Resources /
Blog

How to Implement Zero Trust Architecture in Salesforce

Submit your details to get a book

Min Read
Resources /
Blog

How to Implement Zero Trust Architecture in Salesforce

Download

Submit your details to get a book

Min Read

How to Implement Zero Trust Architecture in Salesforce

Unapproved production changes create audit gaps and release anxiety in Salesforce teams. A compliance manager may find a change with no clear approval trail during audit prep. The same risk confronts DevOps engineers before every release. Meanwhile, overpermissioned accounts and implicit trust assumptions leave data exposed across the platform.

Salesforce provides strong controls for user authentication and field-level security. Gaps remain across three critical layers. Identity verification does not extend to all access contexts. Data protection controls require deliberate configuration and additional licensing. The metadata deployment layer lacks native verification, authorization, or audit controls. Any user or service account with "Deploy Customizations" permission can push changes directly to production. Salesforce does not require a second approver, a signed package, or a change workflow.

This article shows how to close those gaps. IT compliance managers and DevOps engineers will learn how to map Zero Trust tenets to Salesforce environments, from identity and encryption through deployment pipelines. They will also learn five security pillars for protecting data and metadata changes. These controls align with regulatory requirements across four major compliance frameworks.

Implementing Zero Trust controls across identity, data protection, and the deployment layer closes the most direct paths around other Salesforce security controls.

Where Salesforce Security Controls Leave Gaps

Standard Salesforce controls leave gaps across identity, data protection, and deployment that can still create production risk. Those gaps matter even when baseline security features are already enabled.

NIST SP 800-207 defines Zero Trust as a security model where trust is never granted implicitly. Trust must be continually evaluated. Salesforce provides controls for user authentication, field-level security, and session management, but three areas fall short of Zero Trust requirements.

Identity and access gaps

Salesforce requires MFA for UI logins, but native MFA does not enforce on SSO logins by default. Organizations must set the profile-level "Session Security Level Required at Login" to "High Assurance" to enforce MFA for SSO users. This creates an all-or-nothing enforcement scenario that prevents context-aware access controls. The gap appears when these controls are measured against Tenet 6 of NIST SP 800-207. That tenet requires dynamic auth before every access request.

Additional native behaviors compound identity gaps:

  • Trusted IP Ranges allow users to bypass verification, granting implicit network-location-based trust
  • The additive permission model means the most permissive grant wins unless explicitly countered with muting permission sets
  • Session controls do not automatically adjust access based on behavioral anomalies, device posture changes, or risk score variations during active sessions

Data protection gaps

Salesforce provides Shield Platform Encryption for data at rest and TLS for data in transit, but these require deliberate configuration and additional licensing. Organizations must enable Shield encryption field by field for sensitive data. Without it, regulated data such as PHI, PII, and financial records remains unencrypted at the platform level. Sandbox refreshes can also copy production data into lower environments without masking, exposing sensitive information to development teams who should not have access.

Deployment pipeline gaps

Salesforce Transaction Security covers data-access events such as API calls, report views, and login events. It does not cover metadata deployments, permission set modifications, or profile changes. A credential holder with deployment access can push metadata to production with no policy trigger. Neither the Metadata API nor the Salesforce CLI provides a native mechanism to require a second approver for a deployment. Both tools lack enforcement of a change-approval workflow before reaching production. Transaction Security policies also have no native rollback or versioning mechanism when a policy breaks.

These gaps mean Zero Trust controls in Salesforce, from MFA to session management to encryption, can be undermined through overpermissioned accounts or the deployment layer.

Five Pillars of Zero Trust for Salesforce Environments

Salesforce environments need five control pillars to meet Zero Trust requirements. Each pillar maps Zero Trust principles to a specific verification, authorization, data protection, or audit need.

Federal Zero Trust mandates and the DevSecOps model are often interpreted to inform security expectations for CI/CD pipelines, but they do not explicitly define specific CI/CD pipeline requirements. These five pillars translate those mandates into actionable deployment and data protection controls for Salesforce.

Identity verification at each access boundary

Each access boundary, including user login, API call, and deployment stage, needs a separate identity verification checkpoint. That separation prevents one credential from acting as developer, approver, and deployment engine at the same time.

