Development Team Data Access Policy
Summary
This policy describes the process by which Vertic manages the data access for any development team member for the purposes of protecting client transactional data, this can be further expanded based on the needs and policies of specific clients.
The primary objectives of this policy are to:
Protect client data Personally Identifiable Information (PII).
Strategy Template
Detailed below is a strategy which can be further adapted based on the approved approach discussed with the client.
Vertic Admin User - a specific account setup to be used by onshore resources which has System Administrator access.
Vertic Developer User - a specific development user and license is provisioned to Vertic for developer users based offshore.
Vertic Developer Sandbox - a specific sandbox is provisioned to Vertic for development users.
Developer Profile - a specific profile is granted to the Vertic Developer User.
Deactivate Modify All and View All on all sensitive objects which will remove access to anything that is not owned by this specific user.
Hide PII data using Field Level Security.
The ability to export data is removed from this user.
This profile has login access to the dedicated sandbox.
This user has access to release features into other environments (staging and production) via Click Deploy but does not have login access to the environment.
This is for the purpose of validating change sets.
This user can be granted temporary access to other environments (staging and production) to support new releases / deployments.
This could be granted by a Permission Set.
Login Hours and IP Ranges are utilised to protect access on the client side.
Considerations
Bitwarden contains access to all client environments and is maintained based on a needs basis, Vertic resources are only provisioned with access to environments that they need access to.
Copado Click Deploy has connections to all client environments (not credentials) for the purpose of deployments.
Salesforce Password Policies need to be maintained in alignment with Bitwarden to ensure access is removed (the password is changed) when a resource no longer has access to the environment in Bitwarden.
UAT Sandbox - needs to be included in the release strategy if there are multiple development environments involved.
Further Recommendations
For clients who want to take further steps to secure their environments
Copado Click Deploy - a client account is provisioned and all deployments are run through this account.
Available Configuration Options
ITEM | DESCRIPTION | NOTES |
---|---|---|
Development User | A user specifically for development use to be provisioned for development activities. |
|
Development Profile |
| Data Export from reports and standard export feature to be deactivated. Deactivate Modify All Data. Deactivate Modify All at object level for sensitive objects. |
Sandbox Management & Deployment Process | Salesforce sandboxes are used to develop new features for release. A deployment process can be defined depending on the make up of the organisation’s sandboxes to ensure access to data is protected. | With access to a full sandbox, data needs to be protected in this environment too. Development sandboxes deploy to UAT sandbox. Approved user deploys to full sandbox for business testing. Approved user deploys approved featured from full to production. |
Login Hours & IP Ranges |
| Recommended for environments with data to control when they can be accessed. |
Field Level Security |
| Dependent on Development User and Development Profile being provisioned. Turn off access to all fields which are not required from a development perspective with particular focus on fields which contain sensitive data. |
Permission Sets |
| Recommended to increase permissions of the Development Profile for fixed periods of time (eg. monthly releases). |
Roles |
|
|
Organisation Wide Defaults |
| Lock down sensitive areas of data at the object level. |
Record Types |
|
|
Apex Managed Sharing |
|
|