Appearance
Integrations
This section defines controls related to outbound connectivity from Salesforce to external systems, including Remote Site Settings and Named Credentials. These controls ensure that organizations maintain visibility and governance over approved external endpoints, authentication mechanisms, and data flows initiated by Salesforce, reducing the risk of unauthorized data transmission, dependency on untrusted services, and configuration drift in integration pathways.
SBS-INT-001: Enforce Governance of Browser Extensions Accessing Salesforce
Control Statement: Organizations must enforce a centrally managed mechanism that restricts which browser extensions are permitted to access Salesforce, and must not allow the use of unmanaged or uncontrolled extensions.
Description:
Organizations must deploy a centrally managed governance mechanism—such as Chrome Browser Cloud Management, MDM policies, or configuration profiles—that enforces an allow-list or blocklist for browser extensions accessing Salesforce domains.
Rationale:
Browser extensions can harvest session tokens, exfiltrate data, and execute unauthorized operations within authenticated Salesforce sessions. Without centralized governance, malicious or cloned extensions—increasingly common with AI-generated code—create an uncontrolled risk surface that Salesforce cannot detect or prevent natively.
Audit Procedure:
- Request evidence of a browser-extension governance mechanism applied to user devices (e.g., Chrome Browser Cloud Management, Intune configuration profile, Jamf configuration profile, Active Directory GPO, or equivalent).
- Require a screenshot, exported policy file, or screen capture demonstrating that extension controls are active and enforceable (e.g., an allow-list or blocklist configuration for Chrome extensions).
- Verify that the mechanism explicitly restricts installation or execution of unapproved extensions that can access Salesforce domains.
- Flag the organization as noncompliant if no enforceable governance mechanism exists or if extension governance is based solely on policy, awareness, or voluntary user behavior.
Remediation:
- Implement a centrally managed browser or device management solution capable of enforcing extension restrictions (e.g., Chrome Browser Cloud Management, Intune, Jamf, or GPO-based controls).
- Define and apply an allow-list or blocklist policy governing which extensions are permitted to interact with Salesforce.
- Remove or disable any unapproved browser extensions from managed devices.
- Apply enforcement policies to all corporate-managed devices accessing Salesforce.
Default Value:
Salesforce provides no mechanism to prevent or detect browser extension usage; unmanaged browser extensions are permitted by default, including those capable of accessing Salesforce data and authenticated sessions.
References:
- Google Chrome Enterprise Policy Documentation
- NIST SP 800-53: SI-4 Information System Monitoring
- OWASP: Web Application Security Risks Related to Browser Extensions
SBS-INT-002: Inventory and Justification of Remote Site Settings
Control Statement: Organizations must maintain an authoritative inventory of all Remote Site Settings and document a business justification for each endpoint approved for Apex HTTP callouts.
Description:
All Remote Site Settings configured in Salesforce must be recorded in the organization’s system of record along with a clear business justification demonstrating why the endpoint is required and trusted for use in Apex HTTP callouts.
Rationale:
Remote Site Settings authorize outbound communication from Salesforce to external endpoints; without documented justification, unvetted or insecure endpoints may expose the organization to data leakage, dependency risks, or communication with untrusted services.
Audit Procedure:
- Enumerate all Remote Site Settings via Salesforce Setup or the Metadata API.
- Retrieve the organization’s system of record for approved outbound endpoints.
- Compare the Salesforce list to the system of record to confirm each Remote Site Setting is documented.
- Verify that each documented Remote Site Setting includes a clear business justification.
- Flag any Remote Site Settings missing from the inventory or lacking justification as noncompliant.
Remediation:
- Add all undocumented Remote Site Settings to the system of record.
- Document a valid business justification for each endpoint.
- Remove or disable any Remote Site Settings that cannot be justified.
- Implement a recurring process to reconcile Remote Site Settings with the system of record.
Default Value:
Salesforce does not require or maintain business justification for Remote Site Settings and does not enforce an external inventory.
References:
- Salesforce Developer Guide: Apex Callouts and Remote Site Settings
- NIST SP 800-53: AC-4 Information Flow Enforcement
- CIS Controls v8: Control 12 – Network Infrastructure Management
SBS-INT-003: Inventory and Justification of Named Credentials
Control Statement: Organizations must maintain an authoritative inventory of all Named Credentials and document a business justification for each external endpoint and authentication configuration approved for use in Salesforce.
Description:
All Named Credentials defined in Salesforce—regardless of authentication type or use case—must be recorded in the organization’s system of record, including the endpoint URL, authentication model, and a clear business justification demonstrating why the connection is required and trusted for Apex callouts, External Services, or external data access.
Rationale:
Named Credentials control authenticated outbound communication from Salesforce to external systems; undocumented or unjustified configurations may expose the organization to data leakage, unauthorized integrations, or reliance on insecure or untrusted endpoints.
Audit Procedure:
- Enumerate all Named Credentials using Salesforce Setup, Metadata API, Tooling API, or Connect REST API.
- Retrieve the organization’s system of record for approved external endpoints and integration credentials.
- Compare the Salesforce list to the system of record to confirm all Named Credentials are documented.
- Verify that each documented Named Credential includes:
- The external endpoint URL
- The authentication type (named principal or per-user)
- The business justification for the integration
- Flag any Named Credentials missing from the inventory or lacking justification as noncompliant.
Remediation:
- Add any undocumented Named Credentials to the system of record.
- Document a valid business justification for each Named Credential.
- Remove, disable, or reconfigure any Named Credentials that cannot be justified or that reference untrusted endpoints.
- Establish a recurring reconciliation process to ensure Named Credentials remain fully inventoried and justified.
Default Value:
Salesforce does not maintain or enforce an external inventory or business justification for Named Credentials.
References:
- Salesforce Developer Guide: Named Credentials
- NIST SP 800-53: AC-4 Information Flow Enforcement
- CIS Controls v8: Control 12 – Network Infrastructure Management