Pipeline identities and actor identities must remain unique and independent. The CI/CD service account identity must be separate from the developer identity. It must also be separate from the approver identity. Non-person entities fall within Zero Trust scope. Service accounts require the same verification rigor as human users.

Zero Trust identity controls require three specific implementations:

  • MFA for all access points: Require multi-factor authentication for the Salesforce UI, version control systems, CI/CD platforms, and deployment tools. Enforce MFA at the identity provider level using SAML 2.0 or OpenID Connect to cover SSO gaps.
  • Certificate-based service authentication: Use OAuth 2.0 JWT Bearer Flow for CI/CD systems, where the pipeline presents a signed JSON Web Token to retrieve an access token without storing user passwords.
  • Scoped deployment accounts: Each pipeline stage, from validation to staging promotion to production deployment, should use a scoped account with IP restrictions limited to CI/CD infrastructure. Production deployment accounts should be deactivated outside deployment windows.

Encryption and data protection controls

Zero Trust requires that data remain protected at rest, in transit, and across environments. Protection must travel with data regardless of location.

Salesforce Shield Platform Encryption protects sensitive fields at rest with encryption keys that organizations control. Organizations should enable encryption for fields containing PHI, PII, or financial data and implement TLS 1.3 for all connections between deployment tools, version control systems, and Salesforce environments.

Data protection extends to lower environments as well. Sandbox data masking prevents the exposure of production data during sandbox refreshes. Organizations should configure data mask rules to replace personally identifiable information, financial data, and protected health information with synthetic values. Separate encryption keys per environment with regular rotation further limit blast radius if one environment is compromised.

Policy-based controls for metadata changes

Metadata changes need policy gates before they reach production. Zero Trust depends on those gates to verify intent, scope, and sequence.

The Policy Decision Point and Policy Enforcement Point model governs access control architecture. Salesforce Named Credentials function as enforcement points. They abstract credential complexity to enforce least privilege without exposing secrets in metadata or code.

Four sequential policy gates implement this model:

  1. Pre-commit: Branch protection rules enforce peer review before merging
  2. Validate-only deployment: The checkOnly flag executes full validation without committing changes
  3. Metadata type scoping: Service accounts deploying Apex classes should not hold permission to deploy profiles
  4. Environment promotion: Stage sequences prevent direct-to-production deployments

Automated audit trail generation

Teams need a complete evidence chain to defend both access activity and pipeline activity during audits. Without that chain, they cannot reconstruct who changed what, when, and why.

Generated evidence artifacts provide the feedback that sustains the DevSecOps lifecycle. A complete Zero Trust evidence chain for Salesforce requires five layers: version control commits with author identity, deployment job logs, Event Monitoring records, field-level change history, and work item linkage. Together, these connect business change requests to specific metadata deployments.

Deployment job IDs from the Salesforce CLI remain valid 10 days. The native Setup Audit Trail retains data for only 180 days. Organizations with long-term retention requirements must capture and store these records externally before expiration.

Least-privilege permissions and rollback governance

Deployment permissions should stay narrow and role-specific. The main control is limiting what deployment accounts can change.

The critical permission distinction for Salesforce pipelines is between Modify Metadata and Modify All Data. Deployment service accounts should hold Modify Metadata only. The roles of data administrator and metadata administrator are typically separate.

A tiered model assigns escalating permissions. Developers hold sandbox-only access with no Modify Metadata. CI/CD service accounts hold Modify Metadata with IP restrictions and API-only login. Production accounts add a human approval gate. Starting with the Minimum Access Profile and layering permissions through permission sets enforces least privilege from the baseline.

Rollback must follow the same controls as any other deployment. If rollback becomes an exception path, it breaks Zero Trust. Under Zero Trust, a rollback is a deployment of a known prior state. It must pass through all identity verification, policy gates, and audit trail generation required of any forward deployment. Git revert operations create new commits that maintain the audit trail without rewriting history. The reverted metadata then redeploys through the complete pipeline, including validate-only gates.

Regulatory Requirements That Mandate Zero Trust Controls

One control model can support multiple compliance frameworks at once. That makes Zero Trust useful as an operating model, not only as a security principle.

