Insecure Default Settings

Severity: Medium

Salesforce comes with default settings that may not be suitable for securing sensitive data, potentially exposing organizations to security risks if not addressed. Default settings may not reflect the organization's security requirements, leaving them open to vulnerabilities that could lead to data breaches, unauthorized access, or other security incidents.

To mitigate this risk, organizations should review and update default settings, such as password policies, session timeout values, and IP restrictions. This involves reviewing Salesforce's default security settings and assessing their appropriateness for the organization's security requirements. Changes can be made to default settings to align them with the organization's security policies and procedures.

Enabling security features like two-factor authentication (2FA), login alerts, and login history tracking is also critical to securing sensitive data. 2FA requires users to provide two forms of authentication, such as a password and a one-time code sent to a mobile device, before they can access Salesforce. This adds an additional layer of security to the authentication process and helps to prevent unauthorized access. Login alerts and history tracking provide visibility into who is accessing the system and when, helping to identify potential security incidents.

Following Salesforce security best practices is also essential to ensuring a secure platform configuration. These best practices include regular security assessments, vulnerability testing, and security training for users. Salesforce's security best practices should be incorporated into the organization's security policies and procedures to ensure that they are followed consistently.

Overall, to mitigate the risk of default settings exposing organizations to security risks, organizations should review and update default settings, enable security features like 2FA, login alerts, and login history tracking, and follow Salesforce security best practices to ensure a secure platform configuration. By following these best practices, organizations can significantly reduce the risks associated with default settings that may not be suitable for securing sensitive data.

Connect, Protect, Defend

Streamline your approach to security posture management throughout your entire company.
Get a Free Security Assessment
By installing or using the software, you acknowledge and agree to be bound by the Terms of Service.