Once you’ve implemented Platform Encryption for Salesforce Data Cloud, auditing its effectiveness is crucial to ensure your data remains secure. Salesforce provides three powerful tools to verify that your data is encrypted and the encryption policies are being followed effectively.
-
Review the Key Management Page
The Key Management page is your central hub for managing encryption keys and reviewing their status. Here’s how it helps:
- Generator Information: Displays details about the type of encryption keys in use.
- Status: Shows whether the keys are Active (used for encryption and decryption) or Archived (used only for decryption of previously encrypted data).
- Management Options: Allows you to rotate or manage keys directly.
How to Access:
- Go to Setup in Salesforce.
-
In the Quick Find box, type Key Management and select it.
- Review your keys for accuracy and compliance.
-
Use the Setup Audit Trail
The Setup Audit Trail is essential for tracking changes made to encryption settings. It provides a detailed log of when encryption was enabled or modified, helping you ensure consistent application of security policies.
How to Access:
- Navigate to Setup in Salesforce.
-
Type View Setup Audit Trail in the Quick Find box and select it.
- Review the log entries for actions related to Data Cloud encryption, such as enabling encryption or modifying settings.
Why It’s Useful:
The audit trail serves as proof of when encryption settings were applied, ensuring transparency and compliance with internal or external security standards.
-
Analyze Encryption Statistics
The Encryption Statistics page offers a summary of the encryption status of your data, including your Data Cloud stores. It helps you:
- Verify encryption coverage for all data points.
- Spot any discrepancies in encryption status.
- Monitor the overall health of your encryption policies.
How to Access:
- Open Setup in Salesforce.
-
Type Platform Encryption in the Quick Find box and select Encryption Statistics.
- Analyze the summary to confirm that your Data Cloud data is fully encrypted.
Conclusion
Regular auditing of Platform Encryption using key management, setup audit trails, and encryption statistics ensures that encryption policies are being followed effectively. These tools help verify the integrity of data encryption and maintain compliance with security standards.
For additional questions on Experience please reach out to support@astreait.com