An Overview of Salesforce Security & Compliance Measures

Salesforce has rightfully earned and held on to the title of the “World’s #1 CRM Platform” by going to great lengths to enable their customers to access to their data across all devices, all while ensuring the data is protected from unauthorized access.

As the adage goes, “Security is only as strong or weak as the weakest link in the chain.”

Salesforce, from its early days, recognized its part in its customers’ security chain and has taken all measures possible to protect customer data at every layer of the OSI model.

They also offer powerful and flexible tools to their customers to secure their data exactly the way they want.

Let’s look at the tools in each of these categories.

Infrastructure

  • Salesforce’s office sites, development centers, support, and data centers are secured by state-of-the-art technologies and are ISO 270001, ISO 27017, and ISO 27018 certified by an independent party.
  • Salesforce hosts multiple tenants on the same shared set of resources. Tenants are completely isolated from each other via an “Organization ID.”
  • In addition, the platform is HIPAA, FedRAMP, and GDPR compliant. A full list of Salesforce’s certifications may be found here.
  • These security measures are entirely under the control of Salesforce and have been made available to the general public for informational purposes alone. The ones below are more important to the Salesforce customer and require careful review, planning, and execution.

Encryption

  • All data is encrypted using TLS 1.2 the moment it leaves the user’s browser or mobile device. Data is always encrypted as it moves around within Salesforce’s own networks.
  • Salesforce offers the ability to encrypt data in sensitive fields at no extra cost, so they may only be accessed by authorized users.
  • For an additional cost, customers may purchase Salesforce Shield, which encrypts all customer data at rest.

Real-time Monitoring

  • Salesforce offers event monitoring at an additional cost for Enhanced Transaction Security and Threat Detection.
    • Enhanced Transaction Security offers customers the ability to define policies around sensitive operations such as login, API access, and reporting.
    • Threat Detection alerts customers in real-time to unauthorized access from session hijacking, credential Stuffing, and other anomalies.

Authorization

  • Salesforce offers a myriad of ways for customers to log in, ranging from traditional password-based logins to SAML or OAuth-based SSO.
  • In addition, users also have the option of a wide range of two-factor authentication mechanisms. The simplest one (which all users are enrolled in by default) is through an activation code emailed to the user. Other options include text messages to the user’s registered phone, Salesforce Authenticator App, or a physical security key.

Application Security

  • The final and the most important piece of the security chain, from a customer’s perspective, are the security configuration options in the Salesforce app itself.
    • System and Object access levels
      • Profiles control Create, Read, Delete, and Edit access to objects as well as access to fields. They also dictate the scope of what the user can do on the platform.
      • Permission Sets allow additional permissions to be added to the ones provided to a user by their Profile.
      • Permission Set Groups are a recent addition to the platform that allows grouping multiple Permission Sets together. They have been introduced to simplify the metadata representation of a user’s access levels and are projected to make Profiles less relevant soon.
    • Data access levels
      • For a user having at least Read access to an Object, access to individual records is controlled by a combination of Org-Wide Defaults, the User’s Role, the Object’s Sharing Rules, and Record Ownership. In addition, there are features like Sharing Sets, Queue Membership, Enterprise Territory Management, Manual Sharing, and Account/Sales and Case Teams that can provide a user access to certain records.
    • Process execution contexts
      • Custom Screens and Automations designed on the Platform using Code or Flows may be run under the System Context or User Context. It requires careful planning and execution on the part of an admin or developer to ensure these processes always run with the least privileges necessary and don’t turn into attack surfaces or inadvertently expose sensitive customer information.

The features listed above are merely an overview. There are many intricacies to configuring and fine-tuning data security in Salesforce.

Although most small-to-midsize customers start out with an “open” model, where access to data is pretty much unrestricted to all users, the approach may not be suited to all customers and can quickly prove inadequate as the user list starts growing.

Careful planning and execution, driven by an experienced Salesforce Consultant or Administrator can end up saving you a lot of time and money as you start to scale usage of the Platform.

At the same time, a lack of proper planning and improper implementation can end up costing you time, money, and customer goodwill.

Vertex Computer Systems is a trusted Salesforce Solutions Provider with specializations in Sales Cloud, Service Cloud, and Business Process Automation & Transformation.

If you would like to schedule a Salesforce security audit or just learn more about Salesforce security, please contact us.

Cream Rises: Two Vertex Coders Finish in the Top Ten of the Microsoft Cloud Skills Challenge

The India Microsoft Cloud Skills Challenge is a contest that attracts some of the brightest minds in software engineering and pushes them to perform feats of coding ingenuity. For 72 hours in mid-October, over 1,000 people in India battled in this tournament of intellect, creativity, and skill.

Vertex is pleased to share that our own Bhavani Pallekonda, Software Engineer, and Jagadeesh Srirangapuram, Senior Software Programmer, rose to respective second and ninth places. Vertex congratulates Bhavani and Jagadeesh for their initiative and hard work as they completed a series of tutorials, browser-based interactive coding, and scripting. The Microsoft Cloud Skills Challenge is part of the Partner Leadership Conclave 10, a virtual event that gives developers a chance to show off their skills and compete for prizes. “It’s an interactive way to learn the new things,” Pallekonda says. “Also, we were excited to complete the tasks.” Srirangapuram, who loves a good challenge, found the experience rewarding. “Initially, I never expected this high of a result,” he says. “But, it was fruitful. It was exciting to be challenged at each stage of the competition. I exceeded my expectations.”

