Cloud 101CircleEventsBlog
Join us for Cybersecurity Awareness Month! Strengthen your cyber resilience with essential security tips and resources for everyone.

Download Publication

Critical Controls Implementation for Salesforce
Critical Controls Implementation for Salesforce
Who it's for:
New adopters and existing customers of Salesforce who want to achieve a baseline of security. 

Critical Controls Implementation for Salesforce

Release Date: 06/15/2021

The Salesforce Platform can be a valuable tool for organizations to build and test applications. However, certain security changes are needed when an organization deploys Salesforce in the cloud. This whitepaper covers 20 critical controls that will help an organization determine what those necessary changes should be. These controls map to CSA’s overarching Top 20 Critical Controls for Cloud Enterprise Resource Planning Customers.

Please note that this is a reference document whose purpose is to promote best practices for cloud deployments of the Salesforce Platform. It does not replace Salesforce's documentation and specific instructions. Specifically, this guide is to be used as part of the Enterprise Resource Planning Working Group's ongoing dialogue.

Key Takeaways:
  • The rationale for 20 critical controls for the Salesforce Platform, including: secure authentication, user accounts management, segregation of duties, change management, secure integrations and API, continuous monitoring, data encryption, continuous compliance, and more
  • The specific requirements and steps needed to implement the 20 critical controls
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Cybersecurity Risk Mitigation Recommendations for 2024-2025
Cybersecurity Risk Mitigation Recommendations for 2024-2025
Published: 10/08/2024
Why You Should Have a Whistleblower Policy for AI
Why You Should Have a Whistleblower Policy for AI
Published: 10/07/2024
How to Maximize Alignment Between Security and Compliance Teams
How to Maximize Alignment Between Security and Compliance Teams
Published: 10/04/2024
Embracing AI in Cybersecurity: 6 Key Insights from CSA’s 2024 State of AI and Security Survey Report
Embracing AI in Cybersecurity: 6 Key Insights from CSA’s 2024 State...
Published: 10/04/2024

Acknowledgements

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Juan Perez-Etchegoyen
Juan Perez-Etchegoyen

Juan Perez-Etchegoyen

As CTO and co-founder of Onapsis, JP leads the innovation and research teams that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical a...

Read more

Frederik Weidemann Headshot Missing
Frederik Weidemann

Frederik Weidemann

Sergio Abraham Headshot Missing
Sergio Abraham

Sergio Abraham

Ivan Djordjevic
Ivan Djordjevic
Principal Advisor, Security & Compliance at Salesforce

Ivan Djordjevic

Principal Advisor, Security & Compliance at Salesforce

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training