1 / 12

Security Model in Salesforce | QR Solutions

In todayu2019s digital world, where data breaches and cyber threats are increasing, having a security plan for confidential information is necessary for an organization. Understanding the implementation of a security model in their CRM platform is essential to safeguarding valuable data and maintaining a truce with customers.<br>

Download Presentation

Security Model in Salesforce | QR Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURITY MODEL IN SALESFORCE www.qrsolutions.com.au

  2. In today’s digital world, where data breaches and cyber threats are increasing, having a security plan for confidential information is necessary for an organization. Understanding the implementation of a security model in their CRM platform is essential to safeguarding valuable data and maintaining a truce with customers. What is the Security Model in Salesforce? The security model in Salesforce dictates the user access and actions on the Salesforce platform, maintaining data confidentiality, integrity, and availability through access controls and permissions. It establishes a system of control and security to regulate organizational functionality.

  3. Introduction In Salesforce, data is stored in three key constructions: objects, fields, and records. Objects are similar to tables in databases. Fields are similar to columns of the table. Records are similar to rows of data inside the table. Salesforce uses object-level, field-level, and record-level security to secure access to object, field, and individual records. Salesforce security model is powerful than any other CRM security model.

  4. How to Ensure Data Security in Salesforce? Object-level Security: Profiles Permission Sets Field-level Security Record-level Security: Organization-wide Sharing Defaults Role Hierarchies Sharing Rules Apex Managed Sharing Lets understand the implementation of security model in Salesforce with an scenario.

  5. Scenario John is an experienced leader who has recently joined ABC Corp as a sales executive. She also has a marketing background and reports directly to the CEO. She needs access to various objects and apps in Salesforce.

  6. Layer 1: Object-level-security Object-level access can be managed through two configurations, profiles and permission sets.

  7. 1.1 Profiles In Salesforce, profiles control access to object-level and field-level security among other things like apps, tabs, and so on. Since Maria is a new employee, an admin needs to add John to the appropriate profile that has access to sales apps and related objects to begin giving her access to Salesforce data. 1.2 Permission sets Since John has a marketing background, let’s say she wants to access the Campaigns object to help with marketing. The admin wants to give permission to access Campaigns just to John. This is where permission sets come in. Permission sets are used to provide additional (usually special) permissions to users who are already in a profile.

  8. Layer 2: Field-level-security Even if John has access to objects, she still needs access to individual fields of each object. In Salesforce, profiles also control field-level access. An admin can provide read and write permissions for individual fields. An admin can also set a field to hidden, completely hiding the field to that user. Layer 3: Record-level security This is where record-level security comes in. Salesforce provides five ways to share records with others and access others’ records.

  9. Types of record-level security (also known as record sharing rules) Types of Record level sharing permissions

  10. Record-level-security: organization-wide sharing defaults Organization-wide defaults (OWD) control the default behavior of how every record of a given object (for example, Accounts) is accessed by users who do not own the record. For example: 1. If OWD for Accounts is Private, it means Maria can only see records she is a owner of. 2. If OWD for Accounts is Read/Write, it means anyone can read and update (but not delete) the record Record -level-security: role hierarchies Record-level security lets you give users access to some object records, but not others. The owner has full access to the record. In a hierarchy, users higher in the hierarchy always have the same access to users below them in the hierarchy.

  11. Record-level-security: Apex managed sharing If sharing rules and manual sharing don’t give you the control you need, you can use Apex managed sharing. Apex managed sharing allows developers to programmatically share custom objects. When you use Apex managed sharing to share a custom object, only users with the “Modify All Data” permission can add or change the sharing on the custom object’s record, and the sharing access is maintained across record owner changes Wrapping up Today, Salesforce delivers three layers of exceptional security with stupendous flexibility to accommodate any industry need. Salesforce is purely a secured CRM, so you can embrace it without any fear.

  12. GET IN TOUCH THANK YOU! +61478910084 sales@qrsolutions.com.au www.qrsolutions.com.au

More Related