{"id":6363,"date":"2024-06-25T09:27:32","date_gmt":"2024-06-25T07:27:32","guid":{"rendered":"http:\/\/inprosec.com\/security-tools-in-solution-manager-system\/"},"modified":"2024-06-25T13:23:44","modified_gmt":"2024-06-25T11:23:44","slug":"security-tools-in-solution-manager-system","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/","title":{"rendered":"Enhancing Security with Solution Manager System&#8217;s Toolset"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">SAP Solution Manager\u00ae(Solman) is a central system to manage and control the rest of SAP\u00ae systems of the company, like the main configuration, transports (ChaRM), and also security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In Solman system, there are some many tools to check the security, however, the most important ones are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System Recommendations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Configuration Validation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Early Watch<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Self-Optimization Service<\/span><\/li>\n<\/ul>\n<h2><b>System Recommendations<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Tt is good to know first the context of it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second Tuesday of every month, SAP\u00ae publishes a list of new Notes (SAP\u00ae Security Path Day) with their priority and CVSS (Common Vulnerability Scoring System), and it is possible to open SAP\u00ae Portal from this page and see all the notes available to the different systems of the organization. However, to check the status of all these notes, it is necessary to access to the different environments of the systems to see it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">System recommendations, as it is a central system, can check the status of all notes in all systems of the organization without access to the systems. This tool has available different options like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One view with all systems and the notes which affect them: Security Notes, Hot News (security notes with Very High Priority), Performance Notes, Legal Change Notes or License Audit Notes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filter the notes with different options, like system, type of note, Processing Status, priority, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prerequisites of the notes, to check if have to be done some actions before to implement it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00a0Impact analysis of the notes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Transport notes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Objects affected if the note is implemented.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">And some more\u2026<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In the list of notes, it is possible also to change the processing status, or create a new status, by the user so it is easier to have a good maintenance of notes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To sums up, System Recommendations it is a very useful tool to manage the notes and check the status in order to implement or not, and everything in a simple view.<\/span><\/p>\n<h2><b>Configuration Validation<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This tool allows to compare the configuration and the parameters of Security of the different systems of an Organization to a Best practice system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This Best practice system is called Golden Client or Target system and can be configured as the organization wants. For example, the parameter of the length of the password, can be configured in the target system with 10 characters, and the tool will compare this parameter in all systems that organization wants and indicate if it is less, high or equal. The same with all parameters and security configuration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To do easier the configuration of the golden client, the parameters and security configuration are included in small stores, so it is possible only to compare one or some stores, not all of them. Of course, it is possible to create different golden clients with different stores on it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reports which give this information can be run when the user wants or periodically.<\/span><\/p>\n<h2><b>Early Watch<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This report gives the information of the Security parameters and configuration of the systems of an organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As it is a quite similar to Configuration Validation, Early Watch it is not necessary to configure a Golden Client, because it is a report which sends the status and values of the configuration and Security parameters, but also on performance and stability of the systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This report also gives explanations of several points and in some cases also recommendations, as for example the length of the password. In the Note \u201c2425024 \u2013 Early Watch Alert: Sample Reports\u201d there are examples of the report of the Early Watch for different systems.<\/span><\/p>\n<h2><b>Security Optimizations Service<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This security report it is related with the authorizations of the users, security parameters and security reviews.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This tool allows to configure a Rule Set and run an analysis to know which user have the same authorizations as there are in the Rule Set. It is a very useful tool to configure, for example, the Critical actions of IT, and check which users have it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, it is not a similar Risk Analysis as the one of GRC tool, but it is an easy way to check in a central system the users who have critical authorizations in all the system of the organization.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>To sum up\u00b8<\/b><span style=\"font-weight: 400;\"> Solution Manager it is a central system with lot of functionalities and tools which can help to ensure the Security and configuration of the systems of the organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main security tools allow to check and review the status of the notes, all the security parameters, to have reports of the configuration or run risk analysis.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-11720\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/Solution-Manager-System-2.png\" alt=\"\" width=\"800\" height=\"443\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/Solution-Manager-System-2.png 834w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/Solution-Manager-System-2-300x166.