3 Tips to Improve Your ERP User Access Strategy
Users of any ERP system must have access to the right data at the right time. This ERP user access must be policed, in other words, they can’t have access to everything, all the time. Here are some useful pieces of advice to improve your ERP user access strategy.
1. Define Any Confidential Data and Set Role-Based Access
Outside of payroll and human relations, very few will ever need to see employee tax identification and payroll rates. If your business differentiator is Grandma’s secret recipe, that should be identified and your ERP user access strategy should be updated accordingly. Do not get carried away with making a long list of data in these limited access categories. The important step in this process is not lengthening the list of restricted data, the crucial step is identifying which employee roles require access to this data.
2. Separate the Internal User from the External User
Set up internal groups by categories or roles and provide access to input screens and datasets based on those roles. A common misconception is that role-based user access is best practice because of security issues. As much as this is a factor in role-based access, the main advantage of this strategy is the process efficiency improvements associated with role-specific data access due to reduced “noise” within the ERP system.
External users such as supplier or customer portals will always be limited within an ERP user access strategy. In the role-based model, external users will have very niche roles in the ERP system - their access will reflect that. If someone needs to see your inventory position for parts in a certain class, let them see only that part class.
3. Perform Regular Audits
This might be the most important tip for your ERP user-access strategy. You expect an accounts payable clerk to look at certain data. What else have they poked into? If it is innocent exploring, OK. If it raises a suspicion, set some alerts to warn you when suspicious behavior occurs. Track what data people are copying to spreadsheets. It is probably part of their jobs, but when it is being transfered out of your ERP system, your ERP security controls become worthless. Keep a close eye on any data copied to a thumb drive or shared on the internet. Have data policies in writing and expect all employees and users to follow that policy.
Part of the audit is checking if people are in the correct role groups. One common problem is when someone changes positions; they get the new roles added to their security access and keep their old role too. Another common issue is providing access to every role for high-level people. Your sales VP, for example, should not have access to write a purchase order just because they are a VP.
Audits should be a part of internal controls and are required by Sarbanes Oxley for many businesses.
Featured white papers
ERP Software Pricing Guide
Get your comprehensive guide to the cost of ERP softwareDownload
60-Step ERP Selection Checklist
Get the comprehensive checklist for your ERP selection projectDownload
ERP Implementation: 9 steps to success
The 9 proven steps you should follow when implementing ERPDownload
How ERP can help you achieve GDPR compliance
How can we use ERP systems to achieve GDPR compliance?
4 practical examples of the power of real-time ERP data
Discover the potential of real-time data with these practical examples from a range of industries.
5 Ways ERP Workflow Can Speed Up Your Business
Read about the five ways in which ERP workflow can improve efficiency within your business.