{"id":2571,"date":"2018-07-16T08:00:27","date_gmt":"2018-07-16T08:00:27","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/secure-your-data-on-salesforce-before-its-too-late\/"},"modified":"2018-07-16T08:00:27","modified_gmt":"2018-07-16T08:00:27","slug":"secure-your-data-on-salesforce-before-its-too-late","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/secure-your-data-on-salesforce-before-its-too-late\/","title":{"rendered":"Secure Your Data on Salesforce Before It\u2019s Too Late!"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><em><strong>By Laura Pelkey,\u00a0Security Content and Communications Manager, Salesforce\u00a0<\/strong><\/em><\/p>\n<p><!--more--><\/p>\n<p>There is a lot of information out there telling you that you should <a href=\"https:\/\/lavaprotocols.com\/2016\/04\/19\/60-second-data-security-checklist\/\" target=\"_blank\" rel=\"noopener\">protect your data<\/a>. But why is data security important? More data exists online now than at any other point in time, and the quantity is only expected to keep growing. It\u2019s important to protect yourself and your customers. If you\u2019re using a CRM (customer relationship management) software such as Salesforce, you need to equip yourself with best practices on how to secure your data on Salesforce.<\/p>\n<h2><\/h2>\n<h2><span style=\"color: #ff6600;\"><strong>How Do We Define Data?<\/strong><\/span><\/h2>\n<p>Data is any recorded fact or statistic. Personal data\u00a0\u2014 otherwise known as personally identifiable information (or\u00a0<a href=\"https:\/\/www.gsa.gov\/reference\/gsa-privacy-program\/rules-and-policies-protecting-pii-privacy-act\" target=\"_blank\" rel=\"noopener\">PII)\u00a0<\/a>\u2014\u00a0can be a birthday, home address, phone number, or even full name, if it\u2019s in relation to any other PII. It can also be highly valuable information such as healthcare records, banking information, or social security number. The more valuable the information, the more money it\u2019s worth (to hackers or people who buy information from hackers).<\/p>\n<p>Data is not only personal information about an individual that can be found online. It can also be information about a customer that is stored on a company\u2019s database. Recent data security protections like the EU\u2019s General Data Protection Regulation (<a href=\"https:\/\/www.salesforce.com\/gdpr\/overview\/\" target=\"_blank\" rel=\"noopener\">GDPR<\/a>) are an important step in limiting what companies can do with the data that resides in their systems. There are also steps you can take to limit the data that gets exposed in the first place.<\/p>\n<p><span style=\"color: #ff6600;\"><strong>Related<\/strong><\/span>:\u00a0<a href=\"https:\/\/lavaprotocols.com\/2016\/04\/19\/cloud-security-secured-not\/\" target=\"_blank\" rel=\"noopener\">Cloud Security: So Are We Secured (Or Not)?<\/a><\/p>\n<p>Now that we\u2019ve defined data security in general terms, let\u2019s talk more specifically about how to keep your Salesforce data secure.<\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"color: #ff6600;\"><strong>Secure Your Data on Salesforce<\/strong><\/span><\/h2>\n<p>For administrators and developers, choosing data sets each user or group of users can see is one of the key decisions that affects how you secure your data on Salesforce. It\u2019s important to limit the data your users are able to see and the permissions they have. Users ought to only have access to what is necessary to perform their job \u2013 this concept is called the\u00a0<a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/principle-of-least-privilege-POLP\" target=\"_blank\" rel=\"noopener\">principle of least privilege<\/a>.<\/p>\n<p>An example of when you might need to apply this theory is if you\u2019re building an app to help manage the recruiting efforts at your company. The app will store a plethora of confidential data such as names, social security numbers, salary information, and feedback from existing employees. Only some teams or individuals within your company will need to have access to such sensitive information. In this example, recruiters will need access to everything, while some other users will probably only need editing rights to certain fields.<\/p>\n<p>The\u00a0<a href=\"https:\/\/www.salesforce.com\/products\/platform\/overview\/\" target=\"_blank\" rel=\"noopener\">Salesforce platform<\/a>\u00a0lets you maintain data security by assigning different data sets to different types of users. Therefore, users that need access to sensitive information can perform their critical job functions, while reducing the risk of data being stolen, leaked or misused.<\/p>\n<p>Administrators (admins) are able to specify which users can view, create, edit, or delete any record or field in the app. This control can extend to your entire organisation (org), or simply an object, field, or individual record. By combining security controls at different levels, you can provide the ideal level of data access to all of your users while maximising the effectiveness of your data security controls.