{"id":13677,"date":"2025-11-03T12:03:32","date_gmt":"2025-11-03T10:03:32","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13677"},"modified":"2025-11-03T12:03:32","modified_gmt":"2025-11-03T10:03:32","slug":"sap-security-dashboards","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/","title":{"rendered":"SAP Security Dashboards"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">This article introduces a new product that Inprosec will make available to its clients: Power BI reports that display the security status of connected SAP systems.<\/span><\/p>\n\n<h2><b>Introduction<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In business environments where SAP systems play a critical role, ensuring their security and stability is essential. These systems manage core business processes, so having clear and real-time visibility of their status is a key factor to minimize risks, ensure operational continuity, and optimize response times in unforeseen situations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To address this challenge, an integration between SAP HANA and Power BI has been implemented, allowing the creation of interactive reports that show key information about the current status of SAP systems. This provides a consolidated and dynamic view of various key indicators, such as user access, role assignments, and system risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This tool combines the real-time processing and storage power of SAP HANA with Power BI\u2019s visual and data transformation capabilities. As a result, large volumes of complex data can be analyzed and displayed quickly, facilitating decision-making.<\/span><\/p>\n<h2><b>Implementation<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To develop these reports, it is necessary to create a connection between Power BI and an SAP HANA database, which acts as a bridge between both systems, ensuring that the most up-to-date SAP information is always available for analysis and visualization in Power BI. This connection is implemented through an ODBC driver, using a DSN configured for this purpose.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is important to mention that this ODBC connection is only feasible for systems using an SAP HANA database, since the ODBC driver is not compatible with other SAP database engines.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, to ensure secure and controlled data access, a dedicated user is created in SAP HANA with restricted access only to the strictly necessary information. This prevents exposure of the entire database and ensures that Power BI only accesses data relevant to the analysis.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This approach not only establishes an extra security layer but also controls information access by centralizing all queries through a single user. With this configuration, Power BI can connect directly to authorized real-time data, ensuring that the reports display an up-to-date view of the SAP systems.<\/span><\/p>\n<h2><b>Types of Reports<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The developed reports have been designed to differentiate between systems integrated with SAP GRC and those without it. This separation ensures that the reports adapt to each environment\u2019s reality, efficiently leveraging the available information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, these reports show basic information related to security topics; however, the architecture is designed to allow access and visualization of any data stored in the database tables, enabling the analysis to be expanded according to specific business needs.<\/span><\/p>\n<h2><b>Reports for Systems with GRC<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In SAP environments integrated with the Governance, Risk and Compliance (GRC) module, information is centralized, providing a consolidated view of all connected systems. This centralization facilitates the creation of unified reports that analyze multiple systems without having to query each one individually.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on this shared foundation, three types of reports have been developed:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Users and Access<\/b><span style=\"font-weight: 400;\">: Displays, for each system, the number of users and roles, as well as their current status, along with averages of roles per user, transactions per user, and transactions per role.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Transactional Usage<\/b><span style=\"font-weight: 400;\">: Shows how users interact with the different transactions available in the systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk Analysis<\/b><span style=\"font-weight: 400;\">: Displays data about existing risks within the systems. It indicates the number of risks per system, their levels, and the associated business processes, as well as the number and types of conflicts identified in each system.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Below is a visual example of the risk analysis report template for GRC-integrated systems.<\/span><\/p>\n<h2><b>Reports for Systems without GRC<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">For SAP environments without the GRC module, information must be obtained directly from each system since there is no centralized source consolidating the data. Therefore, in this case, an individual report must be generated for each system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Three types of reports have been developed for these systems, two of which are common to those implemented for GRC systems. Therefore, only the last one will be described below:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Users and Access<\/b><\/li>\n<li aria-level=\"1\"><b>Transactional Usage<\/b><\/li>\n<li aria-level=\"1\"><b>Critical Events from the Security Audit Log<\/b><span style=\"font-weight: 400;\">: This report shows the changes made in the different clients of the system, as well as in each of their components.<\/span><\/li>\n<\/ul>\n<h2><b>Benefits for the Organization<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This Power BI dynamic reporting solution provides multiple benefits to organizations seeking to enhance visibility, control, and efficiency in managing SAP system security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main advantages offered by this tool are detailed below:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Centralized and Real-Time System Overview: <\/b><span style=\"font-weight: 400;\">Provides a consolidated and up-to-date view of all available SAP systems from a single tool.