SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
Mobile Trends And The New Threats
Is Your SAP System Vulnerable to Cyber Attacks?
Stephen Lamy, Virtual Forge
Agenda
 Mobile Trends and The New Threats
 The Forgotten Layer
 Benchmarks of Defects in Custom ABAP
 What Can Go Wrong?
 Security Standards
Virtual Forge
Founded in 2001
CodeProfiler released 2008, SystemProfiler released 2013
Patented Data and Control Flow Analysis for ABAP
Gartner:
• Magic Quadrant for Application Security Testing
• Leading vendor for ABAP Security
• Cool Vendor 2011
Heidelberg, Weimar and Philadelphia
Experts in the field of SAP® system and application
security and quality
 Mobile Trends and the new Threats
 The Forgotten Layer
 Benchmarks of Defects in Custom ABAP
 What Can Go Wrong?
 Security Standards
Agenda
Going Mobile ... and the Key Threats
 Access from anywhere Hostile environment (public)
5
Source: Dimension Research – “The impact of mobile devices on information security”
Attractive target for attackers
Increased attack surface
 Extensive access to
corporate information
 New features added daily
Attack Vectors against Mobiles
6
Source: Fraunhofer SIT: „How Smartphones and Co. may be Cheating on you”
Facts
McAfee Threats Report: First Quarter 2013
 “… the total number of samples in our mobile malware ‘zoo’
reached 50,926, with 28 percent of that arriving in 2013”
(source this is the Q1 report!)
 “… IP addresses in the United States are again both the source
and the target of most malicious network activity.”
7
Q1 only!
Facts (continued)
 Attacks on Mobile devices focus either:
 Using the mobile to steal sensitive data
 Getting access data to backend systems
 Apple: “50% of smartphone users do not set up a passcode”
 Phishing
 “Companies from the United States are the most targeted, suffering 80
percent of all attacks.”
 Phishing by country:
8
 Mobile Trends and the new Threats
 The Forgotten Layer
 Benchmarks of Defects in Custom ABAP
 What Can Go Wrong?
 Security Standards
Agenda
ALL Mobile apps eventually call ABAP programs
Where the data comes from
Mobile Gateway
Java
Application
HTML
Application
SAP
…
C++
Application
ABAP
RFC/BAdI
The Attack Surface of SAP
1 9 9 7
The Attack Surface of SAP
2 0 0 2
The Attack Surface of SAP
Since 2 0 0 7
The Attack Surface of SAP
Since 2 0 11
NetWeaver
Gateway
 SAP security must be
addressed holistically
 Business Run-time Apps
must properly enforce
Business Logic
 GRC & SoD are only
effective if they are
enforced within the
applications
Operating System
Database
Business Runtime
The Forgotten Layer – Business Runtime
Business Logic
SAP System Security Tests
Testing of >550 SAP Systems
(including some of the largest organizations of the world)
 Over 95% of the systems analyzed were exposed to espionage,
sabotage and fraud attacks
 None of the evaluated SAP systems were fully updated with
the latest SAP security patches
 Most of these exploitable vulnerabilities have been publicly
known to SAP customers for more than 5 years
Source: Onapsis-BlackHat 2012
Increased External SAP Access Points
 Increased External Access Points
Never Trust the Other Side!
- Security Paradigm
 Unsecured devices have access to sensitive backend
systems (e.g. BYOD)
 93% have mobile devices connected to their corporate networks
 The attacks against Mobiles continue to rise dramatically
 52% of large companies say cost of mobile security incidents last
year exceeded $500,000
 45% have more than five times as many personal mobile devices
as they had two years ago, a 36% increase from 2012
 Best Practice:
 Stringently enforce device-level security
 Test and validate the complete application and data processing
18
“Our SAP systems are secure…“
 Mobile Trends and the new Threats
 The Forgotten Layer
 Benchmarks of Defects in Custom ABAP
 What Can Go Wrong?
 Security Standards
Agenda
Source of Defects
 Source of Defects
Little/no technical specifications
Manual/Basic code reviews
Testing focused on functional aspects
External/3rd Party development
Limited/no code change monitoring
Definitions
Average (Arithmetic Mean):
Median:
The value in the middle, when the numbers are sorted
Example: 1,2,3,100,101  Median = 3
LOC = Lines of Code (without comments and empty lines)
KLOC = 1 Thousand LOC
MLOC = 1 Million LOC
Benchmark Data
As of: July, 2013
# of Systems: 88
Total LOC: 156,443,087
Namespaces: All custom ABAP code
(Y*,Z*, 3rd-Party namespaces, BADIs,…)
Test Case Domains: Security
Compliance
Performance
Maintainability
Robustness
Custom ABAP Benchmarks
 Benchmark StatisticsMetric Average Median
Source Code Lines (LOC)
(without comments and empty lines) 1,862,418 1,032,539
Comments 596,059 325,931
Inline Comments 122,876 63,892
Percentage of Comments
in Analyzed Lines 28% 28%
Pragmas 5,119 1,621
Average Module Size (LOC) 53 52
Critical Defects at the Average Customer
 Benchmarks of Critical Defects
Domain Average Median Pro KLOC
(Average)
