{"id":56,"date":"2017-01-03T19:34:28","date_gmt":"2017-01-03T18:34:28","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=56"},"modified":"2020-07-07T12:00:44","modified_gmt":"2020-07-07T10:00:44","slug":"established-security-check-of-your-custom-developments","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/","title":{"rendered":"Established security check of your custom developments."},"content":{"rendered":"<h2><span style=\"color: #626161;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-46 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg\" alt=\"shutterstock_424352977_akqw_jpg\" width=\"252\" height=\"168\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg 640w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg-300x200.jpg 300w\" sizes=\"auto, (max-width: 252px) 100vw, 252px\" \/>A good connection: the AKQUINET SAST Suite and the SAP Code Inspector.<\/strong><\/span><\/h2>\n<p><span style=\"color: #626161;\">You want a tool that tests your ABAP codes for performance, security, syntax, and compliance with naming conventions? Our recommendation: Use the SAP Code Inspector. This tool is part of the SAP standard and is available for you without additional SAP license costs.<\/span><\/p>\n<p><span style=\"color: #626161;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #626161;\">Our consultant team, which is specialized in SAP Security, will be glad to assist you with the installation of the Code Inspector in your system landscape, and you will be triple secured:<\/span><\/p>\n<ol>\n<li><span style=\"color: #626161;\">Your own developments comply with the SAP standard safety recommendations,<\/span><\/li>\n<li><span style=\"color: #626161;\">all AKQUINET additional checks for the Code Inspector are covered,<\/span><\/li>\n<li><span style=\"color: #626161;\">and your own guidelines are also checked on request.<\/span><\/li>\n<\/ol>\n<p><span style=\"color: #626161;\"><strong>Advantages for you:<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #626161;\">Reliable verification of your SAP custom developments on vulnerabilities.<\/span><\/li>\n<li><span style=\"color: #626161;\">No SAP license costs for the Code Inspector, it is already included in the standard.<\/span><\/li>\n<li><span style=\"color: #626161;\">No extra costs for the Code Vulnerability Analyser (CVA) &#8211; all relevant checks are integrated in the AKQUINET package.<\/span><\/li>\n<li><span style=\"color: #626161;\">Integrated into your development process and extendable to a complete workflow with the SAP ABAP Test Cockpit (ATC).<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #626161;\"><strong>Our consulting services at a glance:<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #626161;\">Initial workshop (inventory, guidelines, processes)<\/span><\/li>\n<li><span style=\"color: #626161;\">Activation of additional check from the AKQUINET package (approx. 30 rules).<\/span><\/li>\n<li><span style=\"color: #626161;\">Development of individual additional checks for your repository objects, which may not be included in the Code Inspector.<\/span><\/li>\n<li><span style=\"color: #626161;\">Individual expansions of your rules.<\/span><\/li>\n<li><span style=\"color: #626161;\">Adaptation of check variants according to your requirements.<\/span><\/li>\n<li><span style=\"color: #626161;\">Training workshops for your developers to deal with the Code Inspector and, if necessary, to develop your own checks.<\/span><\/li>\n<li><span style=\"color: #626161;\">Implementation of the SAP ABAP Test Cockpit (ATC) and integration into your processes.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #626161;\">On request, we also offer partial services to you remote or via Webex.<\/span><\/p>\n<p><span style=\"color: #626161;\">We look forward to your inquiries<\/span>: <a href=\"mailto:knowhow@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">knowhow@akquinet.de<\/a><\/p>\n<h6><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-35 alignnone\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/larshenning.jpg\" alt=\"larshenning\" width=\"130\" height=\"91\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/larshenning.jpg 640w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/larshenning-300x210.jpg 300w\" sizes=\"auto, (max-width: 130px) 100vw, 130px\" \/><br \/>\nLars Henning<br \/>\nProductmanager SAST Suite, AKQUINET<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>You want a tool that tests your ABAP codes for performance, security, syntax, and compliance with naming conventions? Our recommendation: Use the SAP Code Inspector. This tool is part of the SAP standard and is available for you without additional SAP license costs.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[151,58,80],"class_list":["post-56","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-grc","tag-real-time-monitoring","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Established security check of your custom developments.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Established security check of your custom developments.\" \/>\n<meta property=\"og:description\" content=\"You want a tool that tests your ABAP codes for performance, security, syntax, and compliance with naming conventions? Our recommendation: Use the SAP Code Inspector. This tool is part of the SAP standard and is available for you without additional SAP license costs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-03T18:34:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T10:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Established security check of your custom developments.\",\"datePublished\":\"2017-01-03T18:34:28+00:00\",\"dateModified\":\"2020-07-07T10:00:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/\"},\"wordCount\":299,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\",\"keywords\":[\"GRC\",\"Real-time monitoring\",\"SAP Security\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/\",\"name\":\"Established security check of your custom developments.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\",\"datePublished\":\"2017-01-03T18:34:28+00:00\",\"dateModified\":\"2020-07-07T10:00:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2017\\\/01\\\/03\\\/established-security-check-of-your-custom-developments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Established security check of your custom developments.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Established security check of your custom developments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/","og_locale":"en_US","og_type":"article","og_title":"Established security check of your custom developments.","og_description":"You want a tool that tests your ABAP codes for performance, security, syntax, and compliance with naming conventions? Our recommendation: Use the SAP Code Inspector. This tool is part of the SAP standard and is available for you without additional SAP license costs.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/","og_site_name":"SAST BLOG","article_published_time":"2017-01-03T18:34:28+00:00","article_modified_time":"2020-07-07T10:00:44+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Established security check of your custom developments.","datePublished":"2017-01-03T18:34:28+00:00","dateModified":"2020-07-07T10:00:44+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/"},"wordCount":299,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","keywords":["GRC","Real-time monitoring","SAP Security"],"articleSection":["SAST SUITE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/","url":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/","name":"Established security check of your custom developments.","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","datePublished":"2017-01-03T18:34:28+00:00","dateModified":"2020-07-07T10:00:44+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2017\/01\/03\/established-security-check-of-your-custom-developments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Established security check of your custom developments."}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":1,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"predecessor-version":[{"id":1296,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/56\/revisions\/1296"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}