Resources /
Blog

Why Zero Trust Is Key to Securing Salesforce Identity Management

Min Read
Resources /
Blog

Why Zero Trust Is Key to Securing Salesforce Identity Management

Download
Min Read

Credential compromise threatens Salesforce environments, with stolen credentials serving as the primary vector for enterprise breaches. 

The 2025 Sophos Active Adversary Report found that compromised credentials were the root cause of 41% of all attacks. This was a 42% year-on-year increase in credential-based attacks on cloud environments, with 96 billion exploitation attempts logged globally. 

Zero Trust implementation requires supplemental controls beyond native Salesforce capabilities, combining platform-native security controls with purpose-built DevSecOps solutions that enforce continuous verification, extended audit retention and policy-based deployment controls required for regulatory compliance.

This article demonstrates how to implement Zero Trust identity verification in Salesforce environments for IT compliance managers responsible for audit trails, policy enforcement, and regulatory requirements. 

What Is Zero Trust in Salesforce?

Zero Trust is a security framework built on the principle of "never trust, always verify." 

Unlike traditional perimeter-based security models that implicitly trust users and devices inside the network, Zero Trust assumes that threats can originate from anywhere, both inside and outside the organization. Every access request must be explicitly verified, regardless of its origin or the resource it accesses.

In Salesforce environments, Zero Trust means continuous verification of every user session, granular permission controls that prevent privilege accumulation, and audit logging that tracks every access attempt and configuration change.

The Problem: Native Salesforce Identity Gaps

Native Salesforce identity management has three critical gaps that prevent organizations from achieving Zero Trust compliance. These architectural limitations create specific compliance exposures for regulated enterprises and help identify which supplemental solutions each regulatory framework requires.

1. MFA Enforcement Limitations

Native Salesforce MFA does not work for SSO logins by default. To enforce MFA for SSO users, organizations must set the profile-level "Session Security Level Required at Login" to "High Assurance." This creates an all-or-nothing enforcement scenario, preventing context-aware access controls based on individual user risk profiles.

2. Audit Trail Retention Shortfalls

Salesforce Setup Audit Trail retains records for only 180 days. Regulatory frameworks require substantially longer retention periods, with some (like SOX) mandating up to seven years. Salesforce Shield Event Monitoring extends retention to 1 year, but external archiving solutions remain mandatory for full compliance.

3. Permission Set Tracking Gaps

With Setup Audit Trail, compliance managers can track permission set creation but not individual user assignments. Without Shield Event Monitoring, organizations cannot audit who assigned permission sets, track historical assignments for quarterly reviews, generate compliance reports for least privilege verification or prove segregation of duties during audits.

The Requirements: Regulatory Compliance Mandates

Enterprise identity management operates under multiple overlapping regulatory frameworks, each imposing specific technical requirements on authentication, authorization and audit capabilities. 

Aligning these mandates enables organizations to design unified identity architectures that satisfy multiple compliance obligations simultaneously while reducing implementation complexity and total cost of ownership.

SOX Section 404: Access Control and Segregation of Duties

SOX Section 404(a) mandates role-based access controls combined with segregation of duties policies and audit trails maintained according to regulatory retention requirements. Organizations must implement technical controls that prevent any single individual from performing incompatible functions, such as initiating, authorizing and recording transactions.

HIPAA Technical Safeguards: 45 CFR §164.312 Requirements

HIPAA Technical Safeguards at 45 CFR §164.312(a)(1) mandates Access Control with two required implementation specifications: unique user identification and emergency access procedures. The regulation requires audit controls at 45 CFR §164.312(b) as a required standard.

Organizations must define role-based access rules at the application, database and file levels. Identity management systems must maintain logging tied to unique user identifiers, enabling tracking of who accessed PHI, when and what actions occurred.

GDPR Article 25: Data Protection by Design

GDPR Article 25 requires "appropriate technical and organisational measures" implementing data protection principles from the design stage. Role-Based Access Control is a core "Security by Design" approach that enables data minimization, pseudonymization, and encryption as fundamental safeguards.

Cross-Framework Convergence

All three frameworks share common requirements for access control, user identification and audit logging, enabling a unified Role-Based Access Control (RBAC) architecture that addresses multiple compliance mandates simultaneously. 

Organizations implementing identity controls that satisfy the most stringent framework requirements, such as extended audit retention and cryptographic access logging, automatically satisfy the overlapping requirements of other frameworks.

