Share

When you build an external portal with Salesforce as your data source, you inherit full responsibility for row-level security. There are no guardrails, no built-in protections — just the architecture you design and the assumptions you make.

In this session of Salesforce Security Office Hours, Jessie Grenfell — CEO and Principal Architect at Codality — walks through the real architecture she built as Software Development Team Lead at Trajan Wealth: an external portal and mobile app managing $2.7 billion in assets, backed by discussion and understanding of usage of Auth0, MuleSoft, Salesforce, Azure, and Snowflake. Hosted by Melissa Hill Dees, Tech Evangelist at EzProtect.

With ShinyHunters targeting Salesforce orgs through guest user misconfiguration in March 2026, the question isn’t whether this matters — it’s whether your architecture was built to hold when attackers test it.

 

Your Salesforce data is invaluable—is it truly secure? If you are allowing users to upload files into your Salesforce orgs, you are risk of also uploaded viruses and consequential data breaches. Get in contact with us today. 

Share

Did you love this blog and wish there could be more?

It is our goal to keep you informed about everything you need to know about Salesforce security to keep your Salesforce data and company safe and secure by providing you with the highest quality of original content.

If this sounds good to you, then sign-up below to be one of the first to know when the next super awesome Salesforce security blog has been released.

Download your free guide today!

Learn if you are at risk and how to start protecting your users!

GET THE FACTS NOW