{"id":245,"date":"2016-10-26T17:00:36","date_gmt":"2016-10-26T15:00:36","guid":{"rendered":"http:\/\/akquinet-security.blog\/?p=245"},"modified":"2021-05-10T11:09:22","modified_gmt":"2021-05-10T09:09:22","slug":"verhindern-sie-sap-reports-zuverlaessig","status":"publish","type":"post","link":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/","title":{"rendered":"So verhindern Sie die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig."},"content":{"rendered":"<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-251\" title=\"SAST BLOG: SAP-Reports\" src=\"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg\" alt=\"SAST BLOG: SAP-Reports\" width=\"300\" height=\"215\" srcset=\"https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg 640w, https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg-300x214.jpg 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/h2>\n<p><span style=\"color: #626161;\">Wussten Sie, dass der Entzug einer SA38-Transaktion die M\u00f6glichkeit zum Ausf\u00fchren von SAP-Reports nicht zuverl\u00e4ssig verhindert? <\/span><\/p>\n<p><span style=\"color: #626161;\">Lesen Sie in unserem Praxis-Tipp, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen.<\/span><\/p>\n<p><span style=\"color: #626161;\"><!--more--><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"color: #626161;\">Nutzungsbeschr\u00e4nkungen von SAP-Reports <\/span><\/h2>\n<p class=\"picture-text\"><span style=\"color: #626161;\">F\u00fcr die Nutzungsbeschr\u00e4nkung von SAP-Reports ist es g\u00e4ngige Praxis, die Berechtigung f\u00fcr die Transaktion &#8222;SA38&#8220; zu entziehen. Generell korrekt, doch das f\u00fchrt Sie nicht vollst\u00e4ndig zum Ziel. <\/span><span style=\"color: #626161;\">Denn es gibt mehrere Wege zum Start von ABAP-Programmen im SAP-System!<\/span><\/p>\n<p class=\"picture-text\"><span style=\"color: #626161;\"><strong>1. Endanwender-Reporting mit SA38 und Varianten der SA38.<br \/>\n<\/strong>In dieser Kombination pr\u00fcft SAP die Berechtigung auf S_TCODE SA38 und ggf. S_REPORT, falls das zu startende Programm \u00fcber eine Berechtigungsgruppe verf\u00fcgt. In neueren Systemen wird zus\u00e4tzlich das Objekt S_REPORT gepr\u00fcft.<\/span><\/p>\n<p class=\"picture-text\"><span style=\"color: #626161;\"><strong>2. Entwickler-Tools SE80, SE84, SE38 und ca. 50 weitere verschiedene Transaktionen<br \/>\n<\/strong> In unserem Security Monitoring Center wird immer wieder festgestellt, dass Benutzer alternative Transaktionen wie SE38, SE80, SE84 etc. verwenden, um Programme als Report zu starten oder schlimmer noch, SE16N \u00fcber Tricks aufgerufen bekommen. Bei dieser Konstellation wird S_TCODE auf SE84 und Objekt S_DEVELOP ACTVT 03 gepr\u00fcft. S_PROGRAM wird nie gepr\u00fcft!<br \/>\n<\/span><span style=\"color: #626161;\">In vielen Berechtigungskonzepten wird insbesondere das Objekt S_DEVELOP ACTVT 03 (Anzeige) als unkritisch eingestuft und daher Usern bedenkenlos zugewiesen. Doch das f\u00fchrt dazu, dass in vielen Kundensystemen solche &#8222;Workarounds&#8220; f\u00fcr eine gro\u00dfe Benutzeranzahl m\u00f6glich sind.<\/span><\/p>\n<p><span style=\"color: #626161;\"><b>Unser Tipp:<br \/>\n<\/b><\/span><span style=\"color: #626161;\">Vergeben Sie Transaktionen aus dem Entwicklungsumfeld in Kombination S_DEVELOP ACTVT 03 nur an Notfall-User, damit die Nutzung von SA38 und SE16N \u00fcber Umwege verhindert wird. Legen Sie f\u00fcr jeden SA38-Report eine Transaktion an und berechtigen Sie Reports nur \u00fcber Transaktionen. Hierbei sollten Ihre kundeneigenen Programme nat\u00fcrlich noch weitere fachliche Berechtigungspr\u00fcfungen ausf\u00fchren und Sie m\u00fcssen das Coding entsprechend pr\u00fcfen und erweitern.<\/span><\/p>\n<h6><span style=\"color: #626161;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-338\" src=\"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/ralfkempf_akquinet.jpg\" alt=\"ralfkempf_akquinet\" width=\"130\" height=\"90\" srcset=\"https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2016\/12\/ralfkempf_akquinet.jpg 640w, https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2016\/12\/ralfkempf_akquinet-300x210.jpg 300w\" sizes=\"auto, (max-width: 130px) 100vw, 130px\" \/><br \/>\n<\/span><span style=\"color: #626161;\">Ralf Kempf<br \/>\nTechnischer Gesch\u00e4ftsf\u00fchrer &#8222;SAST SOLUTIONS&#8220;<\/span><\/h6>\n<p>Weitere Informationen zu unseren SAST SOLUTIONS erhalten Sie auf unserer <span style=\"color: #c13b70;\"><a style=\"color: #c13b70;\" href=\"https:\/\/sast-solutions.de\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Website<\/a><\/span>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wussten Sie, dass der Berechtigungsentzug einer SA38-Transaktion die M\u00f6glichkeit zum Ausf\u00fchren von SAP-Reports nicht zuverl\u00e4ssig verhindert?<br \/>\nLesen Sie in unserem SAST Blog, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[117,89],"class_list":["post-245","post","type-post","status-publish","format-standard","hentry","category-sap-berechtigungen-grc","tag-management-cockpit","tag-sap-berechtigungen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wie l\u00e4sst sich das Ausf\u00fchren von SAP-Reports zuverl\u00e4ssig verhindern?<\/title>\n<meta name=\"description\" content=\"Lesen Sie in unserem Praxis-Tipp, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen und die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig verhindern.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wie l\u00e4sst sich das Ausf\u00fchren von SAP-Reports zuverl\u00e4ssig verhindern?\" \/>\n<meta property=\"og:description\" content=\"Lesen Sie in unserem Praxis-Tipp, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen und die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig verhindern.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-26T15:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-10T09:09:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/person\/12cc68b63cec7f80f43ac445af9c5a78\"},\"headline\":\"So verhindern Sie die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig.