Resources /
Blog

How to Build a Zero Trust Architecture for Salesforce to Strengthen Security

7
Min Read
Resources /
Blog

How to Build a Zero Trust Architecture for Salesforce to Strengthen Security

Download
7
Min Read

A single compromised credential can expose millions of customer records, derail a product launch, or trigger regulatory penalties that take years to resolve. Traditional perimeter defenses offer no protection when the attacker already holds valid login credentials and operates inside trusted sessions.

Salesforce environments face this reality daily. Users connect from home offices, partner networks, and mobile devices. Automated integrations exchange data through APIs that never cross a firewall. The network boundary that once defined "inside" and "outside" no longer exists.

To secure Salesforce against modern threats, organizations must adopt a true Zero Trust architecture that replaces outdated perimeter-based assumptions with continuous verification, least-privilege access, and real-time monitoring. This approach equips teams with a practical, scalable blueprint for strengthening Salesforce security across users, integrations, and data.

This guide walks through the core principles of Zero Trust, explains why each one matters for Salesforce specifically, and provides step-by-step configuration instructions that security leaders and administrators can implement immediately. By the end, readers will have a concrete framework for building Zero Trust controls that protect sensitive data without slowing down business operations.

Why Perimeter Defense Fails for Salesforce Environments

Salesforce operates fundamentally differently from on-premises applications, making traditional network security ineffective. The platform runs entirely in the cloud with no network perimeter to defend. Users access it through browsers and mobile apps from any location. Integrations connect through public APIs rather than private networks. This architecture eliminates the chokepoint that firewalls were designed to protect.

Perimeter firewalls and VPNs assumed attackers would break through network boundaries. In Salesforce, attackers operate within trusted sessions by stealing credentials or exploiting legitimate integrations. Once inside, they move laterally across data without crossing any network boundary that perimeter tools monitor.

Several Salesforce characteristics create specific security challenges. Multiple production and sandbox environments often share similar data models but lack consistent security policies. Administrators sometimes configure sharing rules that prioritize functionality over strict access controls. Session tokens and OAuth credentials can provide access until explicitly revoked.

These architectural realities create scenarios where compromised credentials or integration tokens provide prolonged access to sensitive data without triggering traditional security alerts. Monitoring tools that focus on network boundaries miss threats that operate through legitimate API calls and valid session tokens.

Zero Trust addresses these gaps by verifying every access request regardless of its origin, treating internal sessions with the same scrutiny as external connections. Building this framework requires understanding five integrated principles that work together to secure data at every layer.

Five Core Principles of Zero Trust Architecture

Zero Trust operates on the assumption that threats exist both outside and inside network perimeters. Rather than trusting any connection by default, the framework requires continuous verification of identity, device health, and access privileges before granting each request. In Salesforce, this translates to five integrated principles that work together to secure data at every layer.

Understanding how these principles interconnect clarifies the implementation approach. 

  • Identity verification establishes who is making a request. 
  • Least-privilege access determines what that identity can do. 
  • Device security validates where the request originates. 
  • Network segmentation limits how far a compromised identity can move laterally. 

Continuous monitoring ensures these controls remain effective over time. Each principle addresses a specific gap that perimeter defense cannot close.

1. Identity Verification

Traditional authentication asks, "Do you know the password?" once at login. Zero Trust asks, "Can you prove you are who you claim to be?" continuously throughout each session. This distinction matters because attackers who steal credentials or hijack sessions inherit the victim's authenticated state. Multi-factor authentication, single sign-on, and risk-based verification create checkpoints that block access even when attackers possess valid passwords.

Salesforce provides several native tools for identity verification. Multi-factor authentication requires users to provide additional proof of identity beyond their password. Single sign-on integrates Salesforce with corporate identity providers, centralizing authentication policies and allowing immediate credential revocation across all connected systems. Login Flows add conditional logic that triggers additional verification steps based on risk factors such as unusual login times, unfamiliar IP addresses, or attempts to access particularly sensitive data.

Strong identity controls reduce unauthorized access by making credential theft insufficient for attackers. However, users with legitimate credentials can still cause damage if those credentials carry excessive permissions.

2. Least-Privilege Access

Least-privilege access operates on a simple principle: users should see only the data required for their specific job function, and nothing more. This limits the blast radius when attackers compromise credentials. An attacker who steals a customer service representative's credentials cannot access financial forecasts if that user never had permission to view opportunity data in the first place.

Salesforce implements least-privilege through a layered permission model. Profiles define baseline access to objects and tabs. Permission Sets and Permission Set Groups add incremental capabilities without requiring profile changes. Object-level security controls whether users can create, read, edit, or delete records of a particular type. Field-level security restricts visibility of specific fields within accessible objects. Record-level security through sharing rules, role hierarchy, and ownership determines which individual records users can view within objects they're allowed to access.

This layered model creates complexity that administrators must manage deliberately. Over time, users accumulate permissions as they change roles, take on temporary projects, or request one-off access for specific tasks. This "permission creep" gradually erodes least-privilege principles unless organizations conduct regular access reviews.

