{"id":8766,"date":"2023-04-05T11:58:07","date_gmt":"2023-04-05T09:58:07","guid":{"rendered":"http:\/\/inprosec.com\/?p=8766"},"modified":"2024-01-10T12:37:09","modified_gmt":"2024-01-10T10:37:09","slug":"webinar-security-controls-in-sap-systems","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/","title":{"rendered":"Webinar \u2013 Security Controls in SAP Systems"},"content":{"rendered":"<p>On March 29th from Inprosec we conducted a webinar on &#8220;Security controls in SAP systems&#8221; taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public.<\/p>\n<p>This webinar was aimed at users with notions of SAP looking to expand their knowledge and they were able to intervene at the end of the session.<\/p>\n<p>Below, we leave you with the contents that were taught in the webinar:<\/p>\n<p>Due to <strong>increased computerization and digitization of business processes<\/strong>, security in their systems is becoming <strong>increasingly important<\/strong> for organizations to prevent possible incidents affecting production, information or management of these, and has begun to prioritize the security of their systems to a greater extent.<\/p>\n<p>All organizations should have a <strong>minimum set of controls<\/strong> in place<strong> to ensure information security in its three key aspects<\/strong>: confidentiality, availability and integrity.<\/p>\n<h2>SAP&#8217;s first steps towards greater security<\/h2>\n<p>Around <strong>2015-2020<\/strong> is the <strong>turning point<\/strong> where different <strong>organizations begin to perceive the security of their systems as a priority.<\/strong><\/p>\n<p>Therefore, in 2019, <strong>SAP implements<\/strong> a series of technical <strong>configurations at the security level<\/strong> that will begin to be applied by default in all new SAP systems that are implemented from that moment on, and that will considerably increase the minimum security standards applied to the systems.<\/p>\n<p>All <strong>these configurations had already been available<\/strong> for years in SAP systems, but<strong> each customer had to configure them manually to these higher security levels.<\/strong><\/p>\n<h3>SAP Security Baseline<\/h3>\n<p>After this first measure taken by SAP, some time later SAP decided to publish what was to be called the <strong>SAP Security Baseline.<\/strong><\/p>\n<p>This document is basically a series of security controls that SAP defines as minimum to monitor and ensure the security of their systems, and are detailed in the following note published by SAP: <a href=\"https:\/\/launchpad.support.sap.com\/\">2253549<\/a>.<\/p>\n<p>These recommendations can be downloaded and implemented for monitoring in some of the system monitoring tools offered by SAP.<\/p>\n<p>This is where we at <strong>Inprosec<\/strong> try to support our customers, offering a security configuration that, although based on the Security Baseline, offers other benefits for security control:<\/p>\n<ul>\n<li>Detailed descriptions of all controls<\/li>\n<li>Classification of controls by groups<\/li>\n<li>Detail of the potential impact of implementing that control on the system<\/li>\n<li>More than 70 major controls that can be configured with Security Baseline<\/li>\n<\/ul>\n<h2>Security Controls<\/h2>\n<h3>ABAP<\/h3>\n<p>The first group for which SAP has designed security controls would be <strong>ABAP-type systems.<\/strong><\/p>\n<p>In these systems, we can divide the different controls into <strong>5 main groups<\/strong>:<\/p>\n<ul>\n<li>ABAP Security<\/li>\n<li>Software<\/li>\n<li>Instance parameters<\/li>\n<li>Component maintenance<\/li>\n<li>System changes<\/li>\n<\/ul>\n<h3>JAVA<\/h3>\n<p>The second group to be reviewed will be<strong> JAVA type systems.<\/strong><\/p>\n<p>In these systems, we can divide the different controls into <strong>3 main groups<\/strong>:<\/p>\n<ul>\n<li>Software<\/li>\n<li>System parameters<\/li>\n<li>Connected services<\/li>\n<\/ul>\n<h3>HANA Database<\/h3>\n<p>The third group to be reviewed will be the <strong>HANA Database type systems<\/strong>, where the most relevant groups would be:<\/p>\n<ul>\n<li>User management<\/li>\n<li>Auditing and traceability<\/li>\n<li>Security protocols<\/li>\n<li>Software<\/li>\n<\/ul>\n<h3>Business Technology Platform (BTP)<\/h3>\n<p>The last group to be reviewed will be <strong>SAP BTP type systems.<\/strong><\/p>\n<p>The main difference in relation to this type of system is that the <strong>configuration and management of the security control tool is performed by SAP itself.<\/strong><\/p>\n<p>All the steps that would have to be taken to request this report would be detailed in the following blog published by SAP:<a href=\"https:\/\/blogs.sap.com\/2022\/05\/05\/new-security-optimization-service-continuous-quality-check-for-business-technology-platform-cqc-sos-for-btp\/\"> New Security Optimization Service Continuous Quality Check for SAP Business Technology Platform (CQC SOS for BTP)<\/a><\/p>\n<h2>Solution Manager &#8211; Configuration Validation<\/h2>\n<p><strong>Configuration Validation<\/strong> is an SAP Solution Manager tool that allows you to check whether SAP systems are configured consistently and securely with the requirements defined by the company.<\/p>\n<p>To review these controls, <strong>a virtual reference system containing the parameters reviewed by the SAP Security Baseline and the appropriate modifications could be established as a Target System<\/strong>.<\/p>\n<p>There is the option of <strong>analyzing the reports in real time<\/strong> through the reporting application offered by the tool.