{"id":24122,"date":"2022-07-12T07:34:03","date_gmt":"2022-07-12T11:34:03","guid":{"rendered":"https:\/\/xiting.com\/?p=24122"},"modified":"2026-02-15T17:45:36","modified_gmt":"2026-02-15T16:45:36","slug":"whitepaper-sap-security-hardening","status":"publish","type":"post","link":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/","title":{"rendered":"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust"},"content":{"rendered":"\n<p>In the age of cybercrime and the ever-evolving loopholes it is of utmost importance to implement a zero trust strategy and security by design to effectively harden any IT system, including SAP. Xiting, as one of the world-leading solution providers for SAP Security, emphasizes on the following four core factors:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Security by Design<\/li><li>Monitoring and responding to unauthorized access<\/li><li>Realtime notifications and escalations<\/li><li>Centralized security audit and compliance reporting<\/li><\/ul>\n\n\n\n<p>When effectively and efficiently securing SAP systems, it is important to set a baseline that defines \u201csecurity by design\u201d. Oftentimes, SAP security takes a back seat especially during projects like new <\/p>\n\n\n\n<p>implementations, upgrades, patches, etc. This, however, can be avoided when a baseline is set and active measures are put in place to make it secure from the start. For example, when migrating from SAP ECC to SAP S\/4HANA, the project team is put under a lot of pressure to get the migration project completed in time and on budget. Due to that, shortcuts are taken and security is compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-are-today-s-key-challenges\">What are Today\u2019s Key Challenges?<\/h2>\n\n\n\n<p>The IT infrastructure, including the SAP landscape, has become an integral part of the intelligent enterprise as IT systems provide the business with applications to effortlessly manage their business processes. With SAP S\/4HANA and the rise of cloud solutions and cloud-based systems, SAP encourages their customers to adopt new SAP applications and integrations, mostly cloud-based, to better scale and implement quicker (rapid deployment).<\/p>\n\n\n\n<p>The adoption of cloud applications and hosting applications in the cloud creates the need for additional interfaces and connectivity beyond a customers\u2019 own network. This creates hybrid landscapes that must be managed securely as cloud-based applications are open to the world and hence require an additional level of security. With an increase in cyber threats and cyber incidents, it\u2019s important to focus on security by design and zero trust, as well as continuous compliance monitoring to identify and manage threats before they occur.<\/p>\n\n\n\n<p>[&#8230;]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Read more in Xiting&#8217;s new e-book:<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/en_2022_sap-security-hardening_linkedin-ad_v1-1-1024x1024.png\" alt=\"\" class=\"wp-image-24123\" width=\"447\" height=\"447\" srcset=\"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/en_2022_sap-security-hardening_linkedin-ad_v1-1-1024x1024.png 1024w, https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/en_2022_sap-security-hardening_linkedin-ad_v1-1-300x300.png 300w, https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/en_2022_sap-security-hardening_linkedin-ad_v1-1-150x150.png 150w, https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/en_2022_sap-security-hardening_linkedin-ad_v1-1-768x768.png 768w, https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/en_2022_sap-security-hardening_linkedin-ad_v1-1.png 1080w\" sizes=\"(max-width: 447px) 100vw, 447px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>If you want to read on, register here and download\u00a0a\u00a0full\u00a0copy of this e-book<\/strong>:<\/h3>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"eu1\",\n    portalId: \"25088517\",\n    formId: \"017d7ac3-6ac1-43c4-ad3e-a131e48ec4e4\"\n  });\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>In the age of cybercrime and the ever-evolving loopholes it is of utmost importance to implement a zero trust strategy and security by design to effectively harden any IT system, including SAP. Xiting, as one of the world-leading solution providers for SAP Security, emphasizes on the following four core factors: Security by Design Monitoring and [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":24128,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1835],"tags":[],"class_list":["post-24122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Hardening &#8211; Implement Security by Design and Zero Trust<\/title>\n<meta name=\"description\" content=\"Learn more about SAP Security by Design and Zero Trust and download our new Xiting ebook to get all insights from our expert.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust\" \/>\n<meta property=\"og:description\" content=\"In the age of cybercrime and the ever-evolving loopholes it is of utmost importance to implement a zero trust strategy and security by design to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-12T11:34:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-15T16:45:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/xiting-sap-security-hardening.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"964\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Banzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Banzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/\"},\"author\":{\"name\":\"Alessandro Banzer\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\"},\"headline\":\"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust\",\"datePublished\":\"2022-07-12T11:34:03+00:00\",\"dateModified\":\"2026-02-15T16:45:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/\"},\"wordCount\":357,\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/xiting-sap-security-hardening.jpg\",\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/\",\"name\":\"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/xiting-sap-security-hardening.jpg\",\"datePublished\":\"2022-07-12T11:34:03+00:00\",\"dateModified\":\"2026-02-15T16:45:36+00:00\",\"description\":\"Learn more about SAP Security by Design and Zero Trust and download our new Xiting ebook to get all insights from our expert.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/xiting-sap-security-hardening.jpg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/xiting-sap-security-hardening.jpg\",\"width\":1800,\"height\":964},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/whitepaper-sap-security-hardening\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xiting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XitingAG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1345129\\\/\",\"https:\\\/\\\/www.instagram.com\\\/xiting.global\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\",\"name\":\"Alessandro Banzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"caption\":\"Alessandro Banzer\"},\"description\":\"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust","description":"Learn more about SAP Security by Design and Zero Trust and download our new Xiting ebook to get all insights from our expert.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust","og_description":"In the age of cybercrime and the ever-evolving loopholes it is of utmost importance to implement a zero trust strategy and security by design to","og_url":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_published_time":"2022-07-12T11:34:03+00:00","article_modified_time":"2026-02-15T16:45:36+00:00","og_image":[{"width":1800,"height":964,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/xiting-sap-security-hardening.jpg","type":"image\/jpeg"}],"author":"Alessandro Banzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Banzer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/#article","isPartOf":{"@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/"},"author":{"name":"Alessandro Banzer","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e"},"headline":"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust","datePublished":"2022-07-12T11:34:03+00:00","dateModified":"2026-02-15T16:45:36+00:00","mainEntityOfPage":{"@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/"},"wordCount":357,"publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"image":{"@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/xiting-sap-security-hardening.jpg","articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/","url":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/","name":"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/xiting-sap-security-hardening.jpg","datePublished":"2022-07-12T11:34:03+00:00","dateModified":"2026-02-15T16:45:36+00:00","description":"Learn more about SAP Security by Design and Zero Trust and download our new Xiting ebook to get all insights from our expert.","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/xiting-sap-security-hardening.jpg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2022\/07\/xiting-sap-security-hardening.jpg","width":1800,"height":964},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/downloads\/whitepaper-sap-security-hardening\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Hardening &#8211; Implement Security by Design and Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]},{"@type":"Person","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e","name":"Alessandro Banzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","caption":"Alessandro Banzer"},"description":"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.","url":"https:\/\/xiting.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/24122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=24122"}],"version-history":[{"count":1,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/24122\/revisions"}],"predecessor-version":[{"id":61343,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/24122\/revisions\/61343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/24128"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=24122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=24122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/tags?post=24122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}