SlideShare a Scribd company logo
Building Secure Applications
in the Cloud

James Dolph, Salesforce.com, Product Security Senior Manager
@SecureCloudDev
Safe harbor
 Safe harbor statement under the Private Securities Litigation Reform Act of 1995:

 This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
 materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or
 implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking,
 including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements
 regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded
 services or technology developments and customer contracts or use of our services.

 The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality
 for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results
 and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of intellectual property and other
 litigation, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating
 history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful
 customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers.
 Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-
 Q for the most recent fiscal quarter ended July 31, 2012. This documents and others containing important disclosures are available on the SEC
 Filings section of the Investor Information section of our Web site.

 Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available
 and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features
 that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Agenda

•  Philosophy and overview
•  Resources and tips
•  Collaborate and get help
•  Takeaways
Philosophy and Overview
Nothing is more important to
 our company than the privacy
 of our customer's data
     -Parker Harris Executive VP, Technology Salesforce.com
In the news

1.5 Million            Hotel chain          BitCoin bank
credit card            multiple             hacked
numbers stolen         compromises          •  $250K stolen
•  Stock dropped       •  $10.6m in Fraud   •  Suspended
                                               operations
•  Visa dropped from   •  FTC fine
   compliant list      •  600k+ accounts
Security Review

•  Mandatory
•  Enterprise level
•  Application Focused
What’s in scope
                             Force.com Native: Apex, Visualforce, Anything in a
                             package.



                             Web Apps: Application or web service hosted on
                             Heroku, other PAAS or hosting provider.

                                                         PAAS

   Web          Client and
Applications   Mobile Apps   Client and Mobile: Apps installed on customer
                             computers, mobile devices or data center.
What we test
               •    Automated code scan
               •    Manual code review and black box testing
               •    Client side components (Flash. JavaScript)
               •    Integrations and web services

               •    Automated testing and manual black box testing
   Web         •    Client side components (Flash, JavaScript)
Applications   •    Integrations and web services
               •    Architecture review and web server testing


               •  Manual hands on testing of the application
 Client and    •  Integrations and web services
Mobile Apps
               •  Architecture review and web server testing
OWASP Top 10 (2010)
1.  Injection (SQLi, XML, LDAP etc.)
2.  Cross Site Scripting (XSS)
3.  Broken Authentication and Session Management
4.  Insecure Direct Object References
5.  Cross Site Request Forgery (CSRF)
6.  Security Misconfiguration
7.  Insecure Cryptographic Storage
8.  Failure to Restrict URL Access (e.g. admin pages)
9.  Insufficient Transport Layer Protection (SSL, Config)
10.  Unvalidated Redirects and Forwards
ISV Security Review Outcomes

     Approved:
     •  Meets our requirements
     •  Offering can be listed on the AppExchange
     •  Subsequent review is scheduled

     Provisionally Approved (very rarely issued):
     •  Meets our requirements but may have very low risk issues as determined by review team
     •  The offering can be temporarily listed on the AppExchange
     •  Failure to remedy issues in a timely manner results in removal from the AppExchange

     Not Approved:
     • Does not meet our requirements
     • New Partners are not permitted to list on AppExchange until all issues are fixed
     • Existing offerings are delisted from the AppExchange if they fail to remediate issues
Why do offerings pass or fail

Why offerings pass         Why offerings don’t pass
• Early testing and prep   • Lack of testing and prep
• Understanding            • Misunderstanding
requirements               requirements
• Understanding scope      • Limiting scope
• Use ISV resources        • Not using ISV resources
Security Resources
Secure Cloud Development

                  http://developer.force.com/security

                  • Secure Coding Guidelines
                  • Secure Coding Library
                  • Security Self-Assessment
                  • Partner security office hours
                  • Force.com Security Code Scanner
                  • ISV program partners receive a free web
                  application scanning tool license
Native app security tips

