SlideShare a Scribd company logo
/* How the U.S. Department of Defense
Secures Its Custom ABAP Code */
#SAPtd
How the U.S. Department of Defense Secures
Its Custom ABAP Code
Christine Warring
TEWLS Sustainment Project Manager, JMLFDC
CACI Contractor © 2015, Virtual Forge, Inc.
All rights reserved.
Agenda
 SAP TEWLS @ Department of Defense
 Challenges
 Custom ABAP
 Best Practices
SAP TEWLS @ Dept of Defense
SAP TEWLS @ Dept of Defense
Custom ABAP Applications
Theater Enterprise Wide Logistics System (TEWLS)
  SAP-based Enterprise Resource Planning
  Supports theater-level medical logistics
  Developed by US Army to replace TAMMIS
  Single shared data environment
  Developed in ABAP
5
SAP TEWLS @ Dept of Defense
Custom ABAP Applications
What is TEWLS?
  Enterprise-level total life cycle management of medical assemblages
  Development
  Production
  Fielding
  Sustainment
  Theater Intermediate-Level Medical Logistics:
  Acquisition & life-cycle management
  Strategic programs for mobilization & deployment of materials
  Theater Supply Chain Management to include full storage and distribution capabilities for
Medical Materials (TLAMM)
  Compliance with Federal Financial Management Improvement Act (FFMIA); Standard Financial
Information Structure (SFIS); Federal Information System Controls Audit Manual (FISCAM)
6
Challenges
Challenges
Passing the Test
Department of Defense Adopted TEWLS
  TEWLS to be used for all armed forces
  Required to prove that ABAP code was secure and compliant
The Problem
  Static code scanning required
  Code scanning solution that DOD mandated did not produce accurate results
  Unable to go live without Authority to Operate (ATO)!
8
Challenges
The Problem
Limitations with existing tools
  Many false findings
  Inconsistent results (even with same code base)
  Developers could not use day to day
  Limited test scope
  No help with remediation!
Impact
  Used valuable resource time working through false results
  Unable to prove that the code was secure and compliant to finalize DOD ATO
  Annoyed developers
  Late feedback for developers
9
Challenges
The Solution
ABAP Scanning with CodeProfiler
  Accurate results with prioritized findings
  Comprehensive testing
  Developers can correct and learn while the work
  Detailed remediation instructions and auto correction
Results
  Able to scan and remediate vulnerabilities quickly
  Reduced number of code corrections required
  Improved developer skills
  Reduced effort and time spent on code reviews
  Ensured ALL code meets security and compliance requirements
10
Custom ABAP
Are your custom applications compliant?
  ATO (Authority To Operate)
  PII (Personally Identifiable Information)
  PIA (Privacy Impact Assessment)
  PCI-DSS (Payment Card Industry Data Security Standard)
  Internal standards
11
Best Practices
Best Practices
Recommended Testing
  Security and compliance
  Performance
  Stability and robustness
  Maintainability
13
Best Practices
Code Reviews
Top 11 Most Dangerous Security Vulnerabilities:
1.  ABAP Command Injection
2.  OS Command Injection
3.  Native SQL Injection
4.  Improper Authorization Checks
5.  Directory Traversal
6.  Direct Database Modifications
7.  Cross-Client Database Access
8.  Open SQL Injection
9.  Generic Module Execution
10.  Cross-Site Scripting
11.  Hidden ABAP code
14
Best Practices
Lessons Learned/Recommendations
  Custom code can be a source of risk to SAP systems.
  Automated testing is necessary to ensure code security and quality.
  All solutions are not alike – Compare!
  Start now. Don’t wait for an incident to occur.
15
Virtual Forge CodeProfiler
Free Risk Assessment Offer!
How good is your SAP system?
Visit www.virtualforge.com
ü  Summary of
findings
ü  Priorization and
classification of
vulnerabilities
ü  Specific examples
of findings
ü  Code and system
metrics
Quality
Compliance
Security
SAP-
System
Risk Assessment /
Penetration Test
•  SAP configuration
•  Custom code
Free
16
www.virtualforge.com
@Virtual_Forge
Thank you!
Disclaimer
© 2015 Virtual Forge Inc. All rights reserved.
SAP, R/3, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective
logos are trademarks or registered trademarks of SAP AG. All other product and service names mentioned are
the trademarks of their respective companies.
Information contained in this publication is subject to change without prior notice. It is provided by Virtual
Forge and serves informational purposes only. Virtual Forge is not liable for errors or incomplete information in
this publication. Information contained in this publication does not imply any further liability.
Virtual Forge Terms and Conditions apply. See www.virtualforge.com for details.

