ENHANCING DATA SECURITY IN SALESFORCE USING SHIELD PLATFORM ENCRYPTION

Authors

  • Venkat Sumanth Guduru Powell, Ohio, USA. Author
  • Venkat Sumanth Guduru Powell, Ohio, USA. Author

Keywords:

Data Security, Cloud Platform, Symmetric Encryption, Asymmetric Encryption, Multi-Factor Authentication

Abstract

This is where the use of Shield Platform Encryption to strengthen data security on Salesforce comes in handy especially for compliance with laws such as GDPR and HIPAA. Based on the results, Shield scrambles data stored on the platform so that they cannot be read if stolen and integrates with the Salesforce environment. For security reasons Shield has to be combined with OwnBackup for backed up encrypted data and Data Mask for anonymizing data for sandboxing. All together these tools contribute to strong security environment and safeguards data from the time it is produced, developed and in response to regulatory requirements.

References

A. Rasheed, O. San, and T. Kvamsdal, “Digital Twin: Values, Challenges and Enablers From a Modeling Perspective,” IEEE Access, vol. 8, pp. 21980–22012, 2020, doi: https://doi.org/10.1109/access.2020.2970143.

P. B. de Laat, “Companies Committed to Responsible AI: From Principles towards Implementation and Regulation?,” Philosophy & Technology, vol. 34, Oct. 2021, doi: https://doi.org/10.1007/s13347-021-00474-3.

S. Ali et al., “Explainable Artificial Intelligence (XAI): What we know and what is left to attain Trustworthy Artificial Intelligence,” Information Fusion, vol. 99, no. 101805, p. 101805, Apr. 2023, doi: https://doi.org/10.1016/j.inffus.2023.101805.

Bhatta, M. G., & Pandey, M.A case study on hybrid cloud approach to automate the cloud services based on decision support system. THE GENESIS, 8(3),49-64,mar.2021 https://doi.org/10.47211/tg.2021.v08i03.010.

Cloud services for device utilization and optimization of hybrid network. (2019). International Journal of Recent Technology and Engineering, 8(2S8), 403-407. https://doi.org/10.35940/ijrte.b1396.0882s819

Fordham, S. (2021). Deploying vSmart. Learning SD-WAN with Cisco, 137-148. https://doi.org/10.1007/978-1-4842-7347-0_6

Kelly, D., Glavin, F. G., & Barrett, E. (2021). Denial of wallet—Defining a looming threat to serverless computing. Journal of Information Security and Applications, 60, 102843. https://doi.org/10.1016/j.jisa.2021.102843

Rath, M., & Keller, L. (2022). US cloud-anbieter, Der „Risikofaktor US CLOUD Act“, das Vergaberecht und die Nachfrage nach sicheren sovereign clouds. Computer und Recht, 38(10), 682-688. https://doi.org/10.9785/cr-2022-381015

Erriyanto, A. P., & Eviyanti, A. (2023). Implementation of the honeypot method in security of input form against attacks SQL-injection. https://doi.org/10.21070/ups.428

Farah, M. B., Al-Kadri, M. O., Ahmed, Y., Abouzariba, R., & Bellekens, X. (2023). Cyber incident scenarios in the maritime industry: Risk assessment and mitigation strategies. 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 615, 194-199. https://doi.org/10.1109/csr57506.2023.10224972

Hojabri, M., & Rao, K. V. (2013). Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues. 2013 International Conference on Information Communication and Embedded Systems (ICICES), 452 456. https://doi.org/10.1109/icices.2013.6508293

Hon, W. K., Millard, C., & Singh, J. (2022). Cloud computing demystified (Part 2): Control, security, and risk in the cloud. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4030114

APOSTOLOV, A. (2021). Impact of IEC 61850 edition 2 on the object modelling of complex Multifunctional protection IEDs. 2021 74th Conference for Protective Relay Engineers (CPRE), 1-5. https://doi.org/10.1109/cpre48231.2021.9429832

