ALL >> Computers >> View Article
Legacy Erp Systems: Impediments To Quick Incident Response
![Profile Picture](https://www.123articleonline.com/upload/fimg5SkwRxTfNe.png)
1: Legacy ERP logs don't inform you about access to data
Most individuals using an ERP software such as PeopleSoft do not know who does what, who accesses what information, or, most importantly, why. You probably need to find out first if this is something the user did or if hackers got access to the computer, and you will need to figure out whether this is an internal job or an external attack.
And whereas the logs can show you the right way, in most instances, the legacy ERP logs are not intended to provide detailed information about who accessed or even viewed something confidential. This results in the second hurdle.
2: Disparate ERP logs
ERP logs are intended for troubleshooting, not tracking granular tasks, leading to the failure of corporations and company departments to realize what their employees are doing inside the applications. In PeopleSoft, here's an example of all the native logs you may find:
1. App Server
2. Database
3. PIA (Web Server)
4. Identity Provider (SAML, LDAP, ADFS)
5. Process Scheduler
6. Load Balancer
7. Firewall ...
...
8. Host O/S Logs
There is probably more than one of these servers in your business where these logs reside. For the program, you might have many computers, web servers, and so on. And there is no connection between that data, so you have little relative background to start your investigation.
Here is an example of logs being used for the App Server and Web Server. Since you do not know the OPRID on the Web server, you are unable to identify the person who signed in. All you have is the IP address and a timestamp. You need to visit the App Server and check the login or log-out of your OPRID, timestamp, and IP address and try to match that information with similar Web Server information.
3: Log data that lacks context
When the team has gathered data from the logs and assembled information from other sources, the final step is to evaluate it and make the best guess so that an action item can be generated. How actionable and useful is a list of raw data, such as IP addresses, user IDs, device locations, completed transactions, etc., if you are unable to bring the data into a human context?
The Solution
Clear, actionable insight is needed to provide the organization with an understanding of what happened to their ERP data. Data protection and analytics applications that log granular user data access compare existing ERP logs, enrich data with contextual attributes (who, where, when, what device, etc.), and display access and usage of ERP data on the dashboard are available. Now, security teams can easily look at data access from user IDs, IP addresses, locations of machines, accessed websites, etc., and very quickly understand the truth behind an incident. Without background, you lack insight. Context presents actionable insights on access to and use of data. The organization is backed by actionable insights and gives value to key stakeholders.
Appsian One of the leading ERP data security,compliance,implementation solutions provider that gives organizations to complete control and visibility over their ERP data.
Add Comment
Computers Articles
1. Devopsin Hallinnoimat Palvelut: Tietoturva Ja Tiedon HallintaAuthor: harju
2. Hyödynnä Pilvesi Täysi Potentiaali Google Cloud Monitoring Solutions -ratkaisuilla
Author: harju
3. Pysy Kyberuhkien Edellä Google Cloud Security Services -palvelun Avulla
Author: harju
4. Mullista Yrityksesi Nopeilla Ja Turvallisilla Googlen Pilvipalveluratkaisuilla
Author: harju
5. Googlen Pilvi-identiteetin Hallintapalvelut Pienille Ja Keskisuurille Yrityksille
Author: harju
6. Google Cloud -konsultointi: Tukea, Strategiaa Ja Kehitystä Yrityksellesi
Author: harju
7. Iot Edge -laskentapalvelut Ja Ai – Älykkään Datankäsittelyn Tulevaisuus
Author: harju
8. Älykäs Reunalaskenta: Tehokkuutta Ja Kilpailuetua Yrityksellesi
Author: harju
9. Cloud Change -palvelut – Tulevaisuuden It-ratkaisu Liiketoiminnallesi
Author: harju
10. Aws-tietokannan Siirtopalvelu Ja Hybridiympäristöt – Miten Ne Toimivat Yhdessä?
Author: harju
11. What Makes Google Ads Management Services Better Than Other Digital Marketing Campaigns?
Author: Digital Agency
12. Things You Should Know About Nema And International Plug Adapters
Author: Jennifer Truong
13. The Best 8 Tools For Data Analysis
Author: goodcoders
14. Top 5 Customer Experience Management Problems And Solution
Author: goodcoders
15. How To Create A Framework-agnostic Application In Php?
Author: goodcoders