{"id":961,"date":"2019-12-03T15:48:18","date_gmt":"2019-12-03T14:48:18","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=961"},"modified":"2021-04-22T13:52:36","modified_gmt":"2021-04-22T11:52:36","slug":"rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/","title":{"rendered":"Rethinking real-time monitoring for IT security with the Internet of Things"},"content":{"rendered":"<p>The Internet of Things (IoT) is both a blessing and a curse: While it offers tremendous potential benefits, it also fosters uncertainty when it comes to protecting these complex connections against unauthorized access. After all, as more things get connected to the Internet, the risk of hacker attacks also increases.<\/p>\n<p><!--more--><\/p>\n<h2><strong>Considering IT security for all components: software and hardware<\/strong><\/h2>\n<p>Attacks from recent years have taught us that merely protecting software components against viruses and malware isn\u2019t enough: the hardware also has to be considered.<\/p>\n<p>One example that we often see is that companies neglect to protect their server rooms against risks. The solution is both obvious and simple: The physical security of the hardware components must be ensured through real-time monitoring.<\/p>\n<p>But before we get into the nitty-gritty of our project, we&#8217;d like to examine the term &#8220;Internet of Things&#8221; (IoT) in more detail, to explain our objectives in this integration project.<\/p>\n<h2><strong>How the Internet of Things is changing IT security<\/strong><\/h2>\n<p>The Internet of Things describes the increasing connectivity of devices and sensors, both with each other and externally, through an Internet connection. They respond exactly like the Internet in that they create open, spontaneous links, exchange data without restrictions, and support unforeseen applications.<\/p>\n<p>This principle is already working in many areas of life \u2013 for example, as smart home applications and in manufacturing and industrial uses. But it can also be applied to security, for example, to monitor both materials and rooms. This is achieved by installing sensors in materials, or on the doors and windows inside the rooms to be monitored.<\/p>\n<h2><strong>New possibilities for monitoring SAP systems<\/strong><\/h2>\n<p>IoT integration in our SAST Security Radar (SSR) module achieves real-time monitoring of the hardware components (server room).<\/p>\n<p>An alarm is sent to the SAP system with SSR integration in two cases:<\/p>\n<ol>\n<li><strong>Door is open: <\/strong>After the door is opened, a row is added to the event monitor, with the date and time when the door was opened.<\/li>\n<li><strong>The Raspberry Pi stops transmitting:<\/strong> If a connection problem arises between the Raspberry Pi and the SAP system with SSR integration, no signal is sent. This can occur when the Raspberry Pi is damaged, for example, or if the Internet cable to the Raspberry Pi is cut. Here, too, an alert is sent to the SSR in this case and displayed on the event monitor.<\/li>\n<\/ol>\n<p>Are you curious to find out what else IoT can do? Would you like to learn more about intelligent connectivity and the real-time monitoring of SAP systems? If so, don&#8217;t hesitate to contact us: <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a> You can also check out the <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\">SAST SOLUTIONS website<\/a> for more information on our portfolio.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-959\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png\" alt=\"Hamza EL Khalfi (SAST SOLUTIONS)\" width=\"143\" height=\"222\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png 193w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt.png 450w\" sizes=\"auto, (max-width: 143px) 100vw, 143px\" \/><br \/>\n<strong>Hamza EL Khalfi, Working Student in SAST SOLUTIONS Development<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More articles for your SAP security and compliance:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/11\/21\/important-elements-of-a-cybersecurity-strategy\/\">The Most Important Elements of a Cybersecurity Strategy<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/10\/01\/eliminate-vulnerabilities-in-sap-systems-thanks-to-security-audit-and-rfc-interface-analysis\/\">Detect and Eliminate Vulnerabilities in SAP Systems \u2013 Thanks to Security Audit and RFC Interface Analysis<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) is both a blessing and a curse: While it offers tremendous potential benefits, it also fosters uncertainty when it comes to protecting these complex connections against unauthorized access. After all, as more things get connected to the Internet, the risk of hacker attacks also increases.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,58,80,114],"class_list":["post-961","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoT - Internet of Things new possibilities for IT security monitoring<\/title>\n<meta name=\"description\" content=\"The Internet of Things is also changing IT security and offers new possibilities for monitoring SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT - Internet of Things new possibilities for IT security monitoring\" \/>\n<meta property=\"og:description\" content=\"The Internet of Things is also changing IT security and offers new possibilities for monitoring SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-03T14:48:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-22T11:52:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Rethinking real-time monitoring for IT security with the Internet of Things\",\"datePublished\":\"2019-12-03T14:48:18+00:00\",\"dateModified\":\"2021-04-22T11:52:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hamza-EL-Khalfi_Ausschnitt-193x300.png\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/\",\"name\":\"IoT - Internet of Things new possibilities for IT security monitoring\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hamza-EL-Khalfi_Ausschnitt-193x300.png\",\"datePublished\":\"2019-12-03T14:48:18+00:00\",\"dateModified\":\"2021-04-22T11:52:36+00:00\",\"description\":\"The Internet of Things is also changing IT security and offers new possibilities for monitoring SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hamza-EL-Khalfi_Ausschnitt-193x300.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hamza-EL-Khalfi_Ausschnitt-193x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/12\\\/03\\\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rethinking real-time monitoring for IT security with the Internet of Things\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT - Internet of Things new possibilities for IT security monitoring","description":"The Internet of Things is also changing IT security and offers new possibilities for monitoring SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/","og_locale":"en_US","og_type":"article","og_title":"IoT - Internet of Things new possibilities for IT security monitoring","og_description":"The Internet of Things is also changing IT security and offers new possibilities for monitoring SAP systems.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/","og_site_name":"SAST BLOG","article_published_time":"2019-12-03T14:48:18+00:00","article_modified_time":"2021-04-22T11:52:36+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Rethinking real-time monitoring for IT security with the Internet of Things","datePublished":"2019-12-03T14:48:18+00:00","dateModified":"2021-04-22T11:52:36+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/"},"wordCount":498,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/","name":"IoT - Internet of Things new possibilities for IT security monitoring","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png","datePublished":"2019-12-03T14:48:18+00:00","dateModified":"2021-04-22T11:52:36+00:00","description":"The Internet of Things is also changing IT security and offers new possibilities for monitoring SAP systems.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/12\/Hamza-EL-Khalfi_Ausschnitt-193x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Rethinking real-time monitoring for IT security with the Internet of Things"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=961"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/961\/revisions"}],"predecessor-version":[{"id":1322,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/961\/revisions\/1322"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}