Introduction to Salesforce Security Model

Introduction to Salesforce Security Model – A Complete Beginner Guide

Salesforce is a powerful CRM platform used by thousands of businesses. One of the key reasons for its success is its robust security model that ensures data is safe, secure, and only visible to the right users.

In this guide, you'll learn everything about the Salesforce Security Model, step by step.


πŸ’‘ What is the Salesforce Security Model?

The Salesforce Security Model is the framework that controls:

  • Who can access the system

  • What data they can see

  • What actions they can perform

The model is flexible, layered, and ensures data is protected at every level.


πŸ”‘ Types of Security in Salesforce

Salesforce provides two main types of security:

1. System Level Security

Controls access to Salesforce as a platform.

2. Data Level Security

Controls access to data (records, fields, objects).

Let’s understand both.


⚙️ System Level Security

πŸ”Ή 1. Login Access

  • IP Restrictions: Limit user logins to trusted IP ranges.

  • Login Hours: Set working hours for users.

πŸ”Ή 2. Password Policies

  • Set rules for password length, complexity, and expiration.

πŸ”Ή 3. Two-Factor Authentication (2FA)

  • Adds an extra layer of security by requiring a code during login.


πŸ“Š Data Level Security

Salesforce gives fine-grained control using:

  1. Object-level security

  2. Field-level security

  3. Record-level security


πŸ” 1. Object-Level Security

This controls what types of records (like Accounts, Contacts, Opportunities) a user can Create, Read, Edit, Delete.

✅ Managed through:

  • Profiles

  • Permission Sets


πŸ“‹ 2. Field-Level Security

Controls which fields within a record a user can see or edit.

πŸ”§ Example:

  • A user can access the Contact record but not see the “Phone Number” field.

✅ Set via:

  • Field-Level Security in Profiles

  • Permission Sets


πŸ“„ 3. Record-Level Security

Controls which specific records a user can access.

Salesforce uses several tools to manage this:


πŸ—️ Record-Level Access Tools

1. Organization-Wide Defaults (OWD)

Defines the default access for records.

Options:

  • Private (most restrictive)

  • Public Read Only

  • Public Read/Write

  • Controlled by Parent

Example:
If OWD for Account is Private, users can only see records they own unless shared.


2. Role Hierarchy

Gives access upward in the hierarchy.

πŸ“Œ Example:

  • A manager can see records owned by their team.

  • Users higher in the role hierarchy inherit access.


3. Sharing Rules

Grant additional access to groups of users.

You can:

  • Share records based on criteria (Criteria-Based Sharing)

  • Share between roles (Role-Based Sharing)

Example:
Share all “High Priority” cases with the Support Manager role.


4. Manual Sharing

Let users manually share their records with others.

Best for:

  • One-off sharing needs

  • User-controlled access


5. Teams (Account/Opportunity/Case Teams)

Let multiple users collaborate on the same record with different access levels.

Example:

  • Sales Rep: Read/Write

  • Sales Assistant: Read Only


6. Apex Sharing

Programmatic way to share records using code (Apex).

Useful when:

  • Complex logic is needed

  • Standard sharing rules aren’t enough


πŸ‘₯ Profiles and Permission Sets – What's the Difference?

FeatureProfilePermission Set
PurposeBase accessAdditional access
UsersOne profile per userMultiple permission sets allowed
ExampleSales Profile“Edit Reports” permission set

πŸ” Summary of Key Security Tools

ToolControlsLevel
Login IP/HoursLogin accessSystem
ProfilesObject & field accessData
Permission SetsAdditional accessData
OWDRecord access defaultsRecord
Role HierarchyUpward accessRecord
Sharing RulesGroup-level accessRecord
Manual SharingOne-off accessRecord
Apex SharingCode-based accessRecord

✅ Best Practices for Salesforce Security

  • Always use least privilege (give only required access)

  • Regularly review roles and permissions

  • Use permission sets for flexibility

  • Enable 2FA for sensitive users

  • Avoid making everything public

  • Keep your OWD Private, then open access as needed


🎯 Final Words

The Salesforce Security Model is layered and flexible, ensuring that your organization’s data is well protected. By using the right combination of:

  • Profiles

  • Roles

  • Permission Sets

  • Sharing Rules

… you can keep your CRM secure and efficient.


 Learn Salesforce Development Training Course

Read More




Comments

Popular posts from this blog

Tosca System Requirements and Installation Guide (Step-by-Step)

How to Install Selenium for Python Step-by-Step

Tosca Commander: A Beginner’s Overview