Least-privilege controls constrain what authenticated users can do, but those users may operate from compromised or unmanaged devices that introduce additional risk vectors.

3. Device Security

Device security addresses a question perimeter defense ignored: Is the hardware making this request trustworthy? An attacker who steals valid credentials from a corporate laptop faces different barriers than one operating from an unpatched personal device infected with keylogging malware. Device posture (the security health of the endpoint) becomes a gate that can block access even when credentials authenticate successfully.

Salesforce evaluates device security through integration with external systems rather than native platform features. Conditional access policies in identity providers check device compliance before issuing authentication tokens. Mobile Device Management platforms verify that phones and tablets meet security baselines. Certificate-based authentication ensures only devices with valid certificates can initiate connections.

Device controls validate the hardware accessing Salesforce, creating a technical barrier that complements identity verification. Yet even trusted users on secure devices need boundaries that prevent lateral movement once inside the platform.

4. Network Segmentation

Traditional network segmentation used VLANs and firewalls to isolate servers into security zones. In cloud platforms like Salesforce, network-level segmentation is irrelevant because all users access the same multi-tenant infrastructure. Zero Trust recreates segmentation at the data layer instead.

Salesforce provides granular controls that compartmentalize information within the platform. Shield Platform Encryption protects sensitive fields at rest with encryption keys that organizations control. Private Connect routes traffic between Salesforce and data centers through dedicated network paths rather than the public internet. Sandbox isolation keeps development and testing environments separate from production data. Field-level and record-level security prevent users from pivoting between data sets even when they successfully authenticate.

Segmentation controls contain the damage from compromised accounts by limiting how far attackers can move laterally. However, static policies cannot adapt to new attack patterns without continuous monitoring that detects anomalies in real time.

5. Continuous Monitoring

The previous four principles establish technical controls; continuous monitoring validates that those controls remain effective and detects threats that bypass them. Administrators make changes that drift security configurations, users' behavior patterns evolve, and attackers probe for weaknesses. Monitoring creates a feedback loop that surfaces problems before they become breaches.

Salesforce generates extensive telemetry about user and system activity. Event Monitoring logs capture granular details about logins, API calls, permission changes, and data exports. Setup Audit Trail records every configuration modification with timestamps and user attribution. Security Health Check scores orgs against Salesforce security baselines and highlights deviations.

These five principles provide the technical foundation for Zero Trust. Translating them into operational controls requires deliberate configuration across identity systems, Salesforce native features, and external security tools.

Configuration Guide: Implementing the Five Principles

Each Zero Trust principle maps to specific Salesforce configurations and integrations. The following steps provide exact menu paths and settings administrators need to activate each control, moving from conceptual framework to operational reality.

Identity Verification Configuration

Implementing identity verification requires coordinating Salesforce settings with external identity providers and establishing approval workflows for high-risk operations. These configurations work together to create multiple authentication checkpoints that verify identity continuously rather than trusting initial login credentials throughout an entire session.

  • Enable MFA for every user, API integration, and connected app through Setup → Identity → Multi-Factor Authentication
  • Configure SSO through Setup → Identity → Single Sign-On Settings, selecting the identity provider and mapping user attributes
  • Build custom Login Flows under Setup → User Interface → Flows that evaluate login context and require step-up authentication for high-risk scenarios
  • Set login hour restrictions and IP range allowlists through Setup → Users → Profiles or Permission Sets to limit when and where sessions can originate
  • Create approval processes for administrative actions such as profile modifications or permission set assignments, documented through Setup → Process Automation → Approval Processes

These identity verification configurations create multiple checkpoints that validate users at every access point. With identity controls established, the next step addresses what those verified identities can access.

Least-Privilege Access Configuration

Least-privilege implementation begins with understanding current permission sprawl before building new access models that grant only necessary rights. This process requires collaboration between security teams who understand risk and business leaders who understand operational requirements, ensuring the resulting permission structure supports work without creating unnecessary exposure.

  • Audit current access by running reports under Setup → Users → Permission Set Assignments and Setup → Profiles to identify users with administrative privileges or unusually broad permissions
  • Document required access for each role by interviewing department leaders and mapping job functions to the necessary data objects and fields
  • Build Permission Set Groups under Setup → Users → Permission Set Groups that grant exactly the access documented for each role, using descriptive naming conventions
  • Configure object-level security through Setup → Object Manager, selecting each object and setting CRUD permissions appropriately
  • Set field-level security through Setup → Object Manager → [Object Name] → Fields & Relationships, editing each sensitive field to restrict visibility by profile or permission set
  • Create sharing rules under Setup → Security → Sharing Settings that grant record access based on criteria like ownership, territory, or record type, rather than giving broad "view all" permissions
  • Schedule quarterly access reviews where managers validate that direct reports retain only necessary permissions, documented through custom reports or third-party audit tools

These least-privilege configurations ensure verified users access only the data required for their roles. However, even properly permissioned users pose a risk when operating from compromised devices.