 

Microsoft Cloud Challenge Winners

Two top-ten finishers prove our team’s talent, hard work, and spirit of success. “It’s a pleasure to see two of our associates place so highly,” says Sudip Nandy, Head of Delivery, Hyderabad. “Not a small achievement against more than 1,000 competitors. I’m extremely proud of them.”

Additionally, 14 other Vertex employees took part in the contest, and all finished respectably. “It was gratifying to see so much interest from our team,” Sudip continued. “Vertex was well represented, and I know that if challenging weather conditions in Hyderabad didn’t interfere – causing power outages – all our contestants would have come through with flying colors.”

Not only is this distinction a feather in the cap of our associates, but it also gains Vertex visibility in the Microsoft Partner Network. “Congratulations to the team for participating and kudos to Bhavani and Jagadeesh for making the top ten,” says Ganesh Iyer, Principal. “This is an incredible achievement and will help elevate our brand as an elite partner in the Microsoft ecosystem.”

A round of applause to Vertex’s full team of participants:

  • Thomas Anthony
  • Nihanth Balabhadra
  • Viswa Bandaru
  • Seetharam Bheemavarapu
  • Muralikrishna Chinigi
  • Prashanthi Geedula
  • Gopala Rao Gollapalli
  • Abdul Hak
  • Satish Kulala
  • Pradeep Madasu
  • Bhavani Pallekonda
  • Suvarchala Pantam
  • Jagadeesh Srirangapuram
  • Seetharama Rao Tungaturti
  • Gopinath Vemulapalli
  • Sudeep Yadagiri

Digitally Transform With Microsoft Power Platform

Microsoft Power Platform is a suite of applications that work together with the entire Microsoft Fusion ecosystem to enable the creation of software applications in no-code, low-code, and code-first environments.

The Development Tools

While Power Platform pulls in most of the Microsoft ecosystem of tools including Office 365, Dynamics 365, Azure, and hundreds of other apps, it is based on four main components: Power BI, Power Apps, Power Automate, and Power Virtual Agents.

Power Apps

Power Apps is a suite of apps, services, and connectors, as well as a data platform, providing a development environment that allows non-professional developers to quickly build professional-grade applications, connect with diverse data sources (such as SharePoint, Microsoft 365, Dynamics 365, SQL Server, and so on), embed dashboards, and deploy to iOS and Android app stores.

Power Apps is embedded with rich business logic and workflow capabilities that can easily transform your manual business processes into automated digital processes. The resulting apps can run seamlessly in both browsers and mobile devices and “democratizes” the previously developer-only app building experience to enable all users to create feature-rich custom apps without writing code.

Power BI

Power BI is a complete data, analytics, artificial intelligence, and visualization tool that integrates with the Power Platform ecosystem. With pre-built and custom data connections, industry-leading data security, tight integration with Excel and built-in AI capabilities, it allows you to easily derive meaningful insights from your data

Power Automate

Power Automate gives you the power to streamline repetitive tasks and create paperless processes, greatly increasing productivity and reducing errors. You can Use low-code, drag-and-drop tools and hundreds of pre-built connectors that automate repetitive, mundane tasks with ease. Furthermore, you can use Process Advisor and get guided recommendations for creating flows and deep insights that take the guesswork out of what to automate. Finally, AI tools make your automation even richer. Quickly process forms using document automation, process approvals, detect images and text, or create with prebuilt models.

Power Virtual Agents

Take your automation to the next level with Power Virtual Agents. Virtual Agents are sophisticated, AI-powered chatbots that can resolve common issues and answer questions around the clock. There’s no need to write code and the chatbots can easily be integrated with the products and services you use every day. Look up records, personalize conversations, hand off conversations to live agents, and call APIs. Choose from hundreds of pre-built connectors, or build custom workflows using Power Automate.

The Development Process

Applications are developed using a methodology called Fusion Teams that brings together professional developers, IT Professionals, Business Analysts and Citizen Developers.

The IT Professional basically acts as a Project Manager and is ultimately responsible for ongoing governance and delivery of the application as well as building security and governance guidelines and dealing with sensitive data. They work with Business Analysts, who may or may not also serve as Citizen Developers.

The professional developer comes into the picture to begin building the service that will become the solution. They access and analyze the legacy data and build the API that ultimately serves as the connection to the MS Power Platform ecosystem.
Once the API has been created, the Citizen Developer defines the user interface and uses open-source tools to create logic for the app.

Vertex Computer Systems is YOUR Power App Partner

With over 125 Microsoft certified professionals across 11 disciplines, Vertex Computer Systems has the technology experience and a mature delivery process that will make us a valuable solution partner for you.

Vertex Computer Systems Ranked #1 IT Staffing Provider for Fortune 50 CPG Manufacturer

We’re proud to announce that Vertex Computer Systems was recently ranked the #1 IT Staffing Vendor for a Fortune 50 Packaged Goods manufacturer, besting 10 other IT firms in the company’s 4th quarter rankings. While this ranking is for IT staffing, Vertex has been a partner of the CPG firm for many years, delivering projects in Microsoft M365 services, Custom App Development, Data & Analytics, and Salesforce, among other technologies.

The ranking is based on several key factors, including speed to provide resources, regulatory compliance, candidate quality, fulfillment, rates and retention.

“Vertex Computer Systems prides itself on creating positive client relationships over many years of working together,” said Global Account Director Murali Swamy. “We look forward to additional work with this client and continuing to be a key part of their success.”

loader
Vertex Computer Systems is Hiring!Join the Team »
+