Download free for 30 days
Sign in
Upload
Language (EN)
Support
Business
Mobile
Social Media
Marketing
Technology
Art & Photos
Career
Design
Education
Presentations & Public Speaking
Government & Nonprofit
Healthcare
Internet
Law
Leadership & Management
Automotive
Engineering
Software
Recruiting & HR
Retail
Sales
Services
Science
Small Business & Entrepreneurship
Food
Environment
Economy & Finance
Data & Analytics
Investor Relations
Sports
Spiritual
News & Politics
Travel
Self Improvement
Real Estate
Entertainment & Humor
Health & Medicine
Devices & Hardware
Lifestyle
Change Language
Language
English
Español
Português
Français
Deutsche
Cancel
Save
Submit search
EN
RM
Uploaded by
Raksha Meanger
166 views
Salesforce Security with Doug Merrett.pdf
Salesforce Security User Group with Doug Merrett
Technology
◦
Read more
0
Save
Share
Embed
Embed presentation
Download
Download to read offline
1
/ 18
2
/ 18
3
/ 18
4
/ 18
5
/ 18
6
/ 18
7
/ 18
8
/ 18
9
/ 18
10
/ 18
11
/ 18
12
/ 18
13
/ 18
14
/ 18
15
/ 18
16
/ 18
17
/ 18
18
/ 18
More Related Content
PDF
Secure Salesforce: Hardened Apps with the Mobile SDK
by
Salesforce Developers
PDF
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
by
Paris Salesforce Developer Group
PDF
Setting up Security in Your Salesforce Instance
by
Salesforce Developers
PDF
Let's Discuss Security with SFWelly
by
Anna Loughnan Colquhoun
PDF
Secure Salesforce: Hardened Apps with the Mobile SDK
by
Martin Vigo
PPTX
Security Boundaries in Apex
by
Salesforce Developers
PDF
What’s new in summer’15 release - Security & Compliance
by
Shesh Kondi
PDF
What’s new in summer’15 release - Security & Compliance
by
Shesh Kondi
Secure Salesforce: Hardened Apps with the Mobile SDK
by
Salesforce Developers
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
by
Paris Salesforce Developer Group
Setting up Security in Your Salesforce Instance
by
Salesforce Developers
Let's Discuss Security with SFWelly
by
Anna Loughnan Colquhoun
Secure Salesforce: Hardened Apps with the Mobile SDK
by
Martin Vigo
Security Boundaries in Apex
by
Salesforce Developers
What’s new in summer’15 release - Security & Compliance
by
Shesh Kondi
What’s new in summer’15 release - Security & Compliance
by
Shesh Kondi
Similar to Salesforce Security with Doug Merrett.pdf
PDF
Introduction to the Salesforce Security Model
by
Salesforce Developers
PPTX
Advanced Apex Security Expert Tips and Best Practices (1).pptx
by
mohayyudin7826
PPTX
Salesforce Security Review Tips and Tricks
by
Ryan Flood
PPTX
Sharing and security in Salesforce
by
Saurabh Kulkarni
PDF
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
by
Salesforce Partners
PDF
Essential Habits for Salesforce Admins: Security
by
Salesforce Admins
PDF
Getting started with Salesforce security
by
Salesforce Admins
PDF
Salesforce Security
by
SFSupport247
PDF
Secure Salesforce: Common Secure Coding Mistakes
by
Salesforce Developers
PDF
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
by
Dreamforce
PDF
Salesforce Administrator | Security Implementation Guide 2014
by
Piper powered by Icontrol
PPTX
PaaS security challenges and solutions (salesforce vision)
by
Olga Lavrentieva
PPTX
Owasp top10salesforce
by
gbreavin
PPTX
How to be a Security Minded Admin by Chris Zullo
by
Salesforce Admins
PDF
How to Become a Security-Minded Admin
by
Salesforce Admins
PDF
An Insider's Guide to Security Review (October 13, 2014)
by
Salesforce Partners
PPTX
