SlideShare a Scribd company logo
Salesforce New Jersey User Group - Security Awareness
- Salesforce Pardot Marketing Automation & Data.com
- March 24, 2-5pm @ The Heldrich Hotel in New Brunswick
- 4th Annual PhillyForce Conference
- May 4, 8:30–5pm @ Quorum Science Center
- Salesforce World Tour NYC
- May 25 @ Javits Center
- New Jersey User Group Meeting
- Date TBD, Salesforce MVP to discuss Summer 16’ Release Notes
Securing Your Salesforce Org:
The Human Factor
New Jersey User Group Meeting
Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such
uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially
from the results expressed or implied by the forward-looking statements we make. All statements other than statements of
historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth,
earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future
operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and
customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new
functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations
in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the
outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in
which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and man age
our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com
products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the
financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our
quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures
are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not cu rrently
available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions
based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these
forward-looking statements.
Agenda
① Setting the Stage: The Human Factor (15 mins)
② Attack Card exercise and discussion (30 mins)
③ Secure Behavior (15 mins)
④ Secure Your Salesforce Org (15 mins)
⑤ Next Steps (15 mins)
Setting the Stage:
The Human Factor
Why are we here?
Estimated
annual cost
of global
cybercrime
Today’s Target: The User
Bugs in Human Hardware
“Everybody else does it,
why shouldn´t I?”
“People are inherently
good and I want to be
helpful”
“Hmmmm…. I wonder
what will happen if I…”
“I´d be wrong not to!”
“If I don´t do this, I´ll get
in trouble!”
“I´ll get something if I do
this!”
Entry Point Methods
Attack Card Exercise
30 mins
Attack Card Instructions
Step 1
Have one person
in your group
read an attack
card aloud.
• What “Bugs in Human
hardware” and “Entry point
methods” were used in this
attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Step 2
For each attack
card discuss the
following:
Attack Card Exercise #1: Linked-Into the Network
10 minutes
• What Bugs in Human Hardware
and Entry Point Methods were
used in this attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Entry Point Methods:
Bugs in Human Hardware:
Conformity, Fear, Reward,
Morality, Curiosity, Trust
Phishing/Malware, Rouge
Devices, Dumpster Diving,
Eaves-dropping, Badge Surfing,
Exploiting Public Info, Social
engineering
Attack Card Exercise #2: Download on the Road
10 minutes
• What Bugs in Human Hardware
and Entry Point Methods were
used in this attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Entry Point Methods:
Bugs in Human Hardware:
Conformity, Fear, Reward,
Morality, Curiosity, Trust
Phishing/Malware, Rouge
Devices, Dumpster Diving,
Eaves-dropping, Badge Surfing,
Exploiting Public Info, Social
engineering
Group Discussion
10 minutes
• What Bugs in Human Hardware
and Entry Point Methods were
used in this attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Entry Point Methods:
Bugs in Human Hardware:
Conformity, Fear, Reward,
Morality, Curiosity, Trust
Phishing/Malware, Rouge
Devices, Dumpster Diving,
Eaves-dropping, Badge Surfing,
Exploiting Public Info, Social
engineering
Secure Behavior
Educate Employees
Password Security
• Activate password complexity and rotation rules
 Password expiration/reset every 90 days
 Password length at least 8-10 characters
 Password complexity – mix alpha and numeric characters
• User education
 No password/credential sharing
 Discourage password reuse across services
 Utilization of a strong password manager (example: LastPass)
• Utilize two-factor authentication (2FA) and single sign-on (SSO)
Phishing Education
• Pervasive and effective attack vector for
installing malware
