{"id":731,"date":"2018-12-04T16:54:13","date_gmt":"2018-12-04T15:54:13","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=731"},"modified":"2020-07-24T10:12:41","modified_gmt":"2020-07-24T08:12:41","slug":"c4hana-and-security-our-take","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/","title":{"rendered":"C\/4HANA \u2013 how does security work for this? Our take."},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-729 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg\" alt=\"SAST SOLUTIONS C\/4 HANA\" width=\"298\" height=\"168\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-768x432.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-1024x576.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/11\/SAST_C4HANA.jpg 1920w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/>C\/4HANA is the name of the newest product in the SAP portfolio. The company based in Walldorf, Germany, promises nothing less than a revolution of customer experience. But is C\/4HANA secure? And what does &#8220;C\/4HANA&#8221; mean, anyway?<\/p>\n<p><!--more--><\/p>\n<p>We&#8217;ll start with the question of what C\/4HANA is and will go back to the very beginning. Then, we can give the answer: C\/4HANA is a big, black black box. We&#8217;ve &#8220;borrowed&#8221; this statement, but the truth is not far off when you look at it in terms of security. C\/4HANA (currently) boils down to little more than a conglomeration of different cloud services under the umbrella of SAP. These services are intended to be consolidated \u2013 eventually, and the idea is to provide a uniform front end \u2013 a uniform &#8220;customer experience&#8221;.<\/p>\n<h3><strong>Spotlight on IT security<\/strong><\/h3>\n<p>It will be some time before things reach that level. This means that customers can take advantage of this time to focus on security now. There are three main reasons for this.<\/p>\n<ol>\n<li><strong>\u00a01+1 can equal 3<\/strong>: This really is true, in a negative sense and in particular for IT security. For example, a vulnerability in a widespread WordPress plug-in recently became known. WordPress is the most widely used content management system for websites across the world. Some even estimate that nearly two-thirds of all websites overall run on this popular open-source system.<br \/>\nThe loophole in the Woo-Commerce plug-in was not, technically, a loophole, meaning that hackers were unable to achieve penetration despite the bug. Rather, it was the combination of the plug-in and WordPress that created the vulnerability and enabled the affected websites to be fully compromised. Of course, none of this means that C\/4HANA has a similar vulnerability. Nevertheless, C\/4HANA does comprise five different technologies and this possibility cannot be excluded.<\/li>\n<li><strong>Authorizations<\/strong>: Even just the migration to S\/4 HANA, wholly SAP technology, is a challenge for many customers. This is because a number of authorization concepts are undergoing fundamental changes, not to mention the authorizations that must be adjusted for the new platform.\u00a0 In the case of C\/4HANA, SAP is now faced with the task of fitting five different technologies \u2013 and the respective authorization concepts \u2013 into a uniform concept. It will not be easy and will mean extra effort for customers who are already using one or more of the five cloud products. This is because any adjustments to authorizations must be adjusted again for C\/4HANA.<\/li>\n<li><strong>\u00a0More interfaces<\/strong>: C\/4HANA &#8220;lives&#8221; in the cloud. However, to ensure its functionality is used in a practical way, integration into the backend (the ERP system) is essential. And here, too, more systems in the cloud \u2013 more interfaces \u2013 mean more avenues for attacks. By contrast to the first two items mentioned, customers are the ones who are responsible for ensuring that the interfaces are secure.<\/li>\n<\/ol>\n<h3><strong>Advantages of C\/4HANA<\/strong><\/h3>\n<p>Of course, C\/4HANA does have a number of positive aspects. For one thing, it follows from the above that when C\/4HANA is complete \u2013 when the separate technologies are consolidated \u2013 it will certainly bring some added security. Among other things, this will be the result of a uniform data model, which, one hopes, will require just one interface to the ERP backend.<\/p>\n<p>End users will be happy to learn that data protection one of the major goals of C\/4HANA. Customer and company data should thus be particularly well protected in compliance with the GDPR, a boon for everyone&#8217;s security.<\/p>\n<h3><strong>C\/4HANA: Next generation CRM<\/strong><\/h3>\n<p>To summarize, we can say that the product vision of C\/4HANA is both justified and will certainly mean more security. However, this will be the case only once the design is final: once the data model, the front end and the integration into the backend have been consolidated. Until then, customers do not need to wait for the next generation CRM: Just follow these basic tips:<\/p>\n<ol>\n<li><strong>Check security<\/strong>: SAP checks its cloud solutions for vulnerabilities regularly. The data centers where the cloud is hosted are certified, meaning they comply with many different security norms. Nevertheless, it is worth paying attention to details, especially when you are responsible. In particular, this involves the security of clients that access the cloud.<\/li>\n<li><strong>Interface security<\/strong>: The cloud itself may be secure, but are the backend interfaces secure too? Here, we recommend deploying a tool, such as the SAST SUITE Interface Management, to obtain an initial overview of all the interfaces and to secure them as needed.