An EPM implementation involves a large number of components – ranging from Source System Data Adapters, Staging Area, ETL Tools, Databases, Flat Files, EPM suit and downstream systems. This paper attempts to expose various security holes and governance issues that lie in this landscape. It discusses best practices to avoid pitfalls whether you have a large team, or a small team with limited resources, and a methodology to conduct an IS security audit to ensure air tight EPM System.

Security Best Practices for architecting, deploying and operating an enterprise wide EPM System

  • How to secure your data, meta-data, reports and other artifacts
  • Discuss possible security holes in an EPM System architecture
  • Checklists and Methodology to conduct IS Security audit
  • Tips to ensure Segregation of Duty and Data Governance