Page 23 - Risk Management Bulletin April-June 2022
P. 23

RMAI BULLETIN APRIL - JUNE 2022


             opted for daily backups and kept 30 days’ worth of  and through virtual private networks (VPNs); another
             historic images. Keeping a historic image in a separate  is conducting regular vulnerability scans and pen tests
             storage network was expensive, but it allowed the  to measure how long it takes to spot and respond to
             company to better protect its systems. The company  attacks. Since ERP systems are so large, automated
             runs regular restore exercises in which a random  scans can take more than two days, so a best practice
             sample of historic backup images is restored. If parts  is to do them on a rolling basis for targeted parts of
             of the sample can no longer be restored, the company  the system, process by process or module by module.
             initiates the emergency plan to fight the attack
             attempt, thereby also limiting loss of data to a  Companies could also use their efforts to migrate their
             maximum of just 30 days’ worth.                  apps and systems to cloud as an opportunity to
                                                              improve how they address cybersecurity. Security as
             6. Make ERP teams an integral part of            code (SaC) has been the most effective approach to
                                                              securing cloud workloads with speed and agility. SaC
             cyberattack-response exercises                   defines cybersecurity policies and standards
             Practicing how to respond to ERP cyberattacks works  programmatically, so that they can be referenced
             only if the ERP teams are actively part of the exercises.  automatically in the configuration scripts that provision
             Too often, ERP teams are treated as adjuncts to  cloud systems. If the business, for example, sets up a
             cyberattack exercises or not even consulted at all. But  policy that all personally identifiable information (PII)
             their knowledge is crucial to ensure that the exercises  must be encrypted when it’s stored, that policy could
             are realistic and test systems across the business.  be applied through a process that is automatically
                                                              launched whenever a developer submits code,
             For example, ERP teams could help to make sure that  prompting the rejection of any code that violates the
             response exercises test ERP systems’ end-to-end  policy.
             processes rather than isolated databases or parts of
             the systems; that they are based on an understanding  During ERP migrations to the cloud, there is a tendency
             of the potential effects of an attack on the business  to focus on the migration and reduce attention paid
             and the processes that are in place to respond; and  to the parts of the ERP system that  remain on
             that they include ways to prioritize responses during  premises. Companies  may need to combat that
             an attack. Without a clear set of well-documented and  tendency and continue to allocate resources to regular
             easy-to-access reaction protocols, the inevitable  patching and maintenance updates to on-premises ERP
             confusion of a cyberattack will be exacerbated by the  systems.
             potential scale of its impact.
                                                              No ERP system is hacker proof. But by implementing
             7. Be more systematic in hardening               sound cyber practices, heightening collaboration with
             ERP systems                                      government (for example, with the National Institute
                                                              of Standards and Technology and the task forces on
             A number of best practices have been established to  global supply-chain security established by the US
             improve cybersecurity that can be applied to an ERP  Department of Homeland Security), and actively
             system. One of them is restricting access to the ERP
                                                              monitoring ERP systems, companies could potentially
             system to users with multifactor authentication (MFA)  reduce the threat to their most vital business systems.
















                                                           21
   18   19   20   21   22   23   24   25   26   27   28