SlideShare a Scribd company logo
1 of 33
Download to read offline
Ensuring the Quality and Security 
of Custom SAP Applications at the 
Department of Defense 
Chris Warring, Department of Defense 
Stephen Lamy, Virtual Forge 
© 2014, Virtual Forge GmbH. All 
rights reserved.
Introductions 
TEWLS Sustainment Project Manager 
JMLFDC 
CACI Contractor
Agenda 
q SAP TEWLS @ Department of Defense 
q Challenges 
q Custom ABAP 
q Best Practices 
q Virtual Forge CodeProfiler
SAP TEWLS @ Dept of Defense
SAP TEWLS @ Dept of Defense 
Custom ABAP Applications 
Theater Enterprise Wide Logistics System (TEWLS) 
q SAP-based Enterprise Resource Planning 
q Supports theater-level medical logistics 
q Developed by US Army to replace TAMMIS 
q Single shared data environment 
q Developed in ABAP
SAP TEWLS @ Dept of Defense 
Custom ABAP Applications 
What is TEWLS? 
q Enterprise-level total life cycle management of medical assemblages 
(development, production, fielding, and sustainment) 
q Materials and assemblage life cycle management 
q Theater Intermediate-Level Medical Logistics: 
q Acquisition & Life Cycle Management 
q Strategic programs for mobilization & deployment of materials 
q Theater Supply Chain Management to include full storage and distribution capabilities for 
Medical Material (TLAMM) 
q Compliance with Federal Financial Management Improvement Act (FFMIA), Standard 
Financial Information Structure (SFIS), and Federal Information System Controls Audit 
Manual (FISCAM)
Challenges
Challenges 
Passing the Test 
Department of Defense Adopted TEWLS 
q TEWLS to be used for all armed forces 
q Required to prove that ABAP code was secure and compliant 
The Problem: 
q Static code scanning required 
q Code scanning solution that DOD mandated did not produce accurate result with ABAP code 
q Precluded the finalization of Authority to Operate (ATO)
Challenges 
The Problem 
Limitations with existing tools 
q Many false findings 
q Inconsistent results (even with same code base) 
q Limited test scope 
q Not integrated with SAP 
q No remediation instructions for developers 
Impact 
q Used valuable resource time working through false results 
q Unable to prove that the code was secure and compliance to finalize DOD ATO 
q Annoyed developers 
q Late feedback for developers
Challenges 
The Solution 
ABAP Scanning with CodeProfiler 
q Accurate results with prioritized findings 
q Comprehensive testing 
q Tightly integrated with SAP 
q Detailed remediation instructions 
Results 
q Able to scan and remediate vulnerabilities quickly 
q Reduced number of code corrections required 
q Improved developer skills 
q Reduced effort and time spent on code reviews 
q Ensured ALL code meets security and compliance requirements
Custom ABAP
Custom ABAP 
The Evolution of SAP® 
In 
the 
past 
Today 
Future 
§ Isolated 
systems 
§ Fewer 
users 
§ Less 
data 
§ Less 
custom 
development 
§ Regular 
but 
rare 
releases 
§ Open 
systems 
§ More 
users 
§ More 
data 
§ More 
custom 
development 
§ Frequent 
release 
cycles 
§ Reduced 
staff 
§ More 
open 
systems 
§ Even 
more 
users 
§ Even 
more 
data 
§ Even 
more 
development 
§ Higher 
frequency 
releases 
§ Even 
smaller 
staff
Custom ABAP 
SAP Security – Holistic View 
q SAP security and quality must be 
addressed holistically - including 
custom code 
q Custom code can result in: 
q system failure 
q hacker access 
q slow performance 
q Business apps must properly 
enforce Business Logic (rules) 
q GRC & SoD are only effective if 
they are enforced within 
application code 
Business Logic 
Business Run-time 
Database 
Operating System
Attack Surface of SAP 
1997 – Good old times 
Direct UIs 
External 
Systems 
SAP ABAP® System
Attack Surface of SAP 
2002 – Complexity grows 
SAP ABAP® System Indirect Uis 
Direct UIs 
External 
Systems
Attack Surface of SAP 
2007 – and grows 
Direct UIs 
Indirect UIs 
External 
Systems 
SAP ABAP® System
Attack Surface of SAP 
Since 2011 – and grows 
Indirect UIs 
External 
Systems 
SAP ABAP® System 
Direct UIs
Custom ABAP 
Current Situation 
The average SAP customer system has: 
q .84 Critical Security / Compliance errors per 1,000 LOC 
q 50% probability of an ABAP® Command Injection vulnerability 
q 88% probability of a Directory Traversal vulnerability 
q 99.9% probability of defective Authorization Checks 
Source: CodeProfiler of custom ABAP® code from 171 SAP systems (status: May 2014) 
Total amount of scanned customers coding lines 377Mio
