in implementation guides ~ read.
Salesforce Security Impl Guide

Salesforce Security Impl Guide

DOWNLOAD

First things first !
To download this implementation guide, click the download button below.
If you need more information about the implementation guide, you can read the Table of Contents below.

Download

Chapter Salesforce Security Guide
Salesforce Security Basics
Phishing and Malware
Security Health Check
Auditing
Salesforce Shield
Authenticate Users
Elements of User Authentication
Configure User Authentication
Connected Apps
Give Users Access to Data
Control Who Sees What
User Permissions
Object Permissions
Custom Permissions
Profiles
Create a User Role
Share Objects and Fields
FieldLevel Security
Sharing Rules
User Sharing
What Is a Group
Manual Sharing
OrganizationWide Sharing Defaults
Strengthen Your Datas Security with Shield Platform Encryption
What You Can Encrypt
How Encryption Works
Set Up Your Encryption Policy
Filter Encrypted Data with Deterministic Encryption
Key Management and Rotation
Shield Platform Encryption Customizations
Encryption TradeOffs
Monitoring Your Organizations Security
Monitor Login History
Field History Tracking
Monitor Setup Changes with Setup Audit Trail
Transaction Security Policies Legacy
RealTime Event Monitoring
RealTime Event Monitoring Definitions
Considerations for Using RealTime Event Monitoring
Enable Access to the RealTime Event Monitoring
Stream and Store Event Data
Create Logout Event Triggers
How Chunking Works with ReportEvent and ListViewEvent
Enhanced Transaction Security
Threat Detection
Security Guidelines for Apex and Visualforce Development

CrossSite Scripting XSS

Formula Tags

CrossSite Request Forgery CSRF

SOQL Injection

Data Access Control

***