{"id":6313,"date":"2025-02-12T10:00:37","date_gmt":"2025-02-12T08:00:37","guid":{"rendered":"http:\/\/inprosec.com\/how-to-be-prepared-for-a-role-design-project\/"},"modified":"2025-02-17T18:01:37","modified_gmt":"2025-02-17T16:01:37","slug":"how-to-be-prepared-for-a-role-design-project","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/","title":{"rendered":"How to be prepared for a Role Design Project in SAP"},"content":{"rendered":"<p>Many clients aim to mitigate most Segregation of Duties (SoD) risks by changing their current role model in the SAP system. However, it is crucial to understand the implications of this type of project and the key points that need to be addressed. In this article, written by <a href=\"https:\/\/www.inprosec.com\/en\/inprosec-human-capital-david-torres\/\">David Torres<\/a>, head of the SAP Business Line Department in <strong>Inprosec<\/strong> we will cover the most important aspects based on the different phases of a <a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/role-model-design\/\"><strong>Role Design Project<\/strong><\/a>.<\/p>\n\n<p>&nbsp;<\/p>\n<h2>Preparation\/Analisys<\/h2>\n<p>During this phase, the following elements must be defined: the <strong>Naming Convention<\/strong>, the <strong>Role Design Approach<\/strong>, and <strong>Role Mapping to Users<\/strong>.<\/p>\n<ul>\n<li><strong>Naming Convention<\/strong> is a key aspect that helps everyone involved in the User Provisioning process understand what access is associated with each role. It is essential to involve all stakeholders in this task. A common misconception is that the <strong>Naming Convention is solely IT\u2019s responsibility<\/strong>, which is a <strong>big mistake<\/strong>, as the <strong>User Provisioning process is not limited to the IT department<\/strong>.<\/li>\n<li><strong>Extracting and delivering the organizational values<\/strong> currently in use is also crucial. The SAP system typically stores values such as <strong>company codes, plants, purchasing organizations, sales organizations<\/strong>, etc., which might be outdated. Allowing the project team to extract this data without a prior review by experts can lead to the creation of <strong>unnecessary roles<\/strong>.<\/li>\n<li><strong>SAP users are likely to need customized transactions<\/strong>, but in many cases, these transactions have <strong>not been properly documented<\/strong>, making it difficult to incorporate them into roles. It is advisable to <strong>allocate time<\/strong> so that <strong>process experts assist the project team in defining these roles correctly<\/strong>. This activity should also be used to <strong>document any customized transactions<\/strong> that lack complete information.<\/li>\n<li><strong>Job Position-Based Roles<\/strong> are always a <strong>complex topic<\/strong> when discussing Role Design Projects. Many clients wish to address this matter but are <strong>not always prepared<\/strong> to design these roles. The following requirements must be met to do so successfully:\n<ul>\n<li>A <strong>clear definition of the job position<\/strong> must exist. It is also important that these positions have been <strong>reviewed and approved by the HR department<\/strong>.<\/li>\n<li>Each position should have, on average, <strong>more than one user<\/strong>. Creating <strong>job position-based roles<\/strong> for a <strong>single user<\/strong> does not follow <strong>best practices<\/strong> in role design.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Testing<\/h2>\n<p>It is essential to <strong>communicate to the testing team<\/strong> that this is a <strong>key activity<\/strong> in a Role Design Project. From a project perspective, it is recommended to optimize the <strong>definition of test scenarios<\/strong>.<\/p>\n<p>There are two key profiles during the testing phase:<\/p>\n<ul>\n<li><strong>Business Process Owners (BPOs):<\/strong> These individuals are responsible for ensuring that transactions function correctly. In most cases, <strong>SAP standard transactions are already documented<\/strong>, so this group should focus mainly on <strong>testing customized transactions<\/strong>.<\/li>\n<li><strong>Champion Users:<\/strong> These users have <strong>extensive knowledge<\/strong> of SAP from the user perspective. They test <strong>job position-based roles<\/strong> and the <strong>role assignments<\/strong> defined in the previous phase.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"size-full wp-image-12706 aligncenter\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/08\/Como-estar-preparado-para-un-Proyecto-de-Diseno-de-Roles-IMG1.png\" alt=\"\" width=\"251\" height=\"173\" \/><\/p>\n<h2>Communication Management<\/h2>\n<p>Since a <strong>Role Design Project<\/strong> impacts the entire organization, it is recommended to define a <strong>Communication Management Plan<\/strong>. This plan should include the following activities:<\/p>\n<ul>\n<li>Workshop activities for Naming Convention.<\/li>\n<li>Workshop activities for Role Design Definition.<\/li>\n<li>Workshop activities for Organizational Values review.<\/li>\n<li>Workshop activities for Job Position Definition.<\/li>\n<li>Project Meeting for Test Scenarios Definition.<\/li>\n<li>Project Meeting for User Acceptance Test process<\/li>\n<li>Workshop activities for the definition of Global Communication for New Role Design Deployment.<\/li>\n<li>Workshop activities for the definition of Incident Management process.