SlideShare a Scribd company logo
1 of 38
Download to read offline
Platform Encryption
Enhanced Native Encryption in the App Cloud
​ Peter Chittum
​ Developer Evangelist
​ @pchittum
​ github.com/pchittum
​ 
Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize
or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by
the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any
projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding
strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or
technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality
for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and
rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with
completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our
ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment,
our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on
potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent
fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important
disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and
may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are
currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Peter Chittum
Developer Evangelist
@pchittum
github.com/pchittum
Speakers
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment
NEW
Quick Setup with Clicks, Not Code
Designed for anyone to build and deploy
Native in Salesforce
Integrated directly, everything works
Build Compliance into your Apps
Encrypt, monitor and audit everything
Encryption - Event Monitoring - Field Audit Trail
Salesforce Shield
​ A new level of trust and compliance for
Salesforce
Introducing
Salesforce Shield
​ New services to help you build trusted apps fast
EncryptAuditMonitor
Platform EncryptionField Audit TrailEvent Monitoring
​ Monitor User Activity
​ Know who is accessing data from where
Optimize Performance
​ Troubleshoot application performance to
improve end user experience
​ Track Application Usage
​ Understand application usage to increase
adoption
Gain Visibility Into User Actions with Event Monitoring
Retain Field History for Up to 10 Years with Field Audit Trail
​ 
​ Establish Data Retention Policies
​ Know the state and value of data at any time
Access Retained Data at Scale
​ Normalize on big data back-end for performance
​ Comply with Industry Regulations
​ Secure data archive with the highest trust standards
Encrypt Sensitive Data While Preserving Business Functionality
​ 
​ Seamlessly protect data at rest
​ Encrypt standard & custom fields, files & attachments
​ 
Natively integrated with key Salesforce features
​ E.g. Search, Chatter, Lookups work with encrypted data
​ Customer managed keys
​ Customer-driven encryption key lifecycle management
Platform Encryption Use Cases
▪  Regulatory Compliance
▪  Unauthorized Access to Database
▪  Contractual Obligations
Platform Encryption is Not
▪  Sharing Model
▪  Object/Field Level Security
▪  Data Residency Solution
▪  Encryption for Other Non-Salesforce Data
▪  Protection against Social Engineering
trust.salesforce.com
Encryption
Authentication & SSO
Two factor Auth
Profiles/Permissions
Sharing & FLS
Setup Audit Trail
Field History Tracking
Event Monitoring
Identity
Encryption
Platform Encryption Is Unique
▪  Quickly Seamlessly interact and protect sensitive data
▪  Setup takes minutes - No Software! No Hardware!
▪  Makes the App Cloud ‘encryption aware’ (metadata driven)
▪  Salesforce1 Mobile-ready, natively
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment
Users
Encrypt at Rest: Fields
Name:
Darla Hood
Name:
aI90xi60csICOdk
Encryption
Service
Darla Hood
***********
Encrypt at Rest: Files
Lorem
ipsum
dolor
Encryption
Service
Xvier0c
9ghcru
cjf4x21f
fdqbBLorem
ipsum
dolor
