ERP - Security Requirements - Vendor
ERP - Security Requirements - Vendor
ERP - Security Requirements - Vendor
Application Architecture
Requirement Comment
Does the application support High Availability? No, current Arch is single/single
Segregation between production and test servers
Customer to Confirm
Should be confirmed by IP addresses
Application should have one function per server (database servers,
One application server and one separate DB server
web servers, application servers should be separate)
Web interface must support secure encryption communication (TLS
Yes
v1.2/HTTPS/SFTP)
Communication between Database and Application should be
encrypted “Encrypted communication must be enabled over DB NA
configuration”
- Low level diagram that includes data flow, services, and ports
between all system components
Access control
Requirement Comment
State the security account matrix which identify the actions,
privileges, and workflow of each account (user/admin)
The system shall enforce the restriction that users have one
Configurable
concurrent session at a time.
Internal applications should integrate with active directory NA, requires SSO
Inactive user accounts shall be removed or disabled at least after 90
Available
days of inactivity
Login error messages are not too informative (must not specify
NA
username or password is incorrect)
Limit repeated access attempts by locking out the user ID after not
Available
more than six attempts.
lockout duration minimum of 30 minutes or until an administrator
Custom
enables the user ID.
The application must not store the user login credentials and
Yes, encrypted in DB
passwords in clear text format
The application must not store sensitive authentication data post-
Yes
authorization
The application must not transmit the login credentials in clear text
over any part of the network, all login operations must be conducted Yes
using secure encrypted protocols
Application should have a User Password change module for users to
Available
change their own passwords, providing the old password
Segregation between Administrative interface and standard user
Default Interface, depends on user privileges
interface
Administrative interface should not be reachable from the internet Yes
Logging
Requirement Comment
All solution assets are capable of generating logs & audit trails Yes
DB Hardening
Requirement Comment
DB need to be on a supported version and last patches need to be
Would be after upgrade
applied
Change vendor-supplied defaults and remove or disable unnecessary
Available
default accounts on DB.
Application Users passwords should be hashed in DB using SHA-256
All passwords are encrypted
with salted value
Application DB user should be stored encrypted in the config file.
Yes
Encryption key should be stored securely
Change root/Administrator and place it in safe Doable