{"id":591,"date":"2018-08-28T16:37:12","date_gmt":"2018-08-28T14:37:12","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=591"},"modified":"2020-07-07T11:33:49","modified_gmt":"2020-07-07T09:33:49","slug":"sast-security-policy","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/","title":{"rendered":"SAST Security Policies: Automation and more transparency thanks to new update features"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-589 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png\" alt=\"SAST Security Policy\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-768x513.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Security policies allow companies to ensure compliance with data integrity, secrecy, availability and authenticity. Such policies are constantly being updated and scaled to keep up with changes to ongoing operations. When additional policies are added in compliance with guidelines \u2013 for example a software update or a DSAG audit, the policy must be compared. To date, this has required checks by hand. Since the <span style=\"background-color: transparent; color: #333333; display: inline; float: none; font-family: Georgia,&amp;quot; times new roman&amp;quot;,&amp;quot;bitstream charter&amp;quot;,times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 24px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; word-wrap: break-word;\">Release 5.0 <\/span>SAST SUITE offers solution, providing automatic identification and adoption of deltas where policies differ.<\/p>\n<p><!--more--><\/p>\n<h3>Status quo: No automatic policy sync<\/h3>\n<p>Until now, it was not possible to automate the comparison of security policies within the <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a>. Previously, for example, an update to akquinet standard policy and the subsequent update to customer policies meant manual rather than automated checks and updates were required to identify and adopt any delta checks. Each time, the new akquinet policy had to be copied into the customer namespace and all unnecessary checks had to be deactivated yet again.<\/p>\n<h3>Automated adoption into customer-specific policies<\/h3>\n<p>As from SAST Release 5.0, all deltas between two or more security policies are now determined and reported by SAST automatically. At the click of a button, any deltas following an update to the akquinet standard policy are transferred to the customer\u2019s policy. A knock-on effect is a boost in transparency with respect to existing differences between policies: The risk of losing or overwriting customer-specific changes or enhancements is nearly impossible.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-588 size-large\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/SAST-Policy-comparison-1024x446.png\" alt=\"SAST Policy comparison\" width=\"764\" height=\"333\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/SAST-Policy-comparison-1024x446.png 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/SAST-Policy-comparison-300x131.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/SAST-Policy-comparison-768x335.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/SAST-Policy-comparison.png 1310w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<h3>Logging uploads and downloads<\/h3>\n<p>Another feature available starting with SAST Release 5.0 logs uploads, downloads, and the central distribution of security policies and SAST content. This additionally enhances traceability and enables these activities in the system to be documented with full audit security.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-590\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/SAST-logging.png\" alt=\"\" width=\"764\" height=\"426\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/SAST-logging.png 1001w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/SAST-logging-300x167.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/SAST-logging-768x428.png 768w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>Are you interested in more information about the SAST SOLUTIONS? Or do you have questions about our different modules? Then check out our <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a> and send us an e-mail at <a href=\"mailto:knowhow@akquinet.de\">knowhow@akquinet.de<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-34\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/kc3b6hler-verena.jpg\" alt=\"Verena K\u00f6hler\" width=\"104\" height=\"136\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/kc3b6hler-verena.jpg 360w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/kc3b6hler-verena-230x300.jpg 230w\" sizes=\"auto, (max-width: 104px) 100vw, 104px\" \/><\/p>\n<p>Verena K\u00f6hler,<br \/>\nSAP Authorization Consulting, AKQUINET<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security policies allow companies to ensure compliance with data integrity, secrecy, availability and authenticity. Such policies are constantly being updated and scaled to keep up with changes to ongoing operations. When additional policies are added in compliance with guidelines \u2013 for example a software update or a DSAG audit, the policy must be compared. To [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[151,80],"class_list":["post-591","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-grc","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAST Security Policies: Automation and more transparency thanks to new update features<\/title>\n<meta name=\"description\" content=\"The new SAST SUITE Release 5.0 offers solution, providing automatic identification and adoption of deltas where policies differ.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAST Security Policies: Automation and more transparency thanks to new update features\" \/>\n<meta property=\"og:description\" content=\"The new SAST SUITE Release 5.0 offers solution, providing automatic identification and adoption of deltas where policies differ.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-28T14:37:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T09:33:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAST Security Policies: Automation and more transparency thanks to new update features\",\"datePublished\":\"2018-08-28T14:37:12+00:00\",\"dateModified\":\"2020-07-07T09:33:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/\"},\"wordCount\":328,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png\",\"keywords\":[\"GRC\",\"SAP Security\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/\",\"name\":\"SAST Security Policies: Automation and more transparency thanks to new update features\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png\",\"datePublished\":\"2018-08-28T14:37:12+00:00\",\"dateModified\":\"2020-07-07T09:33:49+00:00\",\"description\":\"The new SAST SUITE Release 5.0 offers solution, providing automatic identification and adoption of deltas where policies differ.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/28\\\/sast-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAST Security Policies: Automation and more transparency thanks to new update features\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAST Security Policies: Automation and more transparency thanks to new update features","description":"The new SAST SUITE Release 5.0 offers solution, providing automatic identification and adoption of deltas where policies differ.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"SAST Security Policies: Automation and more transparency thanks to new update features","og_description":"The new SAST SUITE Release 5.0 offers solution, providing automatic identification and adoption of deltas where policies differ.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/","og_site_name":"SAST BLOG","article_published_time":"2018-08-28T14:37:12+00:00","article_modified_time":"2020-07-07T09:33:49+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAST Security Policies: Automation and more transparency thanks to new update features","datePublished":"2018-08-28T14:37:12+00:00","dateModified":"2020-07-07T09:33:49+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/"},"wordCount":328,"commentCount":0,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png","keywords":["GRC","SAP Security"],"articleSection":["SAST SUITE"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/","name":"SAST Security Policies: Automation and more transparency thanks to new update features","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png","datePublished":"2018-08-28T14:37:12+00:00","dateModified":"2020-07-07T09:33:49+00:00","description":"The new SAST SUITE Release 5.0 offers solution, providing automatic identification and adoption of deltas where policies differ.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/Motiv_SAST-Security_Bild02_150dpi_1701-300x200.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/28\/sast-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAST Security Policies: Automation and more transparency thanks to new update features"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=591"}],"version-history":[{"count":9,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/591\/revisions"}],"predecessor-version":[{"id":1279,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/591\/revisions\/1279"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}