Our Approach to the Exclude Strategy
While the Include Strategy is our preference for maximum security, there may be situations where the Exclude Strategy (when applied correctly) is more suitable for your Business Central environment. Our consultants help you identify potential risks and precisely configure the exclusions:
- Deep Risk Analysis:
Identifying all critical functions, processes, and data that must be excluded to guarantee an acceptable security level. - Precise Exclusion Configuration:
Technically correct setting up the exclusions within Business Central to prevent unauthorized access to sensitive areas. - Thorough Validation:
Extensive testing to verify that all necessary exclusions are correctly implemented and that no unexpected gaps have arisen.
This method requires, more than the Include Strategy, continuous monitoring to ensure that new functionalities, updates, or changes in user roles do not create unwanted access. We advise and support you in setting up this monitoring.