Secure Development on the Salesforce Platform - Part I
by
Salesforce Developers
PDF
Top Five Ways to Protect Your Salesforce Data
by
DataArchiva
PDF
10 Easy Steps to Mastering Org Security
by
Salesforce Admins
PDF
[Delivering Salesforce secure access to remote workforce
by
Anna Loughnan Colquhoun
Introduction to the Salesforce Security Model
by
Salesforce Developers
Advanced Apex Security Expert Tips and Best Practices (1).pptx
by
mohayyudin7826
Salesforce Security Review Tips and Tricks
by
Ryan Flood
Sharing and security in Salesforce
by
Saurabh Kulkarni
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
by
Salesforce Partners
Essential Habits for Salesforce Admins: Security
by
Salesforce Admins
Getting started with Salesforce security
by
Salesforce Admins
Salesforce Security
by
SFSupport247
Secure Salesforce: Common Secure Coding Mistakes
by
Salesforce Developers
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
by
Dreamforce
Salesforce Administrator | Security Implementation Guide 2014
by
Piper powered by Icontrol
PaaS security challenges and solutions (salesforce vision)
by
Olga Lavrentieva
Owasp top10salesforce
by
gbreavin
How to be a Security Minded Admin by Chris Zullo
by
Salesforce Admins
How to Become a Security-Minded Admin
by
Salesforce Admins
An Insider's Guide to Security Review (October 13, 2014)
by
Salesforce Partners
Secure Development on the Salesforce Platform - Part I
by
Salesforce Developers
Top Five Ways to Protect Your Salesforce Data
by
DataArchiva
10 Easy Steps to Mastering Org Security
by
Salesforce Admins
[Delivering Salesforce secure access to remote workforce
by
Anna Loughnan Colquhoun
Recently uploaded
PPTX
Coded Agents – with UiPath SDK + LlamaIndex.pptx
by
suhanisingh58689
PPTX
Storage-and-HCI-Positioning-update-sales.pptx
by
hungungphu123
PDF
Getting the Best of TrueDEM – January News & Updates
by
panagenda
PDF
Skills to Pass the UiPath Agentic Automation Associate (UiAAA) Certification
by
UiPathCommunity
PPTX
apidays Australia 2025 | Building AI RAG Applications with No Code.pptx
by
apidays
PPTX
Achieve enterprise automation with SAP BTP solutions and SAP Signavio
by
darrellkiwi
PDF
Teaching Robots how to Read 1/2: AI Center & Classic Document Understanding (...
by
anabulhac
PDF
Azure DevOps Managed Services: Driving Speed, Security, and Business Growth
by
johncarterjn
PPTX
Code Like Bro -A guide for better Coding
by
Madan Panthi
PDF
Why Are Cloud Migration Services Essential for Modern Business Growth?
by
GeoPITS Global Pvt Ltd
PPTX
Apache Kafka 101 for Techies in IT dep.pptx
by
amulyareddyk97
PDF
How PayPal Account Verification Works – Complete Guide for Online Businesses
by
jhdhj3989
PPTX
SOFTWARE DEVELOPMENT PROCESS - INTRODUCTION
by
Parithi Thamizh
DOCX
Best Web to Learn About Buying Verified Skrill Accounts (Los Angeles).docx
by
https://topsellerit.com/product/buy-verified-binance-accounts/
PDF
CISO_2027_Playbook: Sovereign AI Resilience & Quantum-Proof Identity
by
SaraDavis91
PDF
Transcript: What ONIX can do: Leveraging metadata to support the discoverabil...
by
BookNet Canada
PDF
LUXHUB: a detailed look at 2025...and fast forward to 2026
by
alexandrekeilmann1
PDF
Agentic AI Roadmap 2026: Mastering Autonomous AI Workflows and Systems
by
Aeafat Ahmed Mubin
DOCX
Mathematical reviewer gor mmw in theofern
by
yeojlevantinojesalva
PPTX
Single Cell Protein from Methane or Methanol - Process development research c...
