{"id":918,"date":"2019-10-30T08:52:18","date_gmt":"2019-10-30T07:52:18","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=918"},"modified":"2021-05-10T13:39:11","modified_gmt":"2021-05-10T11:39:11","slug":"sap-security-five-ways-to-make-sure-youll-be-hacked","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/","title":{"rendered":"SAP Security: five ways to make sure you\u2019ll be hacked"},"content":{"rendered":"<p><em><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-919 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3-300x193.png\" alt=\"Hacker attacks threaten SAP security: All alarmist nonsense?\" width=\"300\" height=\"193\" \/>(A guide of the less serious sort.)<br \/>\n<\/em>Let&#8217;s be honest right off the bat: There\u2019s a lot of hype in the media about IT security in general and SAP security in special these days. But is there really anything behind it? Those headlines about millions of data records going missing always affect someone else \u2013 whether it&#8217;s Equifax across the pond or the big tech companies that have been infiltrated by organized groups of Chinese hackers. It\u2019s all alarmist nonsense!<\/p>\n<h2><!--more--><\/h2>\n<h2><strong>SAP systems aren\u2019t vulnerable to hacking&#8230;right?<\/strong><\/h2>\n<p>Don&#8217;t believe me? There are individual hackers out there, of course, but they\u2019re mostly just kids with too much time on their hands. All they want is to have a little fun; they&#8217;re definitely not interested in SAP systems. Besides causing you unnecessary stress, efforts to protect SAP systems are a waste of resources, and they don\u2019t even work in the end. To see for yourself, simply read on.<\/p>\n<h2><strong>1. Securing SAP Gateway<\/strong><\/h2>\n<p>Why would you ever need to safeguard SAP Gateway? Of course, anyone could theoretically break into your SAP systems under certain circumstances, even without a user and password. The probability of that happening is pretty low, though. After all, you don&#8217;t see very many external consultants in the world of SAP, and you can obviously count on your own employees. And insider attacks? More unsubstantiated hype. What could possibly happen there? Even if your production system grinds to a halt and you have to start handling all your business processes manually, what\u2019s the big deal? It worked well enough 50 years ago!<\/p>\n<h2><strong>2. Hardening SAP systems and applications<\/strong><\/h2>\n<p>Software companies have put a good deal of thought into programming their systems. Whether it&#8217;s an OS, a network, or a database, you can rest easy knowing that there&#8217;s not a single error to be found in all those millions of lines of code. Meanwhile, your own developers are clearly beyond reproach; they know what secure and correct programming requires. And your administrators \u2013 who, let&#8217;s face it, only ever have to fix printer problems as it is \u2013 will have an even easier job. Why else do we have manuals and wizards to help us configure the right settings? It&#8217;s practically idiot-proof. Making an extra effort to secure such things just takes up resources without offering any benefits.<\/p>\n<h2><strong>3. Setting SAP authorizations correctly<\/strong><\/h2>\n<p>Security isn\u2019t the only thing you\u2019ll hear experts and the media going on and on about. \u201cCompliance\u201d is another empty buzzword. What\u2019s so inappropriate about allowing an employee to both create a vendor and pay invoices without any limit checks on the amounts involved? It actually saves a lot of time and effort when you grant full authorizations to all your employees. Besides, it takes a real expert to bring down an entire SAP system using an SAP_ALL profile. Your systems aren\u2019t a likely target for attacks anyway. Who wants to steal sensitive data from a small business? Nefarious insiders looking to gather important information before changing jobs? Fairy tales! There must be some other reason why your main competitor has been reacting so quickly to your pricing changes ever since your head of sales switched sides&#8230;<\/p>\n<h2><strong>4. Setting up real-time monitoring for SAP security<br \/>\n<\/strong><\/h2>\n<p>Do you have an e-recruiting portal that&#8217;s visited by thousands of users every day? Of course you do, and of course it&#8217;s directly connected to the SAP system that houses your most critical data.\u00a0 And now they&#8217;re trying to tell you there are bots that automatically search for common vulnerabilities and can attempt countless user-password combinations per second? Sounds like pure fiction. Why would you invest money in an SIEM system that only produces an incredible amount of data no one can even begin to sort through? Filters, correlations among unusual activities, signs of targeted attacks \u2013 these are just more buzzwords the developers have come up with to scare people. As if that weren\u2019t enough, you supposedly need to have someone who&#8217;s always on alert. In the unlikely event that an attacker makes it past your IT security infrastructure, he or she will have to find another opening in your SAP system or another application, but your admins are sure to notice right away. They\u2019ve got nothing but time, after all, and a printer on the fritz can wait a few minutes.<\/p>\n<h2><strong>5. Installing security updates<\/strong><\/h2>\n<p>All right, maybe not every software manufacturer is infallible. When a security flaw does come to light, however, there&#8217;s no need to rush to install the fix. No hacker in the world is fast enough to devise an exploit just two weeks after a patch is released. This is particularly true of SAP systems, where even the most pernicious hacker is sympathetic to the fact that your system controls your production and can\u2019t simply be restarted. Plus, all the manual steps involved in installing patches take a whole lot of time \u2013 and time is money, as they say. At the same time, you reckon the risk of losing a few million here or there due to production downtime is just the cost of doing business.