Data Residency and Compliance for Salesforce
Overview
This guide covers data residency and compliance patterns for Salesforce, including PII/PHI handling, GDPR/CCPA/SOC2 controls, field-level encryption, and Shield best practices. These patterns are essential for ensuring data protection, regulatory compliance, and maintaining customer trust.
Related Patterns:
- Salesforce LLM Data Governance - Data governance for LLM systems
- Permission Set Architecture - Access control patterns
- Environment Strategy - Data masking patterns
Consensus Best Practices
- Classify data by sensitivity: Identify and classify all PII/PHI data
- Encrypt sensitive data at rest: Use Shield Encryption for sensitive fields
- Implement field-level security: Control access to sensitive fields
- Maintain audit trails: Track access to and changes to sensitive data
- Document compliance controls: Document all compliance measures
- Regular compliance reviews: Conduct regular compliance audits
- Train teams on compliance: Ensure teams understand compliance requirements
- Monitor compliance continuously: Monitor and alert on compliance violations
PII/PHI Handling
PII Identification Patterns
PII Categories:
- Direct identifiers: Name, SSN, email, phone number
- Indirect identifiers: Date of birth, zip code, IP address
- Biometric data: Fingerprints, facial recognition data
- Location data: GPS coordinates, address history
PHI Categories:
- Health information: Medical records, diagnoses, treatments
- Health identifiers: Medical record numbers, health plan numbers
- Payment information: Insurance information, billing records
- Research data: De-identified health data
PII/PHI Identification Process:
- Inventory all data fields in org
- Classify fields by sensitivity level
- Document PII/PHI fields
- Review and update classification regularly
PHI Protection Strategies
HIPAA Compliance:
- Implement administrative safeguards
- Implement physical safeguards
- Implement technical safeguards
- Conduct risk assessments
- Maintain Business Associate Agreements (BAAs)
PHI Protection Measures:
- Encrypt PHI at rest and in transit
- Implement access controls
- Maintain audit logs
- Train staff on HIPAA requirements
- Document PHI handling procedures
PHI Access Controls:
- Role-based access to PHI
- Field-level security for PHI fields
- Audit trail for PHI access
- Regular access reviews
Data Classification
Classification Levels:
- Public: No restrictions, can be shared freely
- Internal: Restricted to organization, not public
- Confidential: Restricted to authorized personnel
- Restricted: Highest sensitivity, strictest controls
Classification Process:
- Classify all data fields
- Document classification rationale
- Review classifications regularly
- Update classifications as needed
Classification Implementation:
- Use field-level security
- Implement sharing rules
- Use encryption for sensitive data
- Monitor data access
GDPR/CCPA/SOC2 Controls
GDPR Compliance Framework
GDPR Principles:
- Lawfulness, fairness, transparency: Process data lawfully and transparently
- Purpose limitation: Collect data for specified purposes only
- Data minimization: Collect only necessary data
- Accuracy: Keep data accurate and up to date
- Storage limitation: Retain data only as long as necessary
- Integrity and confidentiality: Protect data security
- Accountability: Demonstrate compliance
Data Subject Rights:
- Right to access: Provide data subjects access to their data
- Right to rectification: Correct inaccurate data
- Right to erasure: Delete data upon request (right to be forgotten)
- Right to restrict processing: Restrict data processing
- Right to data portability: Export data in portable format
- Right to object: Object to data processing
GDPR Implementation:
- Implement data subject request processes
- Maintain consent management
- Document data processing activities
- Conduct Data Protection Impact Assessments (DPIAs)
- Appoint Data Protection Officer (DPO) if required
CCPA Compliance Framework
CCPA Requirements:
- Right to know: Consumers can request data disclosure
- Right to delete: Consumers can request data deletion
- Right to opt-out: Consumers can opt-out of data sales
- Non-discrimination: Cannot discriminate for exercising rights
CCPA Implementation:
- Implement consumer request processes
- Maintain opt-out mechanisms
- Document data sharing and sales
- Train staff on CCPA requirements
- Update privacy policies
SOC2 Controls
SOC2 Trust Service Criteria:
- Security: System is protected against unauthorized access
