How to configure Salesforce security settings and data protection?
Answer
Configuring Salesforce security settings and data protection requires a multi-layered approach that combines built-in features, administrative controls, and proactive monitoring. Salesforce employs a shared responsibility model where the platform provides foundational security infrastructure, but organizations must actively configure settings to protect sensitive data. The security framework operates across four key levels—organizational, object, field, and record—each requiring specific configurations to ensure comprehensive protection. Core measures include implementing multi-factor authentication (MFA), restricting access via IP ranges, encrypting sensitive data, and enforcing the principle of least privilege through permission sets. Salesforce also offers tools like Security Health Check and Salesforce Shield for advanced threat detection and compliance management.
Key findings from the sources include:
- Multi-factor authentication (MFA) is mandatory for enhancing login security and mitigating phishing risks [2][3]
- IP restrictions and session settings (timeouts, HTTPS enforcement) prevent unauthorized access and session hijacking [3][10]
- Field-level security and encryption (via Platform Encryption or Shield) protect sensitive data at rest and in transit [6][8]
- Audit trails and monitoring (Event Monitoring, Security Center) track user activity and detect anomalies [2][8]
Configuring Salesforce Security and Data Protection
Core Security Settings and Access Controls
Salesforce security begins with foundational settings that govern authentication, session management, and user permissions. The platform’s shared responsibility model requires administrators to configure these controls alongside Salesforce’s built-in protections [3][6]. Start by navigating to Setup > Security > Security Settings, where critical parameters like session timeouts, IP restrictions, and connection security are managed [7][10].
For authentication, multi-factor authentication (MFA) is non-negotiable. Salesforce mandates MFA for all user logins to prevent credential theft and phishing attacks. Administrators can enforce MFA via:
- Salesforce Authenticator (mobile app for push notifications) [3]
- Time-based one-time passwords (TOTP) or third-party authenticator apps [8]
- SMS-based verification (though less secure than app-based methods) [10]
MFA reduces the risk of unauthorized access by 99.9%, according to Salesforce’s security recommendations [2].
Session security settings further harden access controls. Key configurations include:
- Lock sessions to IP addresses: Restricts active sessions to the original login IP, preventing hijacking [10]
- Enforce HTTPS: Ensures all data transmissions are encrypted (enabled by default in most orgs) [7]
- Session timeouts: Set idle timeouts (e.g., 2 hours) and absolute timeouts (e.g., 8 hours) to terminate inactive sessions [10]
- Terminate sessions on password reset: Automatically logs out users when credentials change [10]
User permissions follow the principle of least privilege, granting access only to necessary data and functions. Salesforce recommends:
- Permission sets over profiles for granular access control [3]
- Regular audits of user privileges using the Security Health Check tool [8]
- Deactivating inactive users within 30 days to minimize attack surfaces [2]
Data Protection and Encryption Strategies
Salesforce’s four-level security model—organizational, object, field, and record—provides a structured approach to data protection [6]. At the organizational level, administrators define baseline policies like password complexity and login hours. Object-level security controls which users can view, create, or delete records (e.g., Accounts, Contacts), while field-level security restricts access to sensitive fields (e.g., Social Security Numbers) [8].
For sensitive data, Platform Encryption (available in Enterprise and Unlimited editions) encrypts fields at rest and in transit. Key considerations for encryption include:
- Supported field types: Text, email, phone, and custom fields (excluding some metadata) [6]
- Performance impact: Encrypted fields may slow down searches and reports [8]
- Search limitations: Exact-match searches are required for encrypted fields [2]
Salesforce Shield extends protection with advanced encryption and Event Monitoring:
- Shield Platform Encryption: Encrypts data at rest with customer-managed keys [9]
- Transaction Security: Monitors real-time events (e.g., bulk data exports) and blocks suspicious actions [2]
- Field Audit Trail: Tracks changes to encrypted fields for compliance [8]
For data privacy compliance (e.g., GDPR, CCPA), Salesforce provides tools to manage consent and track preferences:
- Consent Data Model: Enables storage of user consent records (e.g., opt-in/opt-out status) [4]
- Individual Object: Tracks data subject requests (e.g., right to erasure) and privacy preferences [4]
- Custom fields for privacy: Add fields like "Data Processing Purpose" to records [4]
Administrators should also:
- Enable data masking for sensitive fields in reports and dashboards [8]
- Implement sharing rules to restrict record access based on criteria (e.g., role, territory) [6]
- Use Salesforce’s Data Loss Prevention (DLP) tools to scan for exposed sensitive data [3]
Sources & References
trailhead.salesforce.com
security.salesforce.com
help.salesforce.com
cloudprotection.withsecure.com
help.salesforce.com
salesforce.com
help.salesforce.com
Discussions
Sign in to join the discussion and share your thoughts
Sign InFAQ-specific discussions coming soon...