Security (Critical only) 1,475 903 0,79
Compliance (Critical only) 270 93 0,14
Performance (Critical only) 1,171 1,016 0,63
Maintainability (Critical only) 415 0 0,22
Robustness (Critical only) 1,586 427 0,85
Metric Average Median
Source Code Lines (LOC)
(without comments and empty lines) 1,862,418 1,032,539
Critical Defects at the Average Customer
 1 critical security or compliance defect in every ~1,000
lines of ABAP code
 Probabilities:
ABAP Command Injection 50%
Authorization Issue 100%
Directory Traversal 93%
26
Security Defects: Top 20
Test Case
Missing AUTHORITY-CHECK before CALL TRANSACTION
Missing AUTHORITY-CHECK in Reports
Directory Traversal (Write Access)
Hard-coded SAP System ID Checks (sy-sysid)
Missing AUTHORITY-CHECK in RFC-Enabled Functions
Dangerous ABAP Commands
Directory Traversal (Read Access)
File Upload (SAP GUI)
Hard-coded SAP Client Checks (sy-mandt)
File Download (SAP GUI)
Generic RFC Destinations
OSQL Injection (Read Access)
Broken AUTHORITY-CHECKs
Generic Table Query (Write Access)
Generic ABAP Module Calls
Exposed Kernel Calls
Cross-Site Scripting
ABAP Command Injection (report)
ABAP Command Injection (program)
Hard-coded Passwords
 Mobile Trends and the new Threats
 The Forgotten Layer
 Benchmarks of Defects in Custom ABAP
 What Can Go Wrong?
 Security Standards
Agenda
Free Benchmark Scan
of Your ABAP Code
• Summary of findings
• Prioritization of found
vulnerabilities
• Specific examples of
findings from your
own code
• Code metrics
• Benchmark (on
request)
Robustness & Maintainability
Performance
Data Loss Prevention
Security & Compliance
Your
ABAP™
code
What Can Go Wrong?
Register Here for a
Free Benchmark Scan
 Mobile Trends and the new Threats
 The Forgotten Layer
 Benchmarks of Defects in Custom ABAP
 What Can Go Wrong?
 Security Standards
Agenda
Security Guidelines for SAP
 Culture
• Increase awareness of the need for SAP Security (for example,
though workshops)
• Provide security training (Developer, Administrator, User, etc)
 Organization
• Make SAP Security an integral part of your corporate security
strategy
• Develop company and partner security standards and processes
that are binding!
 Compliance
• Make security a pre-requisite for all SAP projects
• Test that all delivered applications comply with security
standards
• Add SAP Security to your audit activities
Seite
32
 Technology
• Implement automated testing into your change control process
to enable faster detection and mediation of security and quality
defects
 Cost Awareness
• The earlier that defects are found, the less they cost to correct
Cost of a correcting a single defect when found in:
Unit testing (DEV) = $100
User Testing (QA) = $1,000
In productive system (PROD) =$10,000
After System failure, attack,… = $??????
Security Guidelines for SAP – continued
Protecting Against Security Defects
 BIZEC APP/11 Standard Security Tests
ID Vulnerability Description
APP-01 ABAP Command Injection Execution of arbitrary ABAP Commands
APP-02 OS Command Injection Execution of arbitrary OS Commands
APP-03 Native SQL Injection Execution of arbitrary SQL Commands
APP-04 Improper Authorization
(Missing, Broken, Proprietary, Generic)
Missing or incorrect Authorization Checks
APP-05 Directory Traversal Unauthorized write/read access to files (SAP Server)
APP-06 Direct Database Modifications Unauthorized Access to SAP Standard Tables
APP-07 Cross-Client Database Access Cross-Client Access to Business Data
APP-08 Open SQL Injection Malicious Manipulation of OSQL Commands
APP-09 Generic Module Execution Unauthorized Execution of Modules (Reports, FMs, etc.)
APP-10 Cross-Site Scripting Manipulation of the Browser UI, Identity Theft
APP-11 Obscure ABAP Code Hidden / untestable ABAP Code
LEARNING POINTS
 Attacks on mobile Devices are rising exponentially.
 The combination of increased external (Web, mobile,
etc.) applications has increased the diligence required
by companies to ensure that their SAP systems are safe
and stable.
 Custom ABAP and 3rd party code often have a relatively
high number of defects that can introduce serious risks
to your SAP production systems.
 Manual code reviews and basic tools offer no real
protection at a relatively high cost.
RETURN ON INVESTMENT
 Implementing automated testing into your change
control process will enable faster detection and
mediation of security and quality defects
 The earlier that defects are found, the less they cost to
correct
Cost of a correcting a single defect when found in:
Unit testing (DEV) = $100
User Testing (QA) = $1,000
In productive system (PROD) =$10,000
After System failure, attack,… = $??????
BEST PRACTICES
 Enforce stringent security and quality standards for all
custom and 3rd party code – add them to contracts!
 Implement change control procedures that include
automatic testing of all ABAP changes before importing
to productive systems.
Thank You!
Stephen Lamy
stephen.lamy@virtualforge.com
+1 610 864 0261
@Virtual_Forge