- Availability: System is available for operation
- Processing integrity: System processing is complete and accurate
- Confidentiality: Confidential information is protected
- Privacy: Personal information is collected and used appropriately
SOC2 Implementation:
- Document control objectives
- Implement control activities
- Monitor control effectiveness
- Conduct regular audits
- Maintain audit evidence
SOC2 Controls for Salesforce:
- Access controls and authentication
- Data encryption
- Audit logging
- Change management
- Incident response
Field-Level Encryption
Shield Encryption Patterns
Shield Platform Encryption:
- Encrypt data at rest in database
- Encrypt data in search indexes
- Encrypt data in file storage
- Maintain encryption keys securely
Encryption Implementation:
- Identify fields requiring encryption
- Enable Shield Platform Encryption
- Configure encryption for identified fields
- Test encryption functionality
- Document encryption configuration
Encryption Best Practices:
- Encrypt all PII/PHI fields
- Use deterministic encryption for searchable fields
- Use probabilistic encryption for maximum security
- Manage encryption keys securely
- Monitor encryption status
Field-Level Security
Field-Level Security (FLS):
- Control access to individual fields
- Implement role-based field access
- Use permission sets for field access
- Document field access requirements
FLS Implementation:
- Review all fields for sensitivity
- Configure FLS per field
- Test FLS configuration
- Monitor FLS effectiveness
- Update FLS as needed
FLS Best Practices:
- Principle of least privilege
- Regular access reviews
- Document FLS decisions
- Test FLS in all environments
Encryption Key Management
Key Management Patterns:
- Salesforce-managed keys: Salesforce manages encryption keys
- Customer-managed keys: Customer manages encryption keys (BYOK)
- Hybrid approach: Mix of Salesforce and customer-managed keys
Key Management Best Practices:
- Rotate keys regularly
- Secure key storage
- Monitor key usage
- Document key management procedures
- Plan for key recovery
Shield Best Practices
Platform Encryption
Platform Encryption Features:
- Encrypt standard and custom fields
- Encrypt files and attachments
- Encrypt search indexes
- Support for deterministic and probabilistic encryption
Platform Encryption Implementation:
- Enable Platform Encryption
- Identify fields for encryption
- Configure field encryption
- Test encryption functionality
- Monitor encryption performance
Platform Encryption Considerations:
- Performance impact of encryption
- Search functionality with encryption
- Integration with external systems
- Backup and restore with encryption
Event Monitoring
Event Monitoring Features:
- Track user activity
- Monitor data access
- Detect security threats
- Audit compliance activities
Event Monitoring Implementation:
- Enable Event Monitoring
- Configure event types to monitor
- Set up event monitoring dashboards
- Create alerts for suspicious activity
- Review event logs regularly
Event Monitoring Best Practices:
- Monitor critical events
- Set up automated alerts
- Review logs regularly
- Document monitoring procedures
- Respond to security events
Field Audit Trail
Field Audit Trail Features:
- Track field value changes
- Maintain change history
- Support compliance audits
- Enable data lineage tracking
Field Audit Trail Implementation:
- Enable Field Audit Trail
- Identify fields for audit tracking
- Configure audit trail per field
- Test audit trail functionality
- Review audit trail data
Field Audit Trail Best Practices:
- Audit all sensitive fields
- Maintain audit trail retention
- Review audit trails regularly
- Export audit data for compliance
- Document audit trail configuration
Compliance Documentation
Compliance Documentation Requirements
Documentation Types:
- Data classification inventory
- Data processing documentation
- Access control documentation
- Encryption configuration documentation
- Audit trail documentation
- Incident response procedures
Documentation Maintenance:
- Keep documentation current
- Review documentation regularly
- Update documentation with changes
- Maintain version control
- Store documentation securely
Compliance Audits
Audit Preparation:
- Maintain compliance documentation
- Conduct internal audits
- Prepare audit evidence
- Train staff on audit procedures
- Schedule regular audits
Audit Execution:
- Provide audit evidence
- Answer auditor questions
- Document audit findings
- Address audit findings
- Follow up on remediation
Q&A
Q: What is PII and PHI in Salesforce?