Granular Control: Fields
▪  Individual Custom Fields
–  Text
–  Text Area
–  Text Area (Long)
–  Email
–  Phone
–  URL
–  Selected Standard Fields
▪  Enabled with flag
Granular Control: Files
▪  Files enabled separately
–  Attachments
–  Chatter
–  Files
–  Libraries
▪  All or none
Encryption Key
▪  Master Secret (Salesforce)
–  Rotated each release
–  Stored in the Key Derivation Servers
▪  Tenant Secret (Customer)
–  Can be Rotated once per day in Prod
–  Stored encrypted in DB
▪  Data Encryption Key
–  Derived from Secrets
–  Stored in cache, never persisted
Features and Support
▪  Feature License Required
▪  Available to evaluate in Developer Edition orgs
▪  Support for
–  Search
–  Workflow Rules
–  Validation Rules
–  Apex and VF Pages
–  And A LOT MORE...
Architecture & Encryption Process Flow
Customer driven key lifecycle
management
FIPS140-2 Hardware Security
Module based key management
infrastructure
AES encryption using 256bit keys
in CBC mode and random IV
Uses PBKDF2 HMAC with
SHA256 deriving secure 256-bit
keys that are never persisted in
Salesforce
Data encryption and decryption
actions are transparent
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment
Demo
▪  Managing Encryption
–  Select Fields/Files
–  Audit Encrypted Fields
–  Setup Audit Trail platform encryption events
–  Rotate Your Key
–  The TenantSecret sObject
The Tenant Secret sObject
​ //Rotate your secret by creating a new TenantSecret record
​ String descText = UserInfo.getName() + ' new secret via Lightning';
​ TenantSecret newSecret = new TenantSecret(Description=descText);
​ insert newSecret;
​ 1
​ 2
​ 3
​ 4
​ 5
​ 6
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment
Building Apps with Platform Encryption
​  SOQL Where Clauses/Filters
​  SOQL Order By/Sorting
​  Formula Fields
​  SOSL Search
​  Sort in Apex
​  Workflow/Apex Trigger
​  Instead of… ​  Use this feature…
Demo
▪  Customizing with Encryption
–  Searching with SOSL
–  Sorting in Apex
Searching with SOSL
​ 'FIND '' + searchStr1 + ''
​ IN ALL FIELDS
​ RETURNING
​  Account (Id, Name, type),
​  Contact (name,email, DLN__c, SSN__c)'
​ 1
​ 2
​ 3
​ 4
​ 5
Sorting with Apex: Wrapper with Comparable Interface
​ public class AccountSortable implements Comparable {
​  public Account acct;
​  AccountSortable(Account acctParam){
​  acct = acctParam;
​  }
​  public Integer compareTo(Object compareTo){
​  AccountSortable compareToAcct = (AccountSortable) compareTo;
​  return acct.Name.compareTo(compareToAcct.acct.Name);
​  }
​ }
​ //invoked like:
​ List<AccountSortable> listWithCustomSort = new List<AccountSortable>();
​ //...fill list with Accounts
​ listWithCustomSort.sort();
​ 1
​ 2
​ 3
​ 4
​ 5
​ 6
​ 7
​ 8
​ 9
​ 10
​ 11
​ 12
​ 13
​ 14
​ 15
Searching with SOSL: Handling Descending in Controller
​ //invoke your sort
​ listWithCustomSort.sort();
​ //
​ List<AccountSortable> listToReturn = new List<AccountSortable>();
​ if (order.toLowerCase() == 'desc’) {
​  for(integer i = resultList.size()-1; i >= 0; i--){
​  items.add(resultList[i].obj);
​  }
​ } else {
​  listToReturn.addAll(listWithCustomSort);
​ }
​ return listToReturn;
​ 1
​ 2
​ 3
​ 4
​ 5
​ 6
​ 7
​ 8
​ 9
​ 10
​ 11
​ 12
​ 13
​ 14
Workflow Field Update
Day__c Month__c Year__c
Birthday__c
Building Apps with Platform Encryption
​  SOSL Search
​  Sort in Apex
​  Workflow/Apex Trigger
​  SOSL is not SOQL
​  Search First
​  Text Data Type Field
​  Feature ​  Considerations
Read the Docs
Plan
Back Up Your Secret
Q & A
​ Resources:
​ Webinar:
​ https://developer.salesforce.com/events/webinars/
platform_encryption
​ DF15 Talk:
​ https://youtu.be/u0VxwyzU52w
​ Key Lifecycle Video:
​ https://youtu.be/LdPC7xT98Hg
Peter Chittum
Developer Evangelist
@pchittum
github.com/pchittum
Thank you