• Education is key to prevention
• https://trust.salesforce.com - recent
threats
• If unsure about a Salesforce email, ask us
via security@salesforce.com
• Don’t open attachments that are
unexpected or from unknown senders
Could your employees fall victim to phishing?
• Internet Creations sent a phishing test to employees
• https://getgophish.com
Security Awareness for Users
Small changes in behavior can have a major impact
14,000 50% 82%
Less Likely to Click on a Phishing
Link
More Likely to Report Threats to
security@salesforce.com
Salesforce Employees
Key Principles – The Human Factor
• Limit the number of users with admin rights
• Provide users with minimum access to do their job
• Create rigorous process for user
termination/deactivation
• Basic security training for all users on
credential/password security, phishing, and social
engineering
• Trailhead for ongoing, role-focused education
• Effective security requires cross-org communication
https://developer.salesforce.com/trailhead
Secure Your Salesforce Org
Trust: Security at Every Level
Applicable to the Sales Cloud, Service Cloud, Communities, Chatter, database.com, site.com and Force.com. For audits, certification and security information or other services,
please see the Trust & Compliance section of help.salesforce.com.
Infrastructure-level SecurityApplication-level Security
Firewall SSL
Accelerators
Web/App
Servers
Load
Balancers
Database
Servers
Trusted
Networks
Authentication
Options
Field Level
Security
Object Level
Security
(CRUD)
Audit Trail
Object History
Tracking
Salesforce Org Security
What is Two-Factor Authentication?
+
Two-Factor Authentication (2FA)
• Provides an extra layer of security
beyond a password
• If a user’s credentials are compromised,
much harder to exploit
• Require a numeric token on login
• Can be received via app, SMS, email,
hardware (YubiKey)
• Walkthrough in your own Org:
http://sforce.co/1VWwmpB
2FA Setup
​Create a permission set titled “Two Factor Authentication”
​Name | Setup | Manage Users | Permission Sets | New
Step 1
2FA Setup
​Select the “Two-Factor Authentication for User Interface Logins” permission and save this
permission set.
​Now assign this permission set to the required user by clicking:
​Manage Assignment | Add Assignments | Select users | Assign
Step 2
2FA Setup
​Upon the next login, users will come across the following prompt:
Step 3
Login IP Ranges
• Limit IP addresses that users can log into
Salesforce from (by profile)
• Can restrict by login or on every request
• Lock sessions to IP address they started on
• These features ensure that if a malicious
actor steals credentials they cannot use them
away from your corporate networks
• Working from home/road – VPN login
Login IP Ranges
• Recommended and available for all customers
• Only access Salesforce from a designated set of IP Ranges
• Two levels:
• Org-level Trusted IP Ranges (permissive)
• Profile-level Login IP Ranges (restrictive)
Enterprise, Unlimited, Performance, Developer:
Manage Users | Profiles
Contact Mgr, Group, Professional:
Security Controls | Session Settings
For moreinfo,searchHelp& Training
User Deactivation
• Deactivateusers as soon as possible
• Removes login access while
preserving historical activity and
records
• Sometimes users cannot be
deactivated: assign new user or
reassign approval responsibilityfirst
• Know your IT department’s
termination process
Best practice:
Freeze users first!
From Setup, click Manage Users | Users.
Click Edit next to a user’s name.
Deselect the Active checkbox and then click Save.
Next Steps
Key Takeaways
Check your Security Settings!
Activate and use turnkey security features:
• Enable two-factor authentication
• Implement identity confirmation
• Activate Login IP Ranges
• Deactivate users in a timely manner (freeze them first!)
Consider the human factor when training Salesforce users:
• Password security
• Emails / phishing
Resources
• Security for Admins Quick Reference Guide (available today!)
• Security & Compliance Release Webinars – What’s New in Security & Compliance, Spring
‘16 (Feb. 25, 8am PST)
• Trailhead: Data Security module (more coming soon!)
• Who Sees What video series (YouTube)
• Dreamforce session recordings (www.dreamforce.com)
• Secure Salesforce series
• Create a Salesforce Force Field for Your Users
• Security Implementation Guide
• ButtonClickAdmin.com
thank y u

