ERP security is very valuable and having a compromised system can bring too many unwanted issues and can end the business. Increasing Internet hacks have threatened the need for having a very robust and updated ERP system. This need also means that we have to continuously improve and constantly be aware of situations to improve the entire ERP security architecture.
When it comes to adopting the latest and greatest of security for ERP. The process falls short because businesses expect their software to run smoothly, any stoppers or roadblocks are considered as a downshift for monetary gain and is treated as not important, and these mandated requirements are parked.
Here’s how hackers get in and how we can improve ERP security
Outdated and un-updated software pose severe risk. Everyday new software vulnerabilities are discovered in software.
Have frequent software updates as and when they are ready
Data Governance, Open data and API
The initiate towards having an open data setup has opened the doors for other departments to get the needed data through APIs and other data feeds and this data can be used for social engineering to gain access to the source ERP system.
Implement data governance. Data accesses APIs should be fully governed to make sure that what was needed yesterday is still needed today. Make sure that anyone gaining access to this data is not opening the doors further to pass the data and have their own data governance processes in place
Firewalls, Middlewares, 3rd Party Connected Systems
Connected systems are compromised. It usually happens through other systems which might have direct access to the destination ERP system.
Re-audit and update all the systems having access to your systems end-point.
Scrutinize Privileged Accounts
Often called privileged accounts. There is always a superuser, power user, who has access to everything. These users access might be compromised.
Have audits to remove this access, no one should access to all the information, if needed, always provide them for a limited time with an approval process using an enterprise password vault.
Change Sofware delivery and implementation process
New programs, innovation, the open source always bring in too many new things
Have strong PMO governance. Always follow rigid DevOps and agile process which will make sure the changes are minimal and can be easily evaluated. Breakdown all major projects into very smaller chunks so itâ€™s easy to develop, implement, test and maintain.
Adopt two-factor Authentication
Users passwords can be easily compromised. In a corporate world, one user will always have access to multiple systems and in order to remember all the password, most of them keep it either in their excel sheet or in a text document.
Force 2FA(two-factor authentication) this will always ensure that even if a password is comprised, there is always an additional layer of protection.
Scan users computers, share points and other common shared folder locations for possible user id and passwords.
Internal audits are always limited to what they see and what they know.
Have a new set of eyes looking at a bird’s eye view of all your process so itâ€™s easier for an external firm to identify flaws and bring in the experience of finding vulnerabilities and security flaws.
Lingering expired user ids and passwords
There will always be unused passwords which are active in the ERP system which might lead to huge security issues.
Define work processes for requesting access, creation of new users and deletion of expired users
Constantly re-train on the effects of having not having an updated system and the impact it has had on businesses and stress that it is very important for them to secure the data. What some might see has useless; the others might see an opportunity.
Have mandatory training.
4 Eye Principle
Having the same user driving an end to end process of doing a task can lead to risky road
Implement 4 Eye Principle process. All processes should handshake with multiple stake holders.
ERP as such comes with lot of complexities and always lacks competent specialists, secure auditing tools and has huge amount of customizing changes. Adopt role based access controls, segregation of duties and ERP security scanners to search and catch vulnerabilities in ERP system.