Encryption in Salesforce
By Vishesh Singhal(SFDC)
Index
1. Encryption
2. Types of Encryption(symmetric & Asymmetric)
3. Salesforce Classic Encryption
4. Salesforce Shield Platform Protection(SPP)
Encryption
Encryption is a process that encodes a message or file so that it can be only be
read by certain people. EX “Trailhead” would look like “Xvemplieh”.
Types of Encryption
1. Symmetric Encryption
2. Asymmetric Encryption
Symmetric Encryption
In a symmetric encryption algorithm, both the sender and the recipient use the same key
(known as the secret key) to encrypt and decrypt the message.
Example: Rotation Cipher
Clear Text : V I S H E S H
Key : 1 1 1 1 1 1 1
Encrypted Text : U H R G D R G
Secret Key : In cryptography, a key is a piece of information that determines the functional output
of a cryptographic algorithm.
Asymmetric Encryption
In an asymmetric encryption algorithm, the sender and recipient use different keys to encrypt and
decrypt a message. Each participant in the cryptosystem has a pair of keys assigned to him: a
public key and a private key.
Famous Algorithm : RSA Algorithm.
Classic Encryption
Salesforce Classic Encryption protects data from your existing Salesforce users by
providing masking capabilities, which allow you to hide the original data with random
characters. Here custom fields with 128-bit Advanced Encryption Standard (AES). are encrypted.
Example :
Credit Card Field Value : 1219-0118-2021-1992
Masked Value: ****-****-****-1992
Advantages and Disadvantages
Advantages
● Is included in Base License cost of Salesforce.
● Provides masking of custom fields to protect against internal Salesforce users seeing specific data.
● Is excellent for masking sensitive data, such as credit card or SSN fields.
Disadvantages
● Can only encrypt custom fields.
● Limits custom field encryption to 16 characters (Tested).
● Needs profiles and permission sets to be configured for Salesforce users.
● Cannot be used in workflows or formula fields.
Shield Platform Protection
Salesforce Shield Platform Encryption protects Salesforce data at rest using either a
generated or an uploaded encryption key. Shield Platform Encryption provides the additional
option of Bring Your Own Key (BYOK), allowing customers to manage their own encryption keys.
Shield Platform Encryption is an additional feature that provides 256-bit encryption with a broader
range of core Salesforce functionality, including search, lookups, validation rules, and Chatter. No
masking is applied to Shield encrypted fields, so visibility needs to be controlled with field-level
security.
Advantages and Disadvantages
Advantages
● The ability to encrypt standard fields, custom fields, files, and attachments.
● Can be used in workflows and formula fields.
● Offers a higher level of encryption (256-bit AES) than Salesforce Classic Encryption.
Disadvantages
● There is an additional cost.
● Does not provide masking, so Field Level Security (FLS) needs to be set to control visibility of fields.
● Does not work with certain third-party apps.
Shield Platform Encryption Verification
https://salesforce.stackexchange.com/questions/175126/encrypted-data-not-in-
the-encrypted-format
https://developer.salesforce.com/forums/?id=9060G000000BdaFQAS
References
https://developer.salesforce.com/docs/atlas.en-
us.securityImplGuide.meta/securityImplGuide/fields_about_encrypted_fields.htm
https://help.salesforce.com/articleView?id=security_pe_vs_classic_encryption.htm&type=5
https://salesforce.stackexchange.com/questions/175126/encrypted-data-not-in-the-encrypted-format
https://developer.salesforce.com/forums/?id=9060G000000BdaFQAS
https://www.salesforce.com/content/dam/web/en_us/www/documents/reports/wp-platform-
encryption-architecture.pdf
Thank you
Questions And Answer

More Related Content

PPTX
Why Disk Level Encryption is Not Enough for Your IBM i
PPTX
Streamlining Data Encryption While Maintaining IBM i Availability
PPTX
Encryption techniques
PDF
Sw prezen3pdf
PDF
Sw2 prezen3pdf
PDF
PPTX
Encryption in Cryptography
PPT
SSL Implementation - IBM MQ - Secure Communications
Why Disk Level Encryption is Not Enough for Your IBM i
Streamlining Data Encryption While Maintaining IBM i Availability
Encryption techniques
Sw prezen3pdf
Sw2 prezen3pdf
Encryption in Cryptography
SSL Implementation - IBM MQ - Secure Communications

Similar to Encryption field and named credentials (20)

PPTX
Encryption by fastech
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PDF
Introduction of an SSL Certificate
PDF
Aws securing data_at_rest_with_encryption (1)
PPT
6. cryptography
PPTX
Secret Management Architectures
PDF
Alfresco DevCon 2019: Encryption at-rest and in-transit
PDF
SlingSecure Mobile Voice Encryption
PPTX
IBM System Storage Data Encryption
PDF
The Time-Consuming Task Of Preparing A Data Set For...
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PPTX
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
PDF
International Journal of Engineering Research and Development (IJERD)
PPT
E-mail Security in Network Security NS5
PDF
Confidential compute with hyperledger fabric .v17
PPT
ssl
PDF
Web cryptography javascript
PPT
Ssl (Secure Sockets Layer)
ODP
Inro to Secure Sockets Layer: SSL
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
Encryption by fastech
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Introduction of an SSL Certificate
Aws securing data_at_rest_with_encryption (1)
6. cryptography
Secret Management Architectures
Alfresco DevCon 2019: Encryption at-rest and in-transit
SlingSecure Mobile Voice Encryption
IBM System Storage Data Encryption
The Time-Consuming Task Of Preparing A Data Set For...
What is SSL ? The Secure Sockets Layer (SSL) Protocol
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
International Journal of Engineering Research and Development (IJERD)
E-mail Security in Network Security NS5
Confidential compute with hyperledger fabric .v17
ssl
Web cryptography javascript
Ssl (Secure Sockets Layer)
Inro to Secure Sockets Layer: SSL
iaetsd Secured multiple keyword ranked search over encrypted databases
Ad

More from Vishesh Singhal (6)

PPTX
Sharing and setting in salesforce
PPTX
Profiles and permission sets
PPTX
Google Lens
PPTX
Ethical hacking
PPTX
Project shield
PPTX
Li fi technology
Sharing and setting in salesforce
Profiles and permission sets
Google Lens
Ethical hacking
Project shield
Li fi technology
Ad

Recently uploaded (20)

PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
communication and presentation skills 01
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
737-MAX_SRG.pdf student reference guides
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Soil Improvement Techniques Note - Rabbi
Exploratory_Data_Analysis_Fundamentals.pdf
Abrasive, erosive and cavitation wear.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Visual Aids for Exploratory Data Analysis.pdf
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Information Storage and Retrieval Techniques Unit III
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
communication and presentation skills 01
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Management Information system : MIS-e-Business Systems.pptx
737-MAX_SRG.pdf student reference guides

Encryption field and named credentials