SAP code is mostly written in ABAP, and it is an integral part of securing your SAP systems. ABAP developers often struggle to keep up with new and increasing changes and requirements in the fields of code security and code quality, leading to major vulnerabilities or misconfigurations within your SAP system. However, due to the average SAP system containing two million lines of custom-developed code, manual reviews are expensive, inefficient and time-consuming. As a result, custom code errors are frequent, and can heavily impact performance and lead to enormous financial costs. Download our ebook below to learn just how common these code issues are—based on analysis of the custom ABAP code of 373 Onapsis customer SAP systems—and explore the consequences they can have on overall system security, compliance, performance and stability.

About the Author
As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
More about this author
Further Reading
Beyond the Basics: Why Comprehensive Application Security Testing for SAP is Non-Negotiable
The shift to the cloud and the rapid evolution of SAP S/4HANA have fundamentally changed the rules of secure software development. Many organizations assume that operating within the SAP ecosystem means built-in tools and the provider’s infrastructure will fully manage their security and compliance requirements. However, relying solely on baseline code security leaves critical vulnerabilities…
The NIST Cybersecurity Framework: What It Is and How to Apply It to SAP
The NIST Cybersecurity Framework provides a comprehensive methodology for organizations to manage cyber risk. Implementing the NIST framework within SAP systems secures the financial, operational, and human resources data that drives the global enterprise. Data breaches cost an average of $4.44 million globally, making robust SAP Governance, Risk, and Compliance strategies essential for modern businesses….
Security: The Silent Enabler of Your SAP Cloud ERP Transformation
The race to SAP Cloud ERP (formerly SAP S/4HANA Cloud) is on, and the industry’s North Star is the “Clean Core.” The goal is simple: keep the standard SAP core untouched to ensure agility, seamless upgrades, and a lower total cost of ownership. However, many organizations mistakenly view security as a separate hurdle to clear…
