" content=\"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-15T11:04:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"806\" \/>\n\t<meta property=\"og:image:height\" content=\"539\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Unify cross-application SoD across your business landscape\" \/>\n<meta name=\"twitter:description\" content=\"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Unify cross-application SoD across your business landscape\",\"datePublished\":\"2022-11-15T11:04:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/\"},\"wordCount\":559,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Motiv_Blog_CrossAppSoD-300x201.jpg\",\"keywords\":[\"GRC\",\"Identity Management\",\"SAP Authorizations\",\"SAP Security\",\"SoD\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/\",\"name\":\"Unify cross-application SoD across your business landscape\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Motiv_Blog_CrossAppSoD-300x201.jpg\",\"datePublished\":\"2022-11-15T11:04:52+00:00\",\"description\":\"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Motiv_Blog_CrossAppSoD.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Motiv_Blog_CrossAppSoD.jpg\",\"width\":806,\"height\":539,\"caption\":\"SAST BLOG: Unify cross-application SoD across your business landscape\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2022\\\/11\\\/15\\\/unify-cross-application-sod-across-your-business-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unify cross-application SoD across your business landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unify cross-application SoD across your business landscape","description":"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/","og_locale":"en_US","og_type":"article","og_title":"Unify cross-application SoD across your business landscape","og_description":"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!","og_url":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/","og_site_name":"SAST BLOG","article_published_time":"2022-11-15T11:04:52+00:00","og_image":[{"width":806,"height":539,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Unify cross-application SoD across your business landscape","twitter_description":"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Unify cross-application SoD across your business landscape","datePublished":"2022-11-15T11:04:52+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/"},"wordCount":559,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD-300x201.jpg","keywords":["GRC","Identity Management","SAP Authorizations","SAP Security","SoD"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/","url":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/","name":"Unify cross-application SoD across your business landscape","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD-300x201.jpg","datePublished":"2022-11-15T11:04:52+00:00","description":"Enterprises should be able to identify SoD conflicts across applications and enable continuous controls monitoring. We show you how!","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2022\/11\/Motiv_Blog_CrossAppSoD.jpg","width":806,"height":539,"caption":"SAST BLOG: Unify cross-application SoD across your business landscape"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2022\/11\/15\/unify-cross-application-sod-across-your-business-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Unify cross-application SoD across your business landscape"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1970"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1970\/revisions"}],"predecessor-version":[{"id":1976,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1970\/revisions\/1976"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}