<\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"color: #ff6600;\"><strong>Secure Your Data on Salesforce by Controlling Access<\/strong><\/span><\/h2>\n<p>As we mentioned earlier, admins can control which users have access to which data in the org\u00a0\u2014 a specific object, a specific field, or an individual record. It\u2019s important to understand how these levels interact with each other. The list below gives a brief overview of which types of controls should be implemented at each level:<\/p>\n<ul>\n<li><strong>Org-wide<\/strong>: Maintain a current list of users, up-to-date password policies and restrict IP login ranges.<\/li>\n<li><strong>Objects<\/strong>: Limit access to specific data to groups of users at the object level.<\/li>\n<li><strong>Fields<\/strong>: Restrict access to specific data, even if a user has access to the object.<\/li>\n<li><strong>Records<\/strong>: Allow some users to access an object, but limit which object records they are allowed to view.<\/li>\n<\/ul>\n<p>In addition to understanding how levels function, conduct a regular audit of the following components to ensure data security is maintained. Remember, security is never done!<\/p>\n<ul>\n<li><strong>Record Modification Fields<\/strong>: This provides some basic auditing information including the name of the user who created the record and who last modified the record.<\/li>\n<li><a href=\"https:\/\/help.salesforce.com\/articleView?id=users_login_history.htm&#038;language=en_us&#038;r=https%3A%2F%2Flavaprotocols.com%2F&#038;type=5\" target=\"_blank\" rel=\"noopener\"><strong>Login History<\/strong><\/a>: Review a list of successful and failed login attempts for the past six months.<\/li>\n<li><a href=\"https:\/\/help.salesforce.com\/articleView?id=tracking_field_history.htm&#038;type=5\" target=\"_blank\" rel=\"noopener\"><strong>Field History Tracking<\/strong><\/a>: Enable this feature to automatically track changes in the values of individual fields. Although field-level auditing is available for all custom objects, only some standard objects allow it.<\/li>\n<li><a href=\"https:\/\/help.salesforce.com\/articleView?id=admin_monitorsetup.htm&#038;type=5\" target=\"_blank\" rel=\"noopener\"><strong>Setup Audit Trail<\/strong><\/a>: This logs when modifications are made to your org\u2019s configuration.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2><span style=\"color: #ff6600;\"><strong>Prioritise Data Security Settings in Salesforce with Health Check<\/strong><\/span><\/h2>\n<p>Now that you understand the data security components and how they work together, you can move on to understanding individual security controls. Is there one place where you can manage all of your org\u2019s most important security settings? Why yes, there is! It\u2019s called\u00a0<a href=\"https:\/\/help.salesforce.com\/articleView?id=security_health_check.htm&#038;type=5\" target=\"_blank\" rel=\"noopener\">Health Check<\/a>, and it is a free tool that comes standard with CRM.<\/p>\n<p>Health Check allows you to view your current security settings and prioritise your risk. This makes it easy (with one click!) to fix settings that pose a risk to your org. If you have multiple orgs, Salesforce has open sourced a tool called\u00a0<a href=\"https:\/\/engineering.salesforce.com\/how-a-need-for-multi-org-health-checks-became-orgmonitor-4b1a93d96e7d\" target=\"_blank\" rel=\"noopener\">OrgMonitor<\/a>\u00a0that can help you bring the same simple management and prioritisation of security settings to all of your orgs in one view.<\/p>\n<p><a href=\"https:\/\/www.salesforce.com\/blog\/2018\/04\/data-security.html\" target=\"_blank\" rel=\"noopener\">Article<\/a> first appeared on the Salesforce Blog.<\/p>\n<p><i><span style=\"font-weight: 400;\">Lava is an<\/span><\/i><a href=\"https:\/\/lavaprotocols.com\/salesforce-crm\/\"> <i><span style=\"font-weight: 400;\">authorised Salesforce Partner<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> in Malaysia and has more than a decade of experience in cloud solutions which includes marketing automation, CRM implementation, change management, and consultation. We pride ourselves in not just being a CRM partner but in also understanding the needs of our customers and taking their business to the next level.<\/span><\/i><\/p>\n<p><script type=\"text\/javascript\">\npiAId = '418952';\npiCId = '56152';\npiHostname = 'pi.pardot.com';<\/p>\n<p>(function() {\n\tfunction async_load(){\n\t\tvar s = document.createElement('script'); s.type = 'text\/javascript';\n\t\ts.src = ('https:' == document.location.protocol ? 'https:\/\/pi' : 'http:\/\/cdn') + '.pardot.com\/pd.js';\n\t\tvar c = document.getElementsByTagName('script')[0]; c.parentNode.insertBefore(s, c);\n\t}\n\tif(window.attachEvent) { window.attachEvent('onload', async_load); }\n\telse { window.addEventListener('load', async_load, false); }\n})();\n<\/script><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Choosing data sets each user or group of users can see is one of the key decisions that affects how you secure your data on Salesforce.<\/p>\n","protected":false},"author":1,"featured_media":2572,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18],"class_list":["post-2571","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-blog"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/accounting-alone-analysis-938963_edited.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2571"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2571\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2572"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}