Does anyone have any experience leveraging access via IAM to ERP tools and the permissions can be so granular that there would be an extreme amount of options in an IAM tool?

2k viewscircle icon1 Upvotecircle icon5 Comments
Sort by:
Director, Special Projects, IT/OT Security in Energy and Utilitiesa year ago

We use an IAM tool that provisions roles in a few hundred applications including the main ERP system. It detects SODs between systems or within other systems (outside of ERP).  

We only include the ERP (SAP) Security roles in the IAM tool and not the permissions. IAM feeds the request into SAP GRC to workflow. The ERP role permissions are tracked and validated for SODs between roles in the SAP GRC system.

Chief Information Security Officer in Healthcare and Biotech2 years ago

It depends on the IAM and ERP if both the tool support open API or have rest API then it can be achieved easily 

Senior Director, Information Technology in Software2 years ago

An IAM tool is an extension of the ERP tool's roles/permissions capability.   The ERP tool is where you define and assign granular permissions to specific roles and job responsibilities.   Keep in mind the amount of effort to maintain these granular permissions (and their assignments) if your organization has regular permissions change requests.

CEO2 years ago

There are newer identity governance applications that are addressing these challenges effectively - notably Clarity Security. There are likely others that can help find SOD conflicts, orphaned accounts, weak authentication challenges, etc. 

CIO in Education2 years ago

It’s crucial to establish a role-based access control (RBAC) model, assign permissions based on job responsibilities, and regularly review access to ensure appropriate privileges. Robust user provisioning and deprovisioning processes, segregation of duties, monitoring, and auditing mechanisms are essential. Educating users about data security and fostering a security-conscious culture is also important. Although challenging, effective IAM implementation in ERP systems ensures secure access while maintaining data integrity and compliance.

Content you might like

HashiCorp (Terraform, Vault, Packer, etc.)22%

Cloud infra automation (Ansible, Puppet, Chef, etc.)56%

APM (Datadog, AppD, SignalFX, NewRelic, etc.)10%

Others?10%

View Results

Every Month20%

Every Quarter57%

Every Year19%

Other (comment below)2%

View Results