New technologies and deployment options have companies rethinking their old, on-premises ERPs. In fact, according to g2.com, nearly 50% of companies are planning to or are already going through an ERP implementation or upgrade.
Unfortunately, for many of these companies, bringing in the compliance and security team is almost an afterthought.
Failing to include the Compliance team early on in your implementation efforts can be costly. Far too often, the compliance team is left out or not even considered during an ERP implementation or upgrade until it is too late. It appears that they assume that once the implementation is completed, then the compliance team can go about the task of configuring the security and user roles and permissions. This leads to costly mistakes and prolonged risk exposure that could have been avoided from day one of the system going live.
Security and access management governance should be one of the cornerstones to implementing a compliant ERP solution.
The following outline breaks down the access management governance principles that guide compliant ERP implementations, regardless of the specific ERP being used:
When compliance is not included before going live on a new system, we often see the initial risk analysis uncover large volumes of Segregation of Duties (SoD) and Critical Access (CA) conflicts. Addressing this risk is no easy task. Typically, security must be redesigned, testing reperformed, user mapping updated, and more. In addition, compensating controls or additional manual tasks must be performed to prove fraudulent activities did not occur while the exposure was present.