Implementation of frequent audits of access and activity in the ERP by a separate team with no operational duties
Implementation of strengthened authentication measures including mandatory second-factor authentication
Review of ERP access profiles to enforce the least-privilege principle based on existing employee responsibilities
Review of employee responsibilities and ERP access profiles to differentiate mission activities from system support activities