Weitere ähnliche Inhalte

Was ist angesagt?

Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Alan Kan
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Kyle Lai
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Jeff Williams
 
Positive Technologies Application Inspector
Positive Technologies Application InspectorPositive Technologies Application Inspector
Positive Technologies Application Inspectorqqlan
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing ToolsEric Lai
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspectrohit_ta
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilitySonatype
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP Technology
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 
IBM Rational App Scan Tester Edition and Quality Manager
IBM Rational App Scan Tester Edition and Quality ManagerIBM Rational App Scan Tester Edition and Quality Manager
IBM Rational App Scan Tester Edition and Quality ManagerАлександр Шамрай
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleJeff Williams
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 stepsERPScan
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Jeff Williams
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile ApplicationsDenim Group
 
AppsSec In a DevOps World
AppsSec In a DevOps WorldAppsSec In a DevOps World
AppsSec In a DevOps WorldParasoft
 

Was ist angesagt? (19)

Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
 
Positive Technologies Application Inspector
Positive Technologies Application InspectorPositive Technologies Application Inspector
Positive Technologies Application Inspector
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing Tools
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspect
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
IBM Rational App Scan Tester Edition and Quality Manager
IBM Rational App Scan Tester Edition and Quality ManagerIBM Rational App Scan Tester Edition and Quality Manager
IBM Rational App Scan Tester Edition and Quality Manager
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio Scale
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Red7 Software Application Security Threat Modeling
Red7 Software Application Security Threat ModelingRed7 Software Application Security Threat Modeling
Red7 Software Application Security Threat Modeling
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
AppsSec In a DevOps World
AppsSec In a DevOps WorldAppsSec In a DevOps World
AppsSec In a DevOps World
 

Ähnlich wie Mobile Trends and SAP Security Risks

Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Virtual Forge
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsERPScan
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonVirtual Forge
 
