SlideShare a Scribd company logo
Produced by Wellesley Information Services,
LLC, publisher of SAPinsider. © 2015 Wellesley
Information Services. All rights reserved.
Is Your SAP System Vulnerable to
Cyber Attacks? Critical Tactics to
Safeguard Your ABAP Applications
Stephen Lamy
Virtual Forge
1
In This Session
• You will learn about specific risks that custom ABAP can
introduce into an SAP system and get proven advice to minimize
ABAP security risks.
• You will:
 Learn about the most dangerous ABAP security vulnerabilities
 View demonstrations to see how an SAP system can be
exploited via ABAP vulnerabilities
 Get insight into the best practices for developing secure and
compliant ABAP code, such as:
 Implementing internal coding guidelines and standards
 Automatically testing all code changes before release
2
What We’ll Cover
• Risks from custom ABAP code
• The realities of ABAP development
• Best practices for ABAP code for security and quality
• Wrap-up
3
ABAP Security Vulnerability
4
The Challenges with Custom ABAP Development
• Espionage or cyber
attack
• Application failure
• System performance
• High development
costs
5
APP/11: The Most Dangerous Security Vulnerabilities
1. ABAP command injection
2. OS command injection
3. Native SQL injection
4. Improper authorization checks
5. Directory traversal
6. Direct database modifications
7. Cross-client database access
8. Open SQL injection
9. Generic module execution
10. Cross-site scripting
11. Obscure ABAP Code
Source: BIZEC APP/11: www.bizec.org
6
The Average SAP Customer System Analyzed Has …
• 1.03 Critical Security/Compliance errors per 1,000 LOC
• 51% probability of an ABAP Command Injection vulnerability
• 70% probability of an open SQL injection vulnerability
• 86% probability of a Directory Traversal vulnerability
• 100% probability of defective Authorization Checks
Source: CodeProfiler scan of 453 Million lines of custom ABAP® code
from 217 SAP systems (status: Oct 2014)
7
Security/Compliance Testing
Test Case Probability per
Scan
Per x LOC
Sec: Missing AUTHORITY-CHECK before CALL TRANS 97% 4,066
Sec: Missing AUTHORITY-CHECK in Reports 96% 6,154
Com: Hard-coded User Name (sy-uname) 91% 8,998
Sec: Directory Traversal (Write Access) 86% 8,960
Sec: Missing AUTHORITY-CHECK in RFC-Enabled Funct 94% 14,347
Com: Cross-Client Access to Business Data 83% 15,254
Sec: Directory Traversal (Read Access) 86% 23,254
Com: Direct Database Modifications 86% 35,016
Source: CodeProfiler scan of 453 Million lines of custom ABAP® code from 217 SAP systems
(status: Oct 2014)
8
ABAP Risk Assessment Benchmark Results
Metric Average Total
Source Code Lines (LOC)
(without comments or empty lines)
2,087,618 453,013,210
Domain – Critical Only Average Per LOC
Security/Compliance 2,150 1.03
Performance 2,463 1.18
Maintainability 2,108 1.01
Robustness 6,618 3.17
Total 13,339 6.39
Source: CodeProfiler scan of 453 Million lines of custom ABAP® code from 217 SAP systems
(status: Oct 2014)
9
Cyber-Attacks and System Downtimes Are Key
Business Risks Caused by Custom Changes
• Performance
• Robustness
• Maintainability
• Security
• Compliance
• Data Loss Prevention
… can lead to key business risks:
Cyber-attacks $7.2 million cost per case in average
Fraud 5% loss in revenue p.a. per typical company
System downtimes 14hrs p.a. per company avg.
Sources: Cost of Cyber Crime Study (Poneomon Institute, 2013), Global Fraud
Study (ACFE, 2014), The Avoidable Cost of Downtime (CA Technologies,
2010)
Custom ABAP Apps …
Custom ABAP Code
Third-Party ABAP add-ons Testing Needed
10
Costs of Correcting a Single Defect
to correct defect during development$100 to correct defect during development$100
to correct defect found during QA testing$1,000 to correct defect found during QA testing$1,000
to correct defect in production$10,000
cost of attack or system down$$$
The earlier the code is repaired, the lower the cost
11
ABAP Security Vulnerability
12
What We’ll Cover
• Risks from custom ABAP code
• The realities of ABAP development
• Best practices for ABAP code for security and quality
• Wrap-up
13
The Evolution of SAP and ABAP Technology
Past Today Future
• Simple, isolated systems
• Fewer users
• Less data
• Less custom development
• Regular but rare releases
• Complex and open systems
• More users
• More data
• More custom development
• Frequent release cycles
• Reduced staff
• More complex and open
• Even more users
• Even more data
• Even more development
• Higher frequency releases
• Even smaller staff
14
Attack Surface of SAP – 1997
Direct UIs
External
Systems
SAP ABAP® System
15