Custom ABAP 
Costs of correcting a single defect 
The earlier the code is repaired, the lower the cost 
to correct defect $100 during development 
$1,000 to correct same defect when found during QA testing 
$10,000 to correct same defect found in production 
$ cost of attack or system down
Custom ABAP 
Cost of Correcting Code 
1 : 10 : 100 
DEV QAS PRD 
Cost of 
Development 
Eclipse 
integration 
SE80 
integration 
TMS Integration 
Test 
Go Live Time (DEV, QAS, PRD)
Custom ABAP 
Code Scanning Compliance 
q DOD 
Proof 
of 
security 
and 
compliance 
q PCI-­‐DSS 
(Payment 
Card 
Industry 
Data 
Security 
Standard) 
q PIA 
(Privacy 
Impact 
Assessment) 
q PII 
(Personally 
IdenHfiable 
InformaHon) 
q Company 
specific 
policies
Best Practices
Best Practices 
Recommended Testing 
q Security 
q Compliance 
q Performance 
q Robustness 
q Maintainability
Best Practices 
Code Reviews! 
Top 10 Most Dangerous Security Vulnerabilities: 
q ABAP Command Injection 
q OS Command Injection 
q Native SQL Injection 
q Improper Authorization Checks 
q Directory Traversal 
q Direct Database Modifications 
q Cross-Client Database Access 
q Open SQL Injection 
q Generic Module Execution 
q Cross-Site Scripting
Best Practices 
Lessons Learned/Recommendations ! 
q Begin static code scanning NOW! 
q Test and correct early and often during 
development 
q Set priorities based upon your own 
code base 
q Plan to manage cleanup activities as 
well as ongoing development 
q Don’t wait for an incident to occur 
q Manual reviews are ineffective 
q Don’t wait until QA 
q Decide what will stop a transport 
from being released 
q Based upon your own code 
q Vulnerabilities can be fatal
Best Practices 
Automated Risk and Quality Management ! 
Development 
Test/QA 
ProducDon 
AutomaDcally 
scan 
ALL 
changes 
DEV 
QA 
PRD 
Approve 
excepDon?
Virtual Forge CodeProfiler
Virtual Forge CodeProfiler 
Automated Risk Management 
ProacHve 
protecHon 
with 
transparency 
ConHnuous 
validaHon 
Patented 
intelligent 
and 
efficient 
verificaHon 
Minimized 
effort 
and 
total 
cost 
of 
ownership 
Flexible 
and 
scalable 
Comprehensive 
and 
powerful
Virtual Forge CodeProfiler 
Finding What Matters 
Input 
(SAP 
GUI, 
BSP, 
RFC, 
...) 
Data Control Flow Analysis 
Dangerous 
Statement 
SoPware
Virtual Forge CodeProfiler 
Customer Testimonials 
Proven success 
[ “Applying the Virtual Forge CodeProfiler and the close collaboration helped us to 
increase the level of security and improved the quality of our business solutions.” ] 
Ralph Salomon, Vice President IT Security & Risk Office at SAP 
[ “One of the key requirements was to scan several billions lines of code each week. 
Together with Virtual Forge we have been able to create a truly unique solution.” ] 
Michael Brauer, Director of Corporate Automation within the Corporate IT department at Siemens 
[ “With Virtual Forge CodeProfiler tightly integrated into our SAP change and transport 
management processes, we were able to scan all our custom ABAP® code and identify non-compliant 
code in no time at all.” ] 
Joby Joseph, SAP Security Lead at Globe and Mail
Virtual Forge CodeProfiler 
Free Risk Assessment Offer! 
How good is your SAP system? 
Visit www.virtualforge.com 
Free 
" Summary of 
findings 
" Prioritization and 
classification of 
vulnerabilities 
" Specific examples 
of findings 
" Code and system 
metrics 
Security 
Compliance 
Quality 
SAP® 
Risk Assessment 
Virtual Forge CodeProfiler 
and SystemProfiler
Disclaimer 
© 2014 Virtual Forge GmbH. All rights reserved. 
Information contained in this publication is subject to change without prior notice. 
These materials are provided by Virtual Forge and serve only as information. 
SAP, ABAP and other named SAP products and services as well as their respective logos are trademarks or 
registered trademarks of SAP AG in Germany and other countries worldwide. 
All other names of products and services are trademarks of their respective companies. 
Virtual Forge accepts no liability or responsibility for errors or omissions in this publication. From the 
information contained in this publication, no further liability is assumed. No part of this publication may be 
reproduced or transmitted in any form or for any purpose without the express permission of Virtual Forge 
GmbH, Germany or Virtual Forge Inc., Philadelphia. The General Terms and Conditions of Virtual Forge apply.
More Case Studies To Come … 
@Virtual_Forge