by
John Downs
Coded Agents – with UiPath SDK + LlamaIndex.pptx
by
suhanisingh58689
Storage-and-HCI-Positioning-update-sales.pptx
by
hungungphu123
Getting the Best of TrueDEM – January News & Updates
by
panagenda
Skills to Pass the UiPath Agentic Automation Associate (UiAAA) Certification
by
UiPathCommunity
apidays Australia 2025 | Building AI RAG Applications with No Code.pptx
by
apidays
Achieve enterprise automation with SAP BTP solutions and SAP Signavio
by
darrellkiwi
Teaching Robots how to Read 1/2: AI Center & Classic Document Understanding (...
by
anabulhac
Azure DevOps Managed Services: Driving Speed, Security, and Business Growth
by
johncarterjn
Code Like Bro -A guide for better Coding
by
Madan Panthi
Why Are Cloud Migration Services Essential for Modern Business Growth?
by
GeoPITS Global Pvt Ltd
Apache Kafka 101 for Techies in IT dep.pptx
by
amulyareddyk97
How PayPal Account Verification Works – Complete Guide for Online Businesses
by
jhdhj3989
SOFTWARE DEVELOPMENT PROCESS - INTRODUCTION
by
Parithi Thamizh
Best Web to Learn About Buying Verified Skrill Accounts (Los Angeles).docx
by
https://topsellerit.com/product/buy-verified-binance-accounts/
CISO_2027_Playbook: Sovereign AI Resilience & Quantum-Proof Identity
by
SaraDavis91
Transcript: What ONIX can do: Leveraging metadata to support the discoverabil...
by
BookNet Canada
LUXHUB: a detailed look at 2025...and fast forward to 2026
by
alexandrekeilmann1
Agentic AI Roadmap 2026: Mastering Autonomous AI Workflows and Systems
by
Aeafat Ahmed Mubin
Mathematical reviewer gor mmw in theofern
by
yeojlevantinojesalva
Single Cell Protein from Methane or Methanol - Process development research c...
by
John Downs
Salesforce Security with Doug Merrett.pdf
1.
Let’s discuss Salesforce
Security Doug Merrett – Platinum7 Wellington Salesforce User Group 20th August 2025
2.
Shared Responsibility Model Salesforce
does not do all of it for you… Copyright © 2025 Platinum7 Foundational International Infrastructure Hardware Compute Storage Scalability Availability Datacentre Security Security Foundational Network (inc encryption) Server (inc encryption) Administrative Capacity High Availability Disaster Recovery Operational Management Audits Site Reliability CSIRT Secure SDLC Security Foundational Persona Level Record Level Field Level Performance Monitor / Audit Backup / Archive Secure SDLC Org Level Privacy / Data Gov Customer
3.
Salesforce is inherently
very secure The Scattered Spider hacker group has exfiltrated data from Salesforce customers like Pandora, Qantas, LVMH, Google, Allianz and Cisco • How? • Socially engineered Salesforce users into helping the hacker install a Connected App • This app may be masquerading as Salesforce’s DataLoader • Mitigation • Educate your staff that no one from IT will be asking them to assist in installing an application into Salesforce • Enable API Access Control – more on that soon! However, you need to do some work as well! Copyright © 2025 Platinum7
4.
STOP PRESS!!!
5.
Security is never
“finished” Copyright © 2025 Platinum7 Assess Your Org Health Secure Your Application Secure Your Data Improve Security Awareness
6.
Assessments • Health Check •
Portal Health Check (do not use as it’s incorrect) • Salesforce Optimizer (being phased out) • Salesforce Security Centre’s Security Analysis tool (ex Own Secure) • Code Scan with Checkmarx/DigitSec S4/Gearset/AutoRabit/Salesforce’s own Code Scanner • Third parties (shameless plug) Copyright © 2025 Platinum7
7.
Security is never
“finished” Copyright © 2025 Platinum7 Assess Your Org Health Secure Your Application Secure Your Data Improve Security Awareness
8.