More Related Content

What's hot

Getting started with Salesforce security
Getting started with Salesforce securityGetting started with Salesforce security
Getting started with Salesforce securitySalesforce Admins
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce OrgSalesforce Admins
 
Setting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce InstanceSetting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce InstanceSalesforce Developers
 
Salesforce Online Training
Salesforce Online TrainingSalesforce Online Training
Salesforce Online TrainingKeylabs
 
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Salesforce Partners
 
Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation missmeryl
 
Salesforce Service Cloud
Salesforce Service CloudSalesforce Service Cloud
Salesforce Service Cloudsharad soni
 
How to Rock a Salesforce Demo (and why it matters)
How to Rock a Salesforce Demo (and why it matters)How to Rock a Salesforce Demo (and why it matters)
How to Rock a Salesforce Demo (and why it matters)Salesforce Admins
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce PresentationChetna Purohit
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Paris Salesforce Developer Group
 
Salesforce admin training 1
Salesforce admin training 1Salesforce admin training 1
Salesforce admin training 1HungPham381
 
Salesforce crm and its cloud services ppt converted
Salesforce crm and its cloud services ppt convertedSalesforce crm and its cloud services ppt converted
Salesforce crm and its cloud services ppt convertedAmbientInfoSolutions1
 
Session 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCESession 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCESmritiSharan1
 
The Role of the Salesforce Administrator
The Role of the Salesforce Administrator The Role of the Salesforce Administrator
The Role of the Salesforce Administrator Ebsta Limited
 
Salesforce Service Cloud - An overview
Salesforce Service Cloud - An overviewSalesforce Service Cloud - An overview
Salesforce Service Cloud - An overviewAjay Balakrishnan
 
LeadingAST.com - Leading a Sales Transformation Dreamforce 2015
LeadingAST.com - Leading a Sales Transformation Dreamforce 2015LeadingAST.com - Leading a Sales Transformation Dreamforce 2015
LeadingAST.com - Leading a Sales Transformation Dreamforce 2015Michael Weening
 
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudSalesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudDreamforce
 

What's hot (20)

Getting started with Salesforce security
Getting started with Salesforce securityGetting started with Salesforce security
Getting started with Salesforce security
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
 
Setting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce InstanceSetting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce Instance
 
Salesforce Online Training
Salesforce Online TrainingSalesforce Online Training
Salesforce Online Training
 
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
 
Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation
 
Salesforce Service Cloud
Salesforce Service CloudSalesforce Service Cloud
Salesforce Service Cloud
 
How to Rock a Salesforce Demo (and why it matters)
How to Rock a Salesforce Demo (and why it matters)How to Rock a Salesforce Demo (and why it matters)
How to Rock a Salesforce Demo (and why it matters)
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce Presentation
 
Salesforce
SalesforceSalesforce
Salesforce
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
Salesforce admin training 1
Salesforce admin training 1Salesforce admin training 1
Salesforce admin training 1
 
Salesforce Files Connect
Salesforce Files ConnectSalesforce Files Connect
Salesforce Files Connect
 
Salesforce crm and its cloud services ppt converted
Salesforce crm and its cloud services ppt convertedSalesforce crm and its cloud services ppt converted
Salesforce crm and its cloud services ppt converted
 
Session 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCESession 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCE
 
The Role of the Salesforce Administrator
The Role of the Salesforce Administrator The Role of the Salesforce Administrator
The Role of the Salesforce Administrator
 
Premier First Call Pitch
Premier First Call Pitch Premier First Call Pitch
Premier First Call Pitch
 
Salesforce Service Cloud - An overview
Salesforce Service Cloud - An overviewSalesforce Service Cloud - An overview
Salesforce Service Cloud - An overview
 
LeadingAST.com - Leading a Sales Transformation Dreamforce 2015
LeadingAST.com - Leading a Sales Transformation Dreamforce 2015LeadingAST.com - Leading a Sales Transformation Dreamforce 2015
LeadingAST.com - Leading a Sales Transformation Dreamforce 2015
 
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudSalesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
 

Viewers also liked

Coding the Salesforce User Interface with Visualforce Pages
Coding the Salesforce User Interface with Visualforce PagesCoding the Salesforce User Interface with Visualforce Pages
Coding the Salesforce User Interface with Visualforce PagesChristopher Lewis
 
Manage Development in Your Org with Salesforce Governance Framework
Manage Development in Your Org with Salesforce Governance FrameworkManage Development in Your Org with Salesforce Governance Framework
Manage Development in Your Org with Salesforce Governance FrameworkSalesforce Developers
 
How to scale and deploy NodeJS app
How to scale and deploy NodeJS appHow to scale and deploy NodeJS app
How to scale and deploy NodeJS appYacobus Reinhart
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Salesforce Partners
 
Salesforce Coding techniques that keep your admins happy (DF13)
Salesforce Coding techniques that keep your admins happy (DF13)Salesforce Coding techniques that keep your admins happy (DF13)
Salesforce Coding techniques that keep your admins happy (DF13)Roy Gilad
 