Device Security Configuration

Device security requires infrastructure outside Salesforce that validates endpoint health before allowing authentication. Most organizations already maintain MDM platforms and identity providers that can enforce device posture checks, making this principle more about integration than new tool acquisition.

  • Deploy MDM software such as Microsoft Intune, VMware Workspace ONE, or MobileIron to manage mobile devices accessing Salesforce
  • Configure device compliance policies in the MDM platform that check for OS patch levels, screen lock configuration, encryption status, and the presence of mobile threat detection
  • Enable certificate-based authentication under Setup → Security Controls → Certificate and Key Management by uploading the organization's certificate authority and requiring client certificates for sensitive operations
  • Configure conditional access in the identity provider (if using SSO) to block authentication attempts from non-compliant devices
  • Implement browser isolation solutions such as Zscaler or Netskope for executives and high-risk users who handle particularly sensitive data, ensuring their Salesforce sessions run in isolated containers

Device security configurations validate endpoint trustworthiness before granting access. With verified identities on secure devices, accessing appropriate data, segmentation controls prevent lateral movement if credentials are compromised.

Network Segmentation Configuration

Segmentation at the data layer requires identifying which information carries the highest sensitivity and applying progressively stronger controls to that subset. This targeted approach maintains usability for routine data while creating strong boundaries around regulated or business-critical information.

  • Identify sensitive fields that require encryption through a data classification exercise, marking fields containing PII, financial data, or regulated health information
  • Enable Shield Platform Encryption under Setup → Platform Encryption, selecting encryption at rest for identified sensitive fields
  • Configure Private Connect under Setup → Private Connect if the organization requires network-level isolation between Salesforce and internal systems
  • Use separate sandboxes for different development teams under Setup → Sandboxes, configuring sharing rules in each sandbox to mirror production restrictions
  • Enforce TLS 1.2 or higher for all API connections by configuring requirements in connected app definitions under Setup → Apps → App Manager
  • Design record-level sharing rules under Setup → Security → Sharing Settings that create data boundaries aligned with organizational structure, such as regional sales territories or business unit hierarchies

Network segmentation configurations compartmentalize data to contain breaches. The final implementation step establishes monitoring that validates all previous controls remain effective over time.

Continuous Monitoring Configuration

Monitoring generates value only when telemetry feeds into systems that detect anomalies and trigger responses. The following configurations connect Salesforce logging capabilities to external SIEM platforms that analyze patterns across multiple data sources, surfacing threats that individual log entries would never reveal.

  • Enable Event Monitoring under Setup → Event Monitoring if not already active, selecting relevant event types such as Login, API, Bulk API, and Report Export
  • Route Event Monitoring data to a SIEM platform such as Splunk, Sumo Logic, or Datadog by configuring the EventLogFile object for external access
  • Create detection rules in the SIEM that alert on suspicious patterns such as bulk exports during unusual hours, privilege escalations, or API calls exceeding baseline volumes
  • Review Setup Audit Trail under Setup → Security Controls → View Setup Audit Trail weekly to identify unexpected configuration changes
  • Run Security Health Check under Setup → Security → Health Check monthly and remediate findings that lower the security score
  • Deploy CI/CD pipeline gates that scan metadata before deployment, blocking changes that introduce risky permissions or violate security policies
  • Maintain immutable deployment logs that record what changed, who approved it, and when it reached production, supporting forensic investigations and compliance audits

These configuration steps activate Zero Trust controls across Salesforce environments. Successful implementation requires phased rollout and operational discipline to maintain these controls as organizations evolve.

Strengthen Salesforce Security Posture with Zero Trust

The configuration steps in this guide represent the starting point, not the finish line. Zero Trust requires ongoing enforcement: scanning every deployment for permission drift, auditing configuration changes before they reach production, and maintaining visibility across environments as teams scale. Manual oversight cannot keep pace with the volume of changes flowing through enterprise Salesforce organizations.

This is where automation becomes essential. Policy-as-code frameworks catch risky configurations before deployment. Immutable audit logs provide the forensic trail that compliance teams and incident responders need. CI/CD gates enforce least-privilege principles consistently, even when dozens of developers push changes simultaneously.

Organizations that treat Zero Trust as a one-time project will watch their security posture erode within months. Those that embed Zero Trust into their DevSecOps pipelines maintain protection automatically, release after release.

Flosum offers the deployment option of delivering this automation natively within Salesforce. Pre-deployment policy scans, immutable audit trails, and pipeline gates operate without moving metadata or data outside the platform, keeping security and compliance aligned from the first commit to production.

Request a demo with Flosum to see how DevSecOps tooling purpose-built for Salesforce transforms Zero Trust from a manual checklist into an automated, enforceable standard across every Salesforce environment.

Table Of Contents
Author
Stay Up-to-Date
Get flosum.com news in your inbox.

Thank you for subscribing

Read about our privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.