<\/li>\n<li><strong>Authorizations<\/strong>: We can attest that it is not easy to keep an eye on authorizations with five clouds and a backend. However, SAST SUITE makes it easy to identify SoD conflicts and potentially critical authorizations.<\/li>\n<\/ol>\n<p>No matter what you decide to do, we recommend performing a security audit before implementing cloud technologies or even migrating specific business processes entirely into the cloud. In this way, you can reduce risks and can also make your systems fit and secure for the cloud, and in turn for C\/4HANA.<\/p>\n<p>Do you want to learn more about securing your SAP systems? Check out our <a href=\"https:\/\/sast-solutions.com\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or send us an e-mail us at <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a>.<\/p>\n<h6><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-690 alignnone\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/10\/Autor_Patrick_Boch-300x200.jpg\" alt=\"SAST_SOLUTIONS_Patrick_Boch\" width=\"173\" height=\"115\" \/><br \/>\nPatrick Boch<br \/>\nProduct Manager SAST SOLUTIONS<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>C\/4HANA is the name of the newest product in the SAP portfolio. The company based in Walldorf, Germany, promises nothing less than a revolution of customer experience. But is C\/4HANA secure? And what does &#8220;C\/4HANA&#8221; mean, anyway?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[153,163,129,80],"class_list":["post-731","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-s-4hana","tag-s4hana-migration","tag-sap-cloud","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C\/4HANA \u2013 how does security work for this? Our take.<\/title>\n<meta name=\"description\" content=\"C\/4HANA is the name of the newest product in the SAP portfolio and promises nothing less than a revolution of customer experience. But is C\/4HANA secure?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\/4HANA \u2013 how does security work for this? Our take.\" \/>\n<meta property=\"og:description\" content=\"C\/4HANA is the name of the newest product in the SAP portfolio and promises nothing less than a revolution of customer experience. But is C\/4HANA secure?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-04T15:54:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T08:12:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"C\\\/4HANA \u2013 how does security work for this? Our take.\",\"datePublished\":\"2018-12-04T15:54:13+00:00\",\"dateModified\":\"2020-07-24T08:12:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/\"},\"wordCount\":878,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_C4HANA-300x169.jpg\",\"keywords\":[\"S\\\/4HANA\",\"S\\\/4HANA Migration\",\"SAP Cloud\",\"SAP Security\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/\",\"name\":\"C\\\/4HANA \u2013 how does security work for this? Our take.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_C4HANA-300x169.jpg\",\"datePublished\":\"2018-12-04T15:54:13+00:00\",\"dateModified\":\"2020-07-24T08:12:41+00:00\",\"description\":\"C\\\/4HANA is the name of the newest product in the SAP portfolio and promises nothing less than a revolution of customer experience. But is C\\\/4HANA secure?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_C4HANA-300x169.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/SAST_C4HANA-300x169.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/12\\\/04\\\/c4hana-and-security-our-take\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\\\/4HANA \u2013 how does security work for this? Our take.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\/4HANA \u2013 how does security work for this? Our take.","description":"C\/4HANA is the name of the newest product in the SAP portfolio and promises nothing less than a revolution of customer experience. But is C\/4HANA secure?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/","og_locale":"en_US","og_type":"article","og_title":"C\/4HANA \u2013 how does security work for this? Our take.","og_description":"C\/4HANA is the name of the newest product in the SAP portfolio and promises nothing less than a revolution of customer experience. But is C\/4HANA secure?","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/","og_site_name":"SAST BLOG","article_published_time":"2018-12-04T15:54:13+00:00","article_modified_time":"2020-07-24T08:12:41+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"C\/4HANA \u2013 how does security work for this? Our take.","datePublished":"2018-12-04T15:54:13+00:00","dateModified":"2020-07-24T08:12:41+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/"},"wordCount":878,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg","keywords":["S\/4HANA","S\/4HANA Migration","SAP Cloud","SAP Security"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/","name":"C\/4HANA \u2013 how does security work for this? Our take.","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg","datePublished":"2018-12-04T15:54:13+00:00","dateModified":"2020-07-24T08:12:41+00:00","description":"C\/4HANA is the name of the newest product in the SAP portfolio and promises nothing less than a revolution of customer experience. But is C\/4HANA secure?","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/11\/SAST_C4HANA-300x169.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/12\/04\/c4hana-and-security-our-take\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"C\/4HANA \u2013 how does security work for this? Our take."}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=731"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/731\/revisions"}],"predecessor-version":[{"id":1277,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/731\/revisions\/1277"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}