Attack Surface of SAP – Since 2011
Indirect UIs
External
Systems
Direct UIs
SAP ABAP® System
16
SAP Security – A Holistic View
• SAP security and quality
must be addressed
holistically – including
custom code
• Custom code can lead to:
 System failure
 Hacker access
 Slow performance
• Business apps must
properly enforce Business
Logic (rules)
• GRC and SoD are only
effective if they are
enforced within application
code
Business Logic
Business Runtime
Database
Operating System
17
Sources of Flaws in ABAP Code
• Manual code reviews/basic testing
• QA testing focused on functional aspects
• Inability to enforce technical coding standards
• External development/third-party add-ons
• Limited/no code change monitoring (during emergencies)
18
What We’ll Cover
• Risks from custom ABAP code
• The realities of ABAP development
• Best practices for ABAP code for security and quality
• Wrap-up
19
Best Practices
• Ensure ABAP code quality and security through …
 Online scanning and correction during development
 Testing of all delivered code (you are responsible for
outsourced and third-party code too!)
 Automatic scanning of all ABAP changes
20
Best Practices: Static Online Scanning
• Static code scanning and correction during development
• Define clear code standards and enforce results
• Give developers the tools they need to test during development
 Faster feedback means lower cost
 Provide recommended remediation approach
• Apply automated corrections for larger clean-up projects
Stop believing that manual reviews are all you need!
21
Best Practices: Testing All Delivered Code
• Testing all code (including outsourced and third-party products)
 Communicate and enforce SLAs
 Let everyone know that you will be testing
 Test all deliverables before beginning functional testing
 Don’t waste time with user testing of inferior code
 Plan for issues!
 Test immediately! Is this code safe enough for your DEV?
22
Best Practices: Automatic Code Scanning
• Automatically scan all SAP ABAP code changes
 Scan all Transport Requests upon release
 Stop Transport Requests with critical issues
 Store test results as for compliance audit trail
 PCI, PII, SOX, FDA, Basil II, etc.
 Be ready for emergency corrections
 Enable override of tests with approval
 Track who approved exceptions
23
Continuous Monitoring of ABAP Code Changes
PRDDEV
Development Test/QA ProductionRequirement
SICHERE SAP PROGRAMMIERUNG
ABAP
Guideline
Java
Guideline
ABAP
Spezifikation
Java
Spezifikation
Generelle
Guideline
Interne
Entwicklung
Externe
Entwicklung
Automatic
Testing
QA
Exception
Approval?
24
Recommended Testing
• Security
• Compliance
• Data Loss Prevention
• Performance
• Robustness
• Maintainability
25
What We’ll Cover
• Risks from custom ABAP code
• The realities of ABAP development
• Best practices for ABAP code for security and quality
• Wrap-up
26
ABAP Security Vulnerability
27
Where to Find More Information
• www.bizec.org/wiki/Main_Page
 The Business Application Security Initiative (BIZEC) is a non-profit
organization with a focus on security defects in business applications
• www.virtualforge.com/en/library/white-papers/whitepaper-the-abap-
underverse.html
 Andreas Wiegenstein, “The ABAP Underverse” (BlackHat Briefings,
2011).
 A Virtual Forge whitepaper on application and ABAP security
• www.virtualforge.com/en/resources/presentations/ensuring-the-security-
of-custom-abap-code.html
 Chris Warring and Stephen Lamy, “Best Practices for Ensuring the
Security of Custom ABAP Code” (SAP TechEd && d-code, 2014).
28
7 Key Points to Take Home
• Companies are responsible for their own custom code
• If you can’t enforce code quality and security standards
consistently, it won’t happen
• It’s not possible to accurately assess the security of ABAP code
through manual reviews alone
• Implementing best practices and corresponding tools early in the
development process will lower risk and result in lower TCO
29
7 Key Points to Take Home (cont.)
• Do not wait until it’s too late!
 Tighten ABAP security while you can
• Don’t forget the 11 most dangerous security vulnerabilities and
how testing during development can protect you
• Provide your developers a way to test and correct code easily
while they develop
30
Your Turn!
How to contact me:
Stephen Lamy
Stephen.Lamy@virtualforge.com
@virtual_forge
Please remember to complete your session evaluation
31
Disclaimer
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or
an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective
companies. Wellesley Information Services is neither owned nor controlled by SAP SE.

