Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How to Ensure Process Mining App Security — Including Authentication, APIs, and Data
Cybersecurity as a Business Enabler

How to Ensure Process Mining App Security — Including Authentication, APIs, and Data

Bill DoerrfeldBy Bill DoerrfeldMarch 16, 2023Updated:June 22, 20237 Mins Read
Facebook Twitter LinkedIn Email
process mining data governance
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Good managers are always striving to improve business processes. Optimizing processes can cut down manual steps, increase efficiency, reduce expenses, and even create new revenue opportunities. But identifying roadblocks in a process, let alone introducing new processes entirely, can be cumbersome without the benefits of automation.

Sometimes, it’s beneficial to do a process review: analyze what’s already working to gather insights on what could be replicated across an organization. However, traditional process reviews typically rely on word of mouth, incomplete documentation, and tribal knowledge, making it challenging to quantify benefits.

Enter process mining, which is designed for the analysis of business functions within complex enterprise software ecosystems. By analyzing data and interactions between systems such as Oracle, SAP, Salesforce, and ServiceNow, process mining produces insights into how processes are actually functioning. By plugging into these and other vendor systems, process mining can track complex processes and identify areas where they are breaking down or where unnecessary manual interventions are occurring outside the system. It can also recommend corrective actions.

Process mining improves upon process refinement techniques including the Lean Six Sigma method by leveraging data to deliver insights that reflect how the processes behind those systems are functioning.

Some widely used process mining providers, according to the Everest Group Peak Matrix Process Mining ranking for 2022, include Celonis, UiPath, Software AG, and Minit. Celonis and UiPath are both on the Acceleration Economy AI/Hyperautomation Top 10 shortlist.

In this analysis, I’ll identify critical security factors to consider so that process mining apps are properly governed and create business opportunities while avoiding gaps that would allow for the misuse of data. A proactive security approach will position your company to derive the most benefits from process mining without risk of data loss or breaches.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

Security Considerations

In order to understand the importance of process mining governance, consider the need to protect data as it flows between systems via software integrations. This is becoming a high priority as API attacks are increasing across the board. In fact, 95% of companies have had an API security incident in the past 12 months, causing APIs to be regarded as a top threat factor. Since process mining applications integrate with APIs to access data across multiple software systems, enterprises must proactively ensure they’re protecting against unauthorized access to sensitive data. Any public exposure of data, of course, presents privacy, security, or compliance risks.

Furthermore, a common issue surrounding web-based integrations is broken object-level authorization. Ensuring application users don’t have access to more fields than they require is consistent with the rule of least privilege. Also, having administrative transparency into who can access what data and who can manipulate such data will be necessary to track roles and thwart any access control threats.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Other potential risks might arise from poorly configuring underlying platforms such as cloud services. For example, if cloud-based technologies aren’t secure by default, users might have to manually raise data protection controls. Similarly, if data isn’t automatically encrypted in transit, it may be prone to man-in-the-middle attacks which could attempt to divulge trade secrets. Outside of misconfigurations and insecure settings, other cloud-native security risks could present themselves in process mining use cases, including leaked secrets and software supply chain threats.

Security Measures for Process Mining

As with any new technology, IT professionals should ensure their process mining software has the proper degree of security. One fundamental method to ensure maximum governance with process mining is to enable multi-factor authentication (MFA). Passwordless technology including biometrics, keyfob, or one-time-password (OTP) can harden the security of any environment. Implementing MFA should ensure, right off the bat, that only authorized personnel with a proven identity can access the platform.

In Celonis’ case, the company enables customers to apply their existing single sign-on systems for authentication and offers its own identity management service for any customers that need it. “Customers usually run an identity solution for their employees and then we integrate with that,” says Stephan Micklitz, senior vice president of engineering at Celonis. “So there’s no separate login for people. We integrate with all the major services.”

Customers also have the option to use Celonis’ own identity service, Micklitz said, which includes multi-factor authentication. “Multifactor authentication is certainly something I’d encourage everybody to use, especially in an enterprise context.”

Celonis supports key standards for user provisioning and de-provisioning including Security Assertion Markup Language (SAML), Open ID Connect, and System for Cross-domain Identity Management (SCIM).

