{"id":900,"date":"2019-10-01T08:00:08","date_gmt":"2019-10-01T06:00:08","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=900"},"modified":"2020-07-24T11:08:58","modified_gmt":"2020-07-24T09:08:58","slug":"eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/","title":{"rendered":"Detect and Eliminate Vulnerabilities in SAP Systems \u2013 Thanks to Security Audit and RFC Interface Analysis"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-901 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612-300x201.png\" alt=\"SAST System Security Validation\" width=\"300\" height=\"201\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612-300x201.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612.png 552w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>SAP systems require special attention when it comes to their security and this is no longer news to anyone. More often than not, the ERP systems supplied from Walldorf in Baden-W\u00fcrttemberg store some of the most crucial and sensitive company data. That said, what is the best approach to achieving the optimum level of security? A security audit would fit the bill!<\/p>\n<p><!--more--><\/p>\n<p>Many companies rely on a targeted attempt to breach the system security and identify possible security loopholes at project begin. This approach is also referred to as a penetration test or a pentest. And pentests do have a leading role to play in every security concept. However, the very first step should be in a different direction.<\/p>\n<h2>SAP Security Audit: Assessing Risk Potential and Preventing Attacks<\/h2>\n<p>A penetration test \u2013 a targeted attempt to hack an SAP system \u2013 is by definition never complete: Often, one of two things happens: The task of the pentester is complete when an exploitable vulnerability is found, or the attempt targets a specific application from the start, the web shop for example, and therefore does not cover all the potential points of entry.<\/p>\n<p>For this reason, an audit should be the first step when assessing SAP system security. A security audit checks one or more SAP systems for known vulnerabilities and incorrect settings. An audit like this can be handled manually. However, because of the many possibly incorrect SAP system parameters and settings \u2013 a four-digit number of these could relate to security &#8211; a security audit is generally largely automated. The result is presented in a report that lists all vulnerabilities identified and provides explanations and recommended measures for remediation.<\/p>\n<h2>But Don&#8217;t Forget to Check Your RFC Interfaces!<\/h2>\n<p>One thing to remember is that a security audit validates the settings only within a given system. Additionally checking interfaces to other systems for vulnerabilities can significantly increase the meaningfulness of such an audit. This is why the RFC interfaces, particularly in the case of SAP production systems, should be part of a security audit. It is important to check for potential pitfalls, for example RFC users who have been allowed authorizations that are too generous, or who have not changed their password in years, and thus are easier to crack. For attackers, these vulnerabilities mean that these points of attack are typically valid across all of a company\u2019s systems, giving easy access once one loophole is found.<\/p>\n<h2>Stay Safe: Eliminate Vulnerabilities in SAP Systems<\/h2>\n<p>The first step after performing this kind of security audit, including the validation of RFC interfaces, is to fix any vulnerabilities found. Not until all of this is done does it make sense to seek and remedy additional loopholes with penetration testing.\u00a0 A pentest in this situation has special meaning: In contrast to a security audit, the focus of a pentest is not only to identify vulnerabilities. A pentest also aims to demonstrate how the given vulnerability can be exploited. This is the only way to permit early identification of attack vectors, allowing them to be thwarted. The aim of a security audit is to support the basic security of each and every system.<\/p>\n<p>The SAST SUITE modules <a href=\"https:\/\/sast-solutions.com\/sap-platform-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">System Security Validation<\/a> and <a href=\"https:\/\/sast-solutions.com\/sap-platform-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">Interface Management<\/a> offer an automated solution for implementing security audits. The special advantage here is that the modules can be installed permanently, allowing the security status of an SAP system to be checked cyclically. For example, you can prevent the deterioration of your security level by smaller changes which will happen inevitably \u2013 across all your systems. And, of course, security audits can also be configured as recurring services. In particular, if your company\u2019s migration to SAP HANA or S\/4HANA is right around the corner, such an audit offers an ideal solution for safeguarding your SAP systems and taking all the necessary security measures before you start your transition.<\/p>\n<p>Would you like more information on our SAST SUITE or would you like to find out more about ALL ROUND protection of your SAP systems? Check out our <a href=\"https:\/\/www.sast-solutions.de\/index-2.jsp\">SAST SOLUTIONS website<\/a> or send us an e-mail us at <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a>.