More Related Content

PDF
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
PPTX
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
PDF
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
PPTX
Keynote: Inflectra Company Vision - InflectraCon 2019
PPTX
Inflectra Overview Presentation (2019)
PPTX
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
PDF
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
PPT
Spira Plan Overview Presentation
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Keynote: Inflectra Company Vision - InflectraCon 2019
Inflectra Overview Presentation (2019)
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
Spira Plan Overview Presentation

What's hot (20)

PPTX
Spira 101 - How We Designed Spira To Be Used: InflectraCon 2019
PDF
How to Do Code Reviews at Massive Scale For DevOps
PPTX
What Can The Spira API Do For You?
PPTX
Test Masters 2016 Spring Conference
PDF
How to Organize Game Developers With Different Planning Needs
PDF
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
PPTX
Beyond JIRA: When Issue Tracking Alone Isn't Enough
PPTX
Testing 2: Advanced Test Management
PDF
Coding Safe Modern C++ With AUTOSAR Guidelines
PDF
Deploy + Destroy Complete Test Environments
PPTX
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
PPTX
Providence: rapid vulnerability prevention
PPT
Introducing: Klocwork Insight Pro | November 2009
PDF
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
PPTX
Shifting the conversation from active interception to proactive neutralization
PPTX
DevGeekWeek 2017 Inflectra Meetup in Herzliya Presentation
PPTX
ApexUnit: Open source test framework for apex
PDF
To Scale Test Automation for DevOps, Avoid These Anti-Patterns
PPTX
Agile-plus-DevOps Testing for Packaged Applications
PPTX
Extending Spira With Add-Ons
Spira 101 - How We Designed Spira To Be Used: InflectraCon 2019
How to Do Code Reviews at Massive Scale For DevOps
What Can The Spira API Do For You?
Test Masters 2016 Spring Conference
How to Organize Game Developers With Different Planning Needs
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Beyond JIRA: When Issue Tracking Alone Isn't Enough
Testing 2: Advanced Test Management
Coding Safe Modern C++ With AUTOSAR Guidelines
Deploy + Destroy Complete Test Environments
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Providence: rapid vulnerability prevention
Introducing: Klocwork Insight Pro | November 2009
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
Shifting the conversation from active interception to proactive neutralization
DevGeekWeek 2017 Inflectra Meetup in Herzliya Presentation
ApexUnit: Open source test framework for apex
To Scale Test Automation for DevOps, Avoid These Anti-Patterns
Agile-plus-DevOps Testing for Packaged Applications
Extending Spira With Add-Ons
Ad

Similar to Is your SAP system vulnerable to cyber attacks? (20)

