Skip to main content

Security Considerations

Protect your NetSuite account and data.


Security Basics

SECURITY LAYERS
===============================================================================

Layer 1: ACCESS CONTROL
├── Who can log in?
├── What can they do?
└── What data can they see?

Layer 2: AUTHENTICATION
├── Strong passwords
├── Two-Factor Authentication (2FA)
└── Session management

Layer 3: MONITORING
├── Login audits
├── Change tracking
└── Suspicious activity alerts

Must-Do Security Settings

1. Enable Two-Factor Authentication (2FA)

ENABLING 2FA
===============================================================================

For Your Account:
Step 1: Home > Set Preferences > Security
Step 2: Click "Set Up Two-Factor Authentication"
Step 3: Choose method (Authenticator app recommended)
Step 4: Follow setup wizard
Step 5: Save backup codes!

For All Admins (require it):
Setup > Company > Two-Factor Authentication
├── Require 2FA for: Administrator roles ✓
└── Applies on next login

2. Set Password Policy

PASSWORD POLICY SETTINGS
===============================================================================

Navigation: Setup > Company > Login Restrictions

Recommended Settings:
├── Minimum Password Length: 12+ characters
├── Require Mixed Case: ✓
├── Require Numbers: ✓
├── Require Special Characters: ✓
├── Password Expiration: 90 days
└── Lockout After Failed Attempts: 5 attempts

3. Configure Session Timeout

SESSION TIMEOUT
===============================================================================

Navigation: Setup > Company > General Preferences

Setting:
├── Session Idle Timeout: 60 minutes (or less)
└── Applies to all users

Why: Automatically logs out inactive users

IP Address Restrictions

Limit where users can log in from:

IP RESTRICTIONS
===============================================================================

Option 1: Company-Wide (all users)
Navigation: Setup > Company > Company Information
├── IP Address Rules section
├── Add allowed IP ranges
└── Users outside range = blocked

Option 2: Role-Based
Navigation: Role > Restrictions subtab
├── IP Address section
├── Add allowed ranges for this role
└── More flexibility per role

Common Uses:

  • Admin role: Office IP only
  • All users: Home + office IPs
  • API users: Server IPs only

Role-Based Security

Principle of Least Privilege

LEAST PRIVILEGE = MINIMUM ACCESS NEEDED
===============================================================================

Bad: Good:
├── Everyone is Admin ├── 2-3 Administrators max
├── All roles have Full access ├── View-only where possible
└── No restrictions └── Restrict by dept/location

Security-Focused Role Design

Role TypePermission Approach
AdminFull access (few people)
ManagerEdit own area, view others
StaffCreate/edit own work only
ViewerView only, no changes
ExternalMinimal access needed

Monitoring & Auditing

Login Audit Trail

REVIEWING LOGIN AUDIT
===============================================================================

Navigation: Setup > Users/Roles > View Login Audit Trail

Look for:
├── Failed login attempts (brute force?)
├── Logins from unusual locations
├── Logins at unusual times
└── Multiple logins from same user

Review Frequency: Weekly (at minimum)

What to Watch For

Red FlagMight MeanAction
Many failed logins from one IPBrute force attackBlock IP
Login from new countryCompromised accountVerify with user
Admin login at 3 AMSuspicious activityInvestigate
Unusual number of record changesData manipulationAudit records

API and Integration Security

If you have integrations:

INTEGRATION SECURITY
===============================================================================

Token-Based Authentication (TBA):
├── Preferred over password-based
├── Create specific tokens per integration
├── Revoke easily if compromised
└── Setup: Setup > Integration > Manage Tokens

Best Practices:
├── Separate role for each integration
├── Minimum permissions needed
├── Log all API activity
└── Rotate tokens periodically

Quick Security Checklist

SECURITY AUDIT CHECKLIST
===============================================================================

□ ACCOUNTS
├── 2FA enabled for all admins: ✓
├── Password policy enforced: ✓
└── Inactive users removed: ✓

□ ACCESS
├── Admin count minimized (2-3): ✓
├── Roles follow least privilege: ✓
└── Restrictions applied: ✓

□ MONITORING
├── Login audit reviewed weekly: ✓
├── Role changes tracked: ✓
└── Alerts for admin access: ✓

□ INTEGRATIONS
├── Token-based auth used: ✓
├── Integration roles minimal: ✓
└── Tokens rotated annually: ✓

Quick Reference

I want to...Go to
Enable 2FAHome > Set Preferences > Security
Set password rulesSetup > Company > Login Restrictions
Restrict by IPSetup > Company > Company Information
View login historySetup > Users/Roles > View Login Audit Trail
Manage tokensSetup > Integration > Manage Tokens

Do's and Don'ts

DoDon't
Enable 2FA for all adminsShare admin credentials
Review logins weeklyIgnore failed login patterns
Limit admin countGive admin to everyone who asks
Use restrictionsGive full access unnecessarily
Document security settingsMake changes without documentation

Key Takeaways

  1. 2FA is essential - especially for admins
  2. Least privilege - give minimum access needed
  3. Monitor regularly - review logins weekly
  4. Limit admins - 2-3 maximum
  5. IP restrictions - add extra layer for sensitive roles