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-690\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/10\/Autor_Patrick_Boch-300x200.jpg\" alt=\"SAST SOLUTIONS Patrick Boch\" width=\"300\" height=\"200\" \/><br \/>\nPatrick Boch, Product Manager SAST SOLUTIONS<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>These articles may also be of interest to you<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/08\/27\/rfc-interfaces-in-sap-landscapes-an-overview\/\">RFC Interfaces in SAP Landscapes: An Overview<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/\">SAP Application Server Encryption via TLS<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP systems require special attention when it comes to their security and this is no longer news to anyone. More often than not, the ERP systems supplied from Walldorf in Baden-W\u00fcrttemberg store some of the most crucial and sensitive company data. That said, what is the best approach to achieving the optimum level of security? [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[156,52,61,163,97,117],"class_list":["post-900","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-cyber-security","tag-penetration-testing","tag-rfc-interface","tag-s4hana-migration","tag-sap-audit","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Improved SAP security thanks to Security Audit and RFC interface analysis<\/title>\n<meta name=\"description\" content=\"Optimally protect SAP ERP and S\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Improved SAP security thanks to Security Audit and RFC interface analysis\" \/>\n<meta property=\"og:description\" content=\"Optimally protect SAP ERP and S\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-01T06:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T09:08:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612.png\" \/>\n\t<meta property=\"og:image:width\" content=\"552\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Improved SAP security thanks to Security Audit and RFC interface analysis\" \/>\n<meta name=\"twitter:description\" content=\"Optimally protect SAP ERP and S\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Detect and Eliminate Vulnerabilities in SAP Systems \u2013 Thanks to Security Audit and RFC Interface Analysis\",\"datePublished\":\"2019-10-01T06:00:08+00:00\",\"dateModified\":\"2020-07-24T09:08:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/\"},\"wordCount\":729,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Motiv_SAST-SSV_72dpi_1612-300x201.png\",\"keywords\":[\"Cyber Security\",\"Penetration Testing\",\"RFC Interface\",\"S\\\/4HANA Migration\",\"SAP Audit\",\"Vulnerability Assessment\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/\",\"name\":\"Improved SAP security thanks to Security Audit and RFC interface analysis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Motiv_SAST-SSV_72dpi_1612-300x201.png\",\"datePublished\":\"2019-10-01T06:00:08+00:00\",\"dateModified\":\"2020-07-24T09:08:58+00:00\",\"description\":\"Optimally protect SAP ERP and S\\\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Motiv_SAST-SSV_72dpi_1612-300x201.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Motiv_SAST-SSV_72dpi_1612-300x201.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/01\\\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detect and Eliminate Vulnerabilities in SAP Systems \u2013 Thanks to Security Audit and RFC Interface Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Improved SAP security thanks to Security Audit and RFC interface analysis","description":"Optimally protect SAP ERP and S\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Improved SAP security thanks to Security Audit and RFC interface analysis","og_description":"Optimally protect SAP ERP and S\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/","og_site_name":"SAST BLOG","article_published_time":"2019-10-01T06:00:08+00:00","article_modified_time":"2020-07-24T09:08:58+00:00","og_image":[{"width":552,"height":369,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Improved SAP security thanks to Security Audit and RFC interface analysis","twitter_description":"Optimally protect SAP ERP and S\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Detect and Eliminate Vulnerabilities in SAP Systems \u2013 Thanks to Security Audit and RFC Interface Analysis","datePublished":"2019-10-01T06:00:08+00:00","dateModified":"2020-07-24T09:08:58+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/"},"wordCount":729,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612-300x201.png","keywords":["Cyber Security","Penetration Testing","RFC Interface","S\/4HANA Migration","SAP Audit","Vulnerability Assessment"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/","name":"Improved SAP security thanks to Security Audit and RFC interface analysis","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612-300x201.png","datePublished":"2019-10-01T06:00:08+00:00","dateModified":"2020-07-24T09:08:58+00:00","description":"Optimally protect SAP ERP and S\/4HANA landscapes and improve basic security thanks to Security Audit and RFC interface analysis.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612-300x201.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/09\/Motiv_SAST-SSV_72dpi_1612-300x201.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Detect and Eliminate Vulnerabilities in SAP Systems \u2013 Thanks to Security Audit and RFC Interface Analysis"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=900"}],"version-history":[{"count":2,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/900\/revisions"}],"predecessor-version":[{"id":1328,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/900\/revisions\/1328"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}