PDF
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
PDF
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
PDF
Best Practices for Ensuring SAP ABAP Code Quality and Security
PPTX
SAST Code Security Advisor for SAP [Webinar]
DOCX
PPTX
10 tips to safeguard your critical business data in SAP systems.pptx
PDF
How to assess the risks in your SAP systems at the push of a button
PPTX
ABAP_STD.pptx
PDF
How the U.S. Department of Defense Secures Its Custom ABAP Code
PDF
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
PDF
S4D401 Col24 Intermediate ABAP Programming
PPTX
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
PDF
sitNL Security Update from SAP TechEd 2013
PDF
SAP inside track NL 2013, SAP Security update
PDF
Protect Your Customers Data from Cyberattacks
PDF
Industrial Challenges of Secure Software Development
PDF
GDPR: The Application Security Twist
PDF
SC conference - Building AppSec Teams
PDF
SAP security made easy
PDF
How to Become an SAP ABAP Developer? Career Scope, Salary, Skills, Future Tre...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Best Practices for Ensuring SAP ABAP Code Quality and Security
SAST Code Security Advisor for SAP [Webinar]
10 tips to safeguard your critical business data in SAP systems.pptx
How to assess the risks in your SAP systems at the push of a button
ABAP_STD.pptx
How the U.S. Department of Defense Secures Its Custom ABAP Code
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
S4D401 Col24 Intermediate ABAP Programming
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
sitNL Security Update from SAP TechEd 2013
SAP inside track NL 2013, SAP Security update
Protect Your Customers Data from Cyberattacks
Industrial Challenges of Secure Software Development
GDPR: The Application Security Twist
SC conference - Building AppSec Teams
SAP security made easy
How to Become an SAP ABAP Developer? Career Scope, Salary, Skills, Future Tre...
Ad

More from Virtual Forge (13)

PDF
SAP HANA Security: New Technology, New Risks
PPTX
Stabile und performante Anwendungen für SAP HANA entwickeln
PDF
Develop Stable, High-Performance Applications for SAP HANA
PDF
Application Security Management with ThreadFix
PDF
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
PDF
Uninvited Guests: Why do hackers love our SAP landscapes?
PDF
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
PDF
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
PPTX
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
PDF
Risks of Hosted SAP Environments
PDF
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
PDF
Die Top 5 Mythen der SAP Sicherheit
PDF
ABAP Code Qualität - Best Practices
SAP HANA Security: New Technology, New Risks
Stabile und performante Anwendungen für SAP HANA entwickeln
Develop Stable, High-Performance Applications for SAP HANA
Application Security Management with ThreadFix
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
Uninvited Guests: Why do hackers love our SAP landscapes?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
Risks of Hosted SAP Environments
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Die Top 5 Mythen der SAP Sicherheit
ABAP Code Qualität - Best Practices

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
A Presentation on Touch Screen Technology
PDF
Hybrid model detection and classification of lung cancer
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Getting Started with Data Integration: FME Form 101
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Chapter 5: Probability Theory and Statistics
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative study of natural language inference in Swahili using monolingua...
Assigned Numbers - 2025 - Bluetooth® Document
Accuracy of neural networks in brain wave diagnosis of schizophrenia
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
OMC Textile Division Presentation 2021.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
cloud_computing_Infrastucture_as_cloud_p
A Presentation on Touch Screen Technology
Hybrid model detection and classification of lung cancer
Web App vs Mobile App What Should You Build First.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Getting Started with Data Integration: FME Form 101
1 - Historical Antecedents, Social Consideration.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Chapter 5: Probability Theory and Statistics

Is your SAP system vulnerable to cyber attacks?

