Read about our update schedules here.
A Salesforce solution that is Trusted protects business and stakeholders. A solution well-architected to be Trusted is secure, compliant, and reliable.
Secure solutions control access and protect data.
Compliant solutions follow legal and ethical guidelines.
Reliable solutions operate efficiently and dependably.
Creating a Trusted solution takes careful planning. You need to understand the context of the business and/or industry your solution serves. What is the overall risk tolerance of the business? What kind of data will move into and out of the system? Will Salesforce serve as a system of record or storage point for data with specialized security, compliance, or ethical considerations? What are the relevant regulations and compliance standards? Are there additional, company-specific standards? Is Salesforce a business-critical system? Are there seasonal or circumstantial spikes in traffic or system usage that you need to take into account?
To arrive at a Trusted solution, you need to partner with stakeholders across the business. You must have a clear view of the kinds of users and systems that will need access to your solution, as well as the data and permissions needed to get work done. You need to understand legal and industry requirements, as well as internal policies and standards. You need to work with development and maintenance teams to ensure features will be accessible and serve users equitably. You’ll need to plan for solution availability and performance, even in times of disruption or rapid growth. Nothing is more essential to a well-architected solution than being Trusted.
The following sections provide more in-depth guidance for core considerations of a Trusted solution architecture.
|A secure system protects the business, stakeholders and data. Secure architectures ensure only approved users can gain access, restrict user access to what's essential to get work done, and protect data within the system from being compromised.|
|Organizational Security||Session Security||Data Security|
Threat Detection and Response
|Sharing and Visibility
Use of Encryption
|Compliant solutions follow legal and ethical guidelines. Compliant architectures adhere to legal regulations and industry standards, uphold ethical policies, and serve all users equitably.|
|Legal Adherence||Ethical Standards||Accessibility|
|Reliable solutions operate efficiently and dependably, under a range of conditions. Reliable architectures are available when and where users expect, perform consistently, and scale with the business.|