Every AppExchange installation, connected app, and API integration extends your Salesforce trust boundary to include a vendor's engineering environment, cloud infrastructure, and credential management. When one of those vendors is compromised, their legitimate OAuth grant becomes an attacker's backdoor—and Salesforce will treat that access as authorized until someone revokes the token. This is not a theoretical concern: third-party access and credential theft remain among the most common intrusion paths in enterprise SaaS environments, and the cost of breach response continues to climb.
The problem is that most organizations treat third-party risk evaluation as a procurement-stage exercise and stop there. But platform controls were designed to verify an app at the point of installation, not to manage what happens when a vendor's credentials rotate, permissions drift, or runtime behavior changes months later. Without an accurate inventory of what is connected and what it can read or export, vendor assessments go stale quickly.
Evaluating third-party data risk in Salesforce requires a continuous, layered approach that goes beyond platform defaults. This article provides that structure.
This article covers four areas that turn third-party governance from a periodic checkbox into an operational practice:
- Where standard Salesforce controls leave gaps
- Which technical criteria to prioritize in vendor evaluations
- How compliance frameworks like GDPR, HIPAA, SOX, and PCI-DSS shape your oversight obligations
- How deployment pipeline controls and continuous monitoring can enforce those requirements operationally
Where Standard Salesforce Controls Fall Short
This section explains which Salesforce controls help with connected apps, and where they stop short of controlling vendor-driven risk after installation. Knowing the boundary prevents overreliance on platform controls that were not designed to manage a vendor's broader security posture.
What Salesforce controls cover at review time
Salesforce requires AppExchange applications to pass a security review that combines automated scanning and manual analysis. Additional platform layers include:
- OAuth scope management
- Permission set governance
- IP range restrictions
These controls verify that an application meets security standards at the time of review—but they do not extend to the vendor's broader engineering environment or runtime behavior after installation.
Where the gap appears after installation
Most high-impact integration failures do not start with a bug in Apex code reviewed for AppExchange. They start with a compromise in the vendor's:
- CI/CD system
- Source control
- Endpoint fleet
- Cloud credentials
From there, attackers target long-lived integration credentials, including OAuth refresh tokens.
Why token compromise bypasses platform controls
Once an attacker obtains a valid token, Salesforce correctly treats the access as authorized until the token is revoked or expires. That means traditional safeguards can become irrelevant for that session, including:
- Identity checks
- MFA
- IP allowlists
Third-party risk, in practice, is the security of the full trust chain around the integration, not only the package that passed review.
The TPRM blind spot
This is also a structural blind spot in many TPRM programs. Entity-level questionnaires and SOC reports describe the vendor organization, but they often miss product-level specifics that matter in Salesforce, such as:
- Exact OAuth scopes
- Token rotation behavior
- Sub-processors
- The vendor's update mechanism
A Framework for Evaluating Third-Party Data Risk
This section provides a vendor evaluation framework you can apply to AppExchange apps, connected apps, and custom integrations. The layers below cover what to assess before and during vendor approval: the vendor's organizational posture, how the integration authenticates, and what data it can reach. Ongoing operational controls—continuous monitoring, audit trails, and pipeline enforcement—are covered in Embedding Third-Party Risk Controls in Deployment Pipelines.
Vendor risk tiering and organizational assessment
Start with entity-level due diligence. NIST SP 800-161 Rev. 1 calls for risk-based vendor evaluation scaled to the criticality of data and systems accessed, using a multi-tiered model: enterprise-level governance, mission/business process-level interpretation, and system-level implementation.
Tier your AppExchange vendors by data sensitivity accordingly:
- High sensitivity: Apps accessing customer PII, financial records, or health information (e.g., a managed package syncing contacts and opportunity data to an external analytics platform). Require technical deep dives, architecture reviews, and on-site assessments.
- Medium sensitivity: Apps accessing internal operational data or non-public business records that do not include regulated data. Require a detailed security questionnaire and documentation review.
- Low sensitivity: Apps limited to non-sensitive metadata or UI-only functionality (e.g., a productivity plugin with no data export capability). A standardized questionnaire is typically sufficient.
Once vendors are tiered, require certifications as baseline evidence scaled to the tier. Each serves a different assurance function:
SOC 2 Type II
Assesses control effectiveness over a sustained period (typically 6–12 months), not just point-in-time design. When reviewing a report, check:
Validates that a vendor operates a formal Information Security Management System (ISMS) covering risk assessment, access control, incident management, and continuous improvement.
Adds cloud-specific assurance across three levels:
For AppExchange vendors processing regulated data, require at minimum Level 1 and prioritize Level 2.
When a vendor lacks certifications: Document the gap, assess compensating controls, and factor the residual risk into your approval decision.
OAuth and token security
With the vendor assessed, evaluate how the integration authenticates and maintains access. The OAuth security BCP emphasizes strict redirect URI handling and recommends short token lifetimes and sender-constrained tokens to limit the blast radius of token theft.
In vendor evaluations, verify the following:
- Scopes map to a documented business need, and the app does not request broad default access.
- Tokens are short-lived where possible, and refresh tokens follow tight controls (storage, rotation, and revocation).