More Related Content

What's hot

Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything CA Technologies
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudSalesforce Developers
 
Salesforce – Proven Platform Development with DevOps & Agile
Salesforce – Proven Platform Development with DevOps & AgileSalesforce – Proven Platform Development with DevOps & Agile
Salesforce – Proven Platform Development with DevOps & AgileSai Jithesh ☁️
 
Serena Webcast: Accelerating Application Delivery with Continuous Testing
Serena Webcast: Accelerating Application Delivery with Continuous TestingSerena Webcast: Accelerating Application Delivery with Continuous Testing
Serena Webcast: Accelerating Application Delivery with Continuous TestingSerena Software
 
Continuous Testing of Cloud Applications
Continuous Testing of Cloud ApplicationsContinuous Testing of Cloud Applications
Continuous Testing of Cloud ApplicationsTechWell
 
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeterCA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeterCA Technologies
 
What Retailers Know About Performance and User Experience
What Retailers Know About Performance and User ExperienceWhat Retailers Know About Performance and User Experience
What Retailers Know About Performance and User ExperienceSOASTA
 
The Key to DevOps? Testing Early in the Pipeline
The Key to DevOps? Testing Early in the PipelineThe Key to DevOps? Testing Early in the Pipeline
The Key to DevOps? Testing Early in the PipelineDevOps.com
 
Our DevOps Journey: 6 Month Waterfalls to 1 Hour Code Deploys
Our DevOps Journey: 6 Month Waterfalls to 1 Hour Code DeploysOur DevOps Journey: 6 Month Waterfalls to 1 Hour Code Deploys
Our DevOps Journey: 6 Month Waterfalls to 1 Hour Code DeploysDynatrace
 
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...CA Technologies
 
James Christie CAST 2014 Standards – promoting quality or restricting competi...
James Christie CAST 2014 Standards – promoting quality or restricting competi...James Christie CAST 2014 Standards – promoting quality or restricting competi...
James Christie CAST 2014 Standards – promoting quality or restricting competi...James Christie Christie
 
Where Testers & QA Fit in the Story of DevOps
Where Testers & QA Fit in the Story of DevOpsWhere Testers & QA Fit in the Story of DevOps
Where Testers & QA Fit in the Story of DevOpsQASymphony
 
3 Tips to Deliver Fast Performance Across Mobile Web
3 Tips to Deliver Fast Performance Across Mobile Web3 Tips to Deliver Fast Performance Across Mobile Web
3 Tips to Deliver Fast Performance Across Mobile WebDynatrace
 
Methodologies 1: Managing Agile Projects
Methodologies 1: Managing Agile ProjectsMethodologies 1: Managing Agile Projects
Methodologies 1: Managing Agile ProjectsInflectra
 
An Agile Testing Dashboard: Metrics that Matter
An Agile Testing Dashboard: Metrics that MatterAn Agile Testing Dashboard: Metrics that Matter
An Agile Testing Dashboard: Metrics that MatterTechWell
 
Jonny wooldridge DevOps Large and Small
Jonny wooldridge DevOps Large and SmallJonny wooldridge DevOps Large and Small
Jonny wooldridge DevOps Large and SmallJwooldridge
 
Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...
Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...
Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...QA or the Highway
 
Preparing for Enterprise Continuous Delivery - 5 Critical Steps
Preparing for Enterprise Continuous Delivery - 5 Critical StepsPreparing for Enterprise Continuous Delivery - 5 Critical Steps
Preparing for Enterprise Continuous Delivery - 5 Critical StepsXebiaLabs
 

