Security, Admin and Integrations Flashcards
Salesforce Security Model
Security and “x” in nCino are set up in 4 layers:
- The “x”
- The “x”
- The “x”
- The “x”
Salesforce Security Model
Security and “data access” in nCino are set up in 4 layers:
- The “org”
- The “object”
- The “record”
- The “field”
Salesforce Security Model: Layer 1
Broad rules are set, to establish when & from which “x” a user can “x” the system.
- Users can be restricted to “x” only from office premises.
- “x” can be set up at the company or profile level.
- “x” can be set to specify when a user can and cannot “x” the system.
Salesforce Security Model: Layer 1
Broad rules are set, to establish when & from which “access points” a user can “access” the system.
- Users can be restricted to “log in” only from office premises.
- “IP Ranges” can be set up at the company or profile level.
- “Login hours” can be set to specify when a user can and cannot “access” the system.
Salesforce Security Model: Layer 2
Object level security determines the actions (“x”) a user can perform on data. This is controlled by “x” and “x”.
“x”
- Control the “x” that can be accessed.
- Control the “x” and “x” that can be seen.
Salesforce Security Model: Layer 2
Object level security determines the actions (“CRED”) a user can perform on data. This is controlled by “profiles” and “permission sets”.
“Profiles”
- Control the “objects” that can be accessed.
- Control the “page layouts” and “tabs” that can be seen.
Salesforce Security Model: Layer 3
“x” security goes deeper to define exactly which existing “x” can be viewed or edited.
- User doesn’t have “x” access, system won’t grant them “x” access, regardless of having the “x”.
- Users can be granted limited “x” access to the “x” they don’t own.
- Additional access can be granted/controlled through various “x”.
Salesforce Security Model: Layer 3
“Record level” security goes deeper to define exactly which existing “records” can be viewed or edited.
- User doesn’t have “object” access, system won’t grant them “record” access, regardless of having the “record access”.
- Users can be granted limited “record-level” access to the “records” they don’t own.
- Additional access can be granted/controlled through various “sharing options”.
Salesforce Security Model: Layer 3 (Cont’d)
The “x” of a “x” has full access to the “x”. Beyond that, “x” sharing among different sets of users is controlled by four pillars:
- Manual “x”
- “x” rules
- “x”
- “x”
Salesforce Security Model: Layer 3 (Cont’d)
The “owner” of a “record” has full access to the “record”. Beyond that, “record-level” sharing among different sets of users is controlled by four pillars:
- Manual “sharing”
- “Sharing” rules
- “Role hierarchy”
- “Org Wide Defaults”
Salesforce Security Model: Layer 4
“x” security is the most detailed level of security and is used to determine the “x” a user can view and edit on the records of an object.
A user must be able to “x” the record in order to “x” any fields on the record. Same for “x”.
“x” have two settings, visible and read only. They can only “x”, not “x”.
Salesforce Security Model: Layer 4
“Field level” security is the most detailed level of security and is used to determine the “fields” a user can view and edit on the records of an object.
A user must be able to “view” the record in order to “view” any fields on the record. Same for “editing”.
“Field level permissions” have two settings, visible and read only. They can only “restrict access”, not “grant it”.
Session Management helps with the following
- View “x”
- View “x” details for the “x”
- Create “x” of the data
- View “x” about a user associated with a “x”
- End “x”
Session Management helps with the following
- View “active sessions”
- View “session” details for the “org”
- Create “different views” of the data
- View “details” about a user associated with a “specific session”
- End “suspicious sessions”
nCino Security Gold Standards: User Provisioning
System admins should define a “x” and “x” process to provide “x” over user records on a system.
“x”
- User records are created by an admin who’s logged into the production system.
“x”
- User records are created from an external software system through an API.
“x”
- User records are automatically created based on information provided on the initial request by a trusted source (SAML JIT Provisioning). This method does not enable background synchronisation of user attributes or de-provisioning/deactivation of user accounts.
nCino Security Gold Standards: User Provisioning
System admins should define a “provisioning” and “de-provisioning” process to provide “clear control” over user records on a system.
“Manual”
- User records are created by an admin who’s logged into the production system.
“Automated (on demand)”
- User records are created from an external software system through an API.
“Just-in-time (JIT)”
- User records are automatically created based on information provided on the initial request by a trusted source (SAML JIT Provisioning). This method does not enable background synchronisation of user attributes or de-provisioning/deactivation of user accounts.
nCino Security Gold Standards: Directory Environments
When planning an nCino implementation, consider the “x” that can be provided for “x”.
Also consider a “x” region for the “x” directory to avoid creating “x” or “x” accounts in “x”.
nCino Security Gold Standards: Directory Environments
When planning an nCino implementation, consider the “directory environments” that can be provided for “testing”.
Also consider a “lower testing” region for the “user/employee” directory to avoid creating “developer” or “test” accounts in “production regions”.
Authentication: SSO
Enables a seamless and secure “x” for users, without a username or password.
This allows a bank to control “x” to the nCino “x” through an established means of trust between the “x” and the “x”.
Users cannot be “x” without the explicit permission of the “x”.
Authentication: SSO
Enables a seamless and secure “authentication” for users, without a username or password.
This allows a bank to control “access” to the nCino “application” through an established means of trust between the “application” and the “enterprise directory”.
Users cannot be “authenticated” without the explicit permission of the “identity-provider”.
Authentication: Two Factor Authentication
SF platform has the standard ability to configure a 2FA.
Login flows allow the ability to declaratively customise the login process to add a custom “x” or two-factor authentication to result in a “x” session.
Authentication: Two Factor Authentication
SF platform has the standard ability to configure a 2FA.
Login flows allow the ability to declaratively customise the login process to add a custom “step-up” or two-factor authentication to result in a “high assurance” session.
Authentication: nCino/Salesforce API Authentication
Specific “x” can be created and “x” to “x” access.
Leveraging the security model, these accounts can be limited to access required by “x” as an additional control to “x” to the system in the event any “x” are “x”.
These “x” can also be restricted to “x” configuration data only. This reduces the risk of “x”.
Authentication: nCino/Salesforce API Authentication
Specific “user accounts” can be created and “restricted” to “API-only” access.
Leveraging the security model, these accounts can be limited to access required by “downstream systems” as an additional control to “limit access” to the system in the event any “credentials” are “compromised”.
These “profiles” can also be restricted to “read/write” configuration data only. This reduces the risk of “migrating nCino record-based configuration”.
Authentication: Off-Platform API Authentication
If a “x” or “x” invocation requires the platform to call “x” at the FI’s network, “x” to that network is often achieved with “x” or “x”.
For “x”, in addition to “x”, the Salesforce platform has a feature called “x”.
This feature allows an admin to configure an “x” with a set of “x”. Once this “x” is configured, the platform allows a “x” to this “x” without additional configuration through a “x”.
Authentication: Off-Platform API Authentication
If a “call-out” or “remote process” invocation requires the platform to call “API hosted” at the FI’s network, “authentication” to that network is often achieved with “mutual” or “two-way SSL”.
For “external API call-outs”, in addition to “certificates”, the Salesforce platform has a feature called “Named Credentials”.
This feature allows an admin to configure an “end point” with a set of “protected credentials”. Once this “end point” is configured, the platform allows a “call-out” to this “endpoint” without additional configuration through a “remote site setting”.
Encryption: Data Security (Encryption)
This is a security feature typically applied to “x”. This is any piece of information that can uniquely identify an individual or provide confidential information such as zip code.
These are mostly common sets of “x” on customer, financial or other asset records.
Encryption: Data Security (Encryption)
This is a security feature typically applied to “PII”. This is any piece of information that can uniquely identify an individual or provide confidential information such as zip code.
These are mostly common sets of “fields” on customer, financial or other asset records.
Encryption: Platform Encryption (Shield)
This provides “x”, “x”, “x” and enables banks to control the security of their information in the Salesforce multi-tenant environment.
As platform encryption is “x” compared to “x”, it’s able to seamlessly operate within the “x” with minimal impact to “x” and “x”. This is a paid add-on feature.
Encryption: Platform Encryption (Shield)
This provides “embedded”, “robust”, “enterprise-grade capabilities” and enables banks to control the security of their information in the Salesforce multi-tenant environment.
As platform encryption is “native” compared to “gateway options”, it’s able to seamlessly operate within the “data access layer” with minimal impact to “functionality” and “operational support”. This is a paid add-on feature.
Expanded Platform Capabilities: Field Audit Trail
Expands on “x”, this feature of platform encryption allows more “x” policies to be set at the field level.
This enables banks to track more “x” over time, and when necessary, comply with record “x” to “x”.
Expanded Platform Capabilities: Field Audit Trail
Expands on “field history tracking”, this feature of platform encryption allows more “granular retention” policies to be set at the field level.
This enables banks to track more “information” over time, and when necessary, comply with record “retention policies” to “reduce risk”.