{"id":455,"date":"2018-03-19T07:30:29","date_gmt":"2018-03-19T06:30:29","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=455"},"modified":"2020-07-07T14:57:16","modified_gmt":"2020-07-07T12:57:16","slug":"do-security-notes-live-up-to-their-name","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/","title":{"rendered":"Do Security Notes Live Up to Their Name?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-456 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg\" alt=\"SAST-Blog_SAPSecurityNotes\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg 500w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes-300x200.jpg 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"color: #626161;\">On every second Tuesday of each month, SAP releases new Security Notes. Many SAP administrators install these patches relatively quickly \u2013 but are they putting too much faith in the security they provide?<\/span><\/p>\n<p><span style=\"color: #626161;\">Very few customers know that security gaps can still be exploited.<\/span><\/p>\n<p><!--more--><span style=\"color: #626161;\">In OSS Note 1908870 \u2013 SACF | Workbench for Switchable Authorization Scenarios, SAP has developed a central solution for \u201cswitchable\u201d authorization verification that makes it possible to conduct authorization checks for adapted functions only after they are activated by the customer. The idea is to reduce the effect on established authorization concepts.<\/span><\/p>\n<p><span style=\"color: #626161;\">Unfortunately, very few customers know that patches and enhancements designed in this way will remain inactive once this OSS Note is implemented. In other words, enhanced authorization checks that are meant to reduce risk can\u2019t perform their intended function. The result? The corresponding security hole can still be\u00a0exploited!<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Compatible with customer-specific programs<\/strong><\/span><\/p>\n<p><span style=\"color: #626161;\">With transaction SUCC, customers can also define scenarios for the custom programs they use. Scenario-based authorization checking enables developers to enhance standard software with alternative checks for authorization objects in a variety of use cases.<\/span><\/p>\n<p><span style=\"color: #626161;\">The use of switchable authorizations in customer-specific programs opens to door to intriguing possibilities with regard to developing and going live with ABAP modifications and authorization roles in separate environments.<\/span><\/p>\n<p><span style=\"color: #626161;\">Further information is available <a href=\"https:\/\/help.sap.com\/erp2005_ehp_06\/helpdata\/de\/14\/a5ea2f33084e2b98721821e294898b\/frameset.htm\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Don&#8217;t forget \u2013 switchable authorizations need to be activated!<\/strong><\/span><\/p>\n<p><span style=\"color: #626161;\">Transaction SACF enables you to activate predefined authorization checks that include authorization tracing and Security Audit Log integration.<\/span><\/p>\n<p><span style=\"color: #626161;\">For security reasons, customers are strongly advised to implement all the defined scenarios (except \u201cSACF_DEMO_SCENARIO\u201d) as live scenarios, as well. Here, auditors have to compare the amount of defined scenarios against the number of live scenarios and carry out rigorous evaluations.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-448\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb01_18031-e1521361494632.png\" alt=\"SAST-Blog_SecNotes_Abb01_1803\" width=\"439\" height=\"287\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb01_18031-e1521361494632.png 439w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb01_18031-e1521361494632-300x196.png 300w\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-449\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb02_18031.png\" alt=\"SAST-Blog_SecNotes_Abb02_1803\" width=\"438\" height=\"149\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb02_18031.png 438w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb02_18031-300x102.png 300w\" sizes=\"auto, (max-width: 438px) 100vw, 438px\" \/><\/p>\n<p><span style=\"color: #626161;\">Once the defined scenarios go live, the system performs an authorization check, which activates enhanced protection.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Remember<\/strong>: Make sure that both header- and object-based verification are set to \u201cACTIVE\u201d. Otherwise, the system may not carry out its checks (or only perform logging).<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-450\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb03_18032.png\" alt=\"SAST-Blog_SecNotes_Abb03_1803\" width=\"1033\" height=\"455\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb03_18032.png 1033w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb03_18032-300x132.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb03_18032-768x338.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_abb03_18032-1024x451.png 1024w\" sizes=\"auto, (max-width: 1033px) 100vw, 1033px\" \/><\/p>\n<p><span style=\"color: #626161;\"><strong>Required authorizations<\/strong><\/span><\/p>\n<p><span style=\"color: #626161;\">In order to use scenario-based authorizations, you\u2019ll need to assign your developers and admins corresponding privileges (S_TCODE).<\/span><\/p>\n<p><span style=\"color: #626161;\">Start with the authorization object \u201cS_TCODE\u201d and the following Transactions:<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-451\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle01_1803_en1.png\" alt=\"SAST-Blog_SecNotes_Tabelle01_1803_en\" width=\"1024\" height=\"374\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle01_1803_en1.png 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle01_1803_en1-300x110.