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Optimized Decision-Making<\/b><span style=\"font-weight: 400;\">: The availability of key system information presented clearly and intuitively allows quick identification of potential threats, deviations, or risks, facilitating the prioritization of corrective measures and a more efficient response.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regulatory Compliance: <\/b><span style=\"font-weight: 400;\">Ongoing analysis of access, events, and risks<\/span><b> <\/b><span style=\"font-weight: 400;\">helps align SAP systems with internal security policies and regulatory frameworks, simplifying audit and monitoring tasks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Flexibility and Scalability: <\/b><span style=\"font-weight: 400;\">This solution adapts to both centralized (with GRC) and distributed (without GRC) SAP environments and allows new systems or indicators to be added easily as the organization evolves.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Improved Access Control: <\/b><span style=\"font-weight: 400;\">Comprehensive analysis of users, roles, and transactions enables detection of excessive privileges, incorrect assignments, or unexpected situations, facilitating the implementation of more effective controls.<\/span><\/li>\n<\/ul>\n<h2><b>Future Enhancements<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Below are some planned measures and improvements to further enhance this tool, aiming to provide organizations with increasingly comprehensive and efficient solutions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Automated Alerts<\/b><span style=\"font-weight: 400;\">: A potential future improvement would be the implementation of automatic notifications upon detecting critical events within the systems. This would immediately inform security or administration teams when unauthorized access, sensitive role assignments, or suspicious changes occur, enabling faster and more effective responses.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Through the integration of Power BI and SAP HANA, an effective and scalable solution has been developed for analyzing security within SAP environments. By using this tool, organizations can gain a clear, unified, and up-to-date view of their systems\u2019 status, facilitating early threat detection and compliance with security regulations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This solution consolidates dispersed information from multiple SAP systems, improving monitoring efficiency. Moreover, by adapting to both SAP GRC and non-GRC environments, it ensures applicability across various corporate scenarios.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article introduces a new product that Inprosec will make available to its clients: Power BI reports that display the security status of connected SAP systems. Introduction In business environments where SAP systems play a critical role, ensuring their security and stability is essential. These systems manage core business processes, so having clear and real-time&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-13677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-security-en-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Dashboards - Inprosec<\/title>\n<meta name=\"description\" content=\"Power BI reports integrated with SAP HANA to analyze, visualize, and enhance SAP system security and compliance in real time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Dashboards\" \/>\n<meta property=\"og:description\" content=\"Power BI reports integrated with SAP HANA to analyze, visualize, and enhance SAP system security and compliance in real time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-03T10:03:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Dashboards\",\"datePublished\":\"2025-11-03T10:03:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/\"},\"wordCount\":1010,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/3.jpg\",\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/\",\"name\":\"SAP Security Dashboards - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/3.jpg\",\"datePublished\":\"2025-11-03T10:03:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"Power BI reports integrated with SAP HANA to analyze, visualize, and enhance SAP system security and compliance in real time.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/3.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-dashboards\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Dashboards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Dashboards - Inprosec","description":"Power BI reports integrated with SAP HANA to analyze, visualize, and enhance SAP system security and compliance in real time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Dashboards","og_description":"Power BI reports integrated with SAP HANA to analyze, visualize, and enhance SAP system security and compliance in real time.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/","og_site_name":"Inprosec","article_published_time":"2025-11-03T10:03:32+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/3.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Dashboards","datePublished":"2025-11-03T10:03:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/"},"wordCount":1010,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/3.jpg","articleSection":["SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/","name":"SAP Security Dashboards - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/3.jpg","datePublished":"2025-11-03T10:03:32+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"Power BI reports integrated with SAP HANA to analyze, visualize, and enhance SAP system security and compliance in real time.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/3.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/10\/3.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-dashboards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Dashboards"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13677"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13677\/revisions"}],"predecessor-version":[{"id":13685,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13677\/revisions\/13685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13682"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}