Technical controls such as time-based access grants, approval workflows for privilege escalation and immutable audit logs serve as cross-framework compliance evidence, reducing the need for separate documentation for each regulatory body.

The Solution: Zero Trust Identity Framework

Zero Trust implementation requires integrating platform-native security controls with supplemental tools across five distinct control domains: authentication, authorization, continuous monitoring, incident response and enterprise IAM integration. 

Each control domain addresses specific Salesforce identity gaps identified earlier, providing a structured approach to closing compliance exposures.

Authentication Controls

Organizations must implement multi-factor authentication to address SSO gaps by enforcing MFA at the identity provider level. Context-aware access policies should evaluate risk factors including device posture, location and behavioral patterns. Phishing-resistant MFA methods such as hardware security keys provide the strongest protection against credential theft.

Salesforce provides specific native configurations that create layered authentication defenses when properly configured: 

  • Login IP Ranges: Restrict authentication to approved IP addresses at the profile or organization level to limit access from untrusted networks
  • Login Hours: Configure time-based access restrictions to prevent authentication outside of business hours
  • Session Settings: Set session timeout values, require secure connections (HTTPS) and lock sessions to the IP address from which they originated
  • My Domain: Enforce authentication through your custom Salesforce domain to prevent phishing attacks using generic login URLs

Authorization Controls

Policy-based controls prevent high-risk changes from bypassing review processes and enforce segregation of duties and least privilege principles required by compliance frameworks. This process: 

  • Requires security team approval for permission set changes, granting elevated access
  • Validates that no single individual can both develop and deploy changes
  • Implements time-based access grants with automatic expiration

Salesforce-specific configurations offer features addressing authorization requirements while maintaining operational flexibility:

  • Named Credentials: Store authentication credentials for external callouts securely, eliminating hardcoded credentials in Apex code
  • Connected Apps Security Settings: Configure OAuth policies, including IP relaxation, refresh token policies and session policies to control how external applications access Salesforce data
  • Permission Set Groups: Combine permission sets into logical groupings that align with job functions, enabling easier auditing and consistent access enforcement
  • Restriction Rules: Limit record access based on criteria such as user location or record ownership, providing row-level security beyond standard sharing rules

Automated deployment pipelines provide policy-based controls that validate identity at every stage of deployment and generate immutable compliance documentation.

Continuous Monitoring Controls

Zero Trust requires continuous identity verification throughout sessions, eliminating implicit trust after initial authentication. Real-time visibility into user behavior enables security teams to detect and respond to threats before they result in data breaches. This process includes: 

  • Session monitoring that detects anomalous behavior patterns
  • Real-time alerting for privilege escalation attempts
  • Policy enforcement points that validate every access request
  • Integration with enterprise SIEM solutions for centralized visibility

Salesforce Shield and native platform features provide the monitoring capabilities needed to implement continuous verification:

  • Transaction Security Policies: Create real-time policies that monitor events such as data exports, report runs or API access and trigger actions like blocking, MFA challenges or notifications
  • Event Monitoring: Track user activity, including login history, API usage, report exports and Apex execution, to identify suspicious patterns
  • Login Forensics: Analyze login attempts to detect credential stuffing, brute force attacks or access from compromised accounts

External log archiving infrastructure addresses the retention gap, maintaining audit trails beyond Salesforce's native limits to meet regulatory requirements.

Incident Response Controls

When verification fails or anomalies are detected, organizations must have defined response procedures that minimize damage and enable rapid recovery. Effective incident response combines automated containment with human oversight to balance security with operational continuity. Controls include: 

  • Automated session terminations for high-risk events
  • Escalation workflows notifying security teams of potential compromises
  • Forensic logging capabilities supporting post-incident investigation
  • Recovery procedures for restoring access after false positives

Salesforce provides mechanisms for automating incident response and capturing detailed logs for forensic investigation: 

  • Transaction Security Policy Actions: Configure policies to automatically end sessions when high-risk behavior is detected
  • User Freeze and Deactivation Automation: Build Flow triggers that automatically freeze user accounts when Transaction Security Policies detect high-risk behavior, requiring security team review before reactivation
  • Flow-Based Escalation Workflows: Create automation that generates cases and sends alerts to designated Slack channels or email distribution lists when incidents occur
  • Real-Time Event Monitoring Streaming: Configure the Pub/Sub API to stream security events to external SIEM platforms within seconds of occurrence
  • Custom Incident Response Objects: Create custom objects to track security incidents with related lists linking to affected users, permission changes and remediation actions

Integration with Enterprise IAM Infrastructure

Salesforce Zero Trust controls must connect directly with the broader enterprise identity infrastructure to maintain a consistent security posture across all systems. Unified identity governance ensures that policies apply consistently across all systems a user accesses.

