6 July

Data Fencing

Data fencing is a security strategy in which access to sensitive data is specifically restricted to certain user roles and requirements. The aim is to prevent data loss and unauthorised access through virtual security boundaries.


SAP Business One Finance Training

 

Detailed explanation/description:

Data fencing is based on the principle of the zero trust model, which assumes that no user or system is automatically trustworthy - regardless of whether it is inside or outside the company network. The method takes a data-centred approach and creates virtual barriers around information worthy of protection, thereby precisely controlling not only access but also usage.

The typical components of a data fencing strategy include

  • Data classification: Identification and evaluation of data according to sensitivity and business relevance.
  • Identity & Access Management (IAM): Access only to data that is necessary for the respective role, including the principle of minimum rights assignment.
  • Data Loss Prevention (DLP): Tools for monitoring and preventing unauthorised data transfers.
  • Microsegmentation: Division of the network into smaller, isolated areas to contain security incidents.
  • Monitoring & Analytics: Continuous monitoring of user behaviour for early detection of threats.

Integration into business processes

Data fencing is primarily used in areas where the protection of sensitive company data is crucial - e.g. in the financehuman resources or when processing customer data. It enables the implementation of fine-grained security guidelines in SAP Business One and can also incorporate cloud-based data sources.

the Versino Financial Suite improves the handling of data fencing in SAP Business One by ensuring automatic and secure encryption of sensitive business partner data.

Relevant modules and functions

In SAP Business One, data fencing can be used via User rightsThe system can also support the use of IAM, role assignment, data access controls and additional security solutions such as IAM or DLP integration.

Concrete application examples

  • A sales employee only sees customer data from his region.
  • An accountant can view invoice data, but not personnel files.
  • Export of sensitive data is prevented by DLP technology unless explicit authorisation has been given.

Key features/important aspects:

  • Fine-grained access control at data level
  • Virtualised security boundaries within the system
  • Alignment with modern security standards such as Zero Trust
  • Protection against internal and external threats

Differentiation from related terms:

In contrast to traditional perimeter protection measures (e.g. firewalls), data fencing specifically protects the data itself - regardless of where it is stored. It supplements concepts such as access rights or network segmentation with a data-focussed layer of protection.

 

Target group:

End users, key users, IT security officers, consultants, management


SAP Business One Access Rights Administration

Security alarm for ERP systems

The Log4Shell crisis has raised awareness: Companies need to pay more and increased attention to ERP security. ERP software ...
SAP Business One Access Rights Administration

Log4Shell (Log4j gap) & SAP Business One

A security vulnerability "Log4Shell" (CVE-2021-44228) was categorised as extremely critical by the German Federal Office for Security (BSI) on 10.12.02021 with the level red ...
Two-factor authentication for MariProject

Two-factor authentication for MariProject

An access point with strong security is not only useful for online banking. Applications that allow access to ...
ERP_Cloud_Legal_Protection

Data secure in the cloud

In-house means more security. This is the misconception that many companies fall prey to. What is overlooked is that this money-saving mentality for software ...
Test SAP Business One Cloud

Test the SAP Business One Cloud now

With our partner Cloudiax we invite you to test the SAP Business One Cloud. Register today and...