Shield Platform Encryption Best Practices
Take the time to identify the most likely threats to your org. This process helps you distinguish data that needs encryption from data that doesn’t, so that you can encrypt only what you need to. Make sure that your tenant secret and keys are backed up, and be careful who you allow to manage your secrets and keys.
Required Editions
| Available in both Salesforce Classic (not available in all orgs) and Lightning Experience. |
| Available in: Enterprise, Performance, and Unlimited Editions with the Salesforce Shield or Shield Platform Encryption licenses. |
| Available for free in Developer Edition. |
| Best Practice | Description |
|---|---|
| Define a threat model for your organization | To identify the threats that are most likely to affect your organization, walk through a formal threat modeling exercise. Use your findings to create a data classification scheme, which can help you decide what data to encrypt. |
| Encrypt only where necessary |
|
| Create a strategy early for backing up and archiving keys and data | If your tenant secrets are destroyed, reimport them to access your data. You are solely responsible for making sure that your data and tenant secrets are backed up and stored in a safe place. Salesforce cannot help you with deleted, destroyed, or misplaced tenant secrets. If you destroy a key by mistake and haven't backed it up, all your data encrypted with that key is unavailable. If you destroy a search index tenant secret, your search indexes and their backups are unusable. All searches of encrypted data are logged as failed searches. The search indexes must be remade by customer support. Depending on the amount of data in your org, the search index can be very large, and it can take a while to fully recreate the search index. |
| Read the Shield Platform Encryption considerations and understand their implications on your organization |
|
| Analyze and test AppExchange apps before deploying them |
|
| Use out-of-the-box security tools | Shield Platform Encryption is not a user authentication or authorization tool. To control which users can see which data, use out-of-the-box tools such as field-level security settings, page layout settings, and sharing rules, rather than Shield Platform Encryption. |
| Grant the Manage Encryption Keys user permission to authorized users only | Users with the Manage Encryption Keys permission can generate, export, import, and destroy organization-specific keys. Monitor the key management activities of these users regularly with the setup audit trail. |
| Synchronize your existing data with your active key material | Existing field and file data is not automatically encrypted when you turn on Shield Platform Encryption. To encrypt existing field data, update the records associated with the field data. This action triggers encryption for these records so that your existing data is encrypted at rest. To encrypt existing files or get help updating other encrypted data, contact Salesforce. You can encrypt existing file data in the background using the Background Encryption Service to ensure data alignment with the latest encryption policy and key material. |
| Handle currency and number data with care | Currency and Number fields can't be encrypted because they could have broad functional consequences across the platform, such as disruptions to roll-up summary reports, report time frames, and calculations. You can often keep private, sensitive, or regulated data of this variety safe in other encryption-supported field types. |
| Communicate to your users about the impact of encryption | Before you enable Shield Platform Encryption in a production environment, inform users about how it affects your business solution. For example, share the information described in Shield Platform Encryption considerations, where it's relevant to your business processes. |
| Encrypt your data using the most current key | When you generate a new tenant secret, any new data is encrypted using this key. However, existing sensitive data remains encrypted using previous keys. In this situation, Salesforce strongly recommends re-encrypting these fields using the latest key. Contact Salesforce for help with re-encrypting your data. |
| Use discretion when granting login as access to users or Salesforce Customer Support | If you grant login access to a user, and they have field level security access to an encrypted field, that user is able to view encrypted data in that field in plaintext. If you want Salesforce Customer Support to follow specific processes around asking for or using login as access, you can create special handling instructions. Salesforce Customer Support follows these instructions in situations where login as access may help them resolve your case. To set up these special handling instructions, contact your account executive. |

