Data & Access Overview
Overview
This workshop is designed to build skills for Salesforce admins to become the front-line defender for security in their organizations. Security is no longer just about preventing unauthorized logins; it is about ensuring that the data fueling your organization is protected and strictly governed. In a landscape where an over-privileged permission can lead to an AI-driven data leak, a secure org is the essential foundation for customer trust and operational integrity. In this workshop you’ll get hands-on identifying, addressing, and mitigating security concerns.
Take Action on Health Check Concerns: Implement password policies and tighten session settings to ensure only authorized users gain entry to your CRM.
Audit Data Visibility: Conduct a deep dive into profiles and permission sets to enforce the Principle of Least Privilege, ensuring users only see what they absolutely need.
Monitor for Threats: Configure enhanceable security products including Salesforce Shield to detect and alert on suspicious activity in real-time.
Establish a Security Cadence: Develop a recurring checklist for health checks and user access reviews to maintain a permanent state of readiness.
A Note Before Getting Started
This workshop is a high-level introduction into security basics and best practices, but we also need to cover the “how”. We won’t have time to cover full-scale deployment cycles, so we’re operating under a strict Sandbox-first rule. Everything we build here stays in a test environment; in the real world, you’d never push these changes straight to Production without a solid deployment strategy.
Take Multi-Factor Authentication (MFA), for example. It’s a security powerhouse, but it directly changes how your users start their workday. Before flipping the switch, you need to map out that user experience, prep your documentation, and have your rollout plan ready. Our goal today is to build the blueprint by getting hands-on with security concepts so you’re ready to deploy with confidence later.
Continue with the exercises:
- Exercise 1: Take Action with Health Check
- Exercise 2: Update Session Security
- Exercise 3: Dive into User Security
- Exercise 4: Configure Health Check
- Exercise 5: Fix Remaining Risks (Optional)
- Exercise 6: Secure your Data with Shield