- SalesforceChaCha
- Posts
- 💃 Salesforce Security, Simplified 🕺
💃 Salesforce Security, Simplified 🕺
How to Keep Your Org Fort Knox-ish
Good morning, Salesforce Nerds! Let’s face it: Salesforce security isn't the sexiest topic on the platform. 🥱
But it’s the backbone of every successful enterprise implementation. And when it breaks, it breaks loudly. 📢
Think of Salesforce like a five-star hotel. ⭐️⭐️⭐️⭐️⭐️
Your org holds high-value guests (data), each with varying levels of VIP access.
Without proper security architecture, anyone with a room key could wander into the penthouse suite, order champagne, and reroute your workflows. ❌
Today let’s break down what Salesforce security really means at the enterprise level, why it matters, and how to design a secure environment without turning your admins into bouncers or your users into hostages.
Let’s get it. 💪

TABLE OF CONTENTS
💃 Salesforce Security, Simplified 🕺
MORE THAN JUST PROFILES
WHAT IS SECURITY ARCHITECTURE?
Security architecture in Salesforce is the design and governance model that ensures the right users access the right data and functionality. 💯
Nothing more.
It’s not just a list of profiles and permission sets. It’s a holistic structure that:
🔐 Controls who can log in (Identity & Access Management)
🔐 Limits what they can see and do (Data & Object Security)
🔐 Protects how they interact with the platform (Session & Network Security)
🔐 Monitors when and where they interact (Event Monitoring & Threat Detection)
At scale, this becomes a delicate balancing act between usability and control.
And enterprise teams that get it wrong either suffocate users with friction or expose sensitive data to every curious intern. 😟
THE SECURITY ONION
KEY BUILDING BLOCKS TO KNOW
Let’s peel back the layers of Salesforce’s security model. 🧅
A common mental model is the “Security Onion”. Multiple layers of defense that work together:
🚪 Organization Security
Login IP Ranges
Login Hours
Session Timeout Policies
Think: "Can they even get in?" 🤔
📚️ Object-Level Security
Profiles & Permission Sets
CRUD (Create, Read, Update, Delete) permissions
Think: "Can they access this object at all?" 🤔
🗝️ Field-Level Security
Field-level permissions via Profiles/Perm Sets
Shield Platform Encryption (for sensitive fields)
Think: "Can they see or edit this specific field?" 🤔
🔓️ Record-Level Security
Org-Wide Defaults (OWD)
Role Hierarchies
Sharing Rules
Manual Sharing
Apex Sharing
Think: "Can they access this particular record?" 🤔

WHERE GOOD ORGS GO BAD
COMMON PITFALLS AND GOTCHAS
Even seasoned architects fall into traps. 🪤
Here are the classics:
❌ Too Many Profiles
Profiles should be role-based, not person-based. If your org has a 1:1 user:profile ratio, take a walk and rethink your life.
🔍️ “Public Read/Write” Defaults
If your OWD is set to “Public Read/Write,” congratulations … you’ve built an open-source CRM. Lock it down.
🔄 Over-Reliance on Sharing Rules
Too many ad hoc rules = hard-to-debug sharing logic. Prefer Role Hierarchy + Apex Sharing for dynamic models.
🍑 Assuming CRUD = Access
Just because a user has Read on an object doesn’t mean they can see every record. Always layer record access on top.
🤷 Ignoring External Access
Guest Users, Experience Cloud, and connected apps are easy ways to accidentally leave the door wide open.
BUILD SMART, STAY SECURE
BEST PRACTICES FOR THE ENTERPRISE
Security isn’t just a config checkbox. It’s a design principle. 😎
Here's how to get it right:
🎯 Start with a Least Privilege Model
Give users the minimum access they need to do their jobs. Expand only when justified. Use Permission Set Groups to manage access scalably.
🏗️ Architect Roles Before Sharing
Build your Role Hierarchy based on real-world org structure, not just sales regions. A well-formed hierarchy simplifies record access and makes Apex sharing more predictable.
🎛️ Use Apex Sharing for Business Logic
When sharing rules fall short, Apex Sharing lets you fine-tune access dynamically:
// Grant access to a case owner’s manager
CaseShare cs = new CaseShare();
cs.CaseId = theCase.Id;
cs.UserOrGroupId = managerUser.Id;
cs.CaseAccessLevel = 'Read';
insert cs;
Keep sharing logic centralized and testable using a service layer.
✍️ Audit with Field-Level Logs and Event Monitoring
Use Field Audit Trail to track changes, and Event Monitoring to see who accessed what, when, and how. These tools don’t just protect you. They prove you’re protected.
🔏 Lock Down External Interfaces
Use Named Credentials and OAuth Scopes wisely. Ensure connected apps follow the same security principles. For guest users, always validate CRUD/FLS in Apex.
DATA IS THE NEW GOLD
THINK LIKE A SECURITY ARCHITECT
Here’s the truth: most enterprise data breaches don’t happen because someone guessed your password. ⛔️
They happen because someone gave access to the wrong person … or forgot to revoke it.
Security architecture is about intentional design. 👈️
It’s about knowing who has access, why they have it, and how to monitor it.
Whether you’re a solo admin or an enterprise architect, your org's credibility, compliance, and customer trust all depend on getting this right.
So yes, security may not be sexy. 🤷♀️
But it’s the reason your org isn’t on the front page of TechCrunch tomorrow. And that’s pretty damn attractive.
SOUL FOOD
Today’s Principle
"Passwords are like underwear: don’t let people see it, change it very often, and you shouldn’t share it with strangers."
and now....Salesforce Memes



What did you think about today's newsletter? |