After addressing authentication requirements, another key process mining security consideration is to establish more hardened data governance. Process mining solutions should delineate secure data access and manipulation, defining who can access what type of data and who has access to event logs. Establishing these privileges upfront will go a long way toward ensuring unauthorized access is not possible. Secondly, deploying additional security over data transmission protocols will help ensure the connections themselves cannot be tampered with.

API security requires a holistic set of strategies that go beyond the traditional firewall. An organization opening access to its databases, event-driven architectures, or internal microservices should approach these connections from a zero-trust mindset, even when transmitting data to an internal tool or system.

See the Cybersecurity Top 10 shortlist

In Celonis’ case, the company’s approach is to secure data in transit (between systems) and at rest. Data at rest is protected by the underlying encryption services of the cloud providers, such as AWS and Microsoft Azure. When it’s moving between systems or services, data is encrypted using Mutual Transport Layer Security (MTLS), a method for mutual authentication that verifies both “parties” have the correct encryption key to access data, Micklitz explained.

“Multi-factor authentication is certainly something that I’d encourage everyone to use, especially in an enterprise context” with process mining apps.

Stephan Micklitz, senior vice president of engineering, Celonis.

Lastly, it’s a good idea to develop data protection policies and establish healthy data hygiene practices. For example, backup and data recovery techniques can distribute copies of your records to protect against data loss. Furthermore, continually monitoring access to sensitive data is important, as is encrypting data at rest. But, since process mining solutions are intended to highlight areas to improve, they needn’t create persistent data records for long periods. Therefore, consider establishing a data lifecycle and deletion process upfront. Maintaining data hygiene will not only aid security but decrease storage costs over time.

Process mining is data-intensive work and “it’s clear that you would like to have as much data as possible on the one hand and, on the other hand, it’s always important to think about ‘What is the subset of data that is actually required? And how long do we need to keep that?'” Micklitz says.

Benefits of Tight Governance

Process mining presents robust functionality that can turn otherwise opaque data into actionable insights that can inform and optimize enterprise processes. Discovering bottlenecks and automating away manual toil is becoming essential to truly reap the benefits of digital transformation — doing so could reduce operational costs and create new efficiencies. Ultimately, this could free workers to focus on delivering new features and enhancing user experience.

Of course, any new technology — especially one that utilizes connections to multiple software ecosystems — poses some degree of risk. To ensure these systems are kept safe from malicious actors, organizations should apply a governance model that considers and deploys as appropriate, MFA, access control, and encryption. Enhancing data security and maintaining proper data hygiene will increase user trust and ensure these new platforms don’t infringe on any compliance requirements.

Editor’s note: Tom Smith contributed to this analysis.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Interested in Celonis?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

automation Celonis Cloud digital transformation featured governance
Share. Facebook Twitter LinkedIn Email
Analystuser

Bill Doerrfeld

Tech Journalist
Editor-in-Chief

Areas of Expertise
  • Cybersecurity
  • Low Code/No Code
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

  Contact Bill Doerrfeld ...

Related Posts

On Location: Generative AI Tops Oracle CloudWorld Key Takeaways

Sponsored ContentSeptember 22, 2023

Google Cloud, NVIDIA Join Forces to Create Game-Changing Generative AI Accelerator

September 22, 2023

Cloud Database TCO Decoded: Savings Strategies

September 22, 2023

On Location: Automation Anywhere Combines Intelligent Automation with Generative AI

September 22, 2023
Add A Comment

Comments are closed.

Recent Posts
  • On Location: Generative AI Tops Oracle CloudWorld Key Takeaways
  • Google Cloud, NVIDIA Join Forces to Create Game-Changing Generative AI Accelerator
  • On Location at CloudWorld: Oracle’s Innovative Approach to Productivity and AI-Powered Development
  • Cloud Database TCO Decoded: Savings Strategies
  • On Location: Automation Anywhere Combines Intelligent Automation with Generative AI

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The State of Process Mining 2023: Unlocking Efficiency and Driving Customer Satisfaction

July 31, 2023

How Workday Creates Agile Monetization Opportunities for CFOs

June 21, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.