Salesforce Jumpstart: Getting Started as a Consulting Partner
Salesforce Jumpstart: Getting Started as a Consulting PartnerSalesforce Jumpstart: Getting Started as a Consulting Partner
Salesforce Jumpstart: Getting Started as a Consulting PartnerSalesforce Partners
 
Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...
Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...
Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...Zohirul Alam Tiemoon
 
Salesforce Security – An Encryption Guide For The Paranoid
Salesforce Security – An Encryption Guide For The ParanoidSalesforce Security – An Encryption Guide For The Paranoid
Salesforce Security – An Encryption Guide For The ParanoidAjeet Singh
 
Salesforce Development Best Practices
Salesforce Development Best PracticesSalesforce Development Best Practices
Salesforce Development Best PracticesVivek Chawla
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudSalesforce Developers
 

Viewers also liked (12)

Coding the Salesforce User Interface with Visualforce Pages
Coding the Salesforce User Interface with Visualforce PagesCoding the Salesforce User Interface with Visualforce Pages
Coding the Salesforce User Interface with Visualforce Pages
 
Salesforce Performance hacks - Client Side
Salesforce Performance hacks - Client SideSalesforce Performance hacks - Client Side
Salesforce Performance hacks - Client Side
 
Manage Development in Your Org with Salesforce Governance Framework
Manage Development in Your Org with Salesforce Governance FrameworkManage Development in Your Org with Salesforce Governance Framework
Manage Development in Your Org with Salesforce Governance Framework
 
How to scale and deploy NodeJS app
How to scale and deploy NodeJS appHow to scale and deploy NodeJS app
How to scale and deploy NodeJS app
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
 
Salesforce Coding techniques that keep your admins happy (DF13)
Salesforce Coding techniques that keep your admins happy (DF13)Salesforce Coding techniques that keep your admins happy (DF13)
Salesforce Coding techniques that keep your admins happy (DF13)
 
Salesforce Jumpstart: Getting Started as a Consulting Partner
Salesforce Jumpstart: Getting Started as a Consulting PartnerSalesforce Jumpstart: Getting Started as a Consulting Partner
Salesforce Jumpstart: Getting Started as a Consulting Partner
 
Salesforce Partner Program
Salesforce Partner ProgramSalesforce Partner Program
Salesforce Partner Program
 
Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...
Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...
Overview on TDD (Test Driven Development) & ATDD (Acceptance Test Driven Deve...
 
Salesforce Security – An Encryption Guide For The Paranoid
Salesforce Security – An Encryption Guide For The ParanoidSalesforce Security – An Encryption Guide For The Paranoid
Salesforce Security – An Encryption Guide For The Paranoid
 
Salesforce Development Best Practices
Salesforce Development Best PracticesSalesforce Development Best Practices
Salesforce Development Best Practices
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce Cloud
 

Similar to Salesforce Platform Encryption Developer Strategy

Dreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for DevelopersDreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for DevelopersPeter Chittum
 
Salesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 releaseSalesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 releaseDevendra Sawant
 
Platform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community KochiPlatform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community KochiAnil Somasundaran
 
Secure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best PracticesSecure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best PracticesSalesforce Developers
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 
Enterprise and Social Integration Using Force.com
Enterprise and Social Integration Using Force.comEnterprise and Social Integration Using Force.com
Enterprise and Social Integration Using Force.comSalesforce Developers
 
Platform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin ZonePlatform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin ZonePeter Chittum
 
Lightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer GroupLightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer GroupAbhilash Kuntar
 
Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17Mark Adcock
 
Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17Salesforce Developers
 
Secure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDKSecure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDKSalesforce Developers
 
Secure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDKSecure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDKMartin Vigo
 
Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Mark Adcock
 
Introduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKIntroduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKSalesforce Developers
 
Dreamforce 2017: Salesforce DX - an Admin's Perspective
Dreamforce 2017:  Salesforce DX - an Admin's PerspectiveDreamforce 2017:  Salesforce DX - an Admin's Perspective
Dreamforce 2017: Salesforce DX - an Admin's PerspectiveMike White
 
LWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptx
LWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptxLWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptx
LWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptxVkrish Peru
 
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSalesforce Developers
 

Similar to Salesforce Platform Encryption Developer Strategy (20)

Dreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for DevelopersDreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for Developers
 
Salesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 releaseSalesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 release
 
Platform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community KochiPlatform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community Kochi
 
Secure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best PracticesSecure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best Practices
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Enterprise and Social Integration Using Force.com
Enterprise and Social Integration Using Force.comEnterprise and Social Integration Using Force.com
Enterprise and Social Integration Using Force.com
 
Salesforce platform session 2
 Salesforce platform session 2 Salesforce platform session 2
Salesforce platform session 2
 
Platform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin ZonePlatform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin Zone
 
Lightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer GroupLightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer Group
 
Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17
 
Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17
 
Secure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDKSecure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDK
 
Secure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDKSecure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDK
 
Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3
 
Introduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKIntroduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDK
 
API Design for Your Packaged App
API Design for Your Packaged AppAPI Design for Your Packaged App
API Design for Your Packaged App
 
Dreamforce 2017: Salesforce DX - an Admin's Perspective
Dreamforce 2017:  Salesforce DX - an Admin's PerspectiveDreamforce 2017:  Salesforce DX - an Admin's Perspective
Dreamforce 2017: Salesforce DX - an Admin's Perspective
 
LWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptx
LWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptxLWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptx
LWC_Workbxcgbgfbgfbfgbfgbfbfbshop_Day2.pptx
 
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce Instance
 

More from Peter Chittum

Dreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and ApexDreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and ApexPeter Chittum
 
Winter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for SalesforceWinter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for SalesforcePeter Chittum
 
LMS Lightning Message Service
LMS Lightning Message ServiceLMS Lightning Message Service
LMS Lightning Message ServicePeter Chittum
 
Apply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday ProblemsApply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday ProblemsPeter Chittum
 
If You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command LineIf You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command LinePeter Chittum
 
If you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command lineIf you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command linePeter Chittum
 
Do Not Fear the Command Line
Do Not Fear the Command LineDo Not Fear the Command Line
Do Not Fear the Command LinePeter Chittum
 
Don't Fear the Command Line
Don't Fear the Command LineDon't Fear the Command Line
Don't Fear the Command LinePeter Chittum
 
The Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour EditionThe Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour EditionPeter Chittum
 
Maths Week - About Computers, for Kids
Maths Week - About Computers, for KidsMaths Week - About Computers, for Kids
Maths Week - About Computers, for KidsPeter Chittum
 
Best api features of 2016
Best api features of 2016Best api features of 2016
Best api features of 2016Peter Chittum
 
Streaming api with generic and durable streaming
Streaming api with generic and durable streamingStreaming api with generic and durable streaming
Streaming api with generic and durable streamingPeter Chittum
 
Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016Peter Chittum
 
All Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action ServiceAll Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action ServicePeter Chittum
 
Boxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchBoxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchPeter Chittum
 
Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015Peter Chittum
 
Building Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College LondonBuilding Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College LondonPeter Chittum
 
Elevate london dec 2014.pptx
Elevate london dec 2014.pptxElevate london dec 2014.pptx
Elevate london dec 2014.pptxPeter Chittum
 
AngularJS App In Two Weeks
AngularJS App In Two WeeksAngularJS App In Two Weeks
AngularJS App In Two WeeksPeter Chittum
 
Df14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer CertificationDf14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer CertificationPeter Chittum
 

More from Peter Chittum (20)

Dreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and ApexDreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
 
Winter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for SalesforceWinter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for Salesforce
 
LMS Lightning Message Service
LMS Lightning Message ServiceLMS Lightning Message Service
LMS Lightning Message Service
 
Apply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday ProblemsApply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday Problems
 
If You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command LineIf You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command Line
 
If you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command lineIf you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command line
 
Do Not Fear the Command Line
Do Not Fear the Command LineDo Not Fear the Command Line
Do Not Fear the Command Line
 
Don't Fear the Command Line
Don't Fear the Command LineDon't Fear the Command Line
Don't Fear the Command Line
 
The Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour EditionThe Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour Edition
 
Maths Week - About Computers, for Kids
Maths Week - About Computers, for KidsMaths Week - About Computers, for Kids
Maths Week - About Computers, for Kids
 
