Build your Security Superpowers: Security Best Practices for Salesforce Admins presented by Devanshu Patel in the Admin Zone at Salesforce World Tour Chicago on 4/22/15.
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Build your Security Superpowers: Security Best Practices for Salesforce Admins
1. Build Your Security Superpowers:
Security Best Practices for Admins
Devanshu Patel
Sr. Security Engagement Manager
2. Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize
or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by
the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any
projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding
strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or
technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality
for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and
rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with
completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our
ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment,
our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on
potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent
fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important
disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and
may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are
currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
7. Password Sharing =
Security Risk
Loss of access control
Compromise will be blamed on the account
owner
Effective insider threat technique
You Own Your Password
Ownership has rights and responsibilities
8. OPPWAD
Other People’s Passwords Are Dangerous!
Never share your Salesforce account
password with anyone
Do not accept Salesforce credentials
from anyone
If someone gives you their Salesforce
credentials, report it to
security@salesforce.com
9. Password Security
Password security is the first line of defense.
Use strong passwords
• Preferably minimum 12 characters and
three character types (upper, lower,
numeric, symbols)
Regularly change passwords
Never reuse passwords on other accounts
Never share passwords (OPPWAD)
Deactivate passwords when people leave
10. Weak Passwords Can Be Hacked
Weak passwords (under 8 characters or real words) are easy prey
Password cracking software can break them easily
16. Login IP Ranges
Available to all customers
Only access Salesforce from a designated set of IP Ranges. Two levels:
Org-level Trusted IP Ranges (permissive)
Profile-level Login IP Ranges (restrictive)
Enterprise, Unlimited, Performance, Developer:
Manage Users | Profiles
Contact Mgr, Group, Professional:
Security Controls | Session Settings
For more info, search Help & Training
17. Recommendation
Org-wide Trusted IP Ranges → all users in your organization
Profile- based login IP range restrictions → employees with
access to lots of data or sensitive materials (Admins,
Developers)
Profile- based login IP range restrictions --> users connecting
from the same locations.
18. Phishing
Educate your Salesforce users!
If your users get a “Salesforce” e-mail, have them reach out to you or your
security team to double check that it is legitimate
If you are not sure about a ”Salesforce" e-mail, ask us, by forwarding to
security@salesforce.com
19. Phishing Superpowers
Hover over links to validate.
Does the e-mail context make sense?
Does the e-mail sender make sense?
Look for typos/grammatical errors.
Beware Clickbait!
• Using emotion to entice you to click immediately
• Fear (Your account will be closed)
• Reward (First 100 users get a free eye exam!)
20. Phishing Spoof
Hover over links to validate.
Does the e-mail context make
sense?
Does the e-mail sender make
sense?
Does Salesforce send receipts in
this manner? Are you normally a
recipient?
Look for typos/grammatical errors.
Beware Clickbait!
21. Real Salesforce E-Mail
Look for:
Legitimate @salesforce.com or @exacttarget.com
address
Links go to www.salesforce.com or App Stores
(hover with your mouse)
Call to action not overly aggressive
22. Phishing Takeaways
Hover over links and sender address to validate.
Does the e-mail context make sense?
Does the e-mail sender make sense?
Look for typos/grammatical errors.
Beware Clickbait!
• Using emotion to entice you to click immediately
• Fear (Your account will be closed)
• Reward (First 100 users get a free eye exam!)
Have users e-mail admin/security
Admin/Security can e-mail security@salesforce.com
Key Takeaway:We are a publicly traded company. Please make your buying decisions only on the products commercially available from Salesforce.com.
Talk Track:
Before I begin, just a quick note that when considering future developments, whether by us or with any other solution provider, you should always base your purchasing decisions on what is currently available.