A: PII (Personally Identifiable Information) includes: Direct identifiers (Name, SSN, email, phone), Indirect identifiers (Date of birth, zip code, IP address), Biometric data, Location data. PHI (Protected Health Information) includes: Health information (medical records, diagnoses), Health identifiers (medical record numbers), Payment information (insurance, billing), Research data. Both require special handling and protection.
Q: How do I handle GDPR compliance in Salesforce?
A: Handle GDPR compliance by: (1) Identifying personal data (PII inventory), (2) Implementing data subject rights (right to access, delete, portability), (3) Obtaining consent (consent management), (4) Implementing data minimization (collect only necessary data), (5) Encrypting sensitive data (Shield Encryption), (6) Maintaining audit trails (track data access), (7) Documenting compliance (compliance documentation).
Q: What is Shield Encryption and when should I use it?
A: Shield Encryption (Platform Encryption) encrypts data at rest in Salesforce. Use it for: (1) Sensitive fields (PII, PHI, financial data), (2) Compliance requirements (GDPR, HIPAA, PCI-DSS), (3) Data residency requirements (data must be encrypted), (4) Regulatory requirements (encryption mandated). Shield encrypts standard and custom fields, files, attachments, and search indexes.
Q: How do I implement field-level encryption?
A: Implement field-level encryption by: (1) Enabling Platform Encryption in Salesforce, (2) Identifying fields for encryption (PII, PHI, sensitive data), (3) Configuring field encryption (deterministic or probabilistic), (4) Configuring Field-Level Security (FLS) to control access, (5) Testing encryption functionality, (6) Monitoring encryption performance. Consider performance impact and search functionality with encryption.
Q: What are GDPR data subject rights and how do I implement them?
A: GDPR data subject rights include: (1) Right to access (provide data copy), (2) Right to deletion (delete personal data), (3) Right to portability (export data in machine-readable format), (4) Right to rectification (correct inaccurate data), (5) Right to object (object to processing). Implement by: creating processes for each right, automating where possible, documenting responses, maintaining audit trails.
Q: How do I maintain audit trails for compliance?
A: Maintain audit trails by: (1) Enabling Field Audit Trail for sensitive fields, (2) Using Event Monitoring to track data access, (3) Tracking field value changes (who, when, what changed), (4) Maintaining audit trail retention (based on compliance requirements), (5) Exporting audit data for compliance, (6) Reviewing audit trails regularly, (7) Documenting audit trail configuration.
Q: What is data residency and how do I handle it?
A: Data residency requires data to be stored in specific geographic locations. Handle by: (1) Identifying data residency requirements (which data, which regions), (2) Using Salesforce data centers in required regions, (3) Configuring data storage per region, (4) Ensuring compliance with residency requirements, (5) Documenting residency configuration, (6) Monitoring data location (verify data stays in required regions).
Q: What compliance controls should I implement for SOC2?
A: Implement SOC2 controls: (1) Access controls (authentication, authorization, FLS), (2) Encryption (data at rest, in transit), (3) Monitoring and logging (Event Monitoring, audit trails), (4) Change management (deployment controls, approval processes), (5) Incident response (security incident procedures), (6) Documentation (compliance documentation, procedures), (7) Regular audits (internal and external audits).
Q: How do I prepare for compliance audits?
A: Prepare for audits by: (1) Maintaining compliance documentation (data inventory, procedures), (2) Conducting internal audits regularly, (3) Preparing audit evidence (logs, documentation, configurations), (4) Training staff on audit procedures, (5) Scheduling regular audits (quarterly, annually), (6) Addressing audit findings promptly, (7) Following up on remediation (verify fixes).
Q: What are best practices for data compliance?
A: Best practices include: (1) Classify data by sensitivity (identify PII/PHI), (2) Encrypt sensitive data (Shield Encryption), (3) Implement field-level security (FLS), (4) Maintain audit trails (track access and changes), (5) Document compliance controls (clear documentation), (6) Regular compliance reviews (audits, assessments), (7) Train teams on compliance requirements, (8) Monitor compliance continuously (alerts, violations).
Related Patterns
- Salesforce LLM Data Governance - Data governance for LLM systems
- Permission Set Architecture - Access control patterns
- Environment Strategy - Data masking patterns
- Data Quality & Stewardship - Data quality patterns