Home
IT Hub
Salesforce

Best Practices for Managing API Security in Salesforce

Reco Security Experts
Updated
October 23, 2024
October 23, 2024

Salesforce places a strong emphasis on data security, and it's essential for users to apply effective strategies to protect their organizations. Integration is a key feature of Salesforce's architecture, allowing seamless interaction with other applications.

In today’s digital world, securing APIs is critical, especially when working with a platform like Salesforce. APIs are the foundation of modern integrations but can also be vulnerable to threats if not properly secured. Let’s look at the best practices for managing API security in Salesforce.

Best Practices for Securing Salesforce APIs

1. Use Named Credentials

Named Credentials are like your secure keychain for external services. They handle the complexities of authentication, so you don’t have to embed sensitive information like usernames or passwords directly in your Apex code.

2.  Enable Two-Factor Authentication (2FA) for API Users

Two-Factor Authentication (2FA), a type of Multi-Factor Authentication (MFA), adds an extra layer of protection by requiring two forms of identification, such as a password and a verification code. This significantly reduces the risk of unauthorized access. The broader benefits of MFA include stronger security against phishing and credential-based attacks, ensuring that even if one authentication method is compromised, the second factor still protects your systems. Enforce 2FA in Salesforce Setup to secure API access and sensitive data, effectively.

3. Use OAuth for Secure API Authentication

OAuth is a widely used and secure method for authorizing API requests without exposing user credentials. It’s especially useful when your app needs to access Salesforce resources on behalf of a user. When setting up connected apps in Salesforce, select OAuth as the authentication method. This ensures tokens are used instead of actual user credentials.

4. Monitor API Usage

Monitoring your API usage helps you identify any unusual activity, like an unexpected spike in requests, which could indicate a security breach. Use the API Usage report available in Salesforce.

5. Restrict API Access with IP Whitelisting

IP whitelisting limits API access to trusted IP addresses, reducing the risk of unauthorized access. Navigate to Setup > Network Access, and add the IP ranges allowing access to your APIs. This way, requests from those IP addresses will only be processed.

6. Use Field-Level Security to Protect Sensitive Data

Not all data should be accessible via API. By using field-level security, you can ensure that sensitive information is hidden from API responses. Go to Setup > Object Manager, select the object you want to secure and adjust the field-level security settings

7. Audit API Access with Event Monitoring

Event Monitoring gives insights into who is accessing your Salesforce APIs and how they are used. It’s a powerful tool for detecting and responding to security incidents. In Setup, search for Event Monitoring and set up the relevant reports. You can analyze API events to spot any irregularities.

Key Takeaways for API Security in Salesforce

Best Practices Description Setup Location / Instructions
Use Named Credentials Securely manage external service credentials, avoiding embedding sensitive info in code. Setup > Named Credentials
Enable Two-Factor Authentication (2FA) Adds an extra layer of security by requiring two forms of identification for API access. Setup > Multi-factor Authentication > Enforce on user profiles needing API access
Use OAuth for API Authentication Secure API requests by using OAuth tokens instead of user credentials. Setup > Connected Apps > Select OAuth as the authentication method
Monitor API Usage Track and identify unusual API activity, such as spikes that may indicate a security breach. Setup > API Usage Notifications > Add a new alert
Restrict API Access with IP Whitelisting Limit API access to trusted IP addresses, reducing unauthorized access risk. Setup > Network Access > Add trusted IP ranges
Use Field-Level Security Protect sensitive data by ensuring only authorized fields are accessible via API. Setup > Object Manager > Adjust field-level security settings
Audit API Access with Event Monitoring Track who is accessing APIs and detect irregularities with Event Monitoring. Setup > Security > Event Monitoring Settings > Toggle “Generate event log files”

Conclusion

If you follow these best practices, you will significantly enhance the security of your Salesforce APIs. Remember, API security is not a one-time task, but an ongoing process. Stay vigilant, keep your configurations current, and always monitor for potential threats.

“I’ve looked at other tools in this space and Reco is the best choice based on use cases I had and their dedication to success of our program. I always recommend Reco to my friends and associates, and would recommend it to anyone looking to get their arms around shadow IT and implement effective SaaS security.”
Mike D'Arezzo
Executive Director of Security
“We decided to invest in SaaS Security over other more traditional types of security because of the growth of SaaS that empowers our business to be able to operate the way that it does. It’s just something that can’t be ignored anymore or put off.”
Aaron Ansari
CISO
“With Reco, our posture score has gone from 55% to 67% in 30 days and more improvements to come in 7-10 days. We are having a separate internal session with our ServiceNow admin to address these posture checks.”
Jen Langford
Information Security & Compliance Analyst
“That's a huge differentiator compared to the rest of the players in the space. And because most of the time when you ask for integrations for a solution, they'll say we'll add it to our roadmap, maybe next year. Whereas Reco is very adaptable. They add new integrations quickly, including integrations we've requested.”
Kyle Kurdziolek
Head of Security

Explore More

Ready for SaaS Security
that can keep up?

Request a demo