Podcast Episode Details

Back to Podcast Episodes
Key Security Best Practices for Salesforce Admins Using Data Cloud

Key Security Best Practices for Salesforce Admins Using Data Cloud



Today on the Salesforce Admins Podcast, Josh Birk talks to Jagan Nathan, Technical Architect with Customer Success at Salesforce.

Join us as we chat about guest user anomalies and what you can do about them with the Threat Detection app.

You should subscribe for the full episode, but here are a few takeaways from our conversation with Jagan Nathan.

The most important thing for a successful Data Cloud migration

Jagan works as a Technical Architect with the Customer Success Group at Salesforce. He's focused on helping businesses use Data Cloud to de-silo their data so they can get a full picture of their customers.

Jagan estimates that 60-70% of the time you spend on a Data Cloud migration is used to make sure you understand what needs to be done. That's because the most important decisions are around what objects and data sources you want to map and how it all fits together. If you need help getting started, his team has put together the Data Cloud Workbook Template to walk you through everything.

What is a guest user anomaly and why is it dangerous for your data security?

The biggest security issues Jagan encounters in orgs come from changes made to profiles and permissions over time. All those consultants can begin to add up! At some point, you need to do an audit of who can see what and apply the principle of least privilege.

And that's the reason we brought Jagan on the pod, because one way this can happen is through something called a guest user anomaly. Essentially, it's when a guest user account has more access than it otherwise than it should. For example, an Apex class that allows them pull all of your data. It's the kind of thing that's difficult to identify but can leave you primed for a data breach if you don't know about it.

How the Threat Detection app can help you identify guest user anomalies

The good news is that there's something you can do about guest user anomalies. If your org has Event Monitoring, you can use the Threat Detection app to identify problematic accounts and take action. It uses the power of machine learning to figure out where the gaps are in your permissions and flag them for you.

In fact, the Threat Detection app can help you monitor all sorts of other anomalies, too. Like if a user who does their reports in the same time window each week suddenly logs in at 3 a.m. to pull a bunch of data, or someone based in Albuquerque logs in from Finland. It can even monitor your APIs. And the best part is that enabling Threat Detection is as easy as turning on the permission set.

Jagan gets into more specifics in our interview, so be sure to take a listen. And don't forget to subscribe to the Salesforce Admins Podcast so you never miss an episode.

Podcast swag

Learn more





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate