{"id":1812,"date":"2023-08-01T14:36:47","date_gmt":"2023-08-01T14:36:47","guid":{"rendered":"https:\/\/www.in3-group.com\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/"},"modified":"2023-08-01T15:11:54","modified_gmt":"2023-08-01T15:11:54","slug":"sap-security-and-code-review-how-to-prevent-hacker-attacks","status":"publish","type":"post","link":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/","title":{"rendered":"SAP Security and Code Review: How to prevent cyber attacks"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:28px;--awb-line-height:33px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><i>SAP systems are popular targets of cyber attacks. The consequences are usually severe, ranging from high financial losses to the sabotage of critical business processes. But how can companies prevent them? In this article we explain the particular role of code review. <\/i><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-margin-top:20px;--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2560\" height=\"1700\" alt=\"Two men are looking at a project plan.\" title=\"pexels-luis-gomes-546819\" src=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/pexels-luis-gomes-546819-scaled.jpg\" class=\"img-responsive wp-image-1807\" srcset=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/pexels-luis-gomes-546819-200x133.jpg 200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/pexels-luis-gomes-546819-400x266.jpg 400w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/pexels-luis-gomes-546819-600x399.jpg 600w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/pexels-luis-gomes-546819-800x531.jpg 800w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/pexels-luis-gomes-546819-1200x797.jpg 1200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/pexels-luis-gomes-546819-scaled.jpg 2560w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:24px;--awb-line-height:26px;--awb-margin-top:20px;--awb-margin-bottom:30px;\"><p style=\"font-size: 20px; letter-spacing: 0.3px; line-height: 34.4px;\" data-fusion-font=\"true\">Friday, July 28, 10:30 a.m.: Mr. Smith, the IT manager from our <a href=\"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/\">last article<\/a>, is sitting in the conference room at the company headquarters, talking to his team and external consultants. An exhausting and nerve-racking time lies behind them: just recently, the company was hit by a serious cyber attack.<\/p>\n<p style=\"font-size: 20px; letter-spacing: 0.3px; line-height: 34.4px;\" data-fusion-font=\"true\">Now that the threat has been contained and all systems are working again, the company wants to check their cyber security from the ground up. To do this, he has called in a consulting firm, whose experts are now explaining the following:<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:34px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">SQL injection: one of the most common entry points<\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:20px;\"><p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">In <a href=\"https:\/\/securitybridge.com\/security-news\/sql-injection-vulnerability-in-abap-4\/\">SQL injection<\/a>, hackers use vulnerabilities in the application layer to access and manipulate information in a database. And this is how it works: Most web-based applications (including many SAP applications) use Structured Query Language (SQL) to store information in databases or to retrieve it.<\/span><\/p>\n<p>If cybercriminals manage to sneak malware into certain SQL statements, they can change the intended behavior of the database, access and modify unauthorized data or even compromise the entire database.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Which applications are particularly vulnerable?<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>One of the distinguishing features of SAP applications is that they can be adapted precisely to the needs and processes of each individual company through custom coding. Using API interfaces (also known as ABAP customer exits in the SAP environment), developers can write their own code in order to modify the SAP standard applications or set up their processes.<\/p>\n<p>But it is precisely this flexibility that carries great risks. To understand why, you have to know more about the conditions under which custom coding is usually developed. All projects have a tight budget and have to be completed quickly. In the context of quality assurance, usually only the desired functionality is tested. Issues such as code quality and program security are often ignored.<\/p>\n<p>The main reason for this lack of quality assurance is that most companies simply don&#8217;t have enough personnel to ensure that good coding practices are adhered to. Especially when many developers &#8211; both internal and external &#8211; are working through a huge amount of code conversions in large initiatives such as S\/4HANA implementations (Brownfield, Bluefield or Greenfield). Best practices are usually well known \u2013 often there are even programming guidelines \u2013 but the people in charge might not have the time to check, if the developers follow them.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">How code reviews increase program security<\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>This is where <a href=\"https:\/\/www.in3-group.com\/en\/services-2\/implementation\/\">code reviews<\/a> come into play: Specially trained consultants accompany the implementation process. They scan the custom code for anomalies and are thus able to uncover unsafe coding practices, potential security gaps and misconfigurations, so that SQL injections, for example, cannot take effect in the first place.<\/p>\n<p>And even if bad coding doesn&#8217;t lead to intentional system manipulation: the loss of release capability due to bad custom code often results in an enormous increase in project costs.<\/p>\n<p>Another critical aspect of SAP system security is authorization management: in our experience, 20% of custom code has no checks at all, and another 50% has incorrect or inadequate checks. If this code is then automatically migrated to the new S\/4HANA system during a brownfield migration, the security vulnerabilities often remain undetected in the system for years. A professional code review therefore also includes this check.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Better safe than sorry<\/h2><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">With the help of external consultants, Mr. Smith identified and eliminated the vulnerabilities in the company&#8217;s SAP applications. In the future, he and his team will pay special attention to the security of their systems.<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1500\" height=\"844\" alt=\"Digitaler Cyberspace mit Partikeln und digitalen Datennetzverbindungen.\" title=\"digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept\" src=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg\" class=\"img-responsive wp-image-1810\" srcset=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept-200x113.jpg 200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept-400x225.jpg 400w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept-600x338.jpg 600w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept-800x450.jpg 800w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept-1200x675.jpg 1200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg 1500w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":1810,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-1812","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security and Code Review: How to prevent cyber attacks<\/title>\n<meta name=\"description\" content=\"Hacker attacks can cause billions of dollars in damage. But there are methods to protect yourself - code review, for example.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security and Code Review: How to prevent cyber attacks\" \/>\n<meta property=\"og:description\" content=\"Hacker attacks can cause billions of dollars in damage. But there are methods to protect yourself - code review, for example.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"IN3 Group\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-01T14:36:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T15:11:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Inka Grimm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inka Grimm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/\"},\"author\":{\"name\":\"Inka Grimm\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#\\\/schema\\\/person\\\/b7c25c8e80d156dfbe7188a5dc966258\"},\"headline\":\"SAP Security and Code Review: How to prevent cyber attacks\",\"datePublished\":\"2023-08-01T14:36:47+00:00\",\"dateModified\":\"2023-08-01T15:11:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/\"},\"wordCount\":2060,\"publisher\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg\",\"articleSection\":[\"Consulting\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/\",\"name\":\"SAP Security and Code Review: How to prevent cyber attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg\",\"datePublished\":\"2023-08-01T14:36:47+00:00\",\"dateModified\":\"2023-08-01T15:11:54+00:00\",\"description\":\"Hacker attacks can cause billions of dollars in damage. But there are methods to protect yourself - code review, for example.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg\",\"contentUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg\",\"width\":1500,\"height\":844,\"caption\":\"Digitaler Cyberspace mit Partikeln und digitalen Datennetzverbindungen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security and Code Review: How to prevent cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/\",\"name\":\"IN3 Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#organization\",\"name\":\"IN3 Group\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/in3group\\\/\"],\"address\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"49.3064\",\"longitude\":\"8.6425\"},\"telephone\":[\"062276989924\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}],\"email\":\"info@in3-group.com\",\"faxNumber\":\"IN3 GmbH & Co. KG\",\"priceRange\":\"$$$$\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#\\\/schema\\\/person\\\/b7c25c8e80d156dfbe7188a5dc966258\",\"name\":\"Inka Grimm\",\"sameAs\":[\"http:\\\/\\\/www.in3-group.com\"],\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/author\\\/inkagrimm\\\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#local-main-place-address\",\"streetAddress\":\"Altrottstrasse 31, 173\",\"addressLocality\":\"Walldorf\",\"postalCode\":\"69190\",\"addressRegion\":\"Baden-W\u00fcrttemberg\",\"addressCountry\":\"DE\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/sap-security-and-code-review-how-to-prevent-hacker-attacks\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png\",\"contentUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png\",\"width\":1563,\"height\":1563,\"caption\":\"IN3 Group\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Walldorf\" \/>\n<meta name=\"geo.position\" content=\"49.3064;8.6425\" \/>\n<meta name=\"geo.region\" content=\"Germany\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security and Code Review: How to prevent cyber attacks","description":"Hacker attacks can cause billions of dollars in damage. But there are methods to protect yourself - code review, for example.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security and Code Review: How to prevent cyber attacks","og_description":"Hacker attacks can cause billions of dollars in damage. But there are methods to protect yourself - code review, for example.","og_url":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/","og_site_name":"IN3 Group","article_published_time":"2023-08-01T14:36:47+00:00","article_modified_time":"2023-08-01T15:11:54+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg","type":"image\/jpeg"}],"author":"Inka Grimm","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inka Grimm","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#article","isPartOf":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/"},"author":{"name":"Inka Grimm","@id":"https:\/\/www.in3-group.com\/en\/#\/schema\/person\/b7c25c8e80d156dfbe7188a5dc966258"},"headline":"SAP Security and Code Review: How to prevent cyber attacks","datePublished":"2023-08-01T14:36:47+00:00","dateModified":"2023-08-01T15:11:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/"},"wordCount":2060,"publisher":{"@id":"https:\/\/www.in3-group.com\/en\/#organization"},"image":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg","articleSection":["Consulting"],"inLanguage":"en-US","copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.in3-group.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/","url":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/","name":"SAP Security and Code Review: How to prevent cyber attacks","isPartOf":{"@id":"https:\/\/www.in3-group.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg","datePublished":"2023-08-01T14:36:47+00:00","dateModified":"2023-08-01T15:11:54+00:00","description":"Hacker attacks can cause billions of dollars in damage. But there are methods to protect yourself - code review, for example.","breadcrumb":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#primaryimage","url":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg","contentUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/08\/digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-data-analysis-future-background-concept.jpg","width":1500,"height":844,"caption":"Digitaler Cyberspace mit Partikeln und digitalen Datennetzverbindungen."},{"@type":"BreadcrumbList","@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.in3-group.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security and Code Review: How to prevent cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.in3-group.com\/en\/#website","url":"https:\/\/www.in3-group.com\/en\/","name":"IN3 Group","description":"","publisher":{"@id":"https:\/\/www.in3-group.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.in3-group.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.in3-group.com\/en\/#organization","name":"IN3 Group","url":"https:\/\/www.in3-group.com\/en\/","logo":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#local-main-organization-logo"},"sameAs":["https:\/\/www.linkedin.com\/company\/in3group\/"],"address":{"@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"49.3064","longitude":"8.6425"},"telephone":["062276989924"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"17:00"}],"email":"info@in3-group.com","faxNumber":"IN3 GmbH & Co. KG","priceRange":"$$$$"},{"@type":"Person","@id":"https:\/\/www.in3-group.com\/en\/#\/schema\/person\/b7c25c8e80d156dfbe7188a5dc966258","name":"Inka Grimm","sameAs":["http:\/\/www.in3-group.com"],"url":"https:\/\/www.in3-group.com\/en\/author\/inkagrimm\/"},{"@type":"PostalAddress","@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#local-main-place-address","streetAddress":"Altrottstrasse 31, 173","addressLocality":"Walldorf","postalCode":"69190","addressRegion":"Baden-W\u00fcrttemberg","addressCountry":"DE"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.in3-group.com\/en\/sap-security-and-code-review-how-to-prevent-hacker-attacks\/#local-main-organization-logo","url":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2026\/01\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png","contentUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2026\/01\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png","width":1563,"height":1563,"caption":"IN3 Group"}]},"geo.placename":"Walldorf","geo.position":{"lat":"49.3064","long":"8.6425"},"geo.region":"Germany"},"_links":{"self":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts\/1812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/comments?post=1812"}],"version-history":[{"count":14,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts\/1812\/revisions"}],"predecessor-version":[{"id":1827,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts\/1812\/revisions\/1827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/media\/1810"}],"wp:attachment":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/media?parent=1812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/categories?post=1812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/tags?post=1812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}