Secure Software Delivery Governance for Enterprise Resource Planning Deployment Workflows
Abstract
Enterprise Resource Planning (ERP) systems represent mission-critical infrastructures that integrate organizational processes across finance, supply chain, human resources, and governance domains. With the increasing adoption of digital transformation initiatives, ERP deployment workflows have become highly dynamic, distributed, and automated. However, these advancements introduce complex security challenges, particularly in ensuring governance across software delivery pipelines. This study investigates secure software delivery governance mechanisms tailored for ERP deployment workflows, emphasizing the integration of security controls, authentication models, and governance frameworks within modern DevSecOps environments.
The research identifies critical vulnerabilities in ERP deployment pipelines, including credential mismanagement, inconsistent authentication enforcement, and insufficient monitoring of deployment anomalies. Drawing upon established e-governance security frameworks, cryptographic authentication models, and digital transformation strategies, this paper proposes a governance-centric model that integrates secure delivery pipelines with policy-driven controls. The study leverages theoretical foundations from secure authentication systems, data modeling techniques, and enterprise digitalization initiatives to construct a comprehensive framework that ensures integrity, confidentiality, and availability across ERP deployments.
A key contribution of this research is the development of a multi-layered governance architecture that incorporates secure credential lifecycle management, automated compliance validation, and anomaly-aware deployment mechanisms. Additionally, the study highlights the role of DevSecOps-driven security controls in minimizing deviations in deployment workflows, supported by insights from recent research on ERP pipeline security (Gangaiah et al., 2026). The framework is evaluated through hypothetical enterprise scenarios aligned with large-scale digital transformation initiatives, demonstrating improved resilience against security breaches and operational inconsistencies.
The findings indicate that embedding governance mechanisms within software delivery pipelines significantly enhances ERP system security while maintaining deployment agility. Furthermore, the study emphasizes the importance of aligning enterprise governance policies with automated security enforcement to mitigate emerging cyber threats. The proposed framework contributes to both academic research and industry practices by providing a structured approach to secure ERP deployment governance in the era of digital transformation.
Keywords
References
How to Cite
Most read articles by the same author(s)
- Adesina Chukwu, UNVEILING GENDER PATTERNS: EXPLORING CONSUMER BEHAVIOR IN ONLINE SHOPPING AMONG NIGERIANS , Global Multidisciplinary Journal: Vol. 2 No. 08 (2023): Volume 02 Issue 08
- Evangelos Rigopoulos, DECODING EDUCATIONAL DECISIONS: TRACING THE EVOLUTION OF DECISION-MAKING THEORIES , Global Multidisciplinary Journal: Vol. 3 No. 03 (2024): Volume 03 Issue 03
- Adebayo Chukwu, DIGITAL MEDIA OVERHAUL: THE TRANSITION FROM TRADITIONAL TO EMERGING CYBER PLATFORMS , Global Multidisciplinary Journal: Vol. 3 No. 11 (2024): Volume 03 Issue 11
- Aida Sukmawati, Mohammad Hubeis, UNLOCKING ENGAGEMENT: EXPLORING COMPENSATION, LEADERSHIP STYLE, AND EMPLOYEE ENGAGEMENT DYNAMICS , Global Multidisciplinary Journal: Vol. 2 No. 05 (2023): Volume 02 Issue 05
