Together, we can reinvent your business
IT security and cybersecurity consulting services to help your company achieve the needed security posture that addresses today’s vast array of sophisticated threats.
Comprehensive Application & ERP Security
Because ERP systems house so much critical business information, ERP security is a paramount concern for all companies. It has become even more important recently because of the supply chain attacks that have affected many companies and their customers.
In addition, ERP systems can be more difficult to secure when employees are working from home. The complexities associated with ensuring security for both local and remote users means that companies must take steps such as implementing multifactor authentication and regularly updating software to ensure their ERP’s sensitive information won’t become compromised.
Here’s a look at the differences between on-premises and cloud ERP security as well as some of the best ERP security practices to follow.
On-premises vs. cloud ERP security
Understanding some of the unique factors affecting cloud ERP security versus on-premises ERP is vital. Believing that someone else, such as the SaaS vendor or managed security service provider, is responsible for an application’s security if it’s hosted in the cloud is a dangerous misconception. This is not the case, and every user, not just technical staff, must understand what’s at stake.
Many cloud service providers have security add-ons for ERP monitoring and protection, but the reality is that no outsourced vendor will likely care as much about security as the company whose information is possibly at risk. In addition, the vendor may not understand how to meet a specific organization’s requirements for a truly resilient ERP environment.
8 security best practices for ERP systems
Whether an ERP system is on premises or in the cloud, the following best practices can help mitigate common risks.
1. Implement multifactor authentication
Multifactor — sometimes referred to as two-factor — authentication (MFA) can be a valuable part of account security. Since most modern ERP systems are web-based, the risk of user credential exposures is often high. This is especially true because of the following factors:
- Personal login credentials are often commingled with business login credentials. If personal passwords are compromised in a data breach or malware infection, exposures can result and full credential pairs — usernames and passwords — can be posted online.
- The ERP system may not have intruder lockout enabled to prevent password cracking attacks.
Many ERP systems, both on-premises and cloud-based, support or include MFA as an option. Enable it across the board when possible, ideally via a mobile app or a token and not an SMS text message. Compromised credentials can expose critical business information, and two levels of authentication can mitigate that risk. Most employees are likely accustomed to two-factor authentication by now.
2. Require password best practices
Basic password complexity requirements can go a long way toward protecting user credentials. Some employees may chafe at strong password requirements, but they’re necessary in today’s world of threats and vulnerabilities.
If objections to password complexity continue, lengthen the amount of time before users must change their passwords — for example, requiring a password change every six to 12 months rather than every 60 to 90 days, unless a password compromise is suspected.
Security teams should also try to get management on board with strong password policies and educate users on how to pick phrases that are easy to remember yet virtually impossible for an attacker to guess or crack. Make sure that the company is consistent in enforcing password policy across all ERP-related systems in which multiple logins are required.
3. Stay on top of software updates
Vulnerability and patch management are arguably the two most difficult aspects of an information security program. Still, a system missing several-years-old patches can be incredibly easy to compromise. Many companies’ networks include workstations and servers that are not properly maintained, and missing software updates can facilitate malware infections and unauthorized remote access.
All it takes for full ERP exposure is a missing OS or application update or even poorly written code that allows for web vulnerabilities, such as a SQL injection. Patching or otherwise resolving code issues periodically and consistently is key.
4. Educate users now and in the future
Often there’s an us vs. them feeling in the relationship between users and IT and security staff. Some users may assume technical staff are taking care of everything and that they can do whatever they please, since someone else will have a presumed safety net to catch them if they fall.
The security team should involve users in the security decision-making process and ask them what would work best from their perspective. Make them feel as if they are part of the team rather than outsiders who may make mistakes.
5. Create and build out an incident response plan
Few organizations possess well-documented and fleshed-out incident response plans. Without a proper incident response plan, everyone’s scrambling when a security event actually occurs. Think of the who, what, where, when, why and how of responding to security incidents and breaches well in advance of them occurring.
Start with a base incident response template, then build it out and make improvements to the document, processes and tools over time.
6. Test, test and test again
Many organizations have yet to acknowledge the threats and vulnerabilities specifically affecting their ERP environment. From mobile devices to workstations to the ERP application and database itself, weak links are likely creating unnecessary security risks.
Move beyond policies and higher-level checklist audits and perform detailed vulnerability and penetration tests of the environment where possible. Make sure to look in all the right areas for flaws and weaknesses — all hosts, all software, all people. Another good exercise is threat modeling, which can help identify threats and their origin. Security teams can ask their company’s vendor for a copy of the vendor’s latest vulnerability and penetration testing report if the security team doesn’t have permission to test a cloud-based ERP system.
