How is your company managing cybersecurity when working with  tools that work on top of your core ERP? e.g visualization, control towers,  decision making tools etc..

443 views1 Upvote2 Comments
Sort By:
Oldest
President and National Managing Principal in Softwarea year ago
For us (internally at our firm) we start with a data governance policy that spells out in detail what type of information that each person (or role) within the firm is able to see across all applications and platforms. That enforcement starts at the core system of record which for us is our ERP and HCM platform; our scheduling system; and our service delivery platform. Least privilege access is enforced at those endpoints.

For there, that policy guides all access across all systems and when our BI team creates reports and connections, access rights are pulled from those primary tools and enforced such that when the BI tool is able to generate advanced reporting based on the data, those reports are limited to the people that had access to the underlying systems in the first place and that access cannot not be circumvented through the use of the BI SaaS tool.

The danger comes when companies start using privileged system accounts to pull data into a BI/visualization platform and the resume is access to individuals that were otherwise unauthorized.
2
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Chief Information Security Officer in Healthcare and Biotecha year ago
Outsourcing policy, Information security policy and Data Governance policy are 3 high-level guidelines to ensure risks are managed appropriately  

Content you might like

No Increase16%

1-5% increase47%

6-25% increase24%

26-50% increase6%

51-75% increase1%

76%+1%

Other2%

View Results
1.7k views1 Upvote
Director of Network Transformationa year ago
Excellent question!!  Folks, please share what should be included in a playbook/checklist.  Let's crowdsource one!
3
Read More Comments
4.2k views2 Upvotes4 Comments

Implementation complete23%

Implementation in progress54%

Planned within the next 12 months12%

Not planned7%

Not enabling O365 on mobile2%

View Results
2.4k views2 Upvotes