  • 1. Produced by Wellesley Information Services, LLC, publisher of SAPinsider. © 2015 Wellesley Information Services. All rights reserved. Is Your SAP System Vulnerable to Cyber Attacks? Critical Tactics to Safeguard Your ABAP Applications Stephen Lamy Virtual Forge
  • 2. 1 In This Session • You will learn about specific risks that custom ABAP can introduce into an SAP system and get proven advice to minimize ABAP security risks. • You will:  Learn about the most dangerous ABAP security vulnerabilities  View demonstrations to see how an SAP system can be exploited via ABAP vulnerabilities  Get insight into the best practices for developing secure and compliant ABAP code, such as:  Implementing internal coding guidelines and standards  Automatically testing all code changes before release
  • 3. 2 What We’ll Cover • Risks from custom ABAP code • The realities of ABAP development • Best practices for ABAP code for security and quality • Wrap-up
  • 5. 4 The Challenges with Custom ABAP Development • Espionage or cyber attack • Application failure • System performance • High development costs
  • 6. 5 APP/11: The Most Dangerous Security Vulnerabilities 1. ABAP command injection 2. OS command injection 3. Native SQL injection 4. Improper authorization checks 5. Directory traversal 6. Direct database modifications 7. Cross-client database access 8. Open SQL injection 9. Generic module execution 10. Cross-site scripting 11. Obscure ABAP Code Source: BIZEC APP/11: www.bizec.org
  • 7. 6 The Average SAP Customer System Analyzed Has … • 1.03 Critical Security/Compliance errors per 1,000 LOC • 51% probability of an ABAP Command Injection vulnerability • 70% probability of an open SQL injection vulnerability • 86% probability of a Directory Traversal vulnerability • 100% probability of defective Authorization Checks Source: CodeProfiler scan of 453 Million lines of custom ABAP® code from 217 SAP systems (status: Oct 2014)
  • 8. 7 Security/Compliance Testing Test Case Probability per Scan Per x LOC Sec: Missing AUTHORITY-CHECK before CALL TRANS 97% 4,066 Sec: Missing AUTHORITY-CHECK in Reports 96% 6,154 Com: Hard-coded User Name (sy-uname) 91% 8,998 Sec: Directory Traversal (Write Access) 86% 8,960 Sec: Missing AUTHORITY-CHECK in RFC-Enabled Funct 94% 14,347 Com: Cross-Client Access to Business Data 83% 15,254 Sec: Directory Traversal (Read Access) 86% 23,254 Com: Direct Database Modifications 86% 35,016 Source: CodeProfiler scan of 453 Million lines of custom ABAP® code from 217 SAP systems (status: Oct 2014)
  • 9. 8 ABAP Risk Assessment Benchmark Results Metric Average Total Source Code Lines (LOC) (without comments or empty lines) 2,087,618 453,013,210 Domain – Critical Only Average Per LOC Security/Compliance 2,150 1.03 Performance 2,463 1.18 Maintainability 2,108 1.01 Robustness 6,618 3.17 Total 13,339 6.39 Source: CodeProfiler scan of 453 Million lines of custom ABAP® code from 217 SAP systems (status: Oct 2014)
  • 10. 9 Cyber-Attacks and System Downtimes Are Key Business Risks Caused by Custom Changes • Performance • Robustness • Maintainability • Security • Compliance • Data Loss Prevention … can lead to key business risks: Cyber-attacks $7.2 million cost per case in average Fraud 5% loss in revenue p.a. per typical company System downtimes 14hrs p.a. per company avg. Sources: Cost of Cyber Crime Study (Poneomon Institute, 2013), Global Fraud Study (ACFE, 2014), The Avoidable Cost of Downtime (CA Technologies, 2010) Custom ABAP Apps … Custom ABAP Code Third-Party ABAP add-ons Testing Needed
  • 11. 10 Costs of Correcting a Single Defect to correct defect during development$100 to correct defect during development$100 to correct defect found during QA testing$1,000 to correct defect found during QA testing$1,000 to correct defect in production$10,000 cost of attack or system down$$$ The earlier the code is repaired, the lower the cost
  • 13. 12 What We’ll Cover • Risks from custom ABAP code • The realities of ABAP development • Best practices for ABAP code for security and quality • Wrap-up
  • 14. 13 The Evolution of SAP and ABAP Technology Past Today Future • Simple, isolated systems • Fewer users • Less data • Less custom development • Regular but rare releases • Complex and open systems • More users • More data • More custom development • Frequent release cycles • Reduced staff • More complex and open • Even more users • Even more data • Even more development • Higher frequency releases • Even smaller staff
  • 15. 14 Attack Surface of SAP – 1997 Direct UIs External Systems SAP ABAP® System