More Related Content

PDF
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
PDF
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
PDF
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
PDF
Is your SAP system vulnerable to cyber attacks?
PDF
Best Practices for Ensuring SAP ABAP Code Quality and Security
PPT
Managing SAP Custom Code
PDF
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
PDF
From APM to Business Monitoring with AppDynamics Analytics
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Is your SAP system vulnerable to cyber attacks?
Best Practices for Ensuring SAP ABAP Code Quality and Security
Managing SAP Custom Code
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
From APM to Business Monitoring with AppDynamics Analytics

What's hot (20)

PPTX
Say Goodbye To Old Tools And Stay Sane
PPTX
Keynote: Inflectra Company Vision - InflectraCon 2019
PDF
Under the Hood: Monitoring Azure and .NET - AppSphere16
PPT
Spira Plan Overview Presentation
PPTX
Testing 2: Advanced Test Management
PPTX
Test Masters 2016 Spring Conference
PDF
Memory Heap Analysis with AppDynamics - AppSphere16
PPT
Rapise Overview Presentation
PPTX
Rapise Overview Presentation (2021)
PDF
Integration strategies best practices- Mulesoft meetup April 2018
PPTX
Spira 101 - How We Designed Spira To Be Used: InflectraCon 2019
PDF
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16
PPTX
Inflectra Partner Program 2022
PDF
Performance Monitoring and Testing in the Salesforce Cloud
PDF
AppDynamics Administration - AppSphere16
PDF
Advanced CA Endevor® Software Change Manager Processor Coding Techniques: Pra...
PPTX
Compare & Contrast How Industries Use Spira
PPTX
Inflectra Overview Presentation (2021)
PDF
Training Webinars - Secret hacks for OutSystems 10
PDF
AppSphere 15 - DevOps and Agile: AppDynamics in Continuous Integration Enviro...
Say Goodbye To Old Tools And Stay Sane
Keynote: Inflectra Company Vision - InflectraCon 2019
Under the Hood: Monitoring Azure and .NET - AppSphere16
Spira Plan Overview Presentation
Testing 2: Advanced Test Management
Test Masters 2016 Spring Conference
Memory Heap Analysis with AppDynamics - AppSphere16
Rapise Overview Presentation
Rapise Overview Presentation (2021)
Integration strategies best practices- Mulesoft meetup April 2018
Spira 101 - How We Designed Spira To Be Used: InflectraCon 2019
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16
Inflectra Partner Program 2022
Performance Monitoring and Testing in the Salesforce Cloud
AppDynamics Administration - AppSphere16
Advanced CA Endevor® Software Change Manager Processor Coding Techniques: Pra...
Compare & Contrast How Industries Use Spira
Inflectra Overview Presentation (2021)
Training Webinars - Secret hacks for OutSystems 10
AppSphere 15 - DevOps and Agile: AppDynamics in Continuous Integration Enviro...
Ad

Similar to How the U.S. Department of Defense Secures Its Custom ABAP Code (20)