Best api features of 2016
Best api features of 2016Best api features of 2016
Best api features of 2016
 
Streaming api with generic and durable streaming
Streaming api with generic and durable streamingStreaming api with generic and durable streaming
Streaming api with generic and durable streaming
 
Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016
 
All Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action ServiceAll Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action Service
 
Boxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchBoxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too Much
 
Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015
 
Building Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College LondonBuilding Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College London
 
Elevate london dec 2014.pptx
Elevate london dec 2014.pptxElevate london dec 2014.pptx
Elevate london dec 2014.pptx
 
AngularJS App In Two Weeks
AngularJS App In Two WeeksAngularJS App In Two Weeks
AngularJS App In Two Weeks
 
Df14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer CertificationDf14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer Certification
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Salesforce Platform Encryption Developer Strategy

  • 1. Platform Encryption Enhanced Native Encryption in the App Cloud ​ Peter Chittum ​ Developer Evangelist ​ @pchittum ​ github.com/pchittum ​ 
  • 2. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 4. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 5. NEW Quick Setup with Clicks, Not Code Designed for anyone to build and deploy Native in Salesforce Integrated directly, everything works Build Compliance into your Apps Encrypt, monitor and audit everything Encryption - Event Monitoring - Field Audit Trail Salesforce Shield ​ A new level of trust and compliance for Salesforce Introducing
  • 6. Salesforce Shield ​ New services to help you build trusted apps fast EncryptAuditMonitor Platform EncryptionField Audit TrailEvent Monitoring
  • 7. ​ Monitor User Activity ​ Know who is accessing data from where Optimize Performance ​ Troubleshoot application performance to improve end user experience ​ Track Application Usage ​ Understand application usage to increase adoption Gain Visibility Into User Actions with Event Monitoring
  • 8. Retain Field History for Up to 10 Years with Field Audit Trail ​  ​ Establish Data Retention Policies ​ Know the state and value of data at any time Access Retained Data at Scale ​ Normalize on big data back-end for performance ​ Comply with Industry Regulations ​ Secure data archive with the highest trust standards
  • 9. Encrypt Sensitive Data While Preserving Business Functionality ​  ​ Seamlessly protect data at rest ​ Encrypt standard & custom fields, files & attachments ​  Natively integrated with key Salesforce features ​ E.g. Search, Chatter, Lookups work with encrypted data ​ Customer managed keys ​ Customer-driven encryption key lifecycle management
  • 10. Platform Encryption Use Cases ▪  Regulatory Compliance ▪  Unauthorized Access to Database ▪  Contractual Obligations
  • 11. Platform Encryption is Not ▪  Sharing Model ▪  Object/Field Level Security ▪  Data Residency Solution ▪  Encryption for Other Non-Salesforce Data ▪  Protection against Social Engineering trust.salesforce.com
  • 12. Encryption Authentication & SSO Two factor Auth Profiles/Permissions Sharing & FLS Setup Audit Trail Field History Tracking Event Monitoring Identity Encryption
  • 13. Platform Encryption Is Unique ▪  Quickly Seamlessly interact and protect sensitive data ▪  Setup takes minutes - No Software! No Hardware! ▪  Makes the App Cloud ‘encryption aware’ (metadata driven) ▪  Salesforce1 Mobile-ready, natively
  • 14. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 15. Users
  • 16. Encrypt at Rest: Fields Name: Darla Hood Name: aI90xi60csICOdk Encryption Service Darla Hood ***********