             •  Business logic issues
             •  Client side issues
             •  Flash and Silverlight
             •  Merge fields in JavaScript blocks or on* methods
             •  S-Controls and custom buttons/links
             •  Secure callouts / secure JS includes
  Native
             •  Secure storage of data
Web app and client app tips

             •  Business logic issues
             •  Multitenancy access control enforcement
             •  CSRF
             •  Client side issues
             •  Flash and Silverlight issues
             •  Secure JS includes
Composite
and Client   •  Secure storage of credentials, tokens, and keys
Collaborate and get help
Collaborate and get help

•  Secure Cloud Development
•  Force.com discussion boards
•  Partner Portal
•  Twitter @SecureCloudDev
•  ISV Office hours
•  Email
ISV Office Hours




            http://bit.ly/ISVSecurityOfficeHours
Takeaways
Takeaways

•  We want you to succeed
•  Preparation is key
•  Take advantage of our resources
•  Give yourself time
•  We’re here to help
Wrap up
DF12 ISV Success Sessions
      Great sessions for each phase of the lifecycle




                           Plan             Build         Distribute             Sell       Support

ISV Kickoff: Getting Started                        Distributing & Licensing Your App          How to Support Your Customers
How to Architect & Design Your App                  Automate Your App Sales                    ISV PM Product Roadmap
Designing Social Apps (Workshop)


                    Extend Your Commercial Force.com App                  Expanding Your Marketing Reach with AppExchange
                    Team Development and Release Mgmt                     Marketing Best Practices in the Social Era
                    Building Secure Applications in the Cloud             Mastering the Direct Sales Model
                                                                          Selling Social Apps


                          Follow sessions and join the Partner Success Group on
A Few Reminders. . .
Why Work With a PDO                                Partner Success Experts
                                                   Innovation Theater and Lounge
                                                   1:1 Success Clinics
                                                   Innovation Theater and Lounge
                                                   Need to relax? Have a massage!


                                     Check out the Partner Hub




                                              540 Howard Street

Survey (Session Record)             Cloud Crawl (Thursday Night)

                  Follow us on Twitter @partnerforce
Partner Hub – Speaker Debrief
Why Work With a PDO

 Partner
 Success
  Clinics




                          Welcome Desk
                                         Speaker
                                         Debrief
                                          Area
Building Secure Apps in the Cloud - Dreamforce - 9/20
Building Secure Apps in the Cloud - Dreamforce - 9/20

More Related Content

What's hot

Citrix and Desktop Migration Success
Citrix and Desktop Migration SuccessCitrix and Desktop Migration Success
Citrix and Desktop Migration Success
eG Innovations
 
How to Deliver Exceptional End User Experience in Your Citrix Environment
How to Deliver Exceptional End User Experience in Your Citrix EnvironmentHow to Deliver Exceptional End User Experience in Your Citrix Environment
How to Deliver Exceptional End User Experience in Your Citrix Environment
eG Innovations
 
4 Best Practices for Delivering Exceptional VDI User Experience
4 Best Practices for Delivering Exceptional VDI User Experience4 Best Practices for Delivering Exceptional VDI User Experience
4 Best Practices for Delivering Exceptional VDI User Experience
eG Innovations
 
How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?
eG Innovations
 
How to Obtain Peak Performance from Your Virtual Environment
How to Obtain Peak Performance from Your Virtual EnvironmentHow to Obtain Peak Performance from Your Virtual Environment
How to Obtain Peak Performance from Your Virtual Environment
eG Innovations
 
How to Ensure High-Performing Microsoft .NET Applications
How to Ensure High-Performing Microsoft .NET ApplicationsHow to Ensure High-Performing Microsoft .NET Applications
How to Ensure High-Performing Microsoft .NET Applications
eG Innovations
 
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
eG Innovations
 
How to Make Citrix Logons Faster?
How to Make Citrix Logons Faster?How to Make Citrix Logons Faster?
How to Make Citrix Logons Faster?
eG Innovations
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero
eG Innovations
 
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktopeG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
eG Innovations
 
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
eG Innovations
 
Ensure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View DeploymentsEnsure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View Deployments
eG Innovations
 
Citrix XenApp and XenDesktop Performance Management Made Easy
Citrix XenApp and XenDesktop Performance Management Made EasyCitrix XenApp and XenDesktop Performance Management Made Easy
Citrix XenApp and XenDesktop Performance Management Made Easy
eG Innovations
 
Enterprise Digital Transformation using APIs and Apps
Enterprise Digital Transformation using APIs and AppsEnterprise Digital Transformation using APIs and Apps
Enterprise Digital Transformation using APIs and Apps
WaveMaker, Inc.
 
Monitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOMMonitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOM
eG Innovations
 
Citrix Cloud Services - Are they right for you ?
Citrix Cloud Services - Are they right for you ?Citrix Cloud Services - Are they right for you ?
Citrix Cloud Services - Are they right for you ?
eG Innovations
 
Case study - Using OSGi within the salesforce.com Data Center Automation Init...
Case study - Using OSGi within the salesforce.com Data Center Automation Init...Case study - Using OSGi within the salesforce.com Data Center Automation Init...
Case study - Using OSGi within the salesforce.com Data Center Automation Init...
mfrancis
 
What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...
What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...
What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...
eG Innovations
 
eG Citrix Performance Management & Analytics IBM Webinar 040815
eG Citrix Performance Management & Analytics   IBM Webinar 040815eG Citrix Performance Management & Analytics   IBM Webinar 040815
eG Citrix Performance Management & Analytics IBM Webinar 040815
eG Innovations
 
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
eG Innovations
 

What's hot (20)

Citrix and Desktop Migration Success
Citrix and Desktop Migration SuccessCitrix and Desktop Migration Success
Citrix and Desktop Migration Success
 
How to Deliver Exceptional End User Experience in Your Citrix Environment
How to Deliver Exceptional End User Experience in Your Citrix EnvironmentHow to Deliver Exceptional End User Experience in Your Citrix Environment
How to Deliver Exceptional End User Experience in Your Citrix Environment
 
4 Best Practices for Delivering Exceptional VDI User Experience
4 Best Practices for Delivering Exceptional VDI User Experience4 Best Practices for Delivering Exceptional VDI User Experience
4 Best Practices for Delivering Exceptional VDI User Experience
 
How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?
 
How to Obtain Peak Performance from Your Virtual Environment
How to Obtain Peak Performance from Your Virtual EnvironmentHow to Obtain Peak Performance from Your Virtual Environment
How to Obtain Peak Performance from Your Virtual Environment
 
How to Ensure High-Performing Microsoft .NET Applications
How to Ensure High-Performing Microsoft .NET ApplicationsHow to Ensure High-Performing Microsoft .NET Applications
How to Ensure High-Performing Microsoft .NET Applications
 
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
 
How to Make Citrix Logons Faster?
How to Make Citrix Logons Faster?How to Make Citrix Logons Faster?
How to Make Citrix Logons Faster?
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero
 
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktopeG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktop
 
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
 
Ensure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View DeploymentsEnsure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View Deployments
 
Citrix XenApp and XenDesktop Performance Management Made Easy
Citrix XenApp and XenDesktop Performance Management Made EasyCitrix XenApp and XenDesktop Performance Management Made Easy
Citrix XenApp and XenDesktop Performance Management Made Easy
 
Enterprise Digital Transformation using APIs and Apps
Enterprise Digital Transformation using APIs and AppsEnterprise Digital Transformation using APIs and Apps
Enterprise Digital Transformation using APIs and Apps
 
Monitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOMMonitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOM
 
Citrix Cloud Services - Are they right for you ?
Citrix Cloud Services - Are they right for you ?Citrix Cloud Services - Are they right for you ?
Citrix Cloud Services - Are they right for you ?
 
Case study - Using OSGi within the salesforce.com Data Center Automation Init...
Case study - Using OSGi within the salesforce.com Data Center Automation Init...Case study - Using OSGi within the salesforce.com Data Center Automation Init...
Case study - Using OSGi within the salesforce.com Data Center Automation Init...
 
