Build Clean Code Security Gates with GitRepository Scanning

Download

Strengthen Your SAP Code Security at the Source

This document describes ONAPSIS Git Repository Scanning to build clean code security gates and strengthen SAP code security at the source.

The Challenge

  • As SAP landscapes modernize toward hybrid, cloud-enabled development, Git repositories manage SAP custom code.
  • While Git allows efficient collaboration and code transport, it increases the risk of vulnerabilities spreading quickly.
  • Without integrated security scanning, vulnerabilities can reach productive systems, where fixing them is much more expensive than addressing them during development.

Onapsis Control for Git Repository Security

  • Onapsis Control secures code at rest in Git repositories by connecting directly to automate vulnerability scanning for SAP custom code (both ABAP and non-ABAP).
  • It embeds scanning directly into Git workflows to enable security and quality by design, preventing issues before they are merged or transported.
  • It supports GitHub, GitLab, Bitbucket, and Azure Git, with use cases in abapGit, gCTS, and SAP UI5.
  • Control ensures security policies are followed for every commit, branch, and merge.
  • It supports secure development on SAP BTP for digital transformation and cloud migration projects like RISE with SAP.

Key Benefits and Features

  • Embedded Security: Shift-left enablement makes secure coding a natural part of daily development.
    • Bulk scan thousands of lines of code in minutes.
    • Perform on-demand or scheduled scans of code at rest.
  • Prevent Rework: Early, automated scans reduce rework, accelerate delivery, and eliminate post-release vulnerabilities.
    • Automated checks enforce secure coding standards across repositories.
    • Centralized policies ensure consistency and compliance.
  • Protection: Batch scans identify vulnerabilities, misconfigurations, and insecure APIs.
    • Continuous updates from Onapsis Research Labs protect against the latest SAP-specific threats.