Home Projects Blog Contact
Tiếng Việt
Back to Blog
March 02, 2026 Nguyễn Mạnh Tường

Financial Security: Beyond the Firewall

Why Audit Trails and Segregation of Duties are the backbone of financial integrity in ERP systems. 20 years of field experience shared.

Financial Security: Beyond the Firewall

In my 20 years of implementing ERP for major corporations, I’ve noticed a paradox: CEOs spend billions on external firewalls but remain incredibly lax with the ‘keys’ inside their own house.

When financial data is compromised, the first question shouldn’t be ‘Who did it?’, but ‘Why did the system allow them to do it?’.

1. Authorization: The Art of Rational Skepticism

The most common mistake in many businesses is the ‘trusting’ mindset. A Chief Accountant demanding Admin rights or a Warehouse Manager wanting to edit last month’s delivery notes is a recipe for disaster.

In modern system administration, we strictly enforce Segregation of Duties (SoD). The person entering data must not be the one approving it. The person creating a vendor profile must not be the one authorizing payments.

“Trust is not a control method. It is a latent risk.”

2. Audit Trail: The Silent Witness

If authorization is the door, the Audit Trail is the 24/7 security camera. A standard ERP system must record: Who modified it? When? What was the old value? What is the new value?

In markets where ‘adjusting’ figures to align with tax reports (VAS) is still a habit, the lack of an Audit Trail is a catastrophe when independent auditors or authorities step in.

3. Control Models Comparison: Lax vs. Strict

FeatureLax Control (Ad-hoc)ERP Best Practice
AuthorizationBased on titles (Manager, Staff)Based on specific tasks (Role-based)
Data ModificationDirect edit/delete allowedOnly Reversal entries allowed
TraceabilityOnly saves the last editorFull Log History of every change
Risk LevelHigh internal fraud, untraceableTransparent, audit-ready

4. Hard-earned Lessons from the Field

I once saw a manufacturing company lose nearly $100,000 because a warehouse accountant had the rights to modify unit prices after the month-end closing. The system didn’t have an Audit Trail enabled, making it impossible to pinpoint when the fraud began.

My advice for Day 24:

  1. Audit your Authorization Matrix immediately.
  2. Enable Log features for critical data tables (Price lists, Bank accounts, BOMs).
  3. Periodically cross-check system logs against physical vouchers.

Don’t wait for your financial reports to ‘dance’ before looking for the cause. Data security is not a project; it is a discipline of steel.