{"id":8295,"date":"2026-04-22T12:51:24","date_gmt":"2026-04-22T11:51:24","guid":{"rendered":"https:\/\/solutions.axians.com\/sap\/?page_id=8295"},"modified":"2026-04-22T12:52:11","modified_gmt":"2026-04-22T11:52:11","slug":"axians-sap-security-checkup-your-sap-security-analysis-at-a-glance","status":"publish","type":"page","link":"https:\/\/solutions.axians.com\/sap\/sap-services\/consulting\/axians-sap-security-checkup-your-sap-security-analysis-at-a-glance\/","title":{"rendered":"Axians SAP Security Checkup &#8211; Your SAP security analysis at a glance"},"content":{"rendered":"\n<section class=\"wp-block-group stage-subpage is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1398\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2026\/04\/security_shield_4k_premium-scaled.png\" alt=\"Futuristic depiction of a glowing, digital protective shield over a circular technology platform, surrounded by network structures and data lines on a dark background. The image visualizes IT security, system protection and the analysis of SAP landscapes as part of the Axians SAP Security Checkup.\" class=\"wp-image-8006\" style=\"aspect-ratio:21\/9;object-fit:cover\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2026\/04\/security_shield_4k_premium-scaled.png 2560w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2026\/04\/security_shield_4k_premium-800x437.png 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2026\/04\/security_shield_4k_premium-1920x1049.png 1920w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2026\/04\/security_shield_4k_premium-768x420.png 768w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2026\/04\/security_shield_4k_premium-1536x839.png 1536w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2026\/04\/security_shield_4k_premium-2048x1119.png 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h1 class=\"wp-block-heading headline\">Axians SAP Security Checkup<\/h1>\n\n\n\n<p>Your quick overview of the security situation of your SAP systems.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group breadcrumb is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\"><nav aria-label=\"breadcrumbs\" class=\"rank-math-breadcrumb\"><p><span class=\"last\">Home<\/span><\/p><\/nav>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group text-centered-gradient is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">Why an SAP security check is crucial<\/h2>\n\n\n\n<p><strong>SAP systems are business-critical<\/strong> &#8211; at the same time, they are a central target for security risks. A lack of transparency regarding authorizations, insecure system configurations or vulnerabilities in custom code can have a significant impact on your company.<\/p>\n\n\n\n<p>A structured<strong> <a href=\"https:\/\/www.axians.de\/portfolio\/sap-solutions-operations\/sap-alm-sap-basis\/sap-security-datenschutz\/\" target=\"_blank\" rel=\"noopener\">SAP security check<\/a><\/strong> helps you to <strong>identify<\/strong> <strong>security gaps<\/strong> at an early stage, assess risks and derive targeted measures.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group text-image-2-columns is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">Clear view of your SAP security situation<\/h2>\n\n\n\n<p>Our comprehensive checkup examines the technical security of your SAP systems &#8211; from system configuration, network and interface security to patch status and the identification of known security gaps.<\/p>\n\n\n\n<p>At the same time, your authorization concept is analyzed in order to evaluate principles such as the minimum principle, separation of functions and compliance (e.g. GDPR) and to uncover weaknesses in roles and access rights.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1365\" height=\"768\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1355632551.jpg\" alt=\"Close-up of an eye behind glasses. The lenses of the glasses reflect bright screen surfaces with digital content, including blurred text and interface elements. The shot emphasizes visual perception, concentration on screen content and the use of digital technology.\" class=\"wp-image-2459\" style=\"aspect-ratio:16\/9;object-fit:cover\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1355632551.jpg 1365w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1355632551-800x450.jpg 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1355632551-768x432.jpg 768w\" sizes=\"auto, (max-width: 1365px) 100vw, 1365px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group image-text-2-columns is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1365\" height=\"768\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1194430859.jpg\" alt=\"Two people sit in front of several large monitors in a darkened control room. The screens display technical dashboards, diagrams and system overviews with blue user interfaces. The monitors are placed on a shared workstation, surrounded by other IT hardware and subtle blue lighting accents, conveying a professional, high-tech environment.