More Related Content

PPTX
Securing Your Salesforce Org: The Human Factor
PPTX
Why Two-Factor Isn't Enough
PPT
Security Testing
PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PPT
M Kamens Iia Financial Services Presentation At Disney
PDF
ProjectReport_Finalversion
PDF
Hijacking a Pizza Delivery Robot (using SQL injection)
PPTX
Poor authorization and authentication
Securing Your Salesforce Org: The Human Factor
Why Two-Factor Isn't Enough
Security Testing
Webinar: Goodbye RSA. Hello Modern Authentication.
M Kamens Iia Financial Services Presentation At Disney
ProjectReport_Finalversion
Hijacking a Pizza Delivery Robot (using SQL injection)
Poor authorization and authentication

What's hot (20)

PDF
VAPT Infomagnum
DOCX
VAPT- A Service on Eucalyptus Cloud
PPT
Penetration Testing Basics
PPTX
Insider Threat
PPT
Web Application Security Testing
PDF
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
PDF
Effective multi factor authentication for people soft
PDF
Combating Phishing Attacks
PDF
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
PPTX
Web application penetration testing
PPTX
Common Sense Security Framework
PPTX
Web Application Penetration Testing Introduction
PPTX
OWASP Mobile TOP 10 2014
PDF
Privleged Access Management
PPTX
Owasp top-10-mobile-risks-v-1-3 publish
PDF
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
PPTX
Security testing
PDF
Two-factor authentication- A sample writing _Zaman
PPTX
Best Practices for Multi-Factor Authentication on IBM i
PDF
Penetration and hacking training brief
VAPT Infomagnum
VAPT- A Service on Eucalyptus Cloud
Penetration Testing Basics
Insider Threat
Web Application Security Testing
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Effective multi factor authentication for people soft
Combating Phishing Attacks
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Web application penetration testing
Common Sense Security Framework
Web Application Penetration Testing Introduction
OWASP Mobile TOP 10 2014
Privleged Access Management
Owasp top-10-mobile-risks-v-1-3 publish
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
Security testing
Two-factor authentication- A sample writing _Zaman
Best Practices for Multi-Factor Authentication on IBM i
Penetration and hacking training brief
Ad

Similar to Salesforce New Jersey User Group - Security Awareness (20)

PDF
Sensibilisation à la Sécurité Salesforce
PDF
How to Become a Security-Minded Admin
PPT
NYC Admin Zone: Build Your Security Superpowers
PPTX
How to be a Security Minded Admin by Chris Zullo
PDF
Information Security Awareness
PDF
Secure Your Salesforce Org with Two-Factor Authentication
PDF
Securing Your Salesforce Deployment with Two Factor Authentication
PDF
Admin Best Practices: Remove Security Risk From Your Org with a User Audit
PDF
10 Easy Steps to Mastering Org Security
PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PDF
Code Talk #3
PPTX
Effectively Managing User Permissions with a Governance Strategy by Justice S...
PDF
Introduction to the Salesforce Security Model
PDF
How to be a SalesFIERCE Admin - Jared Miller & Davina Hanchuck
PPTX
How to be a SalesFIERCE Salesforce Admin
PDF
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
PDF
Essential Habits for Salesforce Admins: Security
PDF
[Delivering Salesforce secure access to remote workforce
PPTX
Security Boundaries in Apex
Sensibilisation à la Sécurité Salesforce
How to Become a Security-Minded Admin
NYC Admin Zone: Build Your Security Superpowers
How to be a Security Minded Admin by Chris Zullo
Information Security Awareness
Secure Your Salesforce Org with Two-Factor Authentication
Securing Your Salesforce Deployment with Two Factor Authentication
Admin Best Practices: Remove Security Risk From Your Org with a User Audit
10 Easy Steps to Mastering Org Security
Tech Talent Meetup Hacking Security Event Recap
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
Code Talk #3
Effectively Managing User Permissions with a Governance Strategy by Justice S...
Introduction to the Salesforce Security Model
How to be a SalesFIERCE Admin - Jared Miller & Davina Hanchuck
How to be a SalesFIERCE Salesforce Admin
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Essential Habits for Salesforce Admins: Security
[Delivering Salesforce secure access to remote workforce
Security Boundaries in Apex
Ad

More from InternetCreations (20)