- Mona Asghar Akbari, Behnam Mowlavi, ASSESSMENT OF RADIATION SCATTER AND ATTENUATION BY DENTAL RESTORATIONS IN HEAD AND NECK RADIOTHERAPY: A DOSIMETRIC STUDY , Global Multidisciplinary Journal: Vol. 3 No. 01 (2024): Volume 03 Issue 01
- Dr.Dhaka Ram Sapkota, Dr. Dol Raj Kafle, THE FIRST DECADE OF DEMOCRACY IN NEPAL: CHALLENGES, EXPERIMENTS, AND LESSONS LEARNED , Global Multidisciplinary Journal: Vol. 3 No. 12 (2024): Volume 03 Issue 12
- Chian Hsu, SIMUCERT: MICROCONTROLLER PROFICIENCY CERTIFICATION THROUGH SIMULATION , Global Multidisciplinary Journal: Vol. 3 No. 03 (2024): Volume 03 Issue 03
- Steve Ismail, FOSTERING CHANGE: EXPLORING MOTIVATING FACTORS IN COMMUNITY ENGAGEMENT AMONG NIGERIAN PROFESSORS , Global Multidisciplinary Journal: Vol. 2 No. 07 (2023): Volume 02 Issue 07
- Michael Anichebe, OPTIMIZING HUMAN RESOURCES MANAGEMENT FOR ENHANCED PERFORMANCE IN NATIONAL INDEPENDENT POWER PROJECTS , Global Multidisciplinary Journal: Vol. 2 No. 09 (2023): Volume 02 Issue 09
- Reza Wijaya, BUILDING SYNERGY: HUMAN CAPITAL DEVELOPMENT STRATEGIES FOR COOPERATIVE PERFORMANCE , Global Multidisciplinary Journal: Vol. 3 No. 05 (2024): Volume 03 Issue 05
Similar Articles
- Dr. Arjun Deshpande, Towards A Secure, Scalable, And Privacy‑Compliant Continuous Delivery Framework For Educational Software Systems , Global Multidisciplinary Journal: Vol. 4 No. 07 (2025): Volume 04 Issue 07
- Everett D. Langford, Financially Resilient Intelligent Systems: Integrating Machine Learning Architectures, Explainability, and Cross-Domain Evidence for Next-Generation Transaction Fraud Detection , Global Multidisciplinary Journal: Vol. 5 No. 01 (2026): Volume 05 Issue 01
- Dr. Emilia Laurent, Graph-Driven Dynamic Pricing and Intelligent Resource Orchestration in Cloud And 5G Ecosystems: A Cost-Optimized, Secure, And Value-Aligned Framework for Private Cloud Transformation , Global Multidisciplinary Journal: Vol. 4 No. 12 (2025): Volume 04 Issue 12
- Dr. Elena Moretti, Resilient, Automated Monitoring and Fault-Tolerant Control for Critical Building Systems: Integrating GPU-Accelerated Anomaly Detection, Infrastructure-as-Code, and Self-Correcting HVAC Strategies , Global Multidisciplinary Journal: Vol. 4 No. 10 (2025): Volume 04 Issue 10
- Jessica Killinpi, The Convergence of Hyperautomation and Autonomous Remediation: Mitigating Site Reliability Engineering Toil in Cloud-Native Ecosystems , Global Multidisciplinary Journal: Vol. 5 No. 04 (2026): Volume 05 Issue 04
- Oliver Reinhardt, Adaptive Security and Modernization Strategies in Enterprise Java Applications: A Comparative Analysis of Legacy and Contemporary Authentication Frameworks , Global Multidisciplinary Journal: Vol. 5 No. 01 (2026): Volume 05 Issue 01
- Dr. Alexander J. Reinhardt, A Comparative and Language-Centric Examination of Web Application Security Vulnerabilities and Framework-Level Mitigation Strategies , Global Multidisciplinary Journal: Vol. 4 No. 11 (2025): Volume 04 Issue 11
- Dr. Sofia Laurent, A Unified Fault-Tolerant and Machine Learning-Driven Architecture for Autonomous Driving Systems: Integrating Dependability, Perception, And Embedded Reliability , Global Multidisciplinary Journal: Vol. 4 No. 12 (2025): Volume 04 Issue 12
- Dr. Adrian John, Risk-Based Cybersecurity Governance: Integrating Regulatory Theory, Cost-Benefit Analysis, and Adaptive Security Design in Digital Infrastructures , Global Multidisciplinary Journal: Vol. 4 No. 12 (2025): Volume 04 Issue 12
- Silas J. Merton, Integrating Artificial Intelligence and Real Time Data Processing in FinTech Credit Scoring Systems for Financial Inclusion and Risk Governance in Emerging Digital Economies , Global Multidisciplinary Journal: Vol. 4 No. 11 (2025): Volume 04 Issue 11
You may also start an advanced similarity search for this article.