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle01_1803_en1-768x281.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><span style=\"color: #626161;\">Then proceed to the authorization object \u201cS_DEVELOP\u201d and the corresponding object types (available activities: 02 for changes, 03 for display mode, and 06 for deletion).<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-452\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle02_1803_en1.png\" alt=\"SAST-Blog_SecNotes_Tabelle02_1803_en\" width=\"1023\" height=\"233\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle02_1803_en1.png 1023w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle02_1803_en1-300x68.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/03\/sast-blog_secnotes_tabelle02_1803_en1-768x175.png 768w\" sizes=\"auto, (max-width: 1023px) 100vw, 1023px\" \/><br \/>\n<span style=\"color: #626161;\"><strong>Remember<\/strong>: Don\u2019t assign \u201cchange\u201d or \u201cdelete\u201d activities to users in live systems!<\/span><\/p>\n<h6><span style=\"color: #626161;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-33\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg\" alt=\"ralfkempf_akquinet\" width=\"130\" height=\"91\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg 640w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg 300w\" sizes=\"auto, (max-width: 130px) 100vw, 130px\" \/><br \/>\nRalf Kempf<br \/>\n<\/span><span style=\"color: #626161;\">Technical Managing Director for SAST SOLUTIONS at AKQUINET<\/span><\/h6>\n<p><span style=\"color: #626161;\">Are you looking forward to further tips and recommendations in the field of SAP security and compliance? There are plenty of opportunities to engage with us \u2013 in one of our <a href=\"https:\/\/sast-solutions.de\/en\/news\/events-webinars\/index.jsp\">webinars<\/a>, for example.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On every second Tuesday of each month, SAP releases new Security Notes. Many SAP administrators install these patches relatively quickly \u2013 but are they putting too much faith in the security they provide?<br \/>\nVery few customers know that security gaps can still be exploited.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[68,80,114],"class_list":["post-455","post","type-post","status-publish","format-standard","hentry","category-general","tag-sap-authorizations","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Do Security Notes Live Up to Their Name?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do Security Notes Live Up to Their Name?\" \/>\n<meta property=\"og:description\" content=\"On every second Tuesday of each month, SAP releases new Security Notes. Many SAP administrators install these patches relatively quickly \u2013 but are they putting too much faith in the security they provide? Very few customers know that security gaps can still be exploited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-19T06:30:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T12:57:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Do Security Notes Live Up to Their Name?\",\"datePublished\":\"2018-03-19T06:30:29+00:00\",\"dateModified\":\"2020-07-07T12:57:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/sast-blog_sapsecuritynotes.jpg\",\"keywords\":[\"SAP Authorizations\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/\",\"name\":\"Do Security Notes Live Up to Their Name?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/sast-blog_sapsecuritynotes.jpg\",\"datePublished\":\"2018-03-19T06:30:29+00:00\",\"dateModified\":\"2020-07-07T12:57:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/sast-blog_sapsecuritynotes.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/sast-blog_sapsecuritynotes.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/03\\\/19\\\/do-security-notes-live-up-to-their-name\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do Security Notes Live Up to Their Name?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Do Security Notes Live Up to Their Name?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/","og_locale":"en_US","og_type":"article","og_title":"Do Security Notes Live Up to Their Name?","og_description":"On every second Tuesday of each month, SAP releases new Security Notes. Many SAP administrators install these patches relatively quickly \u2013 but are they putting too much faith in the security they provide? Very few customers know that security gaps can still be exploited.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/","og_site_name":"SAST BLOG","article_published_time":"2018-03-19T06:30:29+00:00","article_modified_time":"2020-07-07T12:57:16+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Do Security Notes Live Up to Their Name?","datePublished":"2018-03-19T06:30:29+00:00","dateModified":"2020-07-07T12:57:16+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg","keywords":["SAP Authorizations","SAP Security","Threat Detection"],"articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/","name":"Do Security Notes Live Up to Their Name?","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg","datePublished":"2018-03-19T06:30:29+00:00","dateModified":"2020-07-07T12:57:16+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/03\/sast-blog_sapsecuritynotes.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/03\/19\/do-security-notes-live-up-to-their-name\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Do Security Notes Live Up to Their Name?"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=455"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/455\/revisions"}],"predecessor-version":[{"id":1286,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/455\/revisions\/1286"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}