What's hot (20)

Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce Cloud
 
Oak testing profile2013
Oak testing profile2013Oak testing profile2013
Oak testing profile2013
 
Salesforce – Proven Platform Development with DevOps & Agile
Salesforce – Proven Platform Development with DevOps & AgileSalesforce – Proven Platform Development with DevOps & Agile
Salesforce – Proven Platform Development with DevOps & Agile
 
Serena Webcast: Accelerating Application Delivery with Continuous Testing
Serena Webcast: Accelerating Application Delivery with Continuous TestingSerena Webcast: Accelerating Application Delivery with Continuous Testing
Serena Webcast: Accelerating Application Delivery with Continuous Testing
 
Continuous Testing of Cloud Applications
Continuous Testing of Cloud ApplicationsContinuous Testing of Cloud Applications
Continuous Testing of Cloud Applications
 
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeterCA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
CA Security Communities Webcast - CA SSO Performance Testing with CA BlazeMeter
 
What Retailers Know About Performance and User Experience
What Retailers Know About Performance and User ExperienceWhat Retailers Know About Performance and User Experience
What Retailers Know About Performance and User Experience
 
The Key to DevOps? Testing Early in the Pipeline
The Key to DevOps? Testing Early in the PipelineThe Key to DevOps? Testing Early in the Pipeline
The Key to DevOps? Testing Early in the Pipeline
 
Our DevOps Journey: 6 Month Waterfalls to 1 Hour Code Deploys
Our DevOps Journey: 6 Month Waterfalls to 1 Hour Code DeploysOur DevOps Journey: 6 Month Waterfalls to 1 Hour Code Deploys
Our DevOps Journey: 6 Month Waterfalls to 1 Hour Code Deploys
 
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
 
James Christie CAST 2014 Standards – promoting quality or restricting competi...
James Christie CAST 2014 Standards – promoting quality or restricting competi...James Christie CAST 2014 Standards – promoting quality or restricting competi...
James Christie CAST 2014 Standards – promoting quality or restricting competi...
 
Where Testers & QA Fit in the Story of DevOps
Where Testers & QA Fit in the Story of DevOpsWhere Testers & QA Fit in the Story of DevOps
Where Testers & QA Fit in the Story of DevOps
 
3 Tips to Deliver Fast Performance Across Mobile Web
3 Tips to Deliver Fast Performance Across Mobile Web3 Tips to Deliver Fast Performance Across Mobile Web
3 Tips to Deliver Fast Performance Across Mobile Web
 
Methodologies 1: Managing Agile Projects
Methodologies 1: Managing Agile ProjectsMethodologies 1: Managing Agile Projects
Methodologies 1: Managing Agile Projects
 
An Agile Testing Dashboard: Metrics that Matter
An Agile Testing Dashboard: Metrics that MatterAn Agile Testing Dashboard: Metrics that Matter
An Agile Testing Dashboard: Metrics that Matter
 
Jonny wooldridge DevOps Large and Small
Jonny wooldridge DevOps Large and SmallJonny wooldridge DevOps Large and Small
Jonny wooldridge DevOps Large and Small
 
Test Automation in Agile
Test Automation in AgileTest Automation in Agile
Test Automation in Agile
 
Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...
Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...
Enhancing your Test automation Scenario Coverage Using Selenium by Eran Kinsb...
 
Preparing for Enterprise Continuous Delivery - 5 Critical Steps
Preparing for Enterprise Continuous Delivery - 5 Critical StepsPreparing for Enterprise Continuous Delivery - 5 Critical Steps
Preparing for Enterprise Continuous Delivery - 5 Critical Steps
 

Similar to Case Study: Ensuring the Quality and Security of Custom SAP Applications at the Department of Defense

How the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeHow the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeVirtual Forge
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonVirtual Forge
 
Merging Security with DevOps - An AppSec Perspective
Merging Security with DevOps - An AppSec PerspectiveMerging Security with DevOps - An AppSec Perspective
Merging Security with DevOps - An AppSec PerspectiveAbhay Bhargav
 
How to Avoid Continuously Delivering Faulty Software
How to Avoid Continuously Delivering Faulty SoftwareHow to Avoid Continuously Delivering Faulty Software
How to Avoid Continuously Delivering Faulty SoftwareParasoft
 
XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...
XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...
XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...XebiaLabs
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsERPScan
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksSAP Customer Experience
 
Fllow con 2014
Fllow con 2014 Fllow con 2014
Fllow con 2014 gbgruver
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksRyan Flood
 
AWS and Dynatrace: Moving your Cloud Strategy to the Next Level
AWS and Dynatrace: Moving your Cloud Strategy to the Next LevelAWS and Dynatrace: Moving your Cloud Strategy to the Next Level
AWS and Dynatrace: Moving your Cloud Strategy to the Next LevelDynatrace
 
Yumasoft An Outsourcing Software Development Services
Yumasoft An Outsourcing Software Development ServicesYumasoft An Outsourcing Software Development Services
Yumasoft An Outsourcing Software Development ServicesYuma Soft
 
Software testing proposal for the software comppany .pptx
Software testing proposal for the software comppany .pptxSoftware testing proposal for the software comppany .pptx
Software testing proposal for the software comppany .pptxMeseAK
 
DevOps in Salesforce AppCloud
DevOps in Salesforce AppCloudDevOps in Salesforce AppCloud
DevOps in Salesforce AppCloudrsg00usa
 
Better Software East 2016: Evolving Automated to Continuous
Better Software East 2016: Evolving Automated to ContinuousBetter Software East 2016: Evolving Automated to Continuous
Better Software East 2016: Evolving Automated to ContinuousParasoft
 
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...Overview and Walkthrough of the Application Programming Model with SAP Cloud ...
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...SAP Cloud Platform
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP Technology
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 

Similar to Case Study: Ensuring the Quality and Security of Custom SAP Applications at the Department of Defense (20)

How the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeHow the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP Code
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a button
 
Merging Security with DevOps - An AppSec Perspective
Merging Security with DevOps - An AppSec PerspectiveMerging Security with DevOps - An AppSec Perspective
Merging Security with DevOps - An AppSec Perspective
 
How to Avoid Continuously Delivering Faulty Software
How to Avoid Continuously Delivering Faulty SoftwareHow to Avoid Continuously Delivering Faulty Software
How to Avoid Continuously Delivering Faulty Software
 
XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...
XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...
XebiaLabs & codecentric Webinar: Deploy Higher Quality Applications Faster (G...
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP Solutions
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
Fllow con 2014
Fllow con 2014 Fllow con 2014
Fllow con 2014
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
 
AWS and Dynatrace: Moving your Cloud Strategy to the Next Level
AWS and Dynatrace: Moving your Cloud Strategy to the Next LevelAWS and Dynatrace: Moving your Cloud Strategy to the Next Level
AWS and Dynatrace: Moving your Cloud Strategy to the Next Level
 
Yumasoft An Outsourcing Software Development Services
Yumasoft An Outsourcing Software Development ServicesYumasoft An Outsourcing Software Development Services
Yumasoft An Outsourcing Software Development Services
 
Software testing proposal for the software comppany .pptx
Software testing proposal for the software comppany .pptxSoftware testing proposal for the software comppany .pptx
Software testing proposal for the software comppany .pptx
 
DevOps in Salesforce AppCloud
DevOps in Salesforce AppCloudDevOps in Salesforce AppCloud
DevOps in Salesforce AppCloud
 
Better Software East 2016: Evolving Automated to Continuous
Better Software East 2016: Evolving Automated to ContinuousBetter Software East 2016: Evolving Automated to Continuous
Better Software East 2016: Evolving Automated to Continuous
 
Continuous testing
Continuous testingContinuous testing
Continuous testing
 
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...Overview and Walkthrough of the Application Programming Model with SAP Cloud ...
Overview and Walkthrough of the Application Programming Model with SAP Cloud ...
 
Aicas, Inc.
Aicas, Inc.Aicas, Inc.
Aicas, Inc.
 
aicas, inc.
aicas, inc.aicas, inc.
aicas, inc.
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

More from Virtual Forge

How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...Virtual Forge
 
SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksVirtual Forge
 
Stabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnStabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnVirtual Forge
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANAVirtual Forge
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFixVirtual Forge
 
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenVirtual Forge
 
Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Virtual Forge
 
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Virtual Forge
 
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Virtual Forge
 
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Virtual Forge
 
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAPVirtual Forge
 
Risks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsRisks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsVirtual Forge
 
Die Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitDie Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitVirtual Forge
 
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...Virtual Forge
 
ABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesVirtual Forge
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityBest Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityVirtual Forge
 

More from Virtual Forge (16)

How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
 
SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New Risks
 
Stabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnStabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickeln
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANA
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
 
Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?
 
