When it comes to protecting confidential information in salesforce, there are different states where data needs a layer of protection.
Sometimes we need to protect the information on their mobile computers or laptops in case they are lost or data resides in a Salesforce org.
Sometimes we want to keep their documentation protected on file servers so that it can even be protected from improper access by IT staff.
Sometimes we need to protect documentation when it travels attached to an email because they use managed email servers or in the cloud. Sometimes we need to protect the documentation when it is sent to third parties or even internally in order to minimize the possibility of it being copied, unprotected, or accessed by inappropriate users.
Data can change states quickly and frequently, or it may remain in a single state for the entire life cycle of a computer. We can consider three states for information or data:
Data at rest: Data at rest means data that is housed physically on computer data storage in any digital form (e.g. cloud storage, file hosting services, databases, data warehouses, spreadsheets, archives, tapes, off-site or cloud backups, mobile devices etc.).
Data in transit: Data that travels through an email, web, collaborative work applications such as Slack or Microsoft Teams, instant messaging, or any type of private or public communication channel. It’s information that is traveling from one point to another.
Data in use: When it is opened by one or more applications for its treatment or and consumed or accessed by users.
How to protect data in salesforce?
Data must be protected in each state & there are different ways to protect it in each state and it has some challenges in each state. Encryption, permission management & identity control are the different ways to protect the data. In the first place, we can restrict unauthorized access using Identity & Access control, then we can control what can be accessed and then using encryption, we can protect data at rest.
Protecting Data at Rest-
With the help of Shield encrypt, we can secure data at rest.
Challenges of Data at Rest Protection
There are lot of challenges when it comes to protecting idle documentation:
The data can be stored in different media and equipment: Important documentation is not only found in the file servers, or document managers, but there may also be copies on the users’ PCs, USB devices, etc.
Scattered on mobile devices: Mobile phones and tablets are one more work tool that may contain important documentation at rest that must be protected. It must be taken into account that in many cases where sensitive data is managed, the mobile devices in which it is found are not corporate but personal and out of the control of IT departments.
Inability to control cloud storage: Many storage providers offer encryption and protection of the data they manage at rest. However, the encryption keys are owned by the storage provider and not by the companies that hire them, so control of the documentation stored in these clouds is lost.
Need to comply with different data protection regulations: Depending on the vertical in which our company operates, it may be subject to stringent data regulations regarding the protection and control over data. For example, patient data in the healthcare sector or customer data in the financial sector is protected by regulations such as EU-GDPR, HIPAA, PCI, etc. depending on the territory. These regulations impose protection policies on data at rest, regardless of whether it is stored in a database, on a file server or on mobile devices.
Protecting Data in Transit-
Data moving between cloud storage and a local file storage point or moving from one network to another is also considered in motion. Data in motion may be moving within a computer system, over a wireless connection or along a wired connection. In addition, files dragged from one folder to another, within an FTP site or emails are considered data in motion.
We are in the age of digital collaboration and there are now plenty of ways to share our data with others. In Salesforce, data can be shared with email, file transfer or communicating with other applications. When a 3rd party tries to hit salesforce, salesforce will not allow access to the Salesforce URL until its authenticated application, you can authenticate using namespace We can protect enforcing Identity and Access management. Using differ different ways like limited access using permission, oAuth 2.0 etc.
Challenges of Data Protection in Transit
There are an infinite number of means and channels of communication: These tools are normally in protecting a certain channel such as email, web downloads, etc. but it is complicated to reach any protocol and means of communication.
Infinity of Cloud applications to protect: If we are talking about a CASB-type approach to secure the data that is downloaded from the cloud, it is very difficult to reach any application. Options are usually available for the most popular cloud applications such as O365, G-Suite, Salesforce, Box, etc.
Impossibility to maintain control at the receiving end: In the case of email or MFT encryption, once the recipient has received the file and has it decrypted for him, control is lost. They offer point-to-point protection, but no further, with the exception of digital rights protection.
Difficulty determining what should be protected and what should not: PIt is difficult for a DLP or CASB system to determine what should be blocked or not. Certain rules can be set, but they can result in false positives that block the output of data when necessary.
Sometimes, a “protect all” approach (with exceptions) is the best policy, for example, in the case of email encryption because if someone compromises an email box we are sure they will access encrypted data, but this is not always possible depending on the type of organization.
Protecting Data in Use
As mentioned above, we are talking about data in use when it is accessed by an application for treatment. Normally, behind the application there is a user who wants to access the data to view it, change it, etc. In this state, the data is more vulnerable, in the sense that in order to see it, the user must have been able to access the content decrypted (in the case that it was encrypted).
Challenges of Protecting Data in Use
Most of the tools that control access to data do so before allowing access, but once validated, as we said above, it is more complex to control what can be done with the data.
Even if we are limiting permissions on the documentation, if it is being shown to the user in the application, in a viewer, he can always take a picture, for example, although we can mitigate this action through dynamic watermarks on the open document.
Collaboration platforms that limit rights such as prohibiting downloading or only letting the document be seen, can be efficient when we only need to access the document, but have limitations if we need to modify the document for example with an agile tool on the desktop. In addition, we must not forget that the cloud platform itself has the document decrypted at the time of access and stored in their systems so it is technically possible to access the content of it. This can be a problem when we are talking about confidential data or subject to strict data protection regulations.