Secure your Application •
Restrict access to Connected Apps and the API with API Access Control • Raise a case with Salesforce Support to get enabled https://links.platinum7.com.au/APIAccessControl • Reconfigure External Sharing OWD to be Private unless there is a really good reason • Ensure Aura based communities are protected https://links.platinum7.com.au/Aura-Issue • Reconfigure broad sharing access (Public R/W, or Private with broad sharing rules) Use Least Privilege principles Copyright © 2025 Platinum7
9.
Secure your Application
(cont) • Use Lightning Login to go passwordless • Fix the code issues found by the Code Scanner • SOQL injections - Where data from UI/API is put into a SOQL query without protection • Stored XSS - Where data from the database is shown in the UI without protection • XSS due to disabled escaping – developer explicitly turning off XSS escaping • Sharing violation exposed methods – no “with sharing” on exposed Apex methods • Use SSO and enforce it for logging into your org • Most SSO tools have capabilities to stop non-company devices from connecting • Use IP Restrictions to limit access to corporate networks Use Least Privilege principles Copyright © 2025 Platinum7
10.
Security is never
“finished” Copyright © 2025 Platinum7 Assess Your Org Health Secure Your Application Secure Your Data Improve Security Awareness
11.
Secure your Data •
Use Event Monitoring’s Transaction Security policies to minimise data exfiltration risks • Reconfigure API Users that are System Admins • Especially with the availability of the Integration User license • Remove permissions not needed (View All Data, Modify All Data, API Access, …) • Use data masking in sandboxes to shrink the attack surface • Data Mask & Anonymizer by Salesforce, DataMasker by Cloud Compliance • Use archiving/deletion to remove data that no longer provides business benefit Copyright © 2025 Platinum7
12.
Secure your Data
(cont) • User Access Report - https://appexchange.salesforce.com/appxListingDetail?listingId=a0N3A00000FYkDDUA1 • Don’t have too many System Admins (3-5) • Backup your data • Look at Privacy and Consent • Embedded PII and other information • Look at David Norris’ Medium posts – https://dave-norris.medium.com Copyright © 2025 Platinum7
13.
Security is never
“finished” Copyright © 2025 Platinum7 Assess Your Org Health Secure Your Application Secure Your Data Improve Security Awareness
14.
Improve Security Awareness •
Educate users on Cybersecurity for home and work • Educate Developers and Admins on security best practices • Look at using new techniques in your development cycles • Have a playbook for what to do in cyber events • Look at frameworks – eg NIST Cybersecurity Framework Copyright © 2025 Platinum7
15.
Q&A Please reach out
if you have any questions – I do not bite! And I am happy to have a chat about anything security related… Contact Details • doug@platinum7.com.au • +61 404 005 435 • https://www.platinum7.com.au • https://doug-merrett.medium.com
16.
Interesting information • Architecture:
https://architect.salesforce.com/well-architected/trusted/overview • Security: https://developer.salesforce.com/developer-centers/security • Code Scanner from Salesforce blog post: https://developer.salesforce.com/docs/platform/salesforce-code-analyzer/guide/code- analyzer.md • NIST Framework: https://www.nist.gov/cyberframework • Platinum7 Salesforce Security Assessments: https://www.platinum7.com.au/assessments (NFP get a 10% discount) Copyright © 2025 Platinum7
17.
Interesting information (cont) •
Six Steps to Establish a Security Governance Model: https://medium.com/salesforce- architects/six-steps-to-establish-a-security-governance-model-3e9cf461ffe1 • Who Sees What in Salesforce video series: https://www.youtube.com/playlist?list=PLFNbZmUNjID5ILGyXqm_1oJHcTDoLkW0W Copyright © 2025 Platinum7
18.
Companies to investigate Backup •
Salesforce’s Backup (fka OwnBackup) and Odaseva are the top tier Event Monitoring tools • Platinum7 Event Storage – keep your logs “forever” • Platinum7 Transaction Security Policies – complex and capable policies to block data exfiltration Let me know if you would like an introduction Copyright © 2025 Platinum7
Download