Security Flashcards

1
Q

What are the four levels of data access and primary controls?

A
  • Organisation: controlled primarily by IP addresses and login hours
  • Objects: controlled primarily by profiles
  • Records: controlled primarily by roles and role hierarchy
  • Fields: controlled by field level security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where do you set password policies?

A

Globally:

Setup > Password policies

By profile:

Setup > Profiles > Pick a profile > Password Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you restrict login access by IP Address for the whole org?

A

Setup > Network Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you restrict login access by IP Address per profile?

A
  • Setup > Profiles > Pick and edit a profile
  • Click New in the Login IP Range related list.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you restrict login access by time?

A
  • Setup > Profiles > pick a profile
  • Under Login Hours, click Edit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are profiles used to manage object permissions?

A

They are used to restrict access as much as possible.

Conversely, permission sets are used to grant access.

First, turn on the enhanced profile user interface:

  • Setup > User Management Settings
  • Enable Enhanced Profile User Interface

Then :

  • create a profile
  • edit its object settings
  • assign profile to users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are permission sets used to manage object permissions?

A

They are used to grant access, contrary to profiles that are used to restrict access

  • create a permission settings
  • edit its object settings
  • assign users to permission sets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to create a hierarchy of roles?

A
  • Setup > Roles
  • Create roles
  • Set accesses (Private/Public)
  • Assign users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you create a sharing rule?

A

Create a public group:

  • Setup > Public groups
  • Add users, roles or roles and subordinates

Create sharing rule:

  • Setup > Sharing settings
  • Create rule by owner or criteria
  • Select level of access (Private / Public)
  • Select public group or role or role and subordinates to share records with
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wnat are the four increasingly permissive ways of sharing records?

A
  • Organisation wide defaults
  • Role hierarchy
  • Sharing rules
  • Manual sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to create a two-factor authentication permission set?

A

Make sure that two-factor authentication is in the High Assurance category:

Setup > Session Settings

Then create the permission set

Setup > Permission set > New > System Permissions > select Two-Factor Authentication for User Interface Logins.

Assign to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to set field tracking history?

A
  • Go to the object settings
  • Set History Tracking
  • Select the relevant field(s)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you access the Sharing Settings screen and how does it look like?

A

Setup > Sharing Settings

It first lists the “Organization-Wide Defaults” values for all objects then has sub sections to create sharing rules for most objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you set up who gets to see which field?

A

Setup > Field accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you enable admins to log in as users?

A

Setup > Login Access Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do the “Organization-Wide Defaults” do?

A

They set the baseline of all security controls. They are meant to be the most restrictive settings that will be expanded upon by other security controls.

17
Q

What does the “Enable External Sharing Model” button do?

A

It enables sharing of the Salesforce records to external users:

  • Authenticated website users
  • Chatter external users
  • Community users: customers, partners, high volume portal users, guest users, service cloud portal users
18
Q

What are sharing rules used for?

A

The default sharing model in Salesforce follows the vertical role hierarchy. The sharing rules introduce the ability to horizontally share the records of public groups, roles or roles and their subordinates to other public groups, roles or roles and their subordinates.

19
Q

How do you share records manually?

A
  • Setup > Sharing settings > Other settings
  • Check “Manual usesr records sharing”

If enabled in the pages layout, you can add a button fpor users to share their records regardless of other sharing rules

20
Q

What is a quick explanation of the difference between sharing settings and rules, profiles and permission sets?

A

Sharing settings and rules determine who can see data whilst profiles and permission sets determines wjhat they can do with it.

Personal understanding

21
Q

What level of data access does the organization give you?

A

At the highest level, you can secure access to your organization by:

  • maintaining a list of authorized users
  • setting password policies
  • limiting login access to certain hours and certain locations
22
Q

What happens if permission sets conflict with one another?

A

The more permissive one gets applied