<\/li>\n<\/ul>\n<p>These are the <strong>key points<\/strong>, but <strong>other activities<\/strong> may be included depending on the <strong>organizational culture<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"size-medium wp-image-12708 aligncenter\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/08\/Como-estar-preparado-para-un-Proyecto-de-Diseno-de-Roles-IMG2-300x170.png\" alt=\"\" width=\"300\" height=\"170\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/08\/Como-estar-preparado-para-un-Proyecto-de-Diseno-de-Roles-IMG2-300x170.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/08\/Como-estar-preparado-para-un-Proyecto-de-Diseno-de-Roles-IMG2.png 322w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2>Deployment<\/h2>\n<p>This is a <strong>critical phase<\/strong>, and it is important to <strong>understand that issues will arise<\/strong> in these types of projects. This is why the <strong>Incident Management Process<\/strong> was previously included as a <strong>key part of the Communication Plan<\/strong>.<\/p>\n<p>As a <strong>best practice<\/strong> in incident management, it is essential to:<\/p>\n<ol>\n<li><strong>Stay calm<\/strong> and allow the <strong>project team<\/strong> to work on <strong>resolving the issue<\/strong>.<\/li>\n<li><strong>Classify incidents correctly<\/strong>:<\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>If the problem is not critical<\/strong>, and some users are affected but can still work, the <strong>project team will analyze<\/strong> the role model to identify the issue and apply the necessary solution.<\/li>\n<li><strong>If it is a major issue<\/strong>, the <strong>Rollback Plan must be executed<\/strong>, temporarily restoring users\u2019 previous access before the new role model implementation. The <strong>project team<\/strong> will then analyze the problem and restore access once the solution is ready.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>If the <strong>testing phase was properly conducted<\/strong>, <strong>critical issues should not occur<\/strong> in these projects. The most common incidents include:<\/p>\n<ul>\n<li><strong>Missing specific values<\/strong> within authorization objects\u2192 <strong>Quick Fix<\/strong>.<\/li>\n<li><strong>Missing access to transactions called through other transactions<\/strong> (e.g., FBL1N and FB02) \u2192 <strong>Quick Fix<\/strong>.<\/li>\n<li>Transactional usage data does not account for newly implemented transactions \u2192 <strong>Complex Fix<\/strong>.<\/li>\n<\/ul>\n<p>From the <strong>client&#8217;s perspective<\/strong>, <strong>stakeholder commitment<\/strong> is <strong>crucial<\/strong> during this phase. In some cases, the person facing an <strong>SAP access issue<\/strong> may need to <strong>resolve it urgently<\/strong>, making it essential to have a <strong>prioritization system<\/strong> within the <strong>Incident Management Process<\/strong>. However, it is equally important to <strong>ensure that priorities are used correctly<\/strong>\u2014not all incidents can be marked as <strong>critical<\/strong>, as this would make it <strong>difficult for the project team<\/strong> to prioritize problem resolution effectively.<\/p>\n<p>Another important aspect during the <strong>implementation phase<\/strong> is how <strong>end users report incidents<\/strong>. In some cases, end users will attempt to solve issues following the <strong>Business as Usual (BaU) process<\/strong>. However, since the <strong>project is in implementation mode<\/strong>, the <strong>project team has designed a specific Incident Management Process<\/strong> for this phase.<\/p>\n<p>Based on our experience, it is <strong>critical to reinforce communication efforts<\/strong> regarding the <strong>new role design deployment<\/strong> and the <strong>Incident Management Process<\/strong>, as this will determine the <strong>success or failure of the project<\/strong>.<\/p>\n<p>In <strong>role design projects we have worked on<\/strong>, one of the <strong>biggest client concerns<\/strong> has been <strong>unresolved incidents<\/strong> due to <strong>poor communication with the project team<\/strong>. This happens because <strong>end users did not follow the Incident Management Process<\/strong>, and the <strong>Business as Usual (BaU) team<\/strong>, which handles <strong>daily access administration<\/strong>, lacked the <strong>knowledge to resolve these specific issues<\/strong>. This is completely understandable, as <strong>they were not involved in designing the new role model<\/strong>.<\/p>\n<p>Thus, it is <strong>important to ensure<\/strong> that the <strong>Business as Usual team<\/strong> is <strong>aware of the project execution<\/strong> and that <strong>any authorization-related incidents are redirected to the project team<\/strong> for proper resolution.<\/p>\n<h2>5 Key points to take home<\/h2>\n<ul>\n<li><strong>Stakeholder commitment <\/strong>is a critical success factor for the project.<\/li>\n<li>Communication activities<strong> should not be underfunded<\/strong>, as they are essential for the success of the Role Design Project.<\/li>\n<li>The project team <strong>is not responsible for defining organizational values in SAP<\/strong>. Validating which values are correct and which are obsolete is the client\u2019s responsibility.<\/li>\n<li>The role Naming Convention <strong>should not be solely IT\u2019s responsibility<\/strong>. Since SAP roles will be requested by end users, the Naming Convention must be understandable to them.<\/li>\n<li>Incident management <strong>is<\/strong> key to resolving issues on time. Most delays occur due to non-compliance with the Incident Management Process.