Sandrine Ged (Hiest)Salesforce Security Governance — Additional tools and resourcesThis post is a compilation of tools and resources that complements the Six Steps to Establish a Security Governance Model article, in…Dec 14, 20231Dec 14, 20231
Sandrine Ged (Hiest)inSalesforce ArchitectsSix Steps to Establish a Security Governance ModelImagine you are the lead Salesforce Architect on a large transformation program. You are very excited about delivering new features that…Dec 13, 20231Dec 13, 20231
Sandrine Ged (Hiest)inSalesforce ArchitectsHow to Implement the Principle of Least Privilege in SalesforcePrinciple of least privilege (PoLP) is one of the most widely applied concepts in information security. Learn how to use this in…Feb 25, 2021Feb 25, 2021
Sandrine Ged (Hiest)inSalesforce ArchitectsHow to build a User Security ModelAt Salesforce, trust is our number one value, and security is non-negotiable. The platform comes with a comprehensive set of features that…Sep 23, 20204Sep 23, 20204