PDF
Salesforce Developer Console for Admins
PDF
Proactive vs Reactive Support to Drive Success
PDF
Why Salesforce Lightning? Why Now?
PDF
The Life-Changing Magic of Tidying Up in Salesforce
PDF
KCS® is for Closers
PDF
Bundling up for Improved Case Metrics in Salesforce
PDF
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...
PDF
Reach Salesforce Service Cloud Nirvana in 5 Steps
PPTX
Yes, Your Salesforce Community Can Do That
PDF
Spring '16 Release Notes & AppExchange 10th Birthday Bash
PDF
Accelerating Cash Flow with Accounting Seed and Chargent
PDF
Summer of trailhead - Salesforce NJ User Group
PDF
Working at Internet Creations
PDF
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...
PDF
Salesforce Spring '15 Release Notes Review with Alex Sutherland
PDF
Deliver World-Class Customer Service with Salesforce
PDF
Control your world using the Salesforce1 Platform (IoT)
PPTX
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)
PDF
Customer Service in Salesforce: Managing Cases Effectively
PDF
5 apps to be more productive with salesforce cases
Salesforce Developer Console for Admins
Proactive vs Reactive Support to Drive Success
Why Salesforce Lightning? Why Now?
The Life-Changing Magic of Tidying Up in Salesforce
KCS® is for Closers
Bundling up for Improved Case Metrics in Salesforce
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...
Reach Salesforce Service Cloud Nirvana in 5 Steps
Yes, Your Salesforce Community Can Do That
Spring '16 Release Notes & AppExchange 10th Birthday Bash
Accelerating Cash Flow with Accounting Seed and Chargent
Summer of trailhead - Salesforce NJ User Group
Working at Internet Creations
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...
Salesforce Spring '15 Release Notes Review with Alex Sutherland
Deliver World-Class Customer Service with Salesforce
Control your world using the Salesforce1 Platform (IoT)
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)
Customer Service in Salesforce: Managing Cases Effectively
5 apps to be more productive with salesforce cases

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
Getting Started with Data Integration: FME Form 101
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Machine Learning_overview_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Tartificialntelligence_presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Getting Started with Data Integration: FME Form 101
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine Learning_overview_presentation.pptx
A Presentation on Artificial Intelligence
Advanced methodologies resolving dimensionality complications for autism neur...
Programs and apps: productivity, graphics, security and other tools
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Tartificialntelligence_presentation.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Network Security Unit 5.pdf for BCA BBA.