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
 
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
 
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
 
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
 
Risks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsRisks of Hosted SAP Environments
Risks of Hosted SAP Environments
 
Die Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitDie Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP Sicherheit
 
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
 
ABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesABAP Code Qualität - Best Practices
ABAP Code Qualität - Best Practices
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityBest Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and Security
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Case Study: Ensuring the Quality and Security of Custom SAP Applications at the Department of Defense

  • 1. Ensuring the Quality and Security of Custom SAP Applications at the Department of Defense Chris Warring, Department of Defense Stephen Lamy, Virtual Forge © 2014, Virtual Forge GmbH. All rights reserved.
  • 2. Introductions TEWLS Sustainment Project Manager JMLFDC CACI Contractor
  • 3. Agenda q SAP TEWLS @ Department of Defense q Challenges q Custom ABAP q Best Practices q Virtual Forge CodeProfiler
  • 4. SAP TEWLS @ Dept of Defense
  • 5. SAP TEWLS @ Dept of Defense Custom ABAP Applications Theater Enterprise Wide Logistics System (TEWLS) q SAP-based Enterprise Resource Planning q Supports theater-level medical logistics q Developed by US Army to replace TAMMIS q Single shared data environment q Developed in ABAP
  • 6. SAP TEWLS @ Dept of Defense Custom ABAP Applications What is TEWLS? q Enterprise-level total life cycle management of medical assemblages (development, production, fielding, and sustainment) q Materials and assemblage life cycle management q Theater Intermediate-Level Medical Logistics: q Acquisition & Life Cycle Management q Strategic programs for mobilization & deployment of materials q Theater Supply Chain Management to include full storage and distribution capabilities for Medical Material (TLAMM) q Compliance with Federal Financial Management Improvement Act (FFMIA), Standard Financial Information Structure (SFIS), and Federal Information System Controls Audit Manual (FISCAM)
  • 8. Challenges Passing the Test Department of Defense Adopted TEWLS q TEWLS to be used for all armed forces q Required to prove that ABAP code was secure and compliant The Problem: q Static code scanning required q Code scanning solution that DOD mandated did not produce accurate result with ABAP code q Precluded the finalization of Authority to Operate (ATO)
  • 9. Challenges The Problem Limitations with existing tools q Many false findings q Inconsistent results (even with same code base) q Limited test scope q Not integrated with SAP q No remediation instructions for developers Impact q Used valuable resource time working through false results q Unable to prove that the code was secure and compliance to finalize DOD ATO q Annoyed developers q Late feedback for developers
  • 10. Challenges The Solution ABAP Scanning with CodeProfiler q Accurate results with prioritized findings q Comprehensive testing q Tightly integrated with SAP q Detailed remediation instructions Results q Able to scan and remediate vulnerabilities quickly q Reduced number of code corrections required q Improved developer skills q Reduced effort and time spent on code reviews q Ensured ALL code meets security and compliance requirements
  • 12. Custom ABAP The Evolution of SAP® In the past Today Future § Isolated systems § Fewer users § Less data § Less custom development § Regular but rare releases § Open systems § More users § More data § More custom development § Frequent release cycles § Reduced staff § More open systems § Even more users § Even more data § Even more development § Higher frequency releases § Even smaller staff
  • 13. Custom ABAP SAP Security – Holistic View q SAP security and quality must be addressed holistically - including custom code q Custom code can result in: q system failure q hacker access q slow performance q Business apps must properly enforce Business Logic (rules) q GRC & SoD are only effective if they are enforced within application code Business Logic Business Run-time Database Operating System
  • 14. Attack Surface of SAP 1997 – Good old times Direct UIs External Systems SAP ABAP® System
  • 15. Attack Surface of SAP 2002 – Complexity grows SAP ABAP® System Indirect Uis Direct UIs External Systems
  • 16. Attack Surface of SAP 2007 – and grows Direct UIs Indirect UIs External Systems SAP ABAP® System
