Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementCybersecurity News

7 essential capabilities to consider when evaluating ERP security, risk and compliance solutions

By David Vincent
erp-freepik1170.jpg
December 20, 2021

Organizations looking to secure their enterprise resource planning (ERP)'s security defenses are often required to sort through vendor claims of features that are unique to their solution (i.e., leading-edge, disruptive, or other catchy buzz words). Rather than focusing on features and marketing buzz words, organizations should first create a prioritized list of their requirements and then evaluate the solution's capabilities to satisfy those requirements cost-effectively.

Here are seven questions to ask vendors focused on essential capabilities that are based on leading practices from organizations, including Gartner, Forrester, ISO, NIST, COBIT, and COSO. These capabilities should guide every organization's evaluation of ERP application security, risk and compliance solutions and help them understand which features are genuinely the most valuable.

 

1. Will this Solution Enable Effective Governance & Oversight?

Governance is one of the most overlooked capabilities, yet it can be the root cause of many failed security, risk and compliance programs. Governance is a strategic activity performed by senior executives to define their expectations for the performance of application security, risk and compliance operations. The International Organization of Standards (ISO) provides guidance on establishing effective governance over risk management programs, including establishing, performing and measuring governance efficiency.

There are two key governance capabilities you should be looking for in your application security solutions.

  1. Effective identity & access management (IAM) and identity governance & administration (IGA) capabilities to monitor attempts to log into the system and user behavior analysis to detect anomalies and threats as they occur at the transaction and data field level within the system.
  2. Effective policy-based access control (PBAC) capabilities, sometimes called attribute-based access control (ABAC), that allow you to configure policy requirements into the access controls to enable automated policy enforcement. I recommend avoiding solutions that require a one-to-one configuration of PBACs and focusing on those that offer a one-to-many configuration to improve the efficiency of your control configuration and change management effort. PBAC/ABAC could be the most valuable investment, offering the biggest value for the dollar, in your security defense because PBAC/ABAC security models support the Adaptive Security, Zero-Trust, Least Privilege and the Defense in Depth principles discussed below.

2. Does the Solution Enable Zero Trust?

Look for an application security solution based on the zero-trust principle of never trusting and always validating the identity. Zero trust can be enabled in many ways. One is through the use of multi-factor authentication (MFA) when logging into a system, accessing critical transactions and accessing critical data fields. Using layers of MFA is referred to as creating layers of security or defense in depth.

3. Will the Solution Allow Me to Enable Layered Security?

Also known as defense in depth (DiD), layered security enables overlapping layers of controls that typically provide the three control capabilities needed to secure assets: prevention, detection and response. While no individual security control is guaranteed to stop 100% of cyber threats, layered security provides mitigations against a wide variety of threats while incorporating redundancy in the form of compensating controls if one control should fail.

4. Can I Establish a Balanced Defensive Control Capability With this Solution?

The COSO framework is famous globally for its 17 principles of control capabilities that recommend evaluating your application security, risk, and compliance controls framework to ensure you have an adequate balance of predictive, detective and reactive control capabilities. Gartner also recommends leveraging predictive, preventative, detective, and responsive security control capabilities. Look for an application security solution that supports the ability to configure predictive, detective, and reactive access, transaction, and data security controls to effectively comply with compliance regulations. This is typically found in an application security solution established on the policy-based access control (PBAC) security model.

5. Can I Enable Adaptive Security & Control Capabilities?

Adaptive security may be the most valuable defensive capability. The key to the adaptive security model is providing contextual-based controls at the transaction and data field level to enforce policy requirements. Gartner recommends transitioning from static security typically found in a Role-Based Access Control (RBAC) security model to an adaptive security model like Policy-Based Assess Control (PBAC). Unlike RBAC, which grants access based on roles, PBAC grants access based on contextual attributes, which allows for a highly focused approach to transaction and data security that RBAC cannot provide.

6. Can the Solution Help You Understand Your Current Risk Exposure & Vulnerabilities?

The first step in any battle is to assess your defensive capabilities to identify weaknesses that need resolving. This capability ensures you conduct a thorough risk assessment to identify and quantify your potential security risk exposure and then evaluate the design and operating effectiveness of those controls intended to mitigate those risks to identify vulnerabilities that cybercriminals could exploit. Part of this risk assessment should assess your security control environment's capability to detect, prevent, respond, and recover from threat events and your current compliance posture with regulations.

7. Will it Allow Me to Implement a Continuous Improvement Process?

Finally, you should look for a solution that provides you with the capabilities to perform your security risk assessment by continuously monitoring your key risk indicators to detect and respond to anomalies and threats. Look for an artificial intelligence (AI) and machine learning (ML) continuous access risk assessment solution to provide a risk impact analysis and recommend appropriate mitigation actions.

Make Capabilities Based on Leading Practice Standards Your Guide to Choosing the Most Valuable Features

Checking off a list of features and benefits is an important first step to evaluating an ERP application security, risk and compliance solution for your organization. However, features don't necessarily equate to capabilities built on standards and frameworks. Instead, you should be looking for features that align with and enable the capabilities you want from a solution. These seven questions can help you understand which features are genuinely the most valuable and guide you to making a decision that's the most beneficial to your organization.

KEYWORDS: compliance governance risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Vincent has over twenty-one years of experience delivering Security, Audit, Risk, & Compliance services while employed with some of the largest professional service providing firms in the world – Arthur Andersen, KPMG, PwC, and IBM. He has delivered hundreds of ERP Security Risk & Compliance Assessments & Remediation services, and over 100 GRC technology solution implementations. Additionally, he was the North America GRC Practice Leader for IBM, PwC, and Corporater.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital workplace

    7 Essential Security Factors to Consider When Choosing Your Enterprise’s Messaging Platform

    See More
  • SEC0219-data-Feat-slide1_900px

    How to protect ERP data when access to corporate networks is both ubiquitous and for sale on the dark web

    See More
  • cybersecurity-freepik

    Getting started in cybersecurity – 6 essential skills to consider

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!