This document provides an overview of building secure applications in the cloud. It discusses Salesforce's philosophy of putting customer privacy and security first. It also covers Salesforce's security review process for applications, common vulnerabilities tested for like injection flaws and cross-site scripting, and resources available to help partners develop securely like guidelines, code scanning tools, and office hours support.
2. Safe harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or
implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking,
including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements
regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded
services or technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include â but are not limited to â risks associated with developing and delivering new functionality
for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results
and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of intellectual property and other
litigation, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating
history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful
customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers.
Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-
Q for the most recent fiscal quarter ended July 31, 2012. This documents and others containing important disclosures are available on the SEC
Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available
and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features
that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
5. Nothing is more important to
our company than the privacy
of our customer's data
-Parker Harris Executive VP, Technology Salesforce.com
6. In the news
1.5 Million Hotel chain BitCoin bank
credit card multiple hacked
numbers stolen compromises â˘âŻ $250K stolen
â˘âŻ Stock dropped â˘âŻ $10.6m in Fraud â˘âŻ Suspended
operations
â˘âŻ Visa dropped from â˘âŻ FTC fine
compliant list â˘âŻ 600k+ accounts
8. Whatâs in scope
Force.com Native: Apex, Visualforce, Anything in a
package.
Web Apps: Application or web service hosted on
Heroku, other PAAS or hosting provider.
PAAS
Web Client and
Applications Mobile Apps Client and Mobile: Apps installed on customer
computers, mobile devices or data center.
9. What we test
â˘âŻ Automated code scan
â˘âŻ Manual code review and black box testing
â˘âŻ Client side components (Flash. JavaScript)
â˘âŻ Integrations and web services
â˘âŻ Automated testing and manual black box testing
Web â˘âŻ Client side components (Flash, JavaScript)
Applications â˘âŻ Integrations and web services
â˘âŻ Architecture review and web server testing
â˘âŻ Manual hands on testing of the application
Client and â˘âŻ Integrations and web services
Mobile Apps
â˘âŻ Architecture review and web server testing
10. OWASP Top 10 (2010)
1.⯠Injection (SQLi, XML, LDAP etc.)
2.⯠Cross Site Scripting (XSS)
3.⯠Broken Authentication and Session Management
4.⯠Insecure Direct Object References
5.⯠Cross Site Request Forgery (CSRF)
6.⯠Security Misconfiguration
7.⯠Insecure Cryptographic Storage
8.⯠Failure to Restrict URL Access (e.g. admin pages)
9.⯠Insufficient Transport Layer Protection (SSL, Config)
10.⯠Unvalidated Redirects and Forwards
11. ISV Security Review Outcomes
Approved:
â˘âŻ Meets our requirements
â˘âŻ Offering can be listed on the AppExchange
â˘âŻ Subsequent review is scheduled
Provisionally Approved (very rarely issued):
â˘âŻ Meets our requirements but may have very low risk issues as determined by review team
â˘âŻ The offering can be temporarily listed on the AppExchange
â˘âŻ Failure to remedy issues in a timely manner results in removal from the AppExchange
Not Approved:
â˘âŻDoes not meet our requirements
â˘âŻNew Partners are not permitted to list on AppExchange until all issues are fixed
â˘âŻExisting offerings are delisted from the AppExchange if they fail to remediate issues
12. Why do offerings pass or fail
Why offerings pass Why offerings donât pass
â˘âŻEarly testing and prep â˘âŻLack of testing and prep
â˘âŻUnderstanding â˘âŻMisunderstanding
requirements requirements
â˘âŻUnderstanding scope â˘âŻLimiting scope
â˘âŻUse ISV resources â˘âŻNot using ISV resources
14. Secure Cloud Development
http://developer.force.com/security
â˘âŻSecure Coding Guidelines
â˘âŻSecure Coding Library
â˘âŻSecurity Self-Assessment
â˘âŻPartner security office hours
â˘âŻForce.com Security Code Scanner
â˘âŻISV program partners receive a free web
application scanning tool license
15. Native app security tips
â˘âŻ Business logic issues
â˘âŻ Client side issues
â˘âŻ Flash and Silverlight
â˘âŻ Merge fields in JavaScript blocks or on* methods
â˘âŻ S-Controls and custom buttons/links
â˘âŻ Secure callouts / secure JS includes
Native
â˘âŻ Secure storage of data
16. Web app and client app tips
â˘âŻ Business logic issues
â˘âŻ Multitenancy access control enforcement
â˘âŻ CSRF
â˘âŻ Client side issues
â˘âŻ Flash and Silverlight issues
â˘âŻ Secure JS includes
Composite
and Client â˘âŻ Secure storage of credentials, tokens, and keys
21. Takeaways
â˘âŻ We want you to succeed
â˘âŻ Preparation is key
â˘âŻ Take advantage of our resources
â˘âŻ Give yourself time
â˘âŻ Weâre here to help
23. DF12 ISV Success Sessions
Great sessions for each phase of the lifecycle
Plan Build Distribute Sell Support
ISV Kickoff: Getting Started Distributing & Licensing Your App How to Support Your Customers
How to Architect & Design Your App Automate Your App Sales ISV PM Product Roadmap
Designing Social Apps (Workshop)
Extend Your Commercial Force.com App Expanding Your Marketing Reach with AppExchange
Team Development and Release Mgmt Marketing Best Practices in the Social Era
Building Secure Applications in the Cloud Mastering the Direct Sales Model
Selling Social Apps
Follow sessions and join the Partner Success Group on
24. A Few Reminders. . .
Why Work With a PDO Partner Success Experts
Innovation Theater and Lounge
1:1 Success Clinics
Innovation Theater and Lounge
Need to relax? Have a massage!
Check out the Partner Hub
540 Howard Street
Survey (Session Record) Cloud Crawl (Thursday Night)
Follow us on Twitter @partnerforce
25. Partner Hub â Speaker Debrief
Why Work With a PDO
Partner
Success
Clinics
Welcome Desk
Speaker
Debrief
Area