Does anyone have any experience leveraging access via IAM to ERP tools and the permissions can be so granular that there would be an extreme amount of options in an IAM tool?


149 views2 Upvotes4 Comments

CIO in Education, 2 - 10 employees
It’s crucial to establish a role-based access control (RBAC) model, assign permissions based on job responsibilities, and regularly review access to ensure appropriate privileges. Robust user provisioning and deprovisioning processes, segregation of duties, monitoring, and auditing mechanisms are essential. Educating users about data security and fostering a security-conscious culture is also important. Although challenging, effective IAM implementation in ERP systems ensures secure access while maintaining data integrity and compliance.
CIO, Self-employed
There are newer identity governance applications that are addressing these challenges effectively - notably Clarity Security. There are likely others that can help find SOD conflicts, orphaned accounts, weak authentication challenges, etc. 
Senior Director, Information Technology in Software, 1,001 - 5,000 employees
An IAM tool is an extension of the ERP tool's roles/permissions capability.   The ERP tool is where you define and assign granular permissions to specific roles and job responsibilities.   Keep in mind the amount of effort to maintain these granular permissions (and their assignments) if your organization has regular permissions change requests.
1
Chief Information Security Officer in Healthcare and Biotech, 1,001 - 5,000 employees
It depends on the IAM and ERP if both the tool support open API or have rest API then it can be achieved easily 

Content you might like

Patch management: to reduce attack surface and avoid system misconfigurations39%

Malware and ransomware prevention: to protect endpoints from social engineering attacks58%

Malware and fileless malware detection and response: to protect against malicious software49%

Threat Hunting: to detect unknown threats that are acting or dormant in your environment and have bypassed the security controls33%

Not planning to change endpoint security strategy10%


184 PARTICIPANTS

405 views

Once a day29%

Once every few days34%

Once a week17%

Once a month10%

Once a year5%

Never5%


298 PARTICIPANTS

815 views1 Upvote

CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.
Read More Comments
41k views131 Upvotes319 Comments