\" class=\"wp-image-2458\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1194430859.jpg 1365w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1194430859-800x450.jpg 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-1194430859-768x432.jpg 768w\" sizes=\"auto, (max-width: 1365px) 100vw, 1365px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">Concrete results &amp; next steps<\/h2>\n\n\n\n<p>We also check your custom code (ABAP developments) for missing or inadequate authorization checks, typical vulnerabilities and potential security gaps.<\/p>\n\n\n\n<p>At the end, you will receive a clearly structured assessment of your SAP security situation &#8211; including concrete and prioritized recommendations for your next steps.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/solutions.axians.com\/sap\/de\/kontakt\/\">Arrange a consultation appointment <\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group headline-text-slider-icon-text is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">Your benefits with Axians SAP Security Checkup at a glance<\/h2>\n\n\n\n<div class=\"wp-block-group slider-icon-text swiper is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group swiper-wrapper is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group swiper-slide is-layout-flow wp-block-group-is-layout-flow\">\n\n\n<h3 class=\"wp-block-heading headline\"><strong><strong>Transparency<\/strong> <\/strong><\/h3>\n\n\n\n<p>Clear view of your SAP security situation<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide is-layout-flow wp-block-group-is-layout-flow\">\n\n\n<h3 class=\"wp-block-heading headline\"><strong><strong>Risk minimization<\/strong><\/strong><\/h3>\n\n\n\n<p>Early detection of critical vulnerabilities<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide is-layout-flow wp-block-group-is-layout-flow\">\n\n\n<h3 class=\"wp-block-heading headline\"><strong><strong>Efficiency<\/strong><\/strong><\/h3>\n\n\n\n<p>Fast analysis with little effort  <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide is-layout-flow wp-block-group-is-layout-flow\">\n\n\n<h3 class=\"wp-block-heading headline\"><strong><strong><strong>Certainty of action<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>Concrete measures instead of theory <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide is-layout-flow wp-block-group-is-layout-flow\">\n\n\n<h3 class=\"wp-block-heading headline\"><strong><strong><strong>Compliance<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>Support with audits &amp; GDPR  <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide is-layout-flow wp-block-group-is-layout-flow\">\n\n\n<h3 class=\"wp-block-heading headline\"><strong><strong><strong>Holistic approach<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>Technology, authorizations &amp; custom code<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group collapse-4-cols is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\"><strong>Scope of the Axians SAP Security Checkup<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-teufels-accordion accordion\" id=\"accordion-fc0f8cb4-59b4-496e-88b8-7fea24aaf593\">\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-7dfef416-44dc-4bd6-9bae-7dba48b98e4c\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-7dfef416-44dc-4bd6-9bae-7dba48b98e4c\" aria-expanded=\"false\" aria-control=\"collapse-7dfef416-44dc-4bd6-9bae-7dba48b98e4c\"><strong>Technical Security<\/strong><\/button><\/h2><div id=\"collapse-7dfef416-44dc-4bd6-9bae-7dba48b98e4c\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-7dfef416-44dc-4bd6-9bae-7dba48b98e4c\" data-bs-parent=\"#accordion-fc0f8cb4-59b4-496e-88b8-7fea24aaf593\"><div class=\"accordion-body\">\n<ul class=\"wp-block-list\">\n<li>Checking security-relevant system parameters (password guidelines, encryption, system versions)<\/li>\n\n\n\n<li>Control of security features and system configurations<\/li>\n\n\n\n<li>Checking standard users, clients and system changeability<\/li>\n\n\n\n<li>Analysis of Security Audit Log and SAP Gateway<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-4f569eb2-032d-4fcf-81fb-02ddbf75a7b4\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-4f569eb2-032d-4fcf-81fb-02ddbf75a7b4\" aria-expanded=\"false\" aria-control=\"collapse-4f569eb2-032d-4fcf-81fb-02ddbf75a7b4\"><strong>Roles &amp; Authorizations<\/strong><\/button><\/h2><div id=\"collapse-4f569eb2-032d-4fcf-81fb-02ddbf75a7b4\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-4f569eb2-032d-4fcf-81fb-02ddbf75a7b4\" data-bs-parent=\"#accordion-fc0f8cb4-59b4-496e-88b8-7fea24aaf593\"><div class=\"accordion-body\">\n<ul class=\"wp-block-list\">\n<li>Analysis of critical authorizations and roles in the system<\/li>\n\n\n\n<li>Identification of technical gateways (e.g. table access, developer rights)<\/li>\n\n\n\n<li>Review of naming conventions and spot checks<\/li>\n\n\n\n<li>Control of overprivileged RFC users and inactive accounts<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-f5bf3169-33d0-4c4d-aded-2433a761ebf4\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-f5bf3169-33d0-4c4d-aded-2433a761ebf4\" aria-expanded=\"false\" aria-control=\"collapse-f5bf3169-33d0-4c4d-aded-2433a761ebf4\"><strong><strong>Custom