What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...
What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...
What's New in eG Enterprise v6 - Unified performance monitoring, diagnosis, a...
 
eG Citrix Performance Management & Analytics IBM Webinar 040815
eG Citrix Performance Management & Analytics   IBM Webinar 040815eG Citrix Performance Management & Analytics   IBM Webinar 040815
eG Citrix Performance Management & Analytics IBM Webinar 040815
 
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
 

Viewers also liked

Surrogate dependencies (in node js) v1.0
Surrogate dependencies  (in node js)  v1.0Surrogate dependencies  (in node js)  v1.0
Surrogate dependencies (in node js) v1.0
Dinis Cruz
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
Mohammed Danish Amber
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
bilcorry
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
Samvel Gevorgyan
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
AlgoSec
 
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best PracticesSecure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Websecurify
 
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
Priyanka Aash
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
Dinis Cruz
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
Scott Hurrey
 
Tectonic Summit 2016: Preparing for Cloud Native
Tectonic Summit 2016: Preparing for Cloud Native Tectonic Summit 2016: Preparing for Cloud Native
Tectonic Summit 2016: Preparing for Cloud Native
CoreOS
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
Amazon Web Services
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
Amazon Web Services
 
An Introduction to Kubernetes
An Introduction to KubernetesAn Introduction to Kubernetes
An Introduction to Kubernetes
Imesh Gunaratne
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
ColumnInformationSecurity
 
Tectonic Summit 2016: Kubernetes 1.5 and Beyond
Tectonic Summit 2016: Kubernetes 1.5 and BeyondTectonic Summit 2016: Kubernetes 1.5 and Beyond
Tectonic Summit 2016: Kubernetes 1.5 and Beyond
CoreOS
 
Orchestration tool roundup kubernetes vs. docker vs. heat vs. terra form vs...
Orchestration tool roundup   kubernetes vs. docker vs. heat vs. terra form vs...Orchestration tool roundup   kubernetes vs. docker vs. heat vs. terra form vs...
Orchestration tool roundup kubernetes vs. docker vs. heat vs. terra form vs...
Nati Shalom
 

Viewers also liked (16)

Surrogate dependencies (in node js) v1.0
Surrogate dependencies  (in node js)  v1.0Surrogate dependencies  (in node js)  v1.0
Surrogate dependencies (in node js) v1.0
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best PracticesSecure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best Practices
 
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
Train Like You’re Going to Fight—What Kind of Exercise Meets Your Needs?
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Tectonic Summit 2016: Preparing for Cloud Native
Tectonic Summit 2016: Preparing for Cloud Native Tectonic Summit 2016: Preparing for Cloud Native
Tectonic Summit 2016: Preparing for Cloud Native
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
An Introduction to Kubernetes
An Introduction to KubernetesAn Introduction to Kubernetes
An Introduction to Kubernetes
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
 
Tectonic Summit 2016: Kubernetes 1.5 and Beyond
Tectonic Summit 2016: Kubernetes 1.5 and BeyondTectonic Summit 2016: Kubernetes 1.5 and Beyond
Tectonic Summit 2016: Kubernetes 1.5 and Beyond
 
Orchestration tool roundup kubernetes vs. docker vs. heat vs. terra form vs...
Orchestration tool roundup   kubernetes vs. docker vs. heat vs. terra form vs...Orchestration tool roundup   kubernetes vs. docker vs. heat vs. terra form vs...
Orchestration tool roundup kubernetes vs. docker vs. heat vs. terra form vs...
 