  • 17. Encrypt at Rest: Files Lorem ipsum dolor Encryption Service Xvier0c 9ghcru cjf4x21f fdqbBLorem ipsum dolor
  • 18. Granular Control: Fields ▪  Individual Custom Fields –  Text –  Text Area –  Text Area (Long) –  Email –  Phone –  URL –  Selected Standard Fields ▪  Enabled with flag
  • 19. Granular Control: Files ▪  Files enabled separately –  Attachments –  Chatter –  Files –  Libraries ▪  All or none
  • 20. Encryption Key ▪  Master Secret (Salesforce) –  Rotated each release –  Stored in the Key Derivation Servers ▪  Tenant Secret (Customer) –  Can be Rotated once per day in Prod –  Stored encrypted in DB ▪  Data Encryption Key –  Derived from Secrets –  Stored in cache, never persisted
  • 21. Features and Support ▪  Feature License Required ▪  Available to evaluate in Developer Edition orgs ▪  Support for –  Search –  Workflow Rules –  Validation Rules –  Apex and VF Pages –  And A LOT MORE...
  • 22. Architecture & Encryption Process Flow Customer driven key lifecycle management FIPS140-2 Hardware Security Module based key management infrastructure AES encryption using 256bit keys in CBC mode and random IV Uses PBKDF2 HMAC with SHA256 deriving secure 256-bit keys that are never persisted in Salesforce Data encryption and decryption actions are transparent
  • 23. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 24. Demo ▪  Managing Encryption –  Select Fields/Files –  Audit Encrypted Fields –  Setup Audit Trail platform encryption events –  Rotate Your Key –  The TenantSecret sObject
  • 25. The Tenant Secret sObject ​ //Rotate your secret by creating a new TenantSecret record ​ String descText = UserInfo.getName() + ' new secret via Lightning'; ​ TenantSecret newSecret = new TenantSecret(Description=descText); ​ insert newSecret; ​ 1 ​ 2 ​ 3 ​ 4 ​ 5 ​ 6
  • 26. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 27. Building Apps with Platform Encryption ​  SOQL Where Clauses/Filters ​  SOQL Order By/Sorting ​  Formula Fields ​  SOSL Search ​  Sort in Apex ​  Workflow/Apex Trigger ​  Instead of… ​  Use this feature…
  • 28. Demo ▪  Customizing with Encryption –  Searching with SOSL –  Sorting in Apex
  • 29. Searching with SOSL ​ 'FIND '' + searchStr1 + '' ​ IN ALL FIELDS ​ RETURNING ​  Account (Id, Name, type), ​  Contact (name,email, DLN__c, SSN__c)' ​ 1 ​ 2 ​ 3 ​ 4 ​ 5
  • 30. Sorting with Apex: Wrapper with Comparable Interface ​ public class AccountSortable implements Comparable { ​  public Account acct; ​  AccountSortable(Account acctParam){ ​  acct = acctParam; ​  } ​  public Integer compareTo(Object compareTo){ ​  AccountSortable compareToAcct = (AccountSortable) compareTo; ​  return acct.Name.compareTo(compareToAcct.acct.Name); ​  } ​ } ​ //invoked like: ​ List<AccountSortable> listWithCustomSort = new List<AccountSortable>(); ​ //...fill list with Accounts ​ listWithCustomSort.sort(); ​ 1 ​ 2 ​ 3 ​ 4 ​ 5 ​ 6 ​ 7 ​ 8 ​ 9 ​ 10 ​ 11 ​ 12 ​ 13 ​ 14 ​ 15
  • 31. Searching with SOSL: Handling Descending in Controller ​ //invoke your sort ​ listWithCustomSort.sort(); ​ // ​ List<AccountSortable> listToReturn = new List<AccountSortable>(); ​ if (order.toLowerCase() == 'desc’) { ​  for(integer i = resultList.size()-1; i >= 0; i--){ ​  items.add(resultList[i].obj); ​  } ​ } else { ​  listToReturn.addAll(listWithCustomSort); ​ } ​ return listToReturn; ​ 1 ​ 2 ​ 3 ​ 4 ​ 5 ​ 6 ​ 7 ​ 8 ​ 9 ​ 10 ​ 11 ​ 12 ​ 13 ​ 14
  • 32. Workflow Field Update Day__c Month__c Year__c Birthday__c
  • 33. Building Apps with Platform Encryption ​  SOSL Search ​  Sort in Apex ​  Workflow/Apex Trigger ​  SOSL is not SOQL ​  Search First ​  Text Data Type Field ​  Feature ​  Considerations
  • 35. Plan
  • 36. Back Up Your Secret
  • 37. Q & A ​ Resources: ​ Webinar: ​ https://developer.salesforce.com/events/webinars/ platform_encryption ​ DF15 Talk: ​ https://youtu.be/u0VxwyzU52w ​ Key Lifecycle Video: ​ https://youtu.be/LdPC7xT98Hg Peter Chittum Developer Evangelist @pchittum github.com/pchittum