Code<\/strong><\/strong> &#8211; <strong>(ABAP)<\/strong><\/button><\/h2><div id=\"collapse-f5bf3169-33d0-4c4d-aded-2433a761ebf4\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-f5bf3169-33d0-4c4d-aded-2433a761ebf4\" data-bs-parent=\"#accordion-fc0f8cb4-59b4-496e-88b8-7fea24aaf593\"><div class=\"accordion-body\">\n<ul class=\"wp-block-list\">\n<li>Analysis of ABAP developments for security vulnerabilities<\/li>\n\n\n\n<li>Identification of missing authorization checks (AUTHORITY-CHECK)<\/li>\n\n\n\n<li>Detection of typical vulnerabilities such as SQL injections or insecure calls<\/li>\n\n\n\n<li>Checking access to sensitive data and input validation<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-df976c28-71d3-452c-bf96-81484467b601\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-df976c28-71d3-452c-bf96-81484467b601\" aria-expanded=\"false\" aria-control=\"collapse-df976c28-71d3-452c-bf96-81484467b601\"><strong>Interfaces &amp; Integration<\/strong><\/button><\/h2><div id=\"collapse-df976c28-71d3-452c-bf96-81484467b601\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-df976c28-71d3-452c-bf96-81484467b601\" data-bs-parent=\"#accordion-fc0f8cb4-59b4-496e-88b8-7fea24aaf593\"><div class=\"accordion-body\">\n<ul class=\"wp-block-list\">\n<li>Analysis of external access points and interfaces<\/li>\n\n\n\n<li>Checking RFC connections, APIs and SAP Gateway<\/li>\n\n\n\n<li>Evaluation of connected systems (e.g. Cloud Connector, Web Dispatcher, SAProuter)<\/li>\n\n\n\n<li>Identification of potential security risks through integrations<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group timeline-icon-text is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">How does an Axians SAP Security Checkup work? <\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 offset-md-3 col-md-6 is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>From an overview to a secure SAP landscape.<\/strong><br>The Axians SAP Security Checkup follows a structured and efficient procedure that quickly provides you with transparency about your current security situation &#8211; with minimal effort for your team.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 icon is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"900\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-1-1-1.png\" alt=\"Blue, stylized illustration of a light bulb with an integrated dollar symbol. Around the light bulb are short lines symbolizing light or an idea. The symbol stands for financial ideas, value creation or economic innovation.\" class=\"wp-image-2452\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-1-1-1.png 900w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-1-1-1-800x800.png 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-1-1-1-768x768.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 text is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Voting &amp; Scope Definition<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Definition of the objective and scope of the Axians SAP Security Checkup<\/li>\n\n\n\n<li>Identification of relevant SAP systems and components<\/li>\n\n\n\n<li>Coordination of the analysis areas (technology, authorizations, custom code)<\/li>\n\n\n\n<li>Definition of contact persons and access framework<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 icon is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"900\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-4-1.png\" alt=\"Stylized blue symbol with a magnifying glass in front of bar charts. The illustration stands for analysis, evaluation of key figures or data-based decision-making.\" class=\"wp-image-2451\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-4-1.png 900w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-4-1-800x800.png 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-4-1-768x768.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 text is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Analysis of your SAP systems<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Checking safety-relevant system parameters and configurations<\/li>\n\n\n\n<li>Analysis of roles, authorizations and user structures<\/li>\n\n\n\n<li>Checking connected systems and interfaces<\/li>\n\n\n\n<li>Review of organizational structures<\/li>\n\n\n\n<li>Analysis of custom code (ABAP) for security vulnerabilities<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 icon is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"900\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-3-1.png\" alt=\"Blue symbol of a wrench in front of a cogwheel. The illustration symbolizes settings, maintenance, configuration or technical adjustments.\" class=\"wp-image-2450\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-3-1.png 900w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-3-1-800x800.png 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-3-1-768x768.