Similar to Building Secure Apps in the Cloud - Dreamforce - 9/20

How to Distribute and License Your App for Commercial Success - Dreamforce 20...
How to Distribute and License Your App for Commercial Success - Dreamforce 20...How to Distribute and License Your App for Commercial Success - Dreamforce 20...
How to Distribute and License Your App for Commercial Success - Dreamforce 20...
Salesforce Partners
 
How a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market FasterHow a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market Faster
CodeScience
 
APP Academy: Build Your First App (October 13, 2014)
APP Academy: Build Your First App (October 13, 2014)APP Academy: Build Your First App (October 13, 2014)
APP Academy: Build Your First App (October 13, 2014)
Salesforce Partners
 
Dreamwares salesforce (Updated)
Dreamwares salesforce (Updated)Dreamwares salesforce (Updated)
Dreamwares salesforce (Updated)
Amit Ahuja
 
Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...
Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...
Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...
CodeScience
 
Workbench: The API Swiss Army Knife
Workbench: The API Swiss Army KnifeWorkbench: The API Swiss Army Knife
Workbench: The API Swiss Army Knife
Salesforce Developers
 
DevOps in Salesforce AppCloud
DevOps in Salesforce AppCloudDevOps in Salesforce AppCloud
DevOps in Salesforce AppCloud
rsg00usa
 
Emerging Technologies: Heroku for ISVs (October 13, 2014)
Emerging Technologies: Heroku for ISVs (October 13, 2014)Emerging Technologies: Heroku for ISVs (October 13, 2014)
Emerging Technologies: Heroku for ISVs (October 13, 2014)
Salesforce Partners
 
CloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.comCloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.com
Alistair Croll
 
Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)
Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)
Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)
Salesforce Partners
 
ISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning Components
CodeScience
 
Starting A Successful ISV Business with Salesforce (October 13, 2014)
Starting A Successful ISV Business with Salesforce (October 13, 2014)Starting A Successful ISV Business with Salesforce (October 13, 2014)
Starting A Successful ISV Business with Salesforce (October 13, 2014)
Salesforce Partners
 
Using Node.js for Mocking Apex Web Services
Using Node.js for Mocking Apex Web ServicesUsing Node.js for Mocking Apex Web Services
Using Node.js for Mocking Apex Web Services
Jeff Douglas
 
Staying Ahead of the Curve with Lightning - Snowforce16 Keynote
Staying Ahead of the Curve with Lightning - Snowforce16 KeynoteStaying Ahead of the Curve with Lightning - Snowforce16 Keynote
Staying Ahead of the Curve with Lightning - Snowforce16 Keynote
Salesforce Admins
 
Salesforce Campus Tour - Developer Intro
Salesforce Campus Tour - Developer IntroSalesforce Campus Tour - Developer Intro
Salesforce Campus Tour - Developer Intro
James Ward
 
Building for the AppExchange
Building for the AppExchangeBuilding for the AppExchange
Building for the AppExchange
Salesforce Developers
 
DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014
DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014
DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014
Mudit Agarwal
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
Ryan Flood
 
DF15 Partner Zone (Replay!) Guide
DF15 Partner Zone (Replay!) GuideDF15 Partner Zone (Replay!) Guide
DF15 Partner Zone (Replay!) Guide
Salesforce Partners
 
An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)
Salesforce Partners
 

Similar to Building Secure Apps in the Cloud - Dreamforce - 9/20 (20)

How to Distribute and License Your App for Commercial Success - Dreamforce 20...
How to Distribute and License Your App for Commercial Success - Dreamforce 20...How to Distribute and License Your App for Commercial Success - Dreamforce 20...
How to Distribute and License Your App for Commercial Success - Dreamforce 20...
 
How a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market FasterHow a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market Faster
 
APP Academy: Build Your First App (October 13, 2014)
APP Academy: Build Your First App (October 13, 2014)APP Academy: Build Your First App (October 13, 2014)
APP Academy: Build Your First App (October 13, 2014)
 
Dreamwares salesforce (Updated)
Dreamwares salesforce (Updated)Dreamwares salesforce (Updated)
Dreamwares salesforce (Updated)
 
Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...
Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...
Wrestling Alligators: How Salesforce Partners Can Increase Close Rates & Deli...
 
