Resources /
Blog

Salesforce Shield Demystified: What Admins Need to Know About Platform Encryption

Submit your details to get a book

Min Read
Resources /
Blog

Salesforce Shield Demystified: What Admins Need to Know About Platform Encryption

Download

Submit your details to get a book

Min Read

Shield Platform Encryption secures your data at rest and quietly breaks the workflows that depend on it. That's what administrators need to know before enabling it, and it's what most Salesforce encryption guides fail to make clear upfront.

Flipping on AES 256-bit encryption for fields, files, and attachments sounds like a straightforward compliance win. It isn't. Encryption removes the ability to filter, sort, and query protected fields in the ways your teams already rely on. It imposes an 80-field deployment limit that forces pipeline redesigns. And it hands administrators a key management responsibility where a single misstep, one destroyed tenant secret without a backup, makes encrypted data permanently irretrievable. These aren't edge cases. They're the operational reality of every Shield implementation.

The stakes are high on both sides of the decision. The average global cost of a data breach reached $4.88 million in 2024. Encryption at rest is one of the most direct measures to reduce that exposure, but a poorly planned rollout trades one category of risk for another.

This guide walks administrators and compliance managers through every trade-off Shield Platform Encryption introduces: what it changes operationally, which regulatory frameworks it addresses, how key management creates permanent data risks, and what DevOps process adjustments your release pipeline requires. The goal is simple. Make every field-level encryption decision an informed one before it reaches production.

What Shield Platform Encryption Actually Does

Shield Platform Encryption is not an incremental upgrade over Classic Encryption. The differences are architectural, and administrators must understand them before selecting an approach. This section covers core capabilities, the key hierarchy, and why Classic Encryption falls short for enterprise requirements.

Classic Encryption supports 128-bit AES, covers a limited set of field types, and cannot encrypt files or attachments. Shield Platform Encryption uses 256-bit AES encryption across standard fields, custom fields, files, and attachments. However, it provides encryption at the field level for specific data elements rather than the full transactional database. It also supports Bring Your Own Key (BYOK), which Classic Encryption does not offer. BYOK implications for key rotation, revocation, and operational complexity are covered in the Key Management section below.

Key Hierarchy Administrators Control

The encryption architecture operates on three levels. A Master Secret, generated by an air-gapped HSM and stored offline, is managed exclusively by Salesforce security officers. Tenant Secrets sit at the customer-controlled layer. Administrators generate, rotate, back up, and destroy these through Setup. Data Encryption Keys are derived on demand from the Master Secret and Tenant Secret combined. These derived keys are never persisted on disk, which means controlling tenant secret lifecycle gives administrators effective control over all encryption keys.

No additional hardware or custom code is required. According to Salesforce Trailhead, the crypto functions run natively on the platform.

Operational Limitations That Break Workflows

Encryption protects data, but it also restricts how that data can be queried, filtered, and deployed. Administrators must evaluate these constraints against business requirements before encrypting any field. Skipping this assessment leads to broken automation, degraded reporting, and deployment failures.

Run the Analyzer First

Before encrypting any field in production, run the Platform Encryption Analyzer, included in the Shield Extension managed package. It identifies which fields are suitable for encryption and evaluates impacts on list views, filters, search, and reports. The analyzer's output should guide every decision described in the subsections below.

Querying and Filtering Restrictions

The encryption type you select determines what functionality survives. Probabilistic encryption, the default and most secure option, prevents all filtering, sorting, and SOQL WHERE clause operations on encrypted fields. Deterministic encryption allows exact-match filtering only, with no wildcard or range queries. If users need to filter by Account Name or search by email, deterministic encryption is the minimum requirement.

Encrypted fields also cannot be used in criteria-based sharing rules, similar opportunities searches, or external lookup relationships. Flows and Process Builder automation cannot filter on encrypted field values when using field-level encryption (both probabilistic and deterministic encryption types).

The 80-Field Deployment Limit

Organizations with Shield Platform Encryption enabled face a hard constraint: metadata deployments are limited to the 80-field limit. This is not a recommendation. Large-scale deployments must be split into batches, and CI/CD pipelines need batching logic to orchestrate sequential package deployments.