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 text is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Assessment &amp; risk identification<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identification of vulnerabilities and security gaps<\/li>\n\n\n\n<li>Assessment of risks according to criticality<\/li>\n\n\n\n<li>Detection of compliance-relevant issues<\/li>\n\n\n\n<li>Structured prioritization of findings<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 icon is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"900\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-2-1.png\" alt=\"Blue symbol of a mountain with a flag on the summit. The illustration stands for goal achievement, milestones or strategic successes.\" class=\"wp-image-2449\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-2-1.png 900w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-2-1-800x800.png 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/09\/icon-2-1-768x768.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col col-12 text is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Results report &amp; recommendations for action<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Documentation of all identified risks<\/li>\n\n\n\n<li>Clear and comprehensible presentation of the results<\/li>\n\n\n\n<li>Concrete, prioritized measures for improvement<\/li>\n\n\n\n<li>Joint coordination of the next steps<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group image-text-2-columns is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1081\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/DSC4561-2-1920x1081.jpg\" alt=\"Meeting room with a large wooden table at which several people are sitting with laptops. There are glasses, bottles and notes on the table. One person stands at the end of the table and points to a large screen on the wall displaying a presentation slide with technical or business content. The room has a modern design with wooden paneling, large windows and a round ceiling light above the table.\" class=\"wp-image-2687\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/DSC4561-2-1920x1081.jpg 1920w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/DSC4561-2-800x450.jpg 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/DSC4561-2-768x432.jpg 768w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/DSC4561-2-1536x864.jpg 1536w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/DSC4561-2-2048x1153.jpg 2048w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">How secure is your SAP system landscape really?<\/h2>\n\n\n\n<p>Without a clear analysis, risks often remain hidden. The Axians SAP Security Checkup provides you with transparency about vulnerabilities and concrete recommendations for the next steps.<br><br>Create transparency about your SAP security risks and lay the foundation for a secure system landscape<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/solutions.axians.com\/sap\/de\/kontakt\/\">Arrange a consultation appointment<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group cross-selling is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">This might also interest you<\/h2>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group container cards is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 col-lg-6 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/solutions.axians.com\/sap\/de\/sap-losungen\/btp-business-technology-platform\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1706\" height=\"614\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2157666226.jpg\" alt=\"Abstract digital illustration with gently curved, dotted lines in shades of violet and blue on a dark blue background. The lines run in waves from left to right and create an impression of movement, depth and a flowing stream of data.\" class=\"wp-image-2513\" style=\"aspect-ratio:16\/9;object-fit:cover\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2157666226.jpg 1706w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2157666226-800x288.jpg 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2157666226-768x276.jpg 768w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2157666226-1536x553.jpg 1536w\" sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" \/><\/a><\/figure>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<p>SAP Business Technology Platform (BTP)<\/p>\n\n\n\n<h2 class=\"wp-block-heading headline\">Accelerating innovation. Connecting systems.<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/solutions.axians.com\/sap\/de\/sap-losungen\/btp-business-technology-platform\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column col-12 col-lg-6 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/solutions.axians.com\/sap\/de\/business-transformation\/axians-discovery-assessment\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1366\" height=\"768\" src=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2229350656.jpg\" alt=\"Abstract digital composition of luminous, curved lines of light in shades of blue, pink and violet on a dark background. Several superimposed wave sequences intersect and convey dynamism, networking and technological energy.