Resources /
Blog

How to Transform Salesforce Security with the Zero-Trust Security Model

Submit your details to get a book

Min Read
Resources /
Blog

How to Transform Salesforce Security with the Zero-Trust Security Model

Download

Submit your details to get a book

Min Read

An audit can unravel fast when a team cannot show who changed a permission set, who approved the deployment, or whether the audit record still exists. That pressure is not abstract. It shows up when compliance managers scramble for evidence and DevOps teams cannot reconstruct a production change path.

This article shows how to apply Zero Trust principles to Salesforce deployment security. Compliance managers will see how regulatory obligations map to pipeline controls. DevOps engineers will see which verification points matter at each stage of the deployment lifecycle.

Salesforce environments close this gap only when identity verification and audit controls extend beyond user login and into every deployment action.

Why Salesforce Organizations Face Escalating Security Threats

The threat landscape targeting Salesforce environments has shifted dramatically. Attackers are no longer hunting for platform-level exploits. They are exploiting identity, trust, and the connectivity built into everyday business workflows.

In 2025, threat groups tracked as UNC6040 and UNC6395 launched sustained campaigns against Salesforce customers. The UNC6040 cluster, linked to ShinyHunters and Scattered Spider, used phished SSO credentials and malicious Connected Apps to generate long-lived OAuth tokens, bypassing MFA entirely and moving laterally without triggering standard alerts — compromising organizations including Google, Cloudflare, Qantas, and Allianz Life. In a parallel campaign, UNC6395 exploited compromised OAuth tokens from the Salesloft Drift integration to infiltrate over 700 Salesforce customer environments. The FBI issued a FLASH alert on September 12, 2025, warning that both groups were actively compromising Salesforce environments for data theft and extortion.

These attacks did not exploit a vulnerability in the Salesforce platform itself. They exploited the gap between the platform's foundational security and the configurations customers are responsible for managing — the same gap that deployment pipelines pass through every day. When a CI/CD service account holds excessive permissions, when deployment credentials are shared, or when audit trails expire before an investigation begins, attackers inherit the same exposure that compliance teams struggle to document.

This is the operational reality that makes Zero Trust essential for Salesforce — not as an abstract framework, but as a direct response to how modern attacks actually work. Perimeter-based models that trust authenticated sessions cannot counter credential theft, OAuth token abuse, or insider threats that operate within authorized boundaries.

Where Standard Salesforce Security Controls Fall Short

Standard Salesforce controls protect the platform, not the full deployment path into production. That gap matters because configuration security remains the customer's responsibility across CI/CD workflows and service accounts.

Salesforce operates under a shared responsibility model. The platform secures infrastructure, and customers are responsible for securing the configurations and controls they build and manage inside their tenant, alongside Salesforce's foundational security controls.

Audit retention limits create compliance exposure

The Setup Audit Trail tracks profile edits, permission set changes, and connected app settings. It permanently deletes records after 180 days. Shield cannot extend this limit.

Organizations subject to multi-year retention requirements must export these logs to external systems. Otherwise, they must accept a documented compliance gap.

Deployments can silently escalate permissions

Permission-related deployments can introduce access changes that reviewers do not see in advance. When deploying permission sets through change sets, Salesforce field permissions even when those fields are not included in the change set.

A deployment scoped to one permission set can grant unreviewed production access. No native pre-deployment scan flags this behavior.

Security scanning does not cover configuration metadata

Security scanning leaves a blind spot around the metadata that controls access. Salesforce Code Analyzer scans Apex and Flows only. It does not audit profiles, permission sets, sharing rules, or connected app configurations for security regressions.

This leaves a gap in the deployment pipeline for the metadata types that control data access.

What Zero Trust Requires for Salesforce Deployment Pipelines

Salesforce deployment pipelines need four Zero Trust controls:

  1. Identity-based authorization
  2. Least privilege access
  3. Continuous validation
  4. Environment isolation

These controls close the audit and access gaps that standard tools leave open.

Zero Trust for Salesforce deployments means verifying every deployment action, every identity, and every environment boundary. NIST SP 800-207 defines Zero Trust as a model where no implicit trust is assumed and every access request must be continually verified. Four principles from this framework translate directly into pipeline controls.

Identity-based deployment authorization

Every deployment action, whether initiated by a human or an automated agent, requires explicit authentication. Traditional network controls lack per-request capability at the application layer.

A deployment agent inside a corporate VPN does not satisfy this requirement. Pipeline service accounts must authenticate through OAuth Connected Apps with scoped credentials. Human deployment approvers must use SSO with MFA.

Because Flosum is built natively on the Salesforce platform, deployment authentication inherits Salesforce's own identity infrastructure. There are no external servers or separate credential stores that expand the attack surface. Every deployment action is tied to a verified Salesforce identity.

Least privilege access for deployment permissions

CI/CD integration users should hold only the permissions required for each deployment type. A Metadata API service account should be limited to the permissions required for deployment tasks. It should not hold broad administrative access such as "View All Data" or "Manage Users."

Segregation of duties between the engineer who develops a change and the identity who approves production deployment is equally critical.

Flosum enforces role separation through approval workflows that prevent single-user deployments. Policy-based controls restrict which identities can promote metadata to each environment tier, ensuring least privilege extends from development through production.

