Phillips Campbell en IT - Information Technology, Salesforce, Business Business Development Executive • Rolustech 27/3/2017 · 1 min de lectura · +500

Salesforce Cloud Security

Salesforce Cloud Security


Security is often considered to be the biggest risk when it comes to adoption of cloud solutions. For most large companies, data is one of the most valuable assets and its safety cannot be compromised, be it in terms of data privacy or resistance to external threats. Naturally therefore, the biggest challenge faced by cloud providers is gaining trust of enterprises.

The biggest player in CRM domain and cloud solutions provider, Salesforce has invested tremendously in security which makes its cloud solutions at least as secure as any other legacy system or even more.

The certified data centers responsible for physical safeguard are highly fortified and comparable to the best data centers in the world. Closed-circuit television coverage, alarm systems, bullet proof building, biometric scans are only some of the features. Talking about software, Salesforce has immensely secured the metadata driven and multi tenant architecture of its platform.

Let’s look into the various components of Salesforce cloud security.

Information Security Governance

Salesforce’s security governance encompasses the involvement of its major resources as well as the design and upkeep of a secure architecture. It also includes the privacy program policies and security practises that are incorporated in all the stages of development processes. Some of these are listed below.

  • Security Staff including Chief Trust Officer and security experts
  • Privacy Counsel including lawyers who ensure the company’s compliance with global privacy laws
  • Employees receive information security and privacy training
  • Assessments that are regularly conducted to detect and eradicate any vulnerability to internal and external threats
  • Privacy Policies that include how the company detects and responds to security incidents
  • Design Phase where experts make design decisions based on security principles
  • Coding Phase in which they use secure coding patterns and anti patterns to tackle standard vulnerability types and identify security issues through static code analysis
  • Testing Phase where external security consultants and internal staff use professional tools to identify security flaws

System Access

Users are created in a Salesforce Organization before they can login. A user has to be logged in to access most parts of the Force.com platform. Th