<\/li>\n<\/ul>\n<h2>Inprosec, experts in Role Design Proyects<\/h2>\n<p>If you are thinking of redesigning SAP roles in your company, at <strong>Inprosec<\/strong> we are specialists in <a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/role-model-design\/\">role design projects<\/a>, helping to optimize access to systems and ensure proper segregation of duties. Our team has the experience and knowledge necessary to accompany you in every phase of the project, from planning to deployment, ensuring that everything runs efficiently and securely.<\/p>\n<p>Contact us <a href=\"https:\/\/www.inprosec.com\/en\/contact\/\">here<\/a> and let&#8217;s talk about how we can help you!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many clients aim to mitigate most Segregation of Duties (SoD) risks by changing their current role model in the SAP system. However, it is crucial to understand the implications of this type of project and the key points that need to be addressed. In this article, written by David Torres, head of the SAP Business&#8230;<\/p>\n","protected":false},"author":6,"featured_media":12801,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[54,61],"tags":[170,167],"class_list":["post-6313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","category-sap-security-en-2","tag-diseno-de-roles-en","tag-role-model-design"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to be prepared for a Role Design Project in SAP - Inprosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to be prepared for a Role Design Project in SAP\" \/>\n<meta property=\"og:description\" content=\"Many clients aim to mitigate most Segregation of Duties (SoD) risks by changing their current role model in the SAP system. However, it is crucial to understand the implications of this type of project and the key points that need to be addressed. In this article, written by David Torres, head of the SAP Business...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-12T08:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T16:01:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/02\/3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"How to be prepared for a Role Design Project in SAP\",\"datePublished\":\"2025-02-12T08:00:37+00:00\",\"dateModified\":\"2025-02-17T16:01:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/\"},\"wordCount\":1228,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/3.jpg\",\"keywords\":[\"Dise\u00f1o de Roles\",\"Role Model Design\"],\"articleSection\":[\"Cybersecurity\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/\",\"name\":\"How to be prepared for a Role Design Project in SAP - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/3.jpg\",\"datePublished\":\"2025-02-12T08:00:37+00:00\",\"dateModified\":\"2025-02-17T16:01:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/3.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-be-prepared-for-a-role-design-project\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to be prepared for a Role Design Project in SAP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to be prepared for a Role Design Project in SAP - Inprosec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/","og_locale":"en_US","og_type":"article","og_title":"How to be prepared for a Role Design Project in SAP","og_description":"Many clients aim to mitigate most Segregation of Duties (SoD) risks by changing their current role model in the SAP system. However, it is crucial to understand the implications of this type of project and the key points that need to be addressed. In this article, written by David Torres, head of the SAP Business...","og_url":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/","og_site_name":"Inprosec","article_published_time":"2025-02-12T08:00:37+00:00","article_modified_time":"2025-02-17T16:01:37+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/02\/3.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"How to be prepared for a Role Design Project in SAP","datePublished":"2025-02-12T08:00:37+00:00","dateModified":"2025-02-17T16:01:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/"},"wordCount":1228,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/02\/3.jpg","keywords":["Dise\u00f1o de Roles","Role Model Design"],"articleSection":["Cybersecurity","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/","url":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/","name":"How to be prepared for a Role Design Project in SAP - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/02\/3.jpg","datePublished":"2025-02-12T08:00:37+00:00","dateModified":"2025-02-17T16:01:37+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/02\/3.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/02\/3.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/how-to-be-prepared-for-a-role-design-project\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to be prepared for a Role Design Project in SAP"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=6313"}],"version-history":[{"count":6,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6313\/revisions"}],"predecessor-version":[{"id":12745,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6313\/revisions\/12745"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/12801"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=6313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=6313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=6313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}