Salesforce

Secure configuration of Salesforce features and third-party integrations

Take steps to securely configure Salesforce features and third-party integrations in your organization, protecting sensitive data and ensuring compliance with industry standards.
Loved by leading security teams around the world.

Enable Two-Factor Authentication (2FA):

a. In Salesforce Setup, navigate to "Users" and select "Two-Factor Authentication for User"

b. Click the "Enable Two-Factor Authentication" button

c. Follow the prompts to complete the setup.

Implement Role-Based Access Control (RBAC):

a. In Salesforce Setup, navigate to "Users" and select "Profiles"

b. Create new profiles for different user roles and assign appropriate permissions for each profile

c. Navigate to "Permission Sets" and create new permission sets as needed to grant additional permissions to specific users

d. Assign profiles and permission sets to users

Use Salesforce Shield:

a. In Salesforce Setup, navigate to "Security" and select "Shield"

b. Review the available features and enable the ones that are appropriate for your organization.

c. Configure the settings for each enabled feature

Review and Audit System Access:

a. In Salesforce Setup, navigate to "Reports" and create a new report based on the "Login History" report type

b. Run the report regularly to review login activity and detect any suspicious activity

c. Review the report and take action as needed.

Use Salesforce Sandbox:

a. In Salesforce Setup, navigate to "Sandboxes" and create a new sandbox for testing and development.

b. Configure the settings for the sandbox, including data and user access.

c. Use the sandbox for testing and development instead of the production environment

Use Salesforce Encryption:

a. In Salesforce Setup, navigate to "Security" and select "Platform Encryption"

b. Review the available encryption options and enable the ones that are appropriate for your organization

c. Configure the settings for each enabled encryption option.

Use Third-Party Applications:

a. Research and review potential third-party applications for integration with Salesforce

b. Ensure that the applications have been security reviewed and that you only integrate with applications from trustworthy providers

c. Configure the integration settings for each application.

Keep Salesforce Up to Date:

a. In Salesforce Setup, navigate to "Upgrade" to check for new releases and security patches

b. Follow the instructions to install any available updates

Train Users on Salesforce Security Best Practices:

a. Develop a training program for your users, including topics such as strong password policies, recognizing phishing attempts, and secure data handling

b. Deliver the training to all users

c. Regularly review and update the training program.

Implement a Security Incident Response Plan:

a. Develop a plan to handle any suspected security breaches or other security incidents

b. Include procedures for identifying, assessing, and responding to security incidents

c. Train users on the incident response plan and how to recognize and report incidents

By following this guide, you will have taken steps to securely configure Salesforce features and third-party integrations in your organization, protecting sensitive data and ensuring compliance with industry standards. Keep in mind this is a guide not a substitute for professional security audit and it is important to conduct regular security reviews and assessments.

Connect, Protect, Defend

Streamline your approach to security posture management throughout your entire company.
Get a Free Security Assessment
By installing or using the software, you acknowledge and agree to be bound by the Terms of Service.