- The vendor can detect abnormal API behavior and can revoke tokens quickly during incident response.
Salesforce admins should also minimize scope exposure and avoid overly permissive grants unless the use case requires them.
Data access and CRUD/FLS enforcement
Token scopes control which APIs an integration can call, but the Salesforce permission model determines what data it can actually reach. CRUD/FLS issues are a common failure point in AppExchange reviews, and the risk compounds over time as admins assign broad permission sets or integration users accumulate access.
Verify that every third-party application enforces user context in data operations and respects sharing rules. Confirm the vendor does not rely on system-mode patterns that bypass field-level security for read or export operations.
Compliance Requirements for Third-Party Oversight
The evaluation framework above focuses on assessing a vendor's security posture—certifications like SOC 2, ISO 27001, and CSA STAR serve as evidence of how well a vendor manages its own controls. This section addresses a distinct but complementary concern: the regulatory mandates that define your organization's oversight obligations when Salesforce processes regulated data. These obligations apply regardless of a vendor's certification status and shape the contractual, procedural, and monitoring requirements you must maintain.
These frameworks converge on four operational requirements: pre-engagement due diligence, written contractual controls, audit rights, and ongoing monitoring.
GDPR Article 28
Controllers must verify that processors provide sufficient guarantees before engagement. Required clauses govern data processing agreements, including sub-processor authorization and data deletion after service termination.
HIPAA
Covered entities must execute business associate agreements for any third-party application that creates, receives, maintains, or transmits protected health information. HHS guidance clarifies that tracking tools connected to environments handling PHI can become business associates, including reporting and AI tools.
SOX Section 404
Management must assess the effectiveness of internal controls for financial reporting. PCAOB guidance, specifically AS 2201, indirectly includes third-party service organizations in internal control considerations. It requires documented understanding and assessment of these service providers' controls, including oversight, though it does not mandate specific selection criteria, monitoring, or reassessment documentation by name.
PCI-DSS
Organizations must review provider scope, identify gaps between assessed controls and delivered services, and perform annual reviews. Organizations cannot delegate responsibility through vendor selection.
All four frameworks require some form of continuous monitoring and evidence retention. Building a single unified control framework for these overlapping requirements reduces duplicated assessments and closes common audit gaps.
Embedding Third-Party Risk Controls in Deployment Pipelines
The evaluation framework and compliance requirements above define what to assess and what regulations require. This section covers the operational controls that enforce those requirements on an ongoing basis: deployment gates, continuous monitoring, audit trail retention, and policy automation. Pipeline gates matter because many third-party risks surface not at installation, but when an integration is updated or its scope expands.
Automated security gates
Staged deployment architecture creates validation checkpoints before third-party integrations reach production data. Trailhead guidance shows that CI/CD pipelines should enforce sandbox validation, code review, and UAT acceptance before production deployment. SAST and dynamic testing tools may flag credential exposure as part of a DevSecOps workflow, but there is limited evidence to support their capability to detect excessive OAuth scopes and unvalidated API calls.
Continuous monitoring
The evaluation layers above assess what an integration should do. Monitoring verifies what it actually does at runtime—making it an operational control, not a one-time evaluation criterion. Continuous monitoring is an explicit control expectation in NIST's control catalog; third-party access is runtime behavior to measure, not a document to file.
Implement ongoing monitoring using Salesforce Event Monitoring to track API call patterns, the Event Log Browser to spot abnormal extraction behavior, and Security Center to maintain visibility across connected applications. If a vendor cannot support monitoring or rapid token revocation during incident response, treat that as a gating risk for any integration that touches regulated data.
Audit trail integration
The monitoring tools above also serve as the foundation for long-term audit evidence. Key retention considerations:
- Event Monitoring captures runtime activity including API calls and data exports, but retains data short-term.
- Setup Audit Trail tracks configuration changes but only retains data for 180 days.
- Field Audit Trail retains historical changes to sensitive field values for up to 10 years with appropriate licensing.
Integrating these logs into SIEM platforms enables cross-correlation that helps detect bulk extraction patterns and unexpected access paths.
Policy enforcement through automation
Encoding regulatory requirements and security policies into CI/CD pipelines as executable deployment gates is a recommended practice. This approach ensures that governance validations and audit trail generation happen consistently without manual intervention, so only secure and approved changes reach production environments.
Strengthening Third-Party Governance with Purpose-Built DevOps
Third-party data risk in Salesforce environments demands structured vendor evaluation, consolidated compliance controls, and automated enforcement in the release process. The framework above addresses each of these layers, but teams still need tooling to operationalize them.
Flosum, purpose-built for Salesforce, supports this approach with automated deployment pipelines for Salesforce metadata, policy-based deployment controls, and audit trail generation for compliance reporting. Flosum integrates CI/CD workflows within Salesforce environments so pipeline gates and change records stay tied to the same process auditors review.
Teams still need a repeatable operating model: maintain an integration inventory, re-approve scope changes, and review monitoring signals on a schedule that matches data sensitivity.
When audit deadlines approach, having complete deployment history and change documentation accelerates preparation. Request a demo with Flosum to explore how automated audit trails support your compliance requirements.
Thank you for subscribing