  • 17. Attack Surface of SAP Since 2011 – and grows Indirect UIs External Systems SAP ABAP® System Direct UIs
  • 18. Custom ABAP Current Situation The average SAP customer system has: q .84 Critical Security / Compliance errors per 1,000 LOC q 50% probability of an ABAP® Command Injection vulnerability q 88% probability of a Directory Traversal vulnerability q 99.9% probability of defective Authorization Checks Source: CodeProfiler of custom ABAP® code from 171 SAP systems (status: May 2014) Total amount of scanned customers coding lines 377Mio
  • 19. Custom ABAP Costs of correcting a single defect The earlier the code is repaired, the lower the cost to correct defect $100 during development $1,000 to correct same defect when found during QA testing $10,000 to correct same defect found in production $ cost of attack or system down
  • 20. Custom ABAP Cost of Correcting Code 1 : 10 : 100 DEV QAS PRD Cost of Development Eclipse integration SE80 integration TMS Integration Test Go Live Time (DEV, QAS, PRD)
  • 21. Custom ABAP Code Scanning Compliance q DOD Proof of security and compliance q PCI-­‐DSS (Payment Card Industry Data Security Standard) q PIA (Privacy Impact Assessment) q PII (Personally IdenHfiable InformaHon) q Company specific policies
  • 23. Best Practices Recommended Testing q Security q Compliance q Performance q Robustness q Maintainability
  • 24. Best Practices Code Reviews! Top 10 Most Dangerous Security Vulnerabilities: q ABAP Command Injection q OS Command Injection q Native SQL Injection q Improper Authorization Checks q Directory Traversal q Direct Database Modifications q Cross-Client Database Access q Open SQL Injection q Generic Module Execution q Cross-Site Scripting
  • 25. Best Practices Lessons Learned/Recommendations ! q Begin static code scanning NOW! q Test and correct early and often during development q Set priorities based upon your own code base q Plan to manage cleanup activities as well as ongoing development q Don’t wait for an incident to occur q Manual reviews are ineffective q Don’t wait until QA q Decide what will stop a transport from being released q Based upon your own code q Vulnerabilities can be fatal
  • 26. Best Practices Automated Risk and Quality Management ! Development Test/QA ProducDon AutomaDcally scan ALL changes DEV QA PRD Approve excepDon?
  • 28. Virtual Forge CodeProfiler Automated Risk Management ProacHve protecHon with transparency ConHnuous validaHon Patented intelligent and efficient verificaHon Minimized effort and total cost of ownership Flexible and scalable Comprehensive and powerful
  • 29. Virtual Forge CodeProfiler Finding What Matters Input (SAP GUI, BSP, RFC, ...) Data Control Flow Analysis Dangerous Statement SoPware
  • 30. Virtual Forge CodeProfiler Customer Testimonials Proven success [ “Applying the Virtual Forge CodeProfiler and the close collaboration helped us to increase the level of security and improved the quality of our business solutions.” ] Ralph Salomon, Vice President IT Security & Risk Office at SAP [ “One of the key requirements was to scan several billions lines of code each week. Together with Virtual Forge we have been able to create a truly unique solution.” ] Michael Brauer, Director of Corporate Automation within the Corporate IT department at Siemens [ “With Virtual Forge CodeProfiler tightly integrated into our SAP change and transport management processes, we were able to scan all our custom ABAP® code and identify non-compliant code in no time at all.” ] Joby Joseph, SAP Security Lead at Globe and Mail
  • 31. Virtual Forge CodeProfiler Free Risk Assessment Offer! How good is your SAP system? Visit www.virtualforge.com Free " Summary of findings " Prioritization and classification of vulnerabilities " Specific examples of findings " Code and system metrics Security Compliance Quality SAP® Risk Assessment Virtual Forge CodeProfiler and SystemProfiler
  • 32. Disclaimer © 2014 Virtual Forge GmbH. All rights reserved. Information contained in this publication is subject to change without prior notice. These materials are provided by Virtual Forge and serve only as information. SAP, ABAP and other named SAP products and services as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries worldwide. All other names of products and services are trademarks of their respective companies. Virtual Forge accepts no liability or responsibility for errors or omissions in this publication. From the information contained in this publication, no further liability is assumed. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of Virtual Forge GmbH, Germany or Virtual Forge Inc., Philadelphia. The General Terms and Conditions of Virtual Forge apply.
  • 33. More Case Studies To Come … @Virtual_Forge