Kuzior, A., Brożek, P., Kuzmenko, O., Yarovenko, H., & Vasilyeva, T. (2022). Countering cybercrime risks in financial institutions: Forecasting information trends. Journal of Risk and Financial Management, 15(12), 613. https://doi.org/10.3390/jrfm15120613

Lenz, T., & Krnjic, V. (2018). Agile smart-device based multi-factor authentication for modern identity management systems. Proceedings of the 14th International Conference on Web Information Systems and Technologies, 113-124. https://doi.org/10.5220/0007229601130124

Rawal, B. S., M., P., Manogaran, G., & Hamdi, M. (2021). Multi-tier stack of block chain with proxy re-encryption method scheme on the Internet of things platform. ACM Transactions on Internet Technology, 22(2), 1-20. https://doi.org/10.1145/3421508

Chinnasamy, P., Deepalakshmi, P., & Shankar, K. (2020). An analysis of security access control on healthcare records in the cloud. Intelligent Data Security Solutions for e-Health Applications, 113-130.https://doi.org/10.1016/b978-0-12-819511-6.00006-6

Ni Thuama, R., & Costigan, S. S. (2023). DORA - Understanding the new regulatory framework on digital operational resilience. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4549564

Ni Thuama, R., & Costigan, S. S. (2023). DORA - Understanding the new regulatory framework on digital operational resilience. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4549564

Nour, B., Pourzandi, M., & Debbabi, M. (2023). A survey on threat hunting in enterprise networks. IEEE Communications Surveys & Tutorials, 25(4), 2299-2324. https://doi.org/10.1109/comst.2023.3299519

Harding, L., & Bayliss, L. (2022). Data architecture & Management (Phase B) resource base. Salesforce Platform Governance Method, 273-290. https://doi.org/10.1007/978-1-4842-7404-0_13

Rahman, M. H., Wuest, T., & Shafae, M. (2023). Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies. Journal of Manufacturing Systems, 68, 196-208. https://doi.org/10.1016/j.jmsy.2023.03.009

Saracoglu, D. (2023). Metaverse and new cybersecurity threats. Studies in Big Data, 99-121. https://doi.org/10.1007/978-981-99-4641-9_7

Mahajan, H. B. (2022). Emergence of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems: Solutions, challenges, and future roadmap. Wireless Personal Communications, 126(3), 2425-2446. https://doi.org/10.1007/s11277-022-09535-y

Siegel, C. A., & Sweeney, M. (2020). Cyber threats, vulnerabilities, and intelligence analysis. Cyber Strategy, 75-94. https://doi.org/10.1201/9780429323003-4

Thompson, E. C. (2020). Continuous monitoring. Designing a HIPAA-Compliant Security Operations Center, 95-163. https://doi.org/10.1007/978-1-4842-5608-4_5

Zhao, J., Yan, Q., Li, J., Shao, M., He, Z., & Li, B. (2020). TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data. Computers & Security, 95, 101867. https://doi.org/10.1016/j.cose.2020.101867

Saha, H. N., & Debnath, S. (2021). Security and privacy of IoT devices in healthcare systems. Smart Healthcare System Design, 143-165. https://doi.org/10.1002/9781119792253.ch7

Sherman, J. A., Arissian, L., Brown, R. C., Deutch, M. J., Donley, E. A., Gerginov, V., Levine, J., Nelson, G. K., Novick, A. N., Patla, B. R., Parker, T. E., Stuhl, B. K., Sutton, D. D., Yao, J., Yates, W. C., Zhang, V., & Lombardi, M. A. (2021). undefined. https://doi.org/10.6028/nist.tn.2187

Vimal, V., Muruganantham, R., Prabha, R., Arularasan, A. N., Nandal, P., Chanthirasekaran, K., & Reddy Ranabothu, G. (2022). Enhance software-defined network security with IoT for strengthen the encryption of information access control. Computational Intelligence and Neuroscience, 2022, 1-10. https://doi.org/10.1155/2022/4437507

Downloads

Published

2023-12-27