Enterprise Resource Planning Security Audit Work Program

Subscriber Content
Screenshot of the first page of Enterprise Resource Planning Security Audit Work Program
Best Practices for Securing Your Enterprise Resource Planning System

In this work program sample, we list general best-practice steps for the enterprise resource planning security process.

Sample steps include: identify and review users who have access to accounts payable (AP) general options, provide the report to the company’s internal audit team, verify if the access is appropriate, identify and review users who have access to establish business units, identify the permissions that have more than the required access, match these permissions to the operators, obtain password control for all users accessing AP and compare it to company standards, and obtain the policies and procedures to grant user access.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.