<\/p>\n<h2><strong>SAP security and compliance: Achieve comprehensive security and safeguard your systems against attacks<\/strong><\/h2>\n<p>After reading these five arguments, you still aren&#8217;t convinced? Good! As you\u2019ve probably figured out by now, that wasn\u2019t really the idea. Quite the opposite, in fact: With a new cyberattack or loss of data making headlines nearly every week, IT security is playing an increasingly important role. The points outlined above reflect just a few of the subjects you should start prioritizing more in your corresponding strategy (if you aren\u2019t already). In particular, SAP systems \u2013 which most companies use to store their most sensitive and important data \u2013 require comprehensive protection. This is exactly what SAST SUITE and our team of SAST consultants offer: extensive hardening of your SAP system landscape in real time, along with expertise that meets your specific needs.<\/p>\n<p>Interested in finding out how they pull this off? Check out our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or send an e-mail to <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a>.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-690\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/10\/Autor_Patrick_Boch-300x200.jpg\" alt=\"SAST SOLUTIONS Patrick Boch\" width=\"300\" height=\"200\" \/><br \/>\nPatrick Boch, Product Manager SAST SOLUTIONS<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More articles for your SAP security and compliance:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/08\/29\/sap-security-compliance-customers-need-solution-providers\/\">SAP Security &amp; Compliance: &#8220;Customers need Solution Providers.&#8221;<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/05\/20\/sap-security-and-hosting-hacking-40-sap-systems-in-one-fell-swoop\/\">SAP Security and Hosting: Hacking 40 SAP Systems in One Fell Swoop<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>(A guide of the less serious sort.) Let&#8217;s be honest right off the bat: There\u2019s a lot of hype in the media about IT security in general and SAP security in special these days. But is there really anything behind it? Those headlines about millions of data records going missing always affect someone else \u2013 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,151,58,80,114],"class_list":["post-918","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-grc","tag-real-time-monitoring","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five ways to make sure you\u2019ll be hacked<\/title>\n<meta name=\"description\" content=\"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security: Five Ways to Make Sure You\u2019ll Be Hacked\" \/>\n<meta property=\"og:description\" content=\"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-30T07:52:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-10T11:39:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"193\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP Security: Five Ways to Make Sure You\u2019ll Be Hacked\" \/>\n<meta name=\"twitter:description\" content=\"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP Security: five ways to make sure you\u2019ll be hacked\",\"datePublished\":\"2019-10-30T07:52:18+00:00\",\"dateModified\":\"2021-05-10T11:39:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/\"},\"wordCount\":1074,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/AKQ_49_SAST-Blog_Stop_3-300x193.png\",\"keywords\":[\"Cyber Attack\",\"GRC\",\"Real-time monitoring\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/\",\"name\":\"Five ways to make sure you\u2019ll be hacked\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/AKQ_49_SAST-Blog_Stop_3-300x193.png\",\"datePublished\":\"2019-10-30T07:52:18+00:00\",\"dateModified\":\"2021-05-10T11:39:11+00:00\",\"description\":\"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/AKQ_49_SAST-Blog_Stop_3-300x193.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/AKQ_49_SAST-Blog_Stop_3-300x193.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/10\\\/30\\\/sap-security-five-ways-to-make-sure-youll-be-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security: five ways to make sure you\u2019ll be hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five ways to make sure you\u2019ll be hacked","description":"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security: Five Ways to Make Sure You\u2019ll Be Hacked","og_description":"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/","og_site_name":"SAST BLOG","article_published_time":"2019-10-30T07:52:18+00:00","article_modified_time":"2021-05-10T11:39:11+00:00","og_image":[{"width":300,"height":193,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"SAP Security: Five Ways to Make Sure You\u2019ll Be Hacked","twitter_description":"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP Security: five ways to make sure you\u2019ll be hacked","datePublished":"2019-10-30T07:52:18+00:00","dateModified":"2021-05-10T11:39:11+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/"},"wordCount":1074,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3-300x193.png","keywords":["Cyber Attack","GRC","Real-time monitoring","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/","name":"Five ways to make sure you\u2019ll be hacked","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3-300x193.png","datePublished":"2019-10-30T07:52:18+00:00","dateModified":"2021-05-10T11:39:11+00:00","description":"Hacker attacks threaten SAP security, data misuse, damage running into millions - all alarmist nonsense! Or is it not? A guide of the less serious sort.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3-300x193.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/10\/AKQ_49_SAST-Blog_Stop_3-300x193.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/10\/30\/sap-security-five-ways-to-make-sure-youll-be-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP Security: five ways to make sure you\u2019ll be hacked"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=918"}],"version-history":[{"count":5,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/918\/revisions"}],"predecessor-version":[{"id":1246,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/918\/revisions\/1246"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}