  • Identity Provider Federation: Connect Salesforce authentication to enterprise identity providers (Okta, Azure AD, Ping Identity) to enforce consistent MFA policies and enable centralized credential management across all applications
  • Directory Synchronization: Implement automated provisioning and deprovisioning through SCIM (System for Cross-domain Identity Management) to ensure Salesforce user lifecycle aligns with HR systems and enterprise directories
  • Privileged Access Management Integration: Extend enterprise PAM solutions to govern Salesforce administrative access, ensuring privileged sessions are recorded, time-limited and subject to approval workflows consistent with other critical systems
  • Security Orchestration: Connect Salesforce security events to enterprise SOAR (Security Orchestration, Automation, and Response) platforms, enabling automated response playbooks that coordinate across Salesforce and other enterprise systems
  • Unified Policy Enforcement: Align Salesforce access policies with enterprise conditional access frameworks, ensuring risk-based authentication decisions consider signals from endpoint detection, threat intelligence and user behavior analytics across the entire technology stack

This integration ensures Salesforce does not become a security island with inconsistent controls. It also enables Salesforce compliance teams to demonstrate unified identity governance across multiple systems during audits.

The Implementation: Maturity Roadmap

Organizations must progress through defined maturity stages to achieve Zero Trust compliance, with each stage building on the controls established in prior stages. This phased approach enables organizations to demonstrate incremental progress as they build toward a comprehensive Zero Trust architecture.

Stage 1: Foundation

The foundation stage establishes basic identity verification and audit capabilities that serve as prerequisites for more advanced controls. Most organizations can complete Stage 1 with dedicated resources.

  • Deploy Salesforce MFA using the Salesforce Authenticator app or configure SSO with High Assurance session requirements
  • Implement centralized identity management by connecting Salesforce to your identity provider via SAML 2.0 or OpenID Connect
  • Enable Setup Audit Trail and configure Login History reports scheduled for weekly review
  • Document current state gaps by running the Salesforce Security Health Check and comparing results against your regulatory requirements

Stage 2: Enhancement

The enhancement stage adds privileged access controls and extended audit capabilities that address the most critical compliance gaps. Shield licensing, procurement, and configuration represent the primary dependencies for this stage.

  • Implement Privileged Access Management by creating approval processes for System Administrator profile assignments using Flow
  • Deploy adaptive authentication by configuring Transaction Security Policies that require step-up MFA for sensitive operations like mass data exports
  • Procure Salesforce Shield licensing and configure Field Audit Trail for regulated objects and Event Monitoring log retention
  • Begin external log archiving by configuring Event Log File downloads via API to your SIEM or cloud storage with defined retention policies

Stage 3: Optimization

The optimization stage implements continuous authentication and automated governance workflows that represent mature Zero Trust capabilities. Organizations should complete Stage 3 to achieve full Zero Trust compliance.

  • Implement risk-based continuous authentication by configuring identity provider conditional access policies that evaluate device compliance and user risk scores
  • Deploy phishing-resistant MFA methods such as FIDO2 security keys for users with System Administrator or Modify All Data permissions
  • Establish automated identity governance by scheduling quarterly permission set assignment reviews using reports and deactivating unused accounts after 90 days of inactivity
  • Integrate SIEM solutions by configuring Real-Time Event Monitoring Streaming API to push events to Splunk, Microsoft Sentinel or your preferred platform
  • Implement automated compliance reporting workflows using scheduled reports and dashboards delivered to compliance teams before each audit cycle

Build Your Zero Trust Identity Controls

Native Salesforce identity management provides foundational capabilities but lack the continuous verification, extended audit retention and policy-based deployment controls required for Zero Trust compliance. 

Organizations subject to regulatory mandates must address gaps across authentication, authorization, continuous monitoring, incident response and enterprise IAM integration to achieve comprehensive identity security.

Purpose-built DevOps platforms for Salesforce enable organizations to implement Zero Trust identity management through policy-based controls and extended audit capabilities. Those that need solutions must enforce identity verification at every deployment stage while maintaining the governance controls required by compliance frameworks. 

Request a demo to explore how Flosum's automated deployment pipelines with policy-based controls and audit trail capabilities can support your Zero Trust identity management requirements.

Table Of Contents
Author
Stay Up-to-Date
Get flosum.com news in your inbox.

Thank you for subscribing