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/Solution-Manager-System-2-600x332.png 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP Solution Manager\u00ae(Solman) is a central system to manage and control the rest of SAP\u00ae systems of the company, like the main configuration, transports (ChaRM), and also security. In Solman system, there are some many tools to check the security, however, the most important ones are: System Recommendations Configuration Validation Early Watch Self-Optimization Service System&#8230;<\/p>\n","protected":false},"author":6,"featured_media":11718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[60,52],"tags":[151],"class_list":["post-6363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-grc-en","category-technical-article","tag-sap-grc-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Enhancing Security with Solution Manager System&#039;s Toolset - Inprosec<\/title>\n<meta name=\"description\" content=\"Optimize the security of your SAP\u00ae systems with SAP Solution Manager\u00ae (Solman). Discover key tools like System Recommendations, Configuration Validation, Early Watch, and Security Optimizations Service to manage configurations, review notes, and conduct risk analyses, all from a central system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing Security with Solution Manager System&#039;s Toolset\" \/>\n<meta property=\"og:description\" content=\"Optimize the security of your SAP\u00ae systems with SAP Solution Manager\u00ae (Solman). Discover key tools like System Recommendations, Configuration Validation, Early Watch, and Security Optimizations Service to manage configurations, review notes, and conduct risk analyses, all from a central system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-25T07:27:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-25T11:23:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/herramientas-de-seguridad-en-Solution-Manager-System.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"Enhancing Security with Solution Manager System&#8217;s Toolset\",\"datePublished\":\"2024-06-25T07:27:32+00:00\",\"dateModified\":\"2024-06-25T11:23:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/\"},\"wordCount\":758,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/herramientas-de-seguridad-en-Solution-Manager-System.jpg\",\"keywords\":[\"SAP GRC\"],\"articleSection\":[\"SAP GRC\",\"Technical Article\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/\",\"name\":\"Enhancing Security with Solution Manager System's Toolset - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/herramientas-de-seguridad-en-Solution-Manager-System.jpg\",\"datePublished\":\"2024-06-25T07:27:32+00:00\",\"dateModified\":\"2024-06-25T11:23:44+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"Optimize the security of your SAP\u00ae systems with SAP Solution Manager\u00ae (Solman). Discover key tools like System Recommendations, Configuration Validation, Early Watch, and Security Optimizations Service to manage configurations, review notes, and conduct risk analyses, all from a central system.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/herramientas-de-seguridad-en-Solution-Manager-System.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/herramientas-de-seguridad-en-Solution-Manager-System.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/security-tools-in-solution-manager-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing Security with Solution Manager System&#8217;s Toolset\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enhancing Security with Solution Manager System's Toolset - Inprosec","description":"Optimize the security of your SAP\u00ae systems with SAP Solution Manager\u00ae (Solman). Discover key tools like System Recommendations, Configuration Validation, Early Watch, and Security Optimizations Service to manage configurations, review notes, and conduct risk analyses, all from a central system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing Security with Solution Manager System's Toolset","og_description":"Optimize the security of your SAP\u00ae systems with SAP Solution Manager\u00ae (Solman). Discover key tools like System Recommendations, Configuration Validation, Early Watch, and Security Optimizations Service to manage configurations, review notes, and conduct risk analyses, all from a central system.","og_url":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/","og_site_name":"Inprosec","article_published_time":"2024-06-25T07:27:32+00:00","article_modified_time":"2024-06-25T11:23:44+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/herramientas-de-seguridad-en-Solution-Manager-System.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"Enhancing Security with Solution Manager System&#8217;s Toolset","datePublished":"2024-06-25T07:27:32+00:00","dateModified":"2024-06-25T11:23:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/"},"wordCount":758,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/herramientas-de-seguridad-en-Solution-Manager-System.jpg","keywords":["SAP GRC"],"articleSection":["SAP GRC","Technical Article"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/","url":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/","name":"Enhancing Security with Solution Manager System's Toolset - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/herramientas-de-seguridad-en-Solution-Manager-System.jpg","datePublished":"2024-06-25T07:27:32+00:00","dateModified":"2024-06-25T11:23:44+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"Optimize the security of your SAP\u00ae systems with SAP Solution Manager\u00ae (Solman). Discover key tools like System Recommendations, Configuration Validation, Early Watch, and Security Optimizations Service to manage configurations, review notes, and conduct risk analyses, all from a central system.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/herramientas-de-seguridad-en-Solution-Manager-System.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/herramientas-de-seguridad-en-Solution-Manager-System.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/security-tools-in-solution-manager-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Enhancing Security with Solution Manager System&#8217;s Toolset"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=6363"}],"version-history":[{"count":5,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6363\/revisions"}],"predecessor-version":[{"id":11726,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6363\/revisions\/11726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/11718"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=6363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=6363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=6363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}