{"id":761,"date":"2019-01-07T10:31:37","date_gmt":"2019-01-07T09:31:37","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=761"},"modified":"2020-07-24T11:40:50","modified_gmt":"2020-07-24T09:40:50","slug":"sap-systems-insider-attacks","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/","title":{"rendered":"Study shows SAP systems especially prone to insider attacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-762 size-medium alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-300x200.jpg\" alt=\"SAST BLOG: Study shows SAP systems especially prone to insider attacks\" width=\"300\" height=\"200\" \/>After many years working in the field of SAP security, I am still regularly surprised to discover how much Hollywood has contributed to the discussion on cybersecurity. The common perception is that of a hacker sitting at home in front of several screens and using cryptic commands to hack into corporate networks. The recently published &#8220;<a href=\"https:\/\/www.quest.com\/whitepaper\/insider-threat-spotlight-report890546\/\" target=\"_blank\" rel=\"noopener noreferrer\">Insider Threat 2018 Report<\/a>&#8221; however, shows that insider attacks represent a much more serious threat. As far as the security of SAP systems is concerned, insider attacks are by far the greater problem. Why that is the case and what the main risks are is the subject of this post.<!--more--><\/p>\n<p>Most likely, when you think of insider criminals, you think of another Hollywood-inspired character: An employee sitting in front of a computer, sweating profusely \u2013 frantically watching the progress bar that is taking forever to reach 100% \u2013 and his boss approaching the office. The fact is, however, that this image does not accurately convey the typical insider attack.<\/p>\n<h2>Unstructured authorization concepts and complex system landscapes facilitate security incidents<\/h2>\n<p>The \u201c<a href=\"https:\/\/www.quest.com\/whitepaper\/insider-threat-spotlight-report890546\/\" target=\"_blank\" rel=\"noopener noreferrer\">Insider Threat 2018 Report<\/a>\u201d published by the market research company Crowd Research Partners assumes that more than half of all insider attacks (51%) are carried out by employees who cause problems either by mistake or unintentionally. The reasons for these errors are a direct mirroring of the problems by which SAP systems are primarily affected.<\/p>\n<p>The study shows that the <strong>main reason<\/strong> specified (37%) for unintended security incidents was that <strong>authorizations were granted too generously<\/strong>. In SAP systems in which roles and authorizations have developed on an ad-hoc basis, this is a frequent problem. And it\u2019s no wonder when you consider that so many core processes are handled in SAP. With the complexity of an ERP system, it is easier for administrators \u2013 who do not necessarily have the expertise required to appropriately restrict authorizations \u2013 to assign authorizations by way of general role descriptions.<\/p>\n<p>With regard to complexity: <strong>Number three<\/strong> in the list of reasons for security problems is the <strong>increasing complexity of the relevant systems<\/strong>, which was deemed to be critical by 35% of those surveyed. And here again, SAP is strongly impacted: S\/4 HANA, C\/4 HANA, the SAP Cloud \u2013 new products that are typically added to an existing system landscape. And this with a product that, with 320 million lines of code, is already significantly more complex than other software products.<\/p>\n<h2>90% of the survey respondents feel vulnerable to insider attacks<\/h2>\n<p><strong>Second on the list<\/strong> of reasons for security problems is a factor that is topically related to both the over-generous authorizations and the increasingly complex technology: <strong>More and more devices have access to sensitive information.<\/strong> For 36% of those surveyed, this is a critical problem. Quickly approve your employee\u2019s vacation request as you head to the car park and then, as you sit in traffic, have a brief look at the recent quarterly figures: With SAP UI5 or Fiori, such scenarios are realistic. And we haven&#8217;t even considered SAP Leonardo and integration of the \u201cInternet of Things\u201d!<\/p>\n<p>It\u2019s no wonder that two thirds (66%) of the companies surveyed are more worried about attacks from within than external threats. It should be said that \u201cinadvertent\u201d security incidents are primarily caused by phishing attacks. 67% of the study participants highlighted this problem. Thus, the report comes to a clear conclusion: 90% of respondents feel vulnerable to insider attacks.<\/p>\n<h2>The best form of prevention: Basic protection of all SAP systems<\/h2>\n<p>SAP managers naturally wonder how they can best prevent insider attacks. The answer is as simple as it is logical: Protect the SAP system landscape to the greatest extent possible. There are three areas where particular attention should be paid:<\/p>\n<ol>\n<li><strong>Authorizations<\/strong>: The role concept is a potential source of security problems on two fronts:\n<ul>\n<li>On the one hand, there are the critical authorizations that give a user more rights than his job description actually requires.<\/li>\n<li>On the other, there are those authorizations that infringe the principle of segregation of duties (SoD). Here it is important to ensure that SoD conflicts are avoided and that authorizations are no longer allocated too generously.<br \/>\nA classic problem is the trainee effect. A trainee, who spends a short period in several departments, collects authorizations that are similar in scope to those of an administrator \u2013 he is given new authorizations for each department but does not lose those that he has already accumulated.<\/li>\n<\/ul>\n<\/li>\n<li><strong>General protection of SAP Basis<\/strong>: This is a topic that should have been dealt with a long time ago by most customers. Unfortunately, our experience shows that most of the SAP systems inspected are still vulnerable to relatively straightforward attacks. This vulnerability covers standard users who have not changed their default passwords, or an unprotected SAP gateway left open like a barn door.<\/li>\n<li><strong>Interface protection<\/strong>: Increasing complexity and a growing number of Cloud solutions such as On-Premise systems must somehow be integrated with each other. There are very few companies, however, who have a central instance that maintains an overview of all the interfaces that are in use. The SAP system offers an excellent starting point here, and not only because of its central importance. Appropriate solutions facilitate an overview of all interfaces.<\/li>\n<\/ol>\n<h2>Comprehensive SAP security with the SAST SUITE<\/h2>\n<p>With the SAST SUITE from AKQUINET, we provide an all-in-one solution which, in addition to the points mentioned above, also addresses further security weaknesses. The advantage of the SAST SUITE solutions is that ongoing operations are unaffected even by complex security projects. Even if you decide to redesign all roles and authorizations, or if you opt to cleanse your code, our tools ensure that your users can continue working without any interruptions. This effectively prevents both internal and external attacks.