\" class=\"wp-image-2460\" style=\"aspect-ratio:16\/9;object-fit:cover\" srcset=\"https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2229350656.jpg 1366w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2229350656-800x450.jpg 800w, https:\/\/solutions.axians.com\/sap\/wp-content\/uploads\/2025\/08\/iStock-2229350656-768x432.jpg 768w\" sizes=\"auto, (max-width: 1366px) 100vw, 1366px\" \/><\/a><\/figure>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<p>Axians Discovery Assessment (ADA)<\/p>\n\n\n\n<h2 class=\"wp-block-heading headline\">The roadmap to the SAP S\/4HANA Cloud <\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/solutions.axians.com\/sap\/de\/business-transformation\/axians-discovery-assessment\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group headline-accordion is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns row is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-12 is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading headline\">FAQs<\/h2>\n\n\n\n<div class=\"wp-block-teufels-accordion accordion\" id=\"accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\">\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-d2afc4b6-a829-4183-a995-9251433a5339\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-d2afc4b6-a829-4183-a995-9251433a5339\" aria-expanded=\"false\" aria-control=\"collapse-d2afc4b6-a829-4183-a995-9251433a5339\">How long does an Axians SAP Security Checkup take?<\/button><\/h2><div id=\"collapse-d2afc4b6-a829-4183-a995-9251433a5339\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-d2afc4b6-a829-4183-a995-9251433a5339\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>The duration depends on the size and complexity of your SAP system landscape.<\/p>\n\n\n\n<p>The analysis is usually completed within a few days to weeks. Thanks to the structured procedure, the check is efficiently structured and quickly delivers reliable results.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-fff1448a-e17a-4c6a-b4b5-bc02b93b0491\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-fff1448a-e17a-4c6a-b4b5-bc02b93b0491\" aria-expanded=\"false\" aria-control=\"collapse-fff1448a-e17a-4c6a-b4b5-bc02b93b0491\">What is an SAP Security Checkup?<\/button><\/h2><div id=\"collapse-fff1448a-e17a-4c6a-b4b5-bc02b93b0491\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-fff1448a-e17a-4c6a-b4b5-bc02b93b0491\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>An SAP security check is a structured analysis of the security situation of SAP systems. Technical configurations, authorizations, interfaces and individual developments are checked in order to identify vulnerabilities and risks.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-92187097-0abb-46f1-b6c4-55055d308baa\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-92187097-0abb-46f1-b6c4-55055d308baa\" aria-expanded=\"false\" aria-control=\"collapse-92187097-0abb-46f1-b6c4-55055d308baa\">Why is SAP Security so important?<\/button><\/h2><div id=\"collapse-92187097-0abb-46f1-b6c4-55055d308baa\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-92187097-0abb-46f1-b6c4-55055d308baa\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>SAP systems contain business-critical data and processes. Security gaps can therefore have a significant impact on companies &#8211; from data loss to compliance violations.<\/p>\n\n\n\n<p>A regular review of SAP security is therefore essential.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-a99d06ec-3060-4815-9968-247a5be85c78\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-a99d06ec-3060-4815-9968-247a5be85c78\" aria-expanded=\"false\" aria-control=\"collapse-a99d06ec-3060-4815-9968-247a5be85c78\">How does the Axians SAP Security Checkup differ from a traditional audit?<\/button><\/h2><div id=\"collapse-a99d06ec-3060-4815-9968-247a5be85c78\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-a99d06ec-3060-4815-9968-247a5be85c78\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>A classic audit is often strongly driven by rules and compliance and focuses on adherence to certain requirements.<\/p>\n\n\n\n<p>The Axians SAP Security Checkup, on the other hand, goes beyond this: in addition to assessing compliance aspects, we also identify technical vulnerabilities, operational risks and optimization potential.<\/p>\n\n\n\n<p>You therefore not only receive an assessment, but also specific, prioritized recommendations for action to improve your SAP security.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-bddeb117-65ed-47d9-bcc4-dfae41679180\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-bddeb117-65ed-47d9-bcc4-dfae41679180\" aria-expanded=\"false\" aria-control=\"collapse-bddeb117-65ed-47d9-bcc4-dfae41679180\">What requirements must be met for the Axians SAP Security Checkup?<\/button><\/h2><div id=\"collapse-bddeb117-65ed-47d9-bcc4-dfae41679180\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-bddeb117-65ed-47d9-bcc4-dfae41679180\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>To carry out the SAP Security Check Up, we need access to the relevant SAP systems and coordination with your contacts.<\/p>\n\n\n\n<p>No further preparation is usually necessary, as we define the scope of the analysis together in advance and make the process as efficient as possible.