Security

HAF will work with you to create an effective security strategy utilizing the myriad of options available through both Salesforce and other 3rd party solutions. This is a complex undertaking and the implications of a failed security implementation can spell big trouble for your company. The information contained in this section represent only a tiny fraction of the security considerations and challenges your company needs to consider to protect your data. This is why HAF uses iCRM to build a solution to this ever-changing and evolving business/technical environment.

Salesforce security begins with Trust: “A Salesforce term for its company-wide commitment to building and delivering the most secure, fast, and reliable cloud-based service available. trust.salesforce.com is a systems status website that provides Salesforce customers and the community access to real-time and historical system performance information and updates. It also lists incident reports and maintenance schedules across all its key system components. trust.salesforce.com is free to all members of the Salesforce community”.

As a point of data storage security; standard objects, custom objects and Big Objects reside in the Salesforce first part data center. Salesforce Connect, External Objects and Heroku Connect data lives outside of the Salesforce data center. In any case, most data can be surfaced in the UI either directly or through a data proxy. Here is a handy reference:

Closer to home, HAF will incorporate fundamental security settings at your Salesforce org level to create a baseline for user access and sharing. Drilling down, we will work with your company to review current-state security and make recommendations that align with future-state objectives and project requirements. The suggested security model from both Salesforce and HAF iCRM is based on applying the Principle of Least Privilege, a basic tenet that supports providing only enough access to a user required to do their job.

Here are some fundamental security considerations for the development of your data access model:

  • Organization-Wide Defaults
  • Role Hierarchy
  • Sharing Rules
    • File sharing – encrypted link
  • Login hours and IP ranges restrictions
  • Profiles
  • Customize or clone a profile
  • Permission Sets
  • Public Groups
  • Account & Opportunity Teams

Controlling User Access in Salesforce

Hyperforce

Hyperforce represents the next generation of Salesforce standards for compliance, security, agility, and scalability.