  • 16. 15 Attack Surface of SAP – Since 2011 Indirect UIs External Systems Direct UIs SAP ABAP® System
  • 17. 16 SAP Security – A Holistic View • SAP security and quality must be addressed holistically – including custom code • Custom code can lead to:  System failure  Hacker access  Slow performance • Business apps must properly enforce Business Logic (rules) • GRC and SoD are only effective if they are enforced within application code Business Logic Business Runtime Database Operating System
  • 18. 17 Sources of Flaws in ABAP Code • Manual code reviews/basic testing • QA testing focused on functional aspects • Inability to enforce technical coding standards • External development/third-party add-ons • Limited/no code change monitoring (during emergencies)
  • 19. 18 What We’ll Cover • Risks from custom ABAP code • The realities of ABAP development • Best practices for ABAP code for security and quality • Wrap-up
  • 20. 19 Best Practices • Ensure ABAP code quality and security through …  Online scanning and correction during development  Testing of all delivered code (you are responsible for outsourced and third-party code too!)  Automatic scanning of all ABAP changes
  • 21. 20 Best Practices: Static Online Scanning • Static code scanning and correction during development • Define clear code standards and enforce results • Give developers the tools they need to test during development  Faster feedback means lower cost  Provide recommended remediation approach • Apply automated corrections for larger clean-up projects Stop believing that manual reviews are all you need!
  • 22. 21 Best Practices: Testing All Delivered Code • Testing all code (including outsourced and third-party products)  Communicate and enforce SLAs  Let everyone know that you will be testing  Test all deliverables before beginning functional testing  Don’t waste time with user testing of inferior code  Plan for issues!  Test immediately! Is this code safe enough for your DEV?
  • 23. 22 Best Practices: Automatic Code Scanning • Automatically scan all SAP ABAP code changes  Scan all Transport Requests upon release  Stop Transport Requests with critical issues  Store test results as for compliance audit trail  PCI, PII, SOX, FDA, Basil II, etc.  Be ready for emergency corrections  Enable override of tests with approval  Track who approved exceptions
  • 24. 23 Continuous Monitoring of ABAP Code Changes PRDDEV Development Test/QA ProductionRequirement SICHERE SAP PROGRAMMIERUNG ABAP Guideline Java Guideline ABAP Spezifikation Java Spezifikation Generelle Guideline Interne Entwicklung Externe Entwicklung Automatic Testing QA Exception Approval?
  • 25. 24 Recommended Testing • Security • Compliance • Data Loss Prevention • Performance • Robustness • Maintainability
  • 26. 25 What We’ll Cover • Risks from custom ABAP code • The realities of ABAP development • Best practices for ABAP code for security and quality • Wrap-up
  • 28. 27 Where to Find More Information • www.bizec.org/wiki/Main_Page  The Business Application Security Initiative (BIZEC) is a non-profit organization with a focus on security defects in business applications • www.virtualforge.com/en/library/white-papers/whitepaper-the-abap- underverse.html  Andreas Wiegenstein, “The ABAP Underverse” (BlackHat Briefings, 2011).  A Virtual Forge whitepaper on application and ABAP security • www.virtualforge.com/en/resources/presentations/ensuring-the-security- of-custom-abap-code.html  Chris Warring and Stephen Lamy, “Best Practices for Ensuring the Security of Custom ABAP Code” (SAP TechEd && d-code, 2014).
  • 29. 28 7 Key Points to Take Home • Companies are responsible for their own custom code • If you can’t enforce code quality and security standards consistently, it won’t happen • It’s not possible to accurately assess the security of ABAP code through manual reviews alone • Implementing best practices and corresponding tools early in the development process will lower risk and result in lower TCO
  • 30. 29 7 Key Points to Take Home (cont.) • Do not wait until it’s too late!  Tighten ABAP security while you can • Don’t forget the 11 most dangerous security vulnerabilities and how testing during development can protect you • Provide your developers a way to test and correct code easily while they develop
  • 31. 30 Your Turn! How to contact me: Stephen Lamy Stephen.Lamy@virtualforge.com @virtual_forge Please remember to complete your session evaluation
  • 32. 31 Disclaimer SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Wellesley Information Services is neither owned nor controlled by SAP SE.