SAP code is mostly written in ABAP, and it is an integral part of securing your SAP systems. ABAP developers often struggle to keep up with new and increasing changes and requirements in the fields of code security and code quality, leading to major vulnerabilities or misconfigurations within your SAP system. However, due to the average SAP system containing two million lines of custom-developed code, manual reviews are expensive, inefficient and time-consuming. As a result, custom code errors are frequent, and can heavily impact performance and lead to enormous financial costs. Download our ebook below to learn just how common these code issues are—based on analysis of the custom ABAP code of 373 Onapsis customer SAP systems—and explore the consequences they can have on overall system security, compliance, performance and stability.

About the Author
As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
More about this author
Further Reading
Holiday Security for Your SAP Systems: Protecting Critical Applications During the Winter Break
As the year winds down, most organizations are focused on closing the books and enjoying the winter break. However, this period of reduced staffing and “code freezes” often creates a dangerous blind spot for SAP security during Winter. While your team is stepping away, threat actors are gearing up to exploit the “holiday lull,” a…
The Year of the Zero-Day: Top SAP Vulnerabilities of 2025
In 2025, the SAP threat landscape shifted permanently. The year was defined by three critical realities: the massive NetWeaver Zero-Day (CVE-2025-31324), a surge in perfect-score deserialization flaws, and a shrinking window of defense where attackers weaponized exploits within hours of disclosure. For security teams, the takeaway from 2025 is clear: traditional patching windows are no…
What Is SAP Security? A Definitive Guide for 2025
SAP security is the comprehensive practice of protecting SAP applications, data, and the business processes they support from unauthorized access and cyber threats. Because SAP systems house an organization’s most business-critical information, including financial, customer, and HR data, ensuring that they’re properly secured is of the utmost importance. A strong SAP application security strategy is…
