{"id":718,"date":"2018-11-20T15:00:15","date_gmt":"2018-11-20T14:00:15","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=718"},"modified":"2020-07-24T11:02:24","modified_gmt":"2020-07-24T09:02:24","slug":"achieving-effective-it-risk-management-with-dynamic-mitigation-groups","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/","title":{"rendered":"Achieving effective IT risk management with dynamic mitigation groups"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-717 size-medium alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png\" alt=\"SAST Risk and Compliance Management\" width=\"300\" height=\"147\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-768x377.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation throughout your company. In practice, however, we continue to witness a lack of measures appropriate for identifying dangers early on. IT risk management is too often understood as a reactive process.<\/p>\n<p><!--more--><\/p>\n<p>Every company that deals in depth with risks in SAP authorizations must at some point make a decision on how to handle the corresponding security risks. As a rule, we can distinguish between three approaches:<\/p>\n<ol>\n<li>Reject risks and remove authorizations<\/li>\n<li>Reduce risks by taking corresponding actions<\/li>\n<li>Accept less severe risks that are less likely to arise<\/li>\n<\/ol>\n<h3><strong>Effective risk and role management with SAST<\/strong><\/h3>\n<p>When specialists want to reduce risks, they talk about mitigation. Our GRC software, <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a>, allows you to define any kind of mitigation decisions in the Risk &amp; Compliance Management module. All you need to do is select the corresponding RiskID and UserID.<br \/>\nHowever, the time required to maintain individual decisions can add up quickly when you have a large number of users. This is what prompted the request to link mitigation decisions to the allocation of role authorizations. A user assigned a critical role as part of an acceptance process should then be documented within the corresponding mitigation decision in the system. The accepted authorization will then no longer be reported as a risk during risk evaluations. This is a big advantage because this step streamlines maintenance efforts as the system dynamically allocates roles for the mitigation entries.<\/p>\n<p>The underlying principle behind dynamic mitigation groups has been implemented for both ABAP authorization roles and for business roles in connection with <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/identity-user-access-management\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Identity Management<\/a> (IDM).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-715\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Dynamic-Mitigration-Group.png\" alt=\"SAST Dynamic Mitigration Group\" width=\"1073\" height=\"218\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Dynamic-Mitigration-Group.png 1073w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Dynamic-Mitigration-Group-300x61.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Dynamic-Mitigration-Group-768x156.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Dynamic-Mitigration-Group-1024x208.png 1024w\" sizes=\"auto, (max-width: 1073px) 100vw, 1073px\" \/><\/p>\n<p><a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> risk evaluations classify the corresponding users automatically. This means that red flags are raised only for users who are assigned risky authorizations without the acceptance step. This greatly reduces time spent on risk analysis and provides maximum transparency.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-716\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Maintenance-Mitigration-Group.png\" alt=\"SAST: Maintenance Mitigration Group\" width=\"1172\" height=\"537\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Maintenance-Mitigration-Group.png 1172w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Maintenance-Mitigration-Group-300x137.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Maintenance-Mitigration-Group-768x352.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_Maintenance-Mitigration-Group-1024x469.png 1024w\" sizes=\"auto, (max-width: 1172px) 100vw, 1172px\" \/><\/p>\n<p>Do you want to learn more about securing your SAP systems? Check out our <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or send us an e-mail us at <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">sast@akquinet.de<\/a>.<\/p>\n<h6><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-412\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/referent_steffenmaltig_akquinet-e1517509266646-300x225.jpg\" alt=\"Steffen Maltig, SAST SOLUTIONS\" width=\"187\" height=\"140\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/referent_steffenmaltig_akquinet-e1517509266646-300x225.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/referent_steffenmaltig_akquinet-e1517509266646.jpg 649w\" sizes=\"auto, (max-width: 187px) 100vw, 187px\" \/><br \/>\nSteffen Maltig<br \/>\nHead of SAST Authorization Management at AKQUINET<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation throughout your company. In practice, however, we continue to witness a lack of measures appropriate for identifying dangers early on. IT risk management is too often understood as a reactive process.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[151,67,64,68],"class_list":["post-718","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-grc","tag-identity-management","tag-role-management","tag-sap-authorizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Achieving effective IT risk management with dynamic mitigation groups<\/title>\n<meta name=\"description\" content=\"Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation.,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving effective IT risk management with dynamic mitigation groups\" \/>\n<meta property=\"og:description\" content=\"Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation.,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-20T14:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T09:02:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Achieving effective IT risk management with dynamic mitigation groups\",\"datePublished\":\"2018-11-20T14:00:15+00:00\",\"dateModified\":\"2020-07-24T09:02:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/\"},\"wordCount\":363,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_Risk-and-Compliance-Management-300x147.png\",\"keywords\":[\"GRC\",\"Identity Management\",\"Role Management\",\"SAP Authorizations\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/\",\"name\":\"Achieving effective IT risk management with dynamic mitigation groups\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_Risk-and-Compliance-Management-300x147.png\",\"datePublished\":\"2018-11-20T14:00:15+00:00\",\"dateModified\":\"2020-07-24T09:02:24+00:00\",\"description\":\"Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation.,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_Risk-and-Compliance-Management-300x147.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_Risk-and-Compliance-Management-300x147.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/11\\\/20\\\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving effective IT risk management with dynamic mitigation groups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Achieving effective IT risk management with dynamic mitigation groups","description":"Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation.,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/","og_locale":"en_US","og_type":"article","og_title":"Achieving effective IT risk management with dynamic mitigation groups","og_description":"Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation.,","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/","og_site_name":"SAST BLOG","article_published_time":"2018-11-20T14:00:15+00:00","article_modified_time":"2020-07-24T09:02:24+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Achieving effective IT risk management with dynamic mitigation groups","datePublished":"2018-11-20T14:00:15+00:00","dateModified":"2020-07-24T09:02:24+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/"},"wordCount":363,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png","keywords":["GRC","Identity Management","Role Management","SAP Authorizations"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/","name":"Achieving effective IT risk management with dynamic mitigation groups","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png","datePublished":"2018-11-20T14:00:15+00:00","dateModified":"2020-07-24T09:02:24+00:00","description":"Holistic, effective risk management in IT will help you make sounder decisions faster and present tremendous potential for value creation.,","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_Risk-and-Compliance-Management-300x147.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/11\/20\/achieving-effective-it-risk-management-with-dynamic-mitigation-groups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Achieving effective IT risk management with dynamic mitigation groups"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=718"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/718\/revisions"}],"predecessor-version":[{"id":1326,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/718\/revisions\/1326"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}