in implementation guides ~ read.
Salesforce Security Impl Guide

Salesforce Security Impl Guide


First things first !
To download this implementation guide, click the download button below.
If you need more information about the implementation guide, you can read the Table of Contents below.


Chapter Salesforce Security Guide
Salesforce Security Basics
Phishing and Malware
Security Health Check
Salesforce Shield
Authenticate Users
MultiFactor Authentication
Single SignOn
Custom Login Flows
Connected Apps
Manage User Passwords
Device Activation
Session Security
Give Users Access to Data
Control Who Sees What
User Permissions
Object Permissions
Custom Permissions
Create a User Role
Share Objects and Fields
FieldLevel Security
Sharing Rules
User Sharing
What Is a Group
Manual Sharing
OrganizationWide Sharing Defaults
Restriction Rules
Strengthen Your Datas Security with Shield Platform Encryption
What You Can Encrypt
How Encryption Works
Set Up Your Encryption Policy
Filter Encrypted Data with Deterministic Encryption
Key Management and Rotation
Shield Platform Encryption Customizations
Encryption TradeOffs
Audit and Monitor Your Organizations Security
Monitor Login History
Field History Tracking
Monitor Setup Changes with Setup Audit Trail
RealTime Event Monitoring
RealTime Event Monitoring Definitions
Considerations for Using RealTime Event Monitoring
Enable Access to RealTime Event Monitoring
Stream and Store Event Data
Create Logout Event Triggers
How Chunking Works with ReportEvent and ListViewEvent
Enhanced Transaction Security
Threat Detection
Explore Event Log File Data using the Event Log File Browser Beta
Security Guidelines for Apex and Visualforce Development

CrossSite Scripting XSS

Formula Tags

CrossSite Request Forgery CSRF

SOQL Injection

Data Access Control

API EndofLife Policy