How Cognitus, an IBM Company, strengthened SAP application security by implementing the Cybersecurity Extension for SAP from Layer Seven Security.
Cognitus is a global SAP consulting and solutions provider specializing in SAP S/4HANA, digital transformation, and industry-specific SAP innovations. As an IBM company, Cognitus supports complex SAP landscapes for customers across manufacturing, consumer products, life sciences, and other regulated industries. The organization develops and maintains a significant volume of custom SAP assets, including ABAP programs, enhancements, interfaces, and SAP UI5 applications, making application-layer security a critical component of its overall SAP risk posture.
Cognitus implemented the Cybersecurity Extension for SAP to strengthen application-layer security across its SAP systems. The primary objective was to identify and reduce cyber risk introduced through custom SAP code by implementing continuous code vulnerability analysis for ABAP programs and SAP UI5 applications. Additional goals included improving security governance, enabling risk-based remediation, and embedding security into ongoing SAP development and modernization programs.
Layer Seven Security deployed the Cybersecurity Extension for SAP to provide automated and continuous analysis of custom SAP code. The solution performed deep inspection of ABAP programs and SAP UI5 applications to detect security vulnerabilities, insecure coding patterns, and deviations from SAP secure development best practices. Code analysis capabilities enabled Cognitus to identify high-risk issues such as missing authorization checks, injection vulnerabilities, and logic flaws that could be exploited to bypass controls or access sensitive data. Findings were contextualized based on technical severity and business impact, allowing development and security teams to prioritize remediation efficiently.
This case study highlights how Cognitus used the Cybersecurity Extension for SAP from Layer Seven Security to address cyber risks within custom SAP code. By focusing on continuous vulnerability analysis for ABAP programs and SAP UI5 applications, the organization strengthened SAP application security, reduced risk exposure, and established a scalable foundation for secure SAP development and transformation.