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...Chakkrit (Kla) Tantithamthavorn
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...DevOps.com
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...DevOps for Enterprise Systems
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Deborah Schalm
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
Software Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecuritySoftware Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecurityTao Xie
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
PIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfPIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfTAURUSEER
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareRogue Wave Software
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
How the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeHow the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeVirtual Forge
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewallsEnclaveSecurity
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays
 

Ähnlich wie Mobile Trends and SAP Security Risks (20)

Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP Solutions
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a button
 
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Software Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecuritySoftware Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and Security
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
PIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfPIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdf
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
How the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP CodeHow the U.S. Department of Defense Secures Its Custom ABAP Code
How the U.S. Department of Defense Secures Its Custom ABAP Code
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
 

Mehr von Virtual Forge

How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...Virtual Forge
 
SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksVirtual Forge
 
Stabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnStabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnVirtual Forge
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANAVirtual Forge
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFixVirtual Forge
 
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenVirtual Forge
 
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...Virtual Forge
 
Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Virtual Forge
 
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Virtual Forge
 
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Virtual Forge
 
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Virtual Forge
 
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAPVirtual Forge
 
Risks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsRisks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsVirtual Forge
 
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...Virtual Forge
 
Die Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitDie Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitVirtual Forge
 
ABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesVirtual Forge
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityBest Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityVirtual Forge
 
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...Virtual Forge
 

Mehr von Virtual Forge (18)

How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
 
SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New Risks
 
Stabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickelnStabile und performante Anwendungen für SAP HANA entwickeln
Stabile und performante Anwendungen für SAP HANA entwickeln
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANA
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP InstallationenABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
 
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
 
Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?Uninvited Guests: Why do hackers love our SAP landscapes?
Uninvited Guests: Why do hackers love our SAP landscapes?
 
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
 
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
 
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
 
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
 
Risks of Hosted SAP Environments
Risks of Hosted SAP EnvironmentsRisks of Hosted SAP Environments
Risks of Hosted SAP Environments
 
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
 
Die Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP SicherheitDie Top 5 Mythen der SAP Sicherheit
Die Top 5 Mythen der SAP Sicherheit
 
ABAP Code Qualität - Best Practices
ABAP Code Qualität - Best PracticesABAP Code Qualität - Best Practices
ABAP Code Qualität - Best Practices
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityBest Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and Security
 
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
 

Kürzlich hochgeladen

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Kürzlich hochgeladen (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Mobile Trends and SAP Security Risks

