Cloud-based ERP systems have many advantages over their on-premises counterparts. For example, they possess far more powerful processing power, which enables organizations to make smarter, performance-based decisions through analysis of much greater volumes of data. Their accessibility from anywhere, at any time, from any device, makes managing HR, finance, production units, and supply chain logistics considerably more efficient. They also cost much less to establish and operate.
But this doesn’t necessarily mean all clear skies ahead. Your ERP journey to the cloud could lead you through all kinds of stormy weather if you don’t take the right steps to secure it. This is because operating in the cloud leaves your ERP system open to significant fraud and cyber security threats – from hackers, cyber criminals, and even your employees.
Read this paper to learn about the multiple types of risks for ERP in the cloud and how to mitigate them.
KPMG has developed a multi-element framework that can help you take full advantage of a cloud-based ERP system’s capabilities, while simultaneously protecting your organization’s sensitive data and transactions from fraud and cyber security risks.
The key to application controls is automation and prevention; the more you automate your processes and controls – and the less you leave to manual action – the better your odds of preventing or mitigating fraud or theft risk. This portion of our framework takes into consideration business process controls, enhancement and configuration controls, and conversion and interface controls.
A guiding principle to cloud ERP security is that the same individual shouldn’t be able to control all aspects of a transaction. Rather, your process should require multiple people signing off at various steps for the transaction to proceed. Multi-factor authentication (MFA) is another valuable “check and balance” method many organizations use to protect their most sensitive and mission-critical assets. Here, the framework addresses adaptive authentication, role-based access controls, cloud application security architecture, and sensitive access and segregation of duties.
It takes more than just technology upgrades to prevent or mitigate cyber and data security risks. Cooperative collaboration between the business and IT is critical. And employee awareness and training programs, an increased cyber security budget, and additional training for cyber security team members are highly effective. This element of the framework will help you tackle information protection, cyber security, business and technology resilience, and privilege administrative access.
As cyber threats are constantly evolving and changing, so too must your cloud ERP security operation. It’s unlikely to work well if it’s done piecemeal, narrowly targeted to address a specific issue, or forgotten about once it’s in place. The areas we cover in this portion of the framework are enhancement management for security and controls, and cloud ERP security and controls operations.
A key finding in a cloud threat report we co-authored with Oracle in 2018 was that more than 80 percent of cyber leaders suspect that employees fail to follow cloud security procedures. So, the more stringent your user administration and governance controls, the safer your environment will be. This component of the framework addresses user access management and certification, password management, and user analytics.
To learn more, download Securing your ERP journey to the cloud.