\",\"datePublished\":\"2016-10-26T15:00:36+00:00\",\"dateModified\":\"2021-05-10T09:09:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/\"},\"wordCount\":327,\"publisher\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#organization\"},\"image\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg\",\"keywords\":[\"Management Cockpit\",\"SAP-Berechtigungen\"],\"articleSection\":[\"SAP Berechtigungen &amp; GRC\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/\",\"url\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/\",\"name\":\"Wie l\u00e4sst sich das Ausf\u00fchren von SAP-Reports zuverl\u00e4ssig verhindern?\",\"isPartOf\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg\",\"datePublished\":\"2016-10-26T15:00:36+00:00\",\"dateModified\":\"2021-05-10T09:09:22+00:00\",\"description\":\"Lesen Sie in unserem Praxis-Tipp, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen und die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig verhindern.\",\"breadcrumb\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage\",\"url\":\"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg\",\"contentUrl\":\"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sast-solutions.de\/blog-de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"So verhindern Sie die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#website\",\"url\":\"https:\/\/sast-solutions.de\/blog-de\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Application Security &amp; Access Governance\",\"publisher\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sast-solutions.de\/blog-de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\/\/sast-solutions.de\/blog-de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2022\/06\/cropped-Logo_SAST-PLG_2205.png\",\"contentUrl\":\"https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2022\/06\/cropped-Logo_SAST-PLG_2205.png\",\"width\":232,\"height\":232,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/person\/12cc68b63cec7f80f43ac445af9c5a78\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wie l\u00e4sst sich das Ausf\u00fchren von SAP-Reports zuverl\u00e4ssig verhindern?","description":"Lesen Sie in unserem Praxis-Tipp, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen und die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig verhindern.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/","og_locale":"de_DE","og_type":"article","og_title":"Wie l\u00e4sst sich das Ausf\u00fchren von SAP-Reports zuverl\u00e4ssig verhindern?","og_description":"Lesen Sie in unserem Praxis-Tipp, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen und die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig verhindern.","og_url":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/","og_site_name":"SAST BLOG","article_published_time":"2016-10-26T15:00:36+00:00","article_modified_time":"2021-05-10T09:09:22+00:00","og_image":[{"url":"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"securityblog","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/person\/12cc68b63cec7f80f43ac445af9c5a78"},"headline":"So verhindern Sie die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig.","datePublished":"2016-10-26T15:00:36+00:00","dateModified":"2021-05-10T09:09:22+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/"},"wordCount":327,"publisher":{"@id":"https:\/\/sast-solutions.de\/blog-de\/#organization"},"image":{"@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage"},"thumbnailUrl":"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg","keywords":["Management Cockpit","SAP-Berechtigungen"],"articleSection":["SAP Berechtigungen &amp; GRC"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/","url":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/","name":"Wie l\u00e4sst sich das Ausf\u00fchren von SAP-Reports zuverl\u00e4ssig verhindern?","isPartOf":{"@id":"https:\/\/sast-solutions.de\/blog-de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage"},"thumbnailUrl":"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg","datePublished":"2016-10-26T15:00:36+00:00","dateModified":"2021-05-10T09:09:22+00:00","description":"Lesen Sie in unserem Praxis-Tipp, wie Sie \u201eWorkarounds\u201c bestm\u00f6glich vorbeugen und die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig verhindern.","breadcrumb":{"@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#primaryimage","url":"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg","contentUrl":"https:\/\/securityblog.akquinet.de\/wp-content\/uploads\/2016\/12\/istock_45277700_large_akqw_jpg.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.de\/blog-de\/2016\/10\/26\/verhindern-sie-sap-reports-zuverlaessig\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sast-solutions.de\/blog-de\/"},{"@type":"ListItem","position":2,"name":"So verhindern Sie die Ausf\u00fchrung von SAP-Reports zuverl\u00e4ssig."}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.de\/blog-de\/#website","url":"https:\/\/sast-solutions.de\/blog-de\/","name":"SAST BLOG","description":"SAP Application Security &amp; Access Governance","publisher":{"@id":"https:\/\/sast-solutions.de\/blog-de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.de\/blog-de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/sast-solutions.de\/blog-de\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.de\/blog-de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2022\/06\/cropped-Logo_SAST-PLG_2205.png","contentUrl":"https:\/\/sast-solutions.de\/blog-de\/wp-content\/uploads\/2022\/06\/cropped-Logo_SAST-PLG_2205.png","width":232,"height":232,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.de\/blog-de\/#\/schema\/person\/12cc68b63cec7f80f43ac445af9c5a78","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":6,"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":2860,"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/posts\/245\/revisions\/2860"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.de\/blog-de\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}