  • 1. Mobile Trends And The New Threats Is Your SAP System Vulnerable to Cyber Attacks? Stephen Lamy, Virtual Forge
  • 2. Agenda  Mobile Trends and The New Threats  The Forgotten Layer  Benchmarks of Defects in Custom ABAP  What Can Go Wrong?  Security Standards
  • 3. Virtual Forge Founded in 2001 CodeProfiler released 2008, SystemProfiler released 2013 Patented Data and Control Flow Analysis for ABAP Gartner: • Magic Quadrant for Application Security Testing • Leading vendor for ABAP Security • Cool Vendor 2011 Heidelberg, Weimar and Philadelphia Experts in the field of SAP® system and application security and quality
  • 4.  Mobile Trends and the new Threats  The Forgotten Layer  Benchmarks of Defects in Custom ABAP  What Can Go Wrong?  Security Standards Agenda
  • 5. Going Mobile ... and the Key Threats  Access from anywhere Hostile environment (public) 5 Source: Dimension Research – “The impact of mobile devices on information security” Attractive target for attackers Increased attack surface  Extensive access to corporate information  New features added daily
  • 6. Attack Vectors against Mobiles 6 Source: Fraunhofer SIT: „How Smartphones and Co. may be Cheating on you”
  • 7. Facts McAfee Threats Report: First Quarter 2013  “… the total number of samples in our mobile malware ‘zoo’ reached 50,926, with 28 percent of that arriving in 2013” (source this is the Q1 report!)  “… IP addresses in the United States are again both the source and the target of most malicious network activity.” 7 Q1 only!
  • 8. Facts (continued)  Attacks on Mobile devices focus either:  Using the mobile to steal sensitive data  Getting access data to backend systems  Apple: “50% of smartphone users do not set up a passcode”  Phishing  “Companies from the United States are the most targeted, suffering 80 percent of all attacks.”  Phishing by country: 8
  • 9.  Mobile Trends and the new Threats  The Forgotten Layer  Benchmarks of Defects in Custom ABAP  What Can Go Wrong?  Security Standards Agenda
  • 10. ALL Mobile apps eventually call ABAP programs Where the data comes from Mobile Gateway Java Application HTML Application SAP … C++ Application ABAP RFC/BAdI
  • 11. The Attack Surface of SAP 1 9 9 7
  • 12. The Attack Surface of SAP 2 0 0 2
  • 13. The Attack Surface of SAP Since 2 0 0 7
  • 14. The Attack Surface of SAP Since 2 0 11 NetWeaver Gateway
  • 15.  SAP security must be addressed holistically  Business Run-time Apps must properly enforce Business Logic  GRC & SoD are only effective if they are enforced within the applications Operating System Database Business Runtime The Forgotten Layer – Business Runtime Business Logic
  • 16. SAP System Security Tests Testing of >550 SAP Systems (including some of the largest organizations of the world)  Over 95% of the systems analyzed were exposed to espionage, sabotage and fraud attacks  None of the evaluated SAP systems were fully updated with the latest SAP security patches  Most of these exploitable vulnerabilities have been publicly known to SAP customers for more than 5 years Source: Onapsis-BlackHat 2012
  • 17. Increased External SAP Access Points  Increased External Access Points
  • 18. Never Trust the Other Side! - Security Paradigm  Unsecured devices have access to sensitive backend systems (e.g. BYOD)  93% have mobile devices connected to their corporate networks  The attacks against Mobiles continue to rise dramatically  52% of large companies say cost of mobile security incidents last year exceeded $500,000  45% have more than five times as many personal mobile devices as they had two years ago, a 36% increase from 2012  Best Practice:  Stringently enforce device-level security  Test and validate the complete application and data processing 18
  • 19. “Our SAP systems are secure…“
  • 20.  Mobile Trends and the new Threats  The Forgotten Layer  Benchmarks of Defects in Custom ABAP  What Can Go Wrong?  Security Standards Agenda
  • 21. Source of Defects  Source of Defects Little/no technical specifications Manual/Basic code reviews Testing focused on functional aspects External/3rd Party development Limited/no code change monitoring
  • 22. Definitions Average (Arithmetic Mean): Median: The value in the middle, when the numbers are sorted Example: 1,2,3,100,101  Median = 3 LOC = Lines of Code (without comments and empty lines) KLOC = 1 Thousand LOC MLOC = 1 Million LOC
  • 23. Benchmark Data As of: July, 2013 # of Systems: 88 Total LOC: 156,443,087 Namespaces: All custom ABAP code (Y*,Z*, 3rd-Party namespaces, BADIs,…) Test Case Domains: Security Compliance Performance Maintainability Robustness
  • 24. Custom ABAP Benchmarks  Benchmark StatisticsMetric Average Median Source Code Lines (LOC) (without comments and empty lines) 1,862,418 1,032,539 Comments 596,059 325,931 Inline Comments 122,876 63,892 Percentage of Comments in Analyzed Lines 28% 28% Pragmas 5,119 1,621 Average Module Size (LOC) 53 52