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-6bf5ef66-f511-43d3-9151-2dfdb83470ca\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-6bf5ef66-f511-43d3-9151-2dfdb83470ca\" aria-expanded=\"false\" aria-control=\"collapse-6bf5ef66-f511-43d3-9151-2dfdb83470ca\">Will my systems be affected by the check?<\/button><\/h2><div id=\"collapse-6bf5ef66-f511-43d3-9151-2dfdb83470ca\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-6bf5ef66-f511-43d3-9151-2dfdb83470ca\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p> No, the SAP Security Check Up usually takes place without affecting your ongoing operations.<\/p>\n\n\n\n<p>The analyses are carried out in such a way that your productive systems can continue to be used stably and without restriction.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-8ddd002c-5149-450b-99eb-b7a7fb894eff\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-8ddd002c-5149-450b-99eb-b7a7fb894eff\" aria-expanded=\"false\" aria-control=\"collapse-8ddd002c-5149-450b-99eb-b7a7fb894eff\">What do I get at the end of the Axians SAP Security Checkup?<\/button><\/h2><div id=\"collapse-8ddd002c-5149-450b-99eb-b7a7fb894eff\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-8ddd002c-5149-450b-99eb-b7a7fb894eff\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>You will receive a structured results report:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>an assessment of your current SAP security situation<\/li>\n\n\n\n<li>an overview of identified vulnerabilities<\/li>\n\n\n\n<li>prioritization of the risks<\/li>\n\n\n\n<li>concrete recommendations for action<\/li>\n<\/ul>\n\n\n\n<p>This gives you a clear basis for making decisions on the next steps.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-781bba38-f0dd-403b-b8a9-85f305890c25\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-781bba38-f0dd-403b-b8a9-85f305890c25\" aria-expanded=\"false\" aria-control=\"collapse-781bba38-f0dd-403b-b8a9-85f305890c25\">How often should an SAP ssecurity check be carrid out?<\/button><\/h2><div id=\"collapse-781bba38-f0dd-403b-b8a9-85f305890c25\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-781bba38-f0dd-403b-b8a9-85f305890c25\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>An SAP security check should be carried out regularly, in particular:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>after system changes or migrations<\/li>\n\n\n\n<li>before audits<\/li>\n\n\n\n<li>for changes in the authorization concept<\/li>\n\n\n\n<li>as part of a continuous security concept<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-teufels-accordion-item accordion-item\"><h2 class=\"accordion-header\" id=\"heading-149ac35a-ce0e-4bc0-9ed3-22910fb6df95\"><button class=\"accordion-button collapsed\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-149ac35a-ce0e-4bc0-9ed3-22910fb6df95\" aria-expanded=\"false\" aria-control=\"collapse-149ac35a-ce0e-4bc0-9ed3-22910fb6df95\">What exactly is analyzed in the Axians SAP Security Checkup?<\/button><\/h2><div id=\"collapse-149ac35a-ce0e-4bc0-9ed3-22910fb6df95\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading-149ac35a-ce0e-4bc0-9ed3-22910fb6df95\" data-bs-parent=\"#accordion-92cf03ba-3afd-49c8-a02a-9ae6d3930fcc\"><div class=\"accordion-body\">\n<p>As part of the SAP Security Check Up, we analyze your SAP system landscape holistically. This includes technical system parameters, security configurations, authorizations and roles as well as your custom code (ABAP developments).<\/p>\n\n\n\n<p>We also check connected components and interfaces to identify potential gateways. The aim is to obtain a complete picture of your current SAP security situation and to make risks visible at an early stage.<\/p>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Axians SAP Security Checkup Your quick overview of the security situation of your SAP systems. Why an SAP security check is crucial SAP systems are business-critical &#8211; at the same time, they are a central target for security risks. A lack of transparency regarding authorizations, insecure system configurations or vulnerabilities in custom code can have [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":8006,"parent":4541,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8295","page","type-page","status-publish","has-post-thumbnail","hentry"],"lang":"en","translations":{"en":8295,"de":7883,"at":7984,"hr":8299},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/pages\/8295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/comments?post=8295"}],"version-history":[{"count":3,"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/pages\/8295\/revisions"}],"predecessor-version":[{"id":8304,"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/pages\/8295\/revisions\/8304"}],"up":[{"embeddable":true,"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/pages\/4541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/media\/8006"}],"wp:attachment":[{"href":"https:\/\/solutions.axians.com\/sap\/wp-json\/wp\/v2\/media?parent=8295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}