As data operations have expanded and grown more complex, risk of disasters and outages has increased and this can cause significant downtime to your company’s operations, often resulting in a large potential loss of revenue. However, downtime is not the only potential consequence of security breaches. CPM/EPM software have been developed to meet the needs of finance but beyond that have also been structured to address many concerns and vulnerabilities as they relate to data integrity. Before we explore how EPM addresses these concerns, lets discuss the types of risks:
Let us now discuss some ways to avoid these negative repercussions of data security breaches.
is an important and evolving concept, and below I have posted some of the keys for organizations to look out for when trying to create an effective and secure data structure/strategy. These data integrity standards have been published by the FDA and are known by the ALCOA acronym:
Changes in data need to be attributable to a specific user. It is important to know who has made edits so that any errors or questions can be traced back to the person who originally inputted or edited data. EPM tools allow administrators to track user activity as shown below.
All data is recorded for a purpose, and the way the data is displayed needs to make sense with regards to its purpose. This does not mean that everyone should be able to look at a set of data and understand exactly what it means, as some data sets are complex and only make sense if you understand the underlying structure. At the same time however, the data needs to be legible and useful to the users.
EPM software has built in functions to help users and administrators get on the same page with regards to the structure and use of the data. The different types of metadata have a lot of descriptive properties and intuitive functionalities to make the data understandable and meaningful. The below screenshot shows an example of some properties used to describe a “cash” balance sheet account.
Contemporaneous – Data should be recorded as it was observed, and at the time executed. This means that information about when the data was accessed, added, changed, or observed should be recorded.
EPM tools make data contemporaneous usually through a process history function, which was displayed on the screenshot in the “Attributable” section above. Note that it shows which user updated the status of a review, and the exact time to the second that the status was changed
Source data should be available in its original form. The original source data however should not be easily editable. For example, providing users with read only access is a good solution for maintaining the accuracy of original source data.
This concept is often practiced in EPM by creating copies of the app to make changes on and keeping original source data in a dev environment with restricted access and only moving out a copy into prod for users to manipulate and write over. Below is an example of how an EPM administrator can provision access rights to users to put restrictions on specified data:
Meaning that the data should not contain any errors in the numbers or in the logic itself
EPM tools help users get the correct logic by running validation tests and making data EPM data comparable with original ledger data to ensure everything is the same. When we find discrepancies between the source data (ledger) and the EPM data, we can use audit trail functions to go back and see where the miscalculation happened and correct it. EPM tools often have relevant logic programmed into them, and they will stop you from going further with an operation if it does not follow the correct logic. An example is shown below:
Now we have looked at several different ways that poor data security can threaten a business, and we’ve also looked at some key principles to follow to strengthen your organization’s data integrity. As companies are striving for survival and success in an era where digital transformation is moving faster than security and privacy regulations, precise proactive security measures need to be taken to avoid disruptions to IT systems. We’ve outlined some examples of how EPM software can assist with data integrity principles, but the effort doesn’t stop there. In the pursuit of continued long-term success, companies need to constantly stay up to date with security trends and continue to promote secure infrastructures for information systems.