Salesforce New Jersey User Group - Security Awareness

  • 2. - Salesforce Pardot Marketing Automation & Data.com - March 24, 2-5pm @ The Heldrich Hotel in New Brunswick - 4th Annual PhillyForce Conference - May 4, 8:30–5pm @ Quorum Science Center - Salesforce World Tour NYC - May 25 @ Javits Center - New Jersey User Group Meeting - Date TBD, Salesforce MVP to discuss Summer 16’ Release Notes
  • 3. Securing Your Salesforce Org: The Human Factor New Jersey User Group Meeting
  • 4. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and man age our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not cu rrently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 5. Agenda ① Setting the Stage: The Human Factor (15 mins) ② Attack Card exercise and discussion (30 mins) ③ Secure Behavior (15 mins) ④ Secure Your Salesforce Org (15 mins) ⑤ Next Steps (15 mins)
  • 6. Setting the Stage: The Human Factor
  • 7. Why are we here? Estimated annual cost of global cybercrime
  • 9. Bugs in Human Hardware “Everybody else does it, why shouldn´t I?” “People are inherently good and I want to be helpful” “Hmmmm…. I wonder what will happen if I…” “I´d be wrong not to!” “If I don´t do this, I´ll get in trouble!” “I´ll get something if I do this!”
  • 12. Attack Card Instructions Step 1 Have one person in your group read an attack card aloud. • What “Bugs in Human hardware” and “Entry point methods” were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Step 2 For each attack card discuss the following:
  • 13. Attack Card Exercise #1: Linked-Into the Network 10 minutes • What Bugs in Human Hardware and Entry Point Methods were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Entry Point Methods: Bugs in Human Hardware: Conformity, Fear, Reward, Morality, Curiosity, Trust Phishing/Malware, Rouge Devices, Dumpster Diving, Eaves-dropping, Badge Surfing, Exploiting Public Info, Social engineering
  • 14. Attack Card Exercise #2: Download on the Road 10 minutes • What Bugs in Human Hardware and Entry Point Methods were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Entry Point Methods: Bugs in Human Hardware: Conformity, Fear, Reward, Morality, Curiosity, Trust Phishing/Malware, Rouge Devices, Dumpster Diving, Eaves-dropping, Badge Surfing, Exploiting Public Info, Social engineering
  • 15. Group Discussion 10 minutes • What Bugs in Human Hardware and Entry Point Methods were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Entry Point Methods: Bugs in Human Hardware: Conformity, Fear, Reward, Morality, Curiosity, Trust Phishing/Malware, Rouge Devices, Dumpster Diving, Eaves-dropping, Badge Surfing, Exploiting Public Info, Social engineering
  • 17. Password Security • Activate password complexity and rotation rules  Password expiration/reset every 90 days  Password length at least 8-10 characters  Password complexity – mix alpha and numeric characters • User education  No password/credential sharing  Discourage password reuse across services  Utilization of a strong password manager (example: LastPass) • Utilize two-factor authentication (2FA) and single sign-on (SSO)
  • 18. Phishing Education • Pervasive and effective attack vector for installing malware • Education is key to prevention • https://trust.salesforce.com - recent threats • If unsure about a Salesforce email, ask us via security@salesforce.com • Don’t open attachments that are unexpected or from unknown senders
  • 19. Could your employees fall victim to phishing? • Internet Creations sent a phishing test to employees • https://getgophish.com
  • 20. Security Awareness for Users Small changes in behavior can have a major impact 14,000 50% 82% Less Likely to Click on a Phishing Link More Likely to Report Threats to security@salesforce.com Salesforce Employees
  • 21. Key Principles – The Human Factor • Limit the number of users with admin rights • Provide users with minimum access to do their job • Create rigorous process for user termination/deactivation • Basic security training for all users on credential/password security, phishing, and social engineering • Trailhead for ongoing, role-focused education • Effective security requires cross-org communication https://developer.salesforce.com/trailhead
  • 23. Trust: Security at Every Level Applicable to the Sales Cloud, Service Cloud, Communities, Chatter, database.com, site.com and Force.com. For audits, certification and security information or other services, please see the Trust & Compliance section of help.salesforce.com. Infrastructure-level SecurityApplication-level Security Firewall SSL Accelerators Web/App Servers Load Balancers Database Servers Trusted Networks Authentication Options Field Level Security Object Level Security (CRUD) Audit Trail Object History Tracking
  • 25. What is Two-Factor Authentication? +
  • 26. Two-Factor Authentication (2FA) • Provides an extra layer of security beyond a password • If a user’s credentials are compromised, much harder to exploit • Require a numeric token on login • Can be received via app, SMS, email, hardware (YubiKey) • Walkthrough in your own Org: http://sforce.co/1VWwmpB
  • 27. 2FA Setup ​Create a permission set titled “Two Factor Authentication” ​Name | Setup | Manage Users | Permission Sets | New Step 1
  • 28. 2FA Setup ​Select the “Two-Factor Authentication for User Interface Logins” permission and save this permission set. ​Now assign this permission set to the required user by clicking: ​Manage Assignment | Add Assignments | Select users | Assign Step 2
  • 29. 2FA Setup ​Upon the next login, users will come across the following prompt: Step 3
  • 30. Login IP Ranges • Limit IP addresses that users can log into Salesforce from (by profile) • Can restrict by login or on every request • Lock sessions to IP address they started on • These features ensure that if a malicious actor steals credentials they cannot use them away from your corporate networks • Working from home/road – VPN login
  • 31. Login IP Ranges • Recommended and available for all customers • Only access Salesforce from a designated set of IP Ranges • Two levels: • Org-level Trusted IP Ranges (permissive) • Profile-level Login IP Ranges (restrictive) Enterprise, Unlimited, Performance, Developer: Manage Users | Profiles Contact Mgr, Group, Professional: Security Controls | Session Settings For moreinfo,searchHelp& Training
  • 32. User Deactivation • Deactivateusers as soon as possible • Removes login access while preserving historical activity and records • Sometimes users cannot be deactivated: assign new user or reassign approval responsibilityfirst • Know your IT department’s termination process Best practice: Freeze users first! From Setup, click Manage Users | Users. Click Edit next to a user’s name. Deselect the Active checkbox and then click Save.
  • 34. Key Takeaways Check your Security Settings! Activate and use turnkey security features: • Enable two-factor authentication • Implement identity confirmation • Activate Login IP Ranges • Deactivate users in a timely manner (freeze them first!) Consider the human factor when training Salesforce users: • Password security • Emails / phishing
  • 35. Resources • Security for Admins Quick Reference Guide (available today!) • Security & Compliance Release Webinars – What’s New in Security & Compliance, Spring ‘16 (Feb. 25, 8am PST) • Trailhead: Data Security module (more coming soon!) • Who Sees What video series (YouTube) • Dreamforce session recordings (www.dreamforce.com) • Secure Salesforce series • Create a Salesforce Force Field for Your Users • Security Implementation Guide • ButtonClickAdmin.com