5 Challenges for CIOs E-book

The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This e-book reviews five challenges CIOs face when dealing with SAP security, including recommendations for overcoming these challenges.

Battling Trojan Horses in Your SAP® Transports

Battling Trojan Horses in Your SAP® Transports

Changes to SAP production systems through SAP transports pose a high security risk. These potential “Trojan horses” sneak in malicious content or changes, providing a gateway for espionage, data theft and data manipulation. The damage to an affected company can be considerable, ranging from financial and reputation loss to substantial penalties associated with violations of legal data protection regulations.

Nevertheless, many companies are still unaware of the potential dangers of transports for SAP security. In addition, conventional analysis tools are unable to identify the Trojans hidden in SAP transport files. Transport analysis from Onapsis closes this gap with minimal effort.

Download the Battling Trojan Horses in Your SAP® Transports e-book now to learn more.

United States Department of Defense saves time, increases ABAP code quality, and proves it meets DoD standards with Onapsis

Industry – Federal Government
Company Size – 700,000 (civ) 1.4M

Background

The Theater Enterprise-Wide Logistics System (TEWLS) is an SAP software-based application the U.S. Department of Defense (DOD) Health Agency uses to coordinate medical logistics through a single shared data environment to support all armed forces. It was developed by the U.S. Army and adopted by the DOD.

Challenge

Prove SAP® ABAP code was secure and compliant with DOD standards.

Solution

Onapsis code analysis scans ABAP code across all phases of the development process, reporting any vulnerabilities and providing actionable guidance on how to fix. Low instances of false positives, automated scans, and automatic remediation options significantly reduce the burden on developers to maintain code and prove compliance with DOD standards.

Knowing that vulnerable code could cause an application failure or result in compromising an entire system – which could cost lives – the DOD requires stringent security testing for all software program code before they will grant Authority to Operate (ATO). Because of this, all custom SAP ABAP® applications developed for TEWLS are subject to intense scrutiny. 

Unfortunately, TEWLS couldn’t pass the static code scanning and other tests the DOD requires to gain ATO.TEWLS developers needed to be able to prove the security and compliance of their ABAP code, but available tools were insufficient and had many limitations, including false findings, inconsistent results, limited test scope, no integration with SAP, and no remediation instructions for developers. 

TEWLS teams wasted valuable resources working through false results and were ultimately unable to prove that their code was secure and compliant to finalize DOD ATO.

  • Scanned and remediated vulnerabilities quickly
  • Decreased number of code corrections required
  • Improved developer skills
  • Reduced effort and time spent on code reviews
  • Ensured all code meets security and compliance requirements

“Onapsis code analysis enables us to prove that our code is secure and compliant … it is accurate, comprehensive and consistent and ensures that all ABAP code meets our high standards.”

CHRISTINE WARRING 
Tewls Sustainment Project Manager, Joint Medical Logistics Functional Development Center (JMLFDC)

Solution

Realizing how much valuable time and resources were being wasted on manual analysis and insufficient tools, which couldn’t help them reach ATO, the DOD started researching automated code scanning options and found their ideal solution with The Onapsis Platform. With Onapsis, the DOD received accurate results, which allowed the TEWLS teams to pass the testing needed to prove their code is safe and secure. Onapsis code assessment is comprehensive and tightly integrated with SAP, and provides detailed remediation instructions when any issues are found. Using data and control flow analysis, modules and content accessed beyond the code selected are also checked for vulnerabilities. This makes the classification of problems more reliable and reduces the number of false-positive reports. 

Code analysis from Onapsis can be integrated seamlessly into the various phases of the development process. A freely configurable workflow guarantees that company-specific compliance policies, for the purposes of verification and correction, can be modeled and logged. Integration into the SAP transport system ensures that the defective code doesn’t end up in the production system. 

While they are programming new code, developers receive constant, interactive feedback and vulnerabilities are flagged immediately. Onapsis code analysis identifies the problematic statement and immediately classifies the corresponding risk. To provide developers with optimum support for rectifying the problem, proposed corrections are displayed for the specific vulnerability. This direct feedback, plus extensive documentation, works to accelerate the developers’ learning curve.

Maintaining the Security Posture of Oracle E-Business Suite and Other business critical applications

Onapsis has worked together with the Oracle E-Business Suite (EBS) security team to jointly produce a new white paper about Oracle EBS security. 

The white paper discusses how our research team finds vulnerabilities in Oracle EBS and supports Oracle efforts to deliver their Critical Patch Updates. It also includes best practices and details about the need to continually monitor configurations and security settings.

Download the white paper to see how Onapsis and Oracle work together to improve security for Oracle EBS customers. 

Top 20 Critical Controls for Cloud ERP Customers

Cloud technologies are being increasingly adopted by organizations, regardless of their size, location or industry. When it comes to business-critical applications, typically known as enterprise resource planning (ERP) applications, it is no different.

A Security-by-Design Approach to Protecting Your Business-Critical Applications

98% OF THE FORTUNE 100 USE SAP OR ORACLE EBS

77% OF THE WORLD’S TRANSACTION REVENUE TOUCHES THESE ERP SYSTEMS

We have seen an escalation in attacks against ERP systems in the recent decade. This has led the U.S. Department of Homeland Security to issue multiple CERT alerts around SAP cyber threats. Traditional approaches don’t do enough to secure the ERP layer. 

Download our white paper to learn:

  • The evolution of cyberattacks targeting business-critical applications
  • Why traditional cybersecurity approaches don’t work
  • How to create a programmatic approach to business application cybersecurity