Four major compliance frameworks contain provisions that support or mandate the identity, encryption, access control, and pipeline controls described above. Understanding where these frameworks converge helps compliance managers build controls that satisfy multiple obligations. The Zero Trust framework functions as a cross-framework compliance bridge across all four.

  • HIPAA (45 CFR Part 164) requires access controls under §164.312(a), audit controls under §164.312(b), person or entity authentication under §164.312(d), and a six-year retention minimum under §164.316(b)(2)(i). The National Committee on Vital Health Statistics recommended SP 800-207 as a source for minimum security requirements when updating the HIPAA Security Rule.
  • SOX Sections 302 and 404 require management certification and independent auditor attestation of internal controls over financial reporting. IT General Controls assessed under Section 404 include logical access controls, change management controls, and segregation of duties.
  • GDPR Article 25(2) mandates that personal data must limit accessibility so they are not made available without the individual's intervention to an indefinite number of natural persons. This creates a direct mandate for least-privilege access controls. Article 32(1) requires encryption, ongoing confidentiality, and regular testing and evaluation of security measures. Article 5(2) creates an accountability obligation to demonstrate compliance.
  • FedRAMP 20x is the only framework that mandates Zero Trust explicitly by name. KSI-IAM-05 requires organizations to apply Zero Trust design principles. KSI-IAM-04 mandates a least-privileged, role and attribute-based, and just-in-time security authorization model.

All four frameworks converge on the same implementation requirements: per-session access grants, MFA enforcement, encryption of sensitive data, audit trail generation, and change management controls. Building controls for one framework substantially addresses all four.

Closing the Security Gap with Flosum

Salesforce environments need the same verification, encryption, approval, and evidence standards across every access boundary. Without them, teams leave direct routes to data exposure and production changes outside core Zero Trust enforcement.

Closing these gaps requires identity verification at each access point, encryption for data at rest and in transit, policy enforcement before every metadata change, and audit trail generation that meets retention obligations across all four compliance frameworks.

Enterprise DevSecOps platforms purpose-built for Salesforce integrate MFA, encryption, and access control policies directly within the platform. Operating natively inside Salesforce, these platforms inherit the platform's MFA enforcement, session security controls, and Shield Platform Encryption. Metadata and credentials never leave the Salesforce trust boundary, eliminating the risk of exposure in external CI/CD systems. This native architecture also addresses data residency concerns and supports encryption requirements across HIPAA, GDPR, and FedRAMP.

Flosum provides automated deployment pipelines for Salesforce metadata and supports policy-based deployment controls. The platform generates audit trails for compliance reporting and enables version control and rollback capabilities. These CI/CD workflows operate within Salesforce environments, keeping governed release processes under one platform that applies audit discipline, rollback discipline, and deployment coordination.

Organizations managing regulated Salesforce environments need deployment and data protection controls that enforce Zero Trust principles without creating operational bottlenecks. Request a demo with Flosum to see how these controls can maintain compliance across your Salesforce environments.


FAQ

What is the Zero Trust gap in Salesforce?

The gap spans three layers: identity controls that do not enforce MFA consistently across SSO and API contexts, data protection features like Shield encryption that require deliberate activation, and metadata deployments that can reach production without approval, verification, or audit controls.

Why do deployment pipelines matter for compliance?

Deployment pipelines control how changes move into production. If that path lacks approval records, identity separation, or audit evidence, teams create change-control gaps that surface during audits.

What are the core Zero Trust controls for Salesforce?

The article identifies five pillars: identity verification at each access boundary, encryption and data protection controls, policy-based controls for metadata changes, automated audit trail generation, and least-privilege permissions with rollback governance.

How does Flosum enforce Zero Trust in Salesforce?

Flosum provides automated deployment pipelines for Salesforce metadata, supports policy-based deployment controls, and generates audit trails for compliance reporting. The platform enables version control and rollback capabilities while integrating CI/CD workflows within Salesforce environments. As a Salesforce-native solution, it inherits the platform's MFA and encryption controls, keeping metadata and credentials within the Salesforce trust boundary.

Table Of Contents
Author
Stay Up-to-Date
Get flosum.com news in your inbox.

Thank you for subscribing