PDF
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
PDF
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
PDF
SAST for JavaScript: A Brief Overview of Commercial Tools
PPTX
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
PDF
How to assess the risks in your SAP systems at the push of a button
PDF
Top 5 best practice for delivering secure in-vehicle software
PDF
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
PDF
SAFe 4.0 - implementing Enterprise Agile using the Scaled Agile Framework
PDF
Sa fe 4.0 implementing Enterprise Agile using the Scaled Agile Framework
PPTX
Rapid software testing and conformance with static code analysis
PPTX
DevOps and Splunk
PDF
SAP security made easy
PPT
Universal test solutions customer testimonial 10192013-v2.2
PDF
Application Security Management with ThreadFix
PDF
Protect Your Customers Data from Cyberattacks
PDF
Deploying Static Application Security Testing on a Large Scale
PDF
Create code confidence for better application security
PDF
OpenControl Overview - Joshua McKenty
PDF
Top API Security Issues Found During POCs
PDF
Java Micro Edition (ME) 8 Deep Dive
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAST for JavaScript: A Brief Overview of Commercial Tools
DOES SFO 2016 - Scott Willson - Top 10 Ways to Fail at DevOps
How to assess the risks in your SAP systems at the push of a button
Top 5 best practice for delivering secure in-vehicle software
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
SAFe 4.0 - implementing Enterprise Agile using the Scaled Agile Framework
Sa fe 4.0 implementing Enterprise Agile using the Scaled Agile Framework
Rapid software testing and conformance with static code analysis
DevOps and Splunk
SAP security made easy
Universal test solutions customer testimonial 10192013-v2.2
Application Security Management with ThreadFix
Protect Your Customers Data from Cyberattacks
Deploying Static Application Security Testing on a Large Scale
Create code confidence for better application security
OpenControl Overview - Joshua McKenty
Top API Security Issues Found During POCs
Java Micro Edition (ME) 8 Deep Dive
Ad

More from Virtual Forge (12)

PDF
SAP HANA Security: New Technology, New Risks
PPTX
Stabile und performante Anwendungen für SAP HANA entwickeln
PDF
Develop Stable, High-Performance Applications for SAP HANA
PDF
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
PDF
Uninvited Guests: Why do hackers love our SAP landscapes?
PDF
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
PPTX
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
PDF
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
PPTX
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
PDF
Risks of Hosted SAP Environments
PDF
Die Top 5 Mythen der SAP Sicherheit
PDF
ABAP Code Qualität - Best Practices
SAP HANA Security: New Technology, New Risks
Stabile und performante Anwendungen für SAP HANA entwickeln
Develop Stable, High-Performance Applications for SAP HANA
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
Uninvited Guests: Why do hackers love our SAP landscapes?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
Risks of Hosted SAP Environments
Die Top 5 Mythen der SAP Sicherheit
ABAP Code Qualität - Best Practices

Recently uploaded (20)

PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Nekopoi APK 2025 free lastest update
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
System and Network Administration Chapter 2
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
history of c programming in notes for students .pptx
PDF
Digital Strategies for Manufacturing Companies
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
AI in Product Development-omnex systems
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
medical staffing services at VALiNTRY
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PTS Company Brochure 2025 (1).pdf.......
Nekopoi APK 2025 free lastest update
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
CHAPTER 2 - PM Management and IT Context
System and Network Administration Chapter 2
How to Choose the Right IT Partner for Your Business in Malaysia
history of c programming in notes for students .pptx
Digital Strategies for Manufacturing Companies
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
AI in Product Development-omnex systems
Adobe Illustrator 28.6 Crack My Vision of Vector Design
medical staffing services at VALiNTRY
2025 Textile ERP Trends: SAP, Odoo & Oracle
Upgrade and Innovation Strategies for SAP ERP Customers
wealthsignaloriginal-com-DS-text-... (1).pdf
How to Migrate SBCGlobal Email to Yahoo Easily
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Navsoft: AI-Powered Business Solutions & Custom Software Development
Lecture 3: Operating Systems Introduction to Computer Hardware Systems