Reviewing the vendor’s SOC 2 (System and Organization Controls 2) audit report should be the minimum action taken. The report will not highlight application-specific vulnerabilities but is a good first step for reviewing the vendor’s security practices.
7. Monitor the system
Few companies are proactive about system logging, alerting and monitoring. Why? Because whether it’s on premises or in the cloud, it’s not easy and it’s not cheap.
Many organizations implement their own security operations center and security incident and event management system in-house, and that can work well. However, that strategy can also create more of a burden for IT and security staff.
When in doubt, outsource this function. Cloud vendors may be conducting certain monitoring already or may offer it as an add-on option. Just make sure that someone is doing it and that the security team possesses the necessary visibility into their company’s environment to minimize the impact of security incidents.
DFARS Clause 252.204-7012 and NIST 800-171 cybersecurity requirements for primes and subcontractors are no longer voluntary and DoD audits, coupled with the Cybersecurity Maturity Model Certification (CMMC) version 2.0 will require all companies conducting business with the DoD to be certified by a third party.
Audit ready, third party verified compliance with DFARS/NIST 800-171 involves much more than documentation and accomplishing it cost-effectively for your business requires an approach informed by the experience gained from hundreds of implementations
Migrating Security in Oracle ERP Cloud
As security and Segregation of Duties (SoD) risks are becoming more scrutinized by the Public Company Accounting Oversight Board (PCOAB) and external auditors, it is increasingly important to establish a clean and compliant security role design in your Oracle ERP Cloud application. Whether you develop custom roles as part of your implementation or redesign security in your existing environment, role design and build may come with its own set of technical challenges – one of which includes role migration.
Like most configurations, custom roles are typically required to flow through the hierarchy of Oracle environments during their development lifecycle (e.g. roles are developed in a DEV environment, moved to a QA/UAT environment for testing, and finally migrated to Production only after they are fully vetted and approved). A major issue security teams face is that role migration in Oracle ERP Cloud can be a very tedious and time-consuming task. In fact, historically there was no feasible way to “migrate” roles at all – rather, security teams were forced to manually rebuild roles from the ground up in each environment.
New Role Migration Functionality
Starting with release 19A, Oracle introduced a new feature allowing users to export and import custom role hierarchies. The export function extracts the role hierarchies in three .csv files that together comprise the role to duty role to privilege mapping. Once exported from your source environment, the roles can be uploaded or imported into your target environment through the same navigation path. This feature has reduced the level of effort required to migrate custom roles from one environment to another. As an added benefit, eliminating the need to manually recreate role hierarchies also reduces the risk of incomplete or inaccurate role configurations through manual error.
Navigation: Setup and Maintenance > Users and Security > Manage Job Roles > Actions > Export to CSV File or Import from CSV File
Items to Note
- Using this feature does not require any prerequisite setups
- The IT Security Manager role has access to this feature
- You can migrate all custom roles or select only specific roles using available filter criteria
What Can’t be Migrated?
While the feature has dramatically increased the efficiency of migrating roles, there are some limitations around what can be exported and imported. Some examples include:
- Data Security Policies: Currently, the export and import utility only migrates the role hierarchy. The utility is not capable of migrating data security policies, which are critical for roles to function properly. This is a known Oracle design gap. Unfortunately, this means the data security policies still need to be reconfigured manually for each role after migration between environments.
- Seeded Roles: The export feature only allows the export of custom security artifacts. You cannot export seeded roles or seeded role to seeded privilege mapping. For example, if a custom job role contains a seeded duty role, the export data will include the job role to duty role mapping but will not contain the seeded duty role to seeded privilege mapping. In any case, it is best practice to never modify seeded security artifacts, so there should not be a requirement to migrate changes to these roles.
- User Role Mapping: This specific feature does not support the export and import of user role assignments. Fortunately for teams going through a security design or redesign, the HCM data loader tool can be leveraged for this time-consuming task.
Conclusion
While the ability to migrate role hierarchies has been improved, the tool’s inability to migrate data security policies leaves significant challenges for organizations that need to build custom roles. Many teams who have leveraged the tool are left feeling as if the feature is incomplete or “half-baked” – and it has been nearly a year since Oracle has revisited the tool’s functionality.
To increase visibility of this issue, security teams who may require this functionality (or just want to help those that do) are encouraged to vote for the enhancement. If you would like to vote, visit the Oracle Cloud Customer Connect page and click the green thumbs up button. (If the link does not take you directly to the idea page, enter the idea number DF96E33E07 into the search box). Hopefully Oracle will hear us and include the functionality in a future release.
Take the First Step Toward Enhanced Cybersecurity
Protect your business, safeguard your data, and build resilience against evolving threats with FalconRock’s expert cybersecurity solutions.