<\/p>\n<p>Another option would be to<strong> schedule the reports to be run periodically and sent by email to the interested parties.<\/strong><\/p>\n<p>Finally, a relevant advantage to use this tool would be that<strong> the report sent by email could be used to feed a dashboard of the security of SAP systems in PowerBI.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 29th from Inprosec we conducted a webinar on &#8220;Security controls in SAP systems&#8221; taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public. This&#8230;<\/p>\n","protected":false},"author":6,"featured_media":8764,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-8766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-webinar-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Webinar \u2013 Security Controls in SAP Systems - Inprosec<\/title>\n<meta name=\"description\" content=\"On March 29th from Inprosec we conducted a webinar on &quot;Security controls in SAP systems&quot; taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar \u2013 Security Controls in SAP Systems\" \/>\n<meta property=\"og:description\" content=\"On March 29th from Inprosec we conducted a webinar on &quot;Security controls in SAP systems&quot; taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-05T09:58:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-10T10:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/04\/Webinar-controles-seguridad-sistemas-sap.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"Webinar \u2013 Security Controls in SAP Systems\",\"datePublished\":\"2023-04-05T09:58:07+00:00\",\"dateModified\":\"2024-01-10T10:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/\"},\"wordCount\":713,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Webinar-controles-seguridad-sistemas-sap.jpg\",\"articleSection\":[\"Webinar\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/\",\"name\":\"Webinar \u2013 Security Controls in SAP Systems - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Webinar-controles-seguridad-sistemas-sap.jpg\",\"datePublished\":\"2023-04-05T09:58:07+00:00\",\"dateModified\":\"2024-01-10T10:37:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"On March 29th from Inprosec we conducted a webinar on \\\"Security controls in SAP systems\\\" taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Webinar-controles-seguridad-sistemas-sap.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Webinar-controles-seguridad-sistemas-sap.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-security-controls-in-sap-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar \u2013 Security Controls in SAP Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Webinar \u2013 Security Controls in SAP Systems - Inprosec","description":"On March 29th from Inprosec we conducted a webinar on \"Security controls in SAP systems\" taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/","og_locale":"en_US","og_type":"article","og_title":"Webinar \u2013 Security Controls in SAP Systems","og_description":"On March 29th from Inprosec we conducted a webinar on \"Security controls in SAP systems\" taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public.","og_url":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/","og_site_name":"Inprosec","article_published_time":"2023-04-05T09:58:07+00:00","article_modified_time":"2024-01-10T10:37:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/04\/Webinar-controles-seguridad-sistemas-sap.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"Webinar \u2013 Security Controls in SAP Systems","datePublished":"2023-04-05T09:58:07+00:00","dateModified":"2024-01-10T10:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/"},"wordCount":713,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/04\/Webinar-controles-seguridad-sistemas-sap.jpg","articleSection":["Webinar"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/","url":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/","name":"Webinar \u2013 Security Controls in SAP Systems - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/04\/Webinar-controles-seguridad-sistemas-sap.jpg","datePublished":"2023-04-05T09:58:07+00:00","dateModified":"2024-01-10T10:37:09+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"On March 29th from Inprosec we conducted a webinar on \"Security controls in SAP systems\" taught by Miguel Fonte Diaz, SAP consultant. It was given from the CUVIV platform with two sessions of one hour each, one in the morning for the European public and another one in the afternoon for the Latam public.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/04\/Webinar-controles-seguridad-sistemas-sap.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/04\/Webinar-controles-seguridad-sistemas-sap.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/webinar-security-controls-in-sap-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Webinar \u2013 Security Controls in SAP Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/8766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=8766"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/8766\/revisions"}],"predecessor-version":[{"id":9889,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/8766\/revisions\/9889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/8764"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=8766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=8766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=8766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}