How the U.S. Department of Defense Secures Its Custom ABAP Code

  • 1. /* How the U.S. Department of Defense Secures Its Custom ABAP Code */ #SAPtd
  • 2. How the U.S. Department of Defense Secures Its Custom ABAP Code Christine Warring TEWLS Sustainment Project Manager, JMLFDC CACI Contractor © 2015, Virtual Forge, Inc. All rights reserved.
  • 3. Agenda  SAP TEWLS @ Department of Defense  Challenges  Custom ABAP  Best Practices
  • 4. SAP TEWLS @ Dept of Defense
  • 5. SAP TEWLS @ Dept of Defense Custom ABAP Applications Theater Enterprise Wide Logistics System (TEWLS)   SAP-based Enterprise Resource Planning   Supports theater-level medical logistics   Developed by US Army to replace TAMMIS   Single shared data environment   Developed in ABAP 5
  • 6. SAP TEWLS @ Dept of Defense Custom ABAP Applications What is TEWLS?   Enterprise-level total life cycle management of medical assemblages   Development   Production   Fielding   Sustainment   Theater Intermediate-Level Medical Logistics:   Acquisition & life-cycle management   Strategic programs for mobilization & deployment of materials   Theater Supply Chain Management to include full storage and distribution capabilities for Medical Materials (TLAMM)   Compliance with Federal Financial Management Improvement Act (FFMIA); Standard Financial Information Structure (SFIS); Federal Information System Controls Audit Manual (FISCAM) 6
  • 8. Challenges Passing the Test Department of Defense Adopted TEWLS   TEWLS to be used for all armed forces   Required to prove that ABAP code was secure and compliant The Problem   Static code scanning required   Code scanning solution that DOD mandated did not produce accurate results   Unable to go live without Authority to Operate (ATO)! 8
  • 9. Challenges The Problem Limitations with existing tools   Many false findings   Inconsistent results (even with same code base)   Developers could not use day to day   Limited test scope   No help with remediation! Impact   Used valuable resource time working through false results   Unable to prove that the code was secure and compliant to finalize DOD ATO   Annoyed developers   Late feedback for developers 9
  • 10. Challenges The Solution ABAP Scanning with CodeProfiler   Accurate results with prioritized findings   Comprehensive testing   Developers can correct and learn while the work   Detailed remediation instructions and auto correction Results   Able to scan and remediate vulnerabilities quickly   Reduced number of code corrections required   Improved developer skills   Reduced effort and time spent on code reviews   Ensured ALL code meets security and compliance requirements 10
  • 11. Custom ABAP Are your custom applications compliant?   ATO (Authority To Operate)   PII (Personally Identifiable Information)   PIA (Privacy Impact Assessment)   PCI-DSS (Payment Card Industry Data Security Standard)   Internal standards 11
  • 13. Best Practices Recommended Testing   Security and compliance   Performance   Stability and robustness   Maintainability 13
  • 14. Best Practices Code Reviews Top 11 Most Dangerous Security Vulnerabilities: 1.  ABAP Command Injection 2.  OS Command Injection 3.  Native SQL Injection 4.  Improper Authorization Checks 5.  Directory Traversal 6.  Direct Database Modifications 7.  Cross-Client Database Access 8.  Open SQL Injection 9.  Generic Module Execution 10.  Cross-Site Scripting 11.  Hidden ABAP code 14
  • 15. Best Practices Lessons Learned/Recommendations   Custom code can be a source of risk to SAP systems.   Automated testing is necessary to ensure code security and quality.   All solutions are not alike – Compare!   Start now. Don’t wait for an incident to occur. 15
  • 16. Virtual Forge CodeProfiler Free Risk Assessment Offer! How good is your SAP system? Visit www.virtualforge.com ü  Summary of findings ü  Priorization and classification of vulnerabilities ü  Specific examples of findings ü  Code and system metrics Quality Compliance Security SAP- System Risk Assessment / Penetration Test •  SAP configuration •  Custom code Free 16
  • 18. Disclaimer © 2015 Virtual Forge Inc. All rights reserved. SAP, R/3, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG. All other product and service names mentioned are the trademarks of their respective companies. Information contained in this publication is subject to change without prior notice. It is provided by Virtual Forge and serves informational purposes only. Virtual Forge is not liable for errors or incomplete information in this publication. Information contained in this publication does not imply any further liability. Virtual Forge Terms and Conditions apply. See www.virtualforge.com for details.