  • 25. Critical Defects at the Average Customer  Benchmarks of Critical Defects Domain Average Median Pro KLOC (Average) Security (Critical only) 1,475 903 0,79 Compliance (Critical only) 270 93 0,14 Performance (Critical only) 1,171 1,016 0,63 Maintainability (Critical only) 415 0 0,22 Robustness (Critical only) 1,586 427 0,85 Metric Average Median Source Code Lines (LOC) (without comments and empty lines) 1,862,418 1,032,539
  • 26. Critical Defects at the Average Customer  1 critical security or compliance defect in every ~1,000 lines of ABAP code  Probabilities: ABAP Command Injection 50% Authorization Issue 100% Directory Traversal 93% 26
  • 27. Security Defects: Top 20 Test Case Missing AUTHORITY-CHECK before CALL TRANSACTION Missing AUTHORITY-CHECK in Reports Directory Traversal (Write Access) Hard-coded SAP System ID Checks (sy-sysid) Missing AUTHORITY-CHECK in RFC-Enabled Functions Dangerous ABAP Commands Directory Traversal (Read Access) File Upload (SAP GUI) Hard-coded SAP Client Checks (sy-mandt) File Download (SAP GUI) Generic RFC Destinations OSQL Injection (Read Access) Broken AUTHORITY-CHECKs Generic Table Query (Write Access) Generic ABAP Module Calls Exposed Kernel Calls Cross-Site Scripting ABAP Command Injection (report) ABAP Command Injection (program) Hard-coded Passwords
  • 28.  Mobile Trends and the new Threats  The Forgotten Layer  Benchmarks of Defects in Custom ABAP  What Can Go Wrong?  Security Standards Agenda
  • 29. Free Benchmark Scan of Your ABAP Code • Summary of findings • Prioritization of found vulnerabilities • Specific examples of findings from your own code • Code metrics • Benchmark (on request) Robustness & Maintainability Performance Data Loss Prevention Security & Compliance Your ABAP™ code What Can Go Wrong? Register Here for a Free Benchmark Scan
  • 30.  Mobile Trends and the new Threats  The Forgotten Layer  Benchmarks of Defects in Custom ABAP  What Can Go Wrong?  Security Standards Agenda
  • 31. Security Guidelines for SAP  Culture • Increase awareness of the need for SAP Security (for example, though workshops) • Provide security training (Developer, Administrator, User, etc)  Organization • Make SAP Security an integral part of your corporate security strategy • Develop company and partner security standards and processes that are binding!  Compliance • Make security a pre-requisite for all SAP projects • Test that all delivered applications comply with security standards • Add SAP Security to your audit activities Seite
  • 32. 32  Technology • Implement automated testing into your change control process to enable faster detection and mediation of security and quality defects  Cost Awareness • The earlier that defects are found, the less they cost to correct Cost of a correcting a single defect when found in: Unit testing (DEV) = $100 User Testing (QA) = $1,000 In productive system (PROD) =$10,000 After System failure, attack,… = $?????? Security Guidelines for SAP – continued
  • 33. Protecting Against Security Defects  BIZEC APP/11 Standard Security Tests ID Vulnerability Description APP-01 ABAP Command Injection Execution of arbitrary ABAP Commands APP-02 OS Command Injection Execution of arbitrary OS Commands APP-03 Native SQL Injection Execution of arbitrary SQL Commands APP-04 Improper Authorization (Missing, Broken, Proprietary, Generic) Missing or incorrect Authorization Checks APP-05 Directory Traversal Unauthorized write/read access to files (SAP Server) APP-06 Direct Database Modifications Unauthorized Access to SAP Standard Tables APP-07 Cross-Client Database Access Cross-Client Access to Business Data APP-08 Open SQL Injection Malicious Manipulation of OSQL Commands APP-09 Generic Module Execution Unauthorized Execution of Modules (Reports, FMs, etc.) APP-10 Cross-Site Scripting Manipulation of the Browser UI, Identity Theft APP-11 Obscure ABAP Code Hidden / untestable ABAP Code
  • 34. LEARNING POINTS  Attacks on mobile Devices are rising exponentially.  The combination of increased external (Web, mobile, etc.) applications has increased the diligence required by companies to ensure that their SAP systems are safe and stable.  Custom ABAP and 3rd party code often have a relatively high number of defects that can introduce serious risks to your SAP production systems.  Manual code reviews and basic tools offer no real protection at a relatively high cost.
  • 35. RETURN ON INVESTMENT  Implementing automated testing into your change control process will enable faster detection and mediation of security and quality defects  The earlier that defects are found, the less they cost to correct Cost of a correcting a single defect when found in: Unit testing (DEV) = $100 User Testing (QA) = $1,000 In productive system (PROD) =$10,000 After System failure, attack,… = $??????
  • 36. BEST PRACTICES  Enforce stringent security and quality standards for all custom and 3rd party code – add them to contracts!  Implement change control procedures that include automatic testing of all ABAP changes before importing to productive systems.