Workbench: The API Swiss Army Knife
Workbench: The API Swiss Army KnifeWorkbench: The API Swiss Army Knife
Workbench: The API Swiss Army Knife
 
DevOps in Salesforce AppCloud
DevOps in Salesforce AppCloudDevOps in Salesforce AppCloud
DevOps in Salesforce AppCloud
 
Emerging Technologies: Heroku for ISVs (October 13, 2014)
Emerging Technologies: Heroku for ISVs (October 13, 2014)Emerging Technologies: Heroku for ISVs (October 13, 2014)
Emerging Technologies: Heroku for ISVs (October 13, 2014)
 
CloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.comCloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.com
 
Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)
Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)
Cloud Academy: Planning for Success as a Consulting Partner (October 13, 2014)
 
ISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning ComponentsISV Tech Talk: Distributing Lightning Components
ISV Tech Talk: Distributing Lightning Components
 
Starting A Successful ISV Business with Salesforce (October 13, 2014)
Starting A Successful ISV Business with Salesforce (October 13, 2014)Starting A Successful ISV Business with Salesforce (October 13, 2014)
Starting A Successful ISV Business with Salesforce (October 13, 2014)
 
Using Node.js for Mocking Apex Web Services
Using Node.js for Mocking Apex Web ServicesUsing Node.js for Mocking Apex Web Services
Using Node.js for Mocking Apex Web Services
 
Staying Ahead of the Curve with Lightning - Snowforce16 Keynote
Staying Ahead of the Curve with Lightning - Snowforce16 KeynoteStaying Ahead of the Curve with Lightning - Snowforce16 Keynote
Staying Ahead of the Curve with Lightning - Snowforce16 Keynote
 
Salesforce Campus Tour - Developer Intro
Salesforce Campus Tour - Developer IntroSalesforce Campus Tour - Developer Intro
Salesforce Campus Tour - Developer Intro
 
Building for the AppExchange
Building for the AppExchangeBuilding for the AppExchange
Building for the AppExchange
 
DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014
DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014
DF14-So Many Features Dreamforce ’14 Presentation FINAL-Monday-13OCT2014
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
 
DF15 Partner Zone (Replay!) Guide
DF15 Partner Zone (Replay!) GuideDF15 Partner Zone (Replay!) Guide
DF15 Partner Zone (Replay!) Guide
 
An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)
 

More from Salesforce Partners

ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)
Salesforce Partners
 
Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)
Salesforce Partners
 
Lightning Now for Consulting Partners
Lightning Now for Consulting PartnersLightning Now for Consulting Partners
Lightning Now for Consulting Partners
Salesforce Partners
 
ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)
Salesforce Partners
 
Salesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification PathsSalesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification Paths
Salesforce Partners
 
Salesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for AdministratorsSalesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for Administrators
Salesforce Partners
 
Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)
Salesforce Partners
 
Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)
Salesforce Partners
 
Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)
Salesforce Partners
 
Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)
Salesforce Partners
 
Salesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam PrepSalesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam Prep
Salesforce Partners
 
Einstein Analytics for Partners
Einstein Analytics for PartnersEinstein Analytics for Partners
Einstein Analytics for Partners
Salesforce Partners
 
Sales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best PracticesSales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best Practices
Salesforce Partners
 
AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017
Salesforce Partners
 
Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)
Salesforce Partners
 
FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)
Salesforce Partners
 
AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages
Salesforce Partners
 
ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)
Salesforce Partners
 
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Salesforce Partners
 
FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1
Salesforce Partners
 

More from Salesforce Partners (20)

ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)
 
Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)
 
Lightning Now for Consulting Partners
Lightning Now for Consulting PartnersLightning Now for Consulting Partners
Lightning Now for Consulting Partners
 
ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)
 
Salesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification PathsSalesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification Paths
 
Salesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for AdministratorsSalesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for Administrators
 
Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)
 
Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)
 
Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)
 
Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)
 
Salesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam PrepSalesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam Prep
 
Einstein Analytics for Partners
Einstein Analytics for PartnersEinstein Analytics for Partners
Einstein Analytics for Partners
 
Sales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best PracticesSales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best Practices
 
AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017
 
