10.07.2015 Views

DEFENSE IN DEPTH - Layer Seven Security

DEFENSE IN DEPTH - Layer Seven Security

DEFENSE IN DEPTH - Layer Seven Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>DEFENSE</strong> <strong>IN</strong> <strong>DEPTH</strong> AN <strong>IN</strong>TEGRATED STRATEGY FOR SAP SECURITY9SAP performs a rigorous code review for all standard or deliveredprograms prior to release and regularly issues <strong>Security</strong> Notes topatch vulnerabilities detected aſter release. Custom programs arerarely subject to the same level of scrutiny. Programs developed byin-house or off-shore developers to meet the needs of customersnot met by standard SAP functionality are oſten laden with vulnerabilitiesthat, when exploited, undermine the integrity of entire SAPlandscapes. Such landscapes are only as strong as their weakestpoint. A robust application layer fortified with properly configuredplatforms can still be breached through vulnerabilities at theprogram level.SAP does not assume responsibility or liability for losses arisingfrom the exploitation of vulnerabilities in custom code. Customersare expected to develop and apply appropriate soſtware developmentprocedures to manage such risks. Procedures should includerequirements for soſtware integrity and security and should notfocus exclusively on measures such as functionality and performance.Specific examples include the use of open rather thannative SQL, avoiding arbitrary input for dynamic SQL statements,encoding user input before output, removing hardcoded users,secure construction of SELECT statements, and input validationthrough existence and length checks, canonicalization, type checks,range checks and white or black list filters.Developing secure custom programs is a formidable challenge formany SAP customers. ABAP and Java programmers are generallyunfamiliar with secure programming techniques. Furthermore,manual code reviews can increase resource requirements andtimeframes during development and testing. Standard SAP toolssuch as Code Inspector can be used to perform static checks andtests for development objects. Code Inspector is accessed throughthe ABAP Workbench or directly through transaction SCI. Thedefault check variant includes some checks for security risks.Errors, warnings and messages generated by the Code Inspectorshould be investigated and resolved before the release of transports.Code Inspector does not match the performance of soſtware suchas CodeProfiler designed to detect a wider array of vulnerabilitiesin SAP programs. CodeProfiler is used by SAP to perform qualityassurance for standard programs. It is tuned to detect andauto-correct suspicious statements in ABAP programs andintegrates directly with the SAP Transport Management System toprevent the deployment of malicious code. It scans an average of2.24M lines of ABAP code per project and detects an average of5,065 critical errors, of which over 2,400 are considered criticalsecurity flaws. CodeProfiler is SAP-certified for integration withSAP NetWeaver.LAYER SEVEN SECURITY © 2013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!