Cloud 101CircleEventsBlog
Gain exclusive access to CSA’s extensive network of cloud security experts by becoming a corporate member. Learn how today.

Download Publication

Critical Controls Implementation for Salesforce
Critical Controls Implementation for Salesforce
Who it's for:
New adopters and existing customers of Salesforce who want to achieve a baseline of security. 

Critical Controls Implementation for Salesforce

Release Date: 06/15/2021

The Salesforce Platform can be a valuable tool for organizations to build and test applications. However, certain security changes are needed when an organization deploys Salesforce in the cloud. This whitepaper covers 20 critical controls that will help an organization determine what those necessary changes should be. These controls map to CSA’s overarching Top 20 Critical Controls for Cloud Enterprise Resource Planning Customers.

Please note that this is a reference document whose purpose is to promote best practices for cloud deployments of the Salesforce Platform. It does not replace Salesforce's documentation and specific instructions. Specifically, this guide is to be used as part of the Enterprise Resource Planning Working Group's ongoing dialogue.

Key Takeaways:
  • The rationale for 20 critical controls for the Salesforce Platform, including: secure authentication, user accounts management, segregation of duties, change management, secure integrations and API, continuous monitoring, data encryption, continuous compliance, and more
  • The specific requirements and steps needed to implement the 20 critical controls
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
What is IAM for the Cloud?
What is IAM for the Cloud?
CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance
CSA Code of Conduct Gap Resolution and Annex 10...
State of Financial Services in Cloud
State of Financial Services in Cloud
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria
Published: 09/19/2023
Reshaping Security Landscapes: The Essence of Cyber Transformation
Reshaping Security Landscapes: The Essence of Cyber Transformation
Published: 09/15/2023
5 Reasons Why Just-in-Time Cloud Access is Pioneering the Future of CIEM
5 Reasons Why Just-in-Time Cloud Access is Pioneering the Future of...
Published: 09/13/2023
The Great Agent Debate: New Research Breaks Down the Love-Hate Relationship
The Great Agent Debate: New Research Breaks Down the Love-Hate Rela...
Published: 09/07/2023

Acknowledgements

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

This person does not have a biography listed with CSA.

Juan Perez-Etchegoyen
Juan Perez-Etchegoyen

Juan Perez-Etchegoyen

Juan-Pablo Perez-Etchegoyen is the chief technology officer of Onapsis, where he leads the innovation team to ensure the company stays on the cutting edge of the business-critical application security market. He serves as co-chair of the CSA Enterprise Resource Planning (ERP) working group, where he leads the development of multiple documents and surveys to help organizations secure their ERP applications while migrating to the cloud. He is...

Read more

Frederik Weidemann Headshot Missing
Frederik Weidemann

Frederik Weidemann

This person does not have a biography listed with CSA.

Sergio Abraham Headshot Missing
Sergio Abraham

Sergio Abraham

This person does not have a biography listed with CSA.

Ivan Djordjevic Headshot Missing
Ivan Djordjevic

Ivan Djordjevic

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training