Continuous validation through metadata tracking

Every metadata component managed through a pipeline must produce an immutable record. That includes Apex classes, Flows, permission sets, and sharing rules. Pipeline execution logs, deployment manifests, and approval records form the compliance evidence that regulators require.

Automated scanning before promotion should verify that no deployment introduces broader-than-necessary permissions.

Flosum generates continuous audit trails that link every metadata change to an approved change request, a named identity, and a timestamped deployment record. Static code analysis blocks permission sets that violate policy before they reach production.

Environment isolation through identity segmentation

Credentials valid for a sandbox must not be reusable for production. Each pipeline stage should operate through a distinct Connected App OAuth configuration with scopes limited to that stage.

Promotion-only workflows that prevent direct production access implement both change management and micro-segmentation controls at the same time.

Because Flosum operates entirely within Salesforce infrastructure, metadata never crosses trust boundaries during version control or deployment. Each environment tier is accessed through scoped credentials, and promotion-only workflows enforce environment isolation natively.

Compliance Requirements That Align with Zero Trust Controls

HIPAA, GDPR, and SOX align with the same Salesforce deployment controls. That overlap matters because one control model can support both security goals and audit obligations.

This section consolidates the requirements that apply to deployment environments. Understanding that overlap helps teams build one model that satisfies multiple frameworks.

HIPAA Technical Safeguards

HIPAA Technical Safeguards impose three requirements directly relevant to deployment pipelines:

  • Unique user identification (§ 164.312(a)(2)(i)) — Prohibits shared pipeline credentials.
  • Audit controls (§ 164.312(b)) — Require mechanisms that record and examine system activity, with no addressable flexibility.
  • Person/entity authentication (§ 164.312(d)) — Requires verifying the identity of anyone seeking access to protected health information.

GDPR Articles 25 and 32

GDPR Article 25 imposes a pre-deployment obligation. Security measures must be implemented "at the time of the determination of the means for processing," not added retroactively.

Article 32 adds two further requirements:

  • Testing and evaluation — Regularly testing and evaluating the effectiveness of technical measures.
  • Documented access instructions — Anyone with access to personal data must process it only on documented instructions.

SOX Section 404

SOX Section 404 brings Salesforce into scope whenever financial reporting data flows through the platform. PCAOB AS5 requires that security and access controls over critical applications restrict access to authorized personnel. This includes:

  • Documented provisioning
  • Periodic access reviews
  • Design documentation for permission architectures

The Operational Advantage

Named service accounts, deployment logs linked to approved change requests, role separation, and environment-tier isolation satisfy Zero Trust principles and audit requirements through the same set of controls.

How to Implement Zero Trust Across Salesforce Environments

Salesforce teams can implement Zero Trust in a clear sequence: gain visibility, apply identity controls, then automate enforcement. That sequence reduces audit risk and deployment exposure.

Broad policy statements do not secure pipeline activity on their own. CISA's Zero Trust Maturity Model provides four stages, from Traditional through Optimal, across five pillars and three cross-cutting capabilities. The following steps translate that model into Salesforce-specific actions.

  1. Assess current maturity across all five pillars. Map existing Salesforce controls for Identity, Devices, Networks, Applications, and Data against CISA maturity stages. Identify which pillars remain at the Traditional stage with manual, siloed policies.
  2. Establish aggregated visibility first. Organizations often lack transaction visibility between subjects, assets, and services. Enable Event Monitoring and centralize pipeline logs before attempting automated enforcement.
  3. Implement identity-tier controls. Replace shared deployment credentials with named service accounts. Enforce MFA for all human approvers. Scope Connected App OAuth configurations per environment tier.
  4. Automate enforcement in the pipeline. Add pre-deployment checks that flag permission escalations, verify role separation, and validate metadata components against approved change requests.
  5. Advance cross-cutting capabilities in parallel. CISA's model treats automation, orchestration, and governance as cross-cutting. Advancing one pillar to Advanced while leaving others at Traditional creates exploitable gaps.

Automated deployment pipelines can enforce gate checks at each pipeline stage. To address the enforcement gaps outlined above, solutions purpose-built for Salesforce consolidate identity verification, policy-based gate checks, and approval workflows into a single pipeline. Flosum provides automated deployment pipelines for Salesforce metadata and generates audit trails for compliance reporting, linking every deployment to an approved change request and a named identity.

Closing the Security Gap with Purpose-Built Controls

Salesforce deployment security improves when teams treat every change as a verified action, not a trusted one. That requires identity checks, least-privilege enforcement, and continuous validation across the pipeline. The regulatory requirements and the security framework requirements converge on the same control architecture.

The 2025 wave of Salesforce-targeted attacks proved that perimeter trust and platform-level security are not enough. Organizations need Zero Trust enforcement embedded directly into the deployment pipeline, not bolted on from outside the platform. Addressing these requirements at scale demands a DevOps solution purpose-built for Salesforce.

Flosum supports policy-based deployment controls, version control, rollback capabilities, and CI/CD workflows, all operating natively within Salesforce environments. The four Zero Trust principles outlined in this article (identity-based authorization, least privilege, continuous validation, and environment isolation) map directly to the pipeline controls and audit trail capabilities described in the preceding sections.

When audit deadlines approach, complete deployment history and change documentation reduce preparation time. Request a demo with Flosum to explore how purpose-built deployment controls and audit trails support your compliance requirements.

Table Of Contents
Author
Stay Up-to-Date
Get flosum.com news in your inbox.

Thank you for subscribing