Key Management: The Highest-Risk Responsibility

Tenant secret management carries permanent consequences that no other Salesforce configuration decision shares. This section covers the lifecycle responsibilities administrators must build into operational procedures from day one.

Salesforce states explicitly: "Salesforce cannot help you with deleted, destroyed, or misplaced tenant secrets." If a tenant secret is destroyed without a backup, all data encrypted with keys derived from it becomes permanently inaccessible. Back up every tenant secret immediately after generation.

Rotation and BYOK Considerations

Key rotation applies new tenant secrets to future data while retaining old keys for decrypting existing records. BYOK production environments allow rotation once every 24 hours. Sandbox environments allow rotation every four hours.

Organizations choosing between Salesforce-managed keys and BYOK should evaluate operational complexity against control requirements. BYOK integrates with enterprise key management systems and allows customers to revoke Salesforce access at any time. Salesforce-managed keys offer lower operational overhead but less granular control.

Deployment and DevOps Impact

Shield Platform Encryption changes how metadata moves between environments. Administrators and DevOps teams must adjust pipeline design, testing workflows, and sandbox management. These adjustments prevent deployment failures that surface only after encryption is active.

Asynchronous Encryption Creates Test Failures

A critical timing issue affects automated pipelines. The encryption compliance check runs asynchronously after the Metadata API reports deployment success. Apex tests that query encrypted fields can fail if executed before encryption processing completes. A two-phase deployment strategy addresses this: deploy field metadata first, allow encryption to apply, then deploy dependent Apex code and tests.

Sandbox Refresh Behavior

Beyond pipeline adjustments, administrators must also account for how encryption settings propagate across environments. When Shield Platform Encryption is enabled in production, all encryption settings, including tenant secrets, copy automatically to sandboxes during refresh. No manual reconfiguration is needed. Salesforce explicitly recommends testing all reports, dashboards, flows, and processes in sandbox before applying encryption changes to production.

Compliance Requirements Shield Addresses

Shield Platform Encryption maps to specific regulatory mandates across multiple frameworks. With the operational constraints, key management responsibilities, and deployment impacts now established, this section consolidates all compliance framework references. Understanding these mappings helps administrators and compliance managers build audit-ready documentation.

  • HIPAA: 45 CFR 164.312(a)(2)(iv) and 45 CFR 164.312(e)(2)(ii) classify encryption as addressable implementation specifications. Covered entities must implement encryption for ePHI or document a reasonable alternative.
  • GDPR: Article 32(1)(a) requires "the pseudonymisation and encryption of personal data" as an appropriate technical measure. BYOK supports accountability requirements by demonstrating cryptographic control.
  • PCI-DSS: Shield Platform Encryption is recommended but not required to benefit from Salesforce's PCI-DSS Attestation of Compliance when storing PANs. Organizations must ensure cardholder data is protected using compliant encryption methods outlined in PCI DSS standards, with options like tokenization and strong cryptography. Customers using deterministic encryption for Primary Account Number (PAN) or other cardholder data are responsible for their own PCI DSS compliance for those fields, as this usage falls outside the scope of Salesforce's PCI DSS Attestation of Compliance (AoC).
  • SOX: Section 404 requires internal control documentation. Shield's Field Audit Trail and Event Monitoring components support security log management requirements for financial data audit trails.

Making Encryption Work Across Your Release Process

Shield Platform Encryption is a suite-level investment that changes how administrators protect data, satisfy auditors, and deploy metadata. The decision between deterministic and probabilistic encryption affects which fields retain query functionality, with deterministic encryption allowing exact matching searches and filtering.

The 80-field deployment limit and asynchronous encryption processing require pipeline adjustments that manual change sets handle poorly. Automated deployment pipelines, such as those provided by Flosum, enable teams to orchestrate batched metadata deployments, enforce policy-based governance controls, and maintain audit trails for compliance across Salesforce environments.

When audit deadlines approach, having complete deployment history and change documentation accelerates preparation. Request a demo with Flosum to explore how its features can support your compliance requirements.

Table Of Contents
Author
Stay Up-to-Date
Get flosum.com news in your inbox.

Thank you for subscribing