<\/p>\n<p>Would you like more information on our <a href=\"https:\/\/www.sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> or would you like to find out more about comprehensive protection of your SAP systems? Check out our <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or send us an e-mail to: <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">sast@akquinet.de<\/a><\/p>\n<p>The \u201c<a href=\"https:\/\/www.quest.com\/whitepaper\/insider-threat-spotlight-report890546\/\">Insider Threat 2018 Report<\/a>\u201d, produced by the market research company Crowd Research Partners, was jointly commissioned by the online platform Cybersecurity Insiders and the Information Security Community on LinkedIn with the support of Quest Software. (Source: <a href=\"https:\/\/www.security-insider.de\/unternehmen-sind-anfaellig-fuer-innentaeter-a-780258\/?cmp=nl-36&amp;uuid=A702C738-9229-4FE5-B2D0D616ABCA2689\" target=\"_blank\" rel=\"noopener noreferrer\">Security Insider<\/a>)<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-690\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/10\/Autor_Patrick_Boch-300x200.jpg\" alt=\"SAST SOLUTIONS Patrick Boch\" width=\"300\" height=\"200\" \/><br \/>\nPatrick Boch<\/strong><br \/>\n<strong>Product Manager SAST SOLUTIONS<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Related articles in the SAST BLOG<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2018\/12\/04\/c4hana-and-security-our-take\/\">C\/4HANA \u2013 how does security work for this? Our take.<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2018\/10\/23\/the-state-of-sap-security-2018-between-platform-security-authorization-management-and-s-4-hana-migration\/\">The State of SAP Security 2018: Between platform security, authorization management and S\/4 HANA migration.<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2018\/10\/15\/are-you-really-that-attached-to-your-abap-security-flaws-or-is-it-time-to-say-goodbye\/\">Are you really that attached to your ABAP security flaws, or is it time to say goodbye?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After many years working in the field of SAP security, I am still regularly surprised to discover how much Hollywood has contributed to the discussion on cybersecurity. The common perception is that of a hacker sitting at home in front of several screens and using cryptic commands to hack into corporate networks. The recently published [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[58,68],"class_list":["post-761","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-real-time-monitoring","tag-sap-authorizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Study shows SAP systems especially prone to insider attacks<\/title>\n<meta name=\"description\" content=\"SAP systems are particularly prone to insider attacks. Read about the dangers and how you can ensure SAP security in the SAST blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Study shows SAP systems especially prone to insider attacks\" \/>\n<meta property=\"og:description\" content=\"SAP systems are particularly prone to insider attacks. Read about the dangers and how you can ensure SAP security in the SAST blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-07T09:31:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T09:40:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-e1546854202222.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Study shows SAP systems especially prone to insider attacks\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-e1546854202222.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Study shows SAP systems especially prone to insider attacks\",\"datePublished\":\"2019-01-07T09:31:37+00:00\",\"dateModified\":\"2020-07-24T09:40:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/\"},\"wordCount\":1082,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/SAST-SOLUTIONS_Insider-300x200.jpg\",\"keywords\":[\"Real-time monitoring\",\"SAP Authorizations\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/\",\"name\":\"Study shows SAP systems especially prone to insider attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/SAST-SOLUTIONS_Insider-300x200.jpg\",\"datePublished\":\"2019-01-07T09:31:37+00:00\",\"dateModified\":\"2020-07-24T09:40:50+00:00\",\"description\":\"SAP systems are particularly prone to insider attacks. Read about the dangers and how you can ensure SAP security in the SAST blog.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/SAST-SOLUTIONS_Insider-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/SAST-SOLUTIONS_Insider-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/01\\\/07\\\/sap-systems-insider-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Study shows SAP systems especially prone to insider attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Study shows SAP systems especially prone to insider attacks","description":"SAP systems are particularly prone to insider attacks. Read about the dangers and how you can ensure SAP security in the SAST blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Study shows SAP systems especially prone to insider attacks","og_description":"SAP systems are particularly prone to insider attacks. Read about the dangers and how you can ensure SAP security in the SAST blog.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/","og_site_name":"SAST BLOG","article_published_time":"2019-01-07T09:31:37+00:00","article_modified_time":"2020-07-24T09:40:50+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-e1546854202222.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Study shows SAP systems especially prone to insider attacks","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-e1546854202222.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Study shows SAP systems especially prone to insider attacks","datePublished":"2019-01-07T09:31:37+00:00","dateModified":"2020-07-24T09:40:50+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/"},"wordCount":1082,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-300x200.jpg","keywords":["Real-time monitoring","SAP Authorizations"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/","name":"Study shows SAP systems especially prone to insider attacks","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-300x200.jpg","datePublished":"2019-01-07T09:31:37+00:00","dateModified":"2020-07-24T09:40:50+00:00","description":"SAP systems are particularly prone to insider attacks. Read about the dangers and how you can ensure SAP security in the SAST blog.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-300x200.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/01\/SAST-SOLUTIONS_Insider-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/01\/07\/sap-systems-insider-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Study shows SAP systems especially prone to insider attacks"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=761"}],"version-history":[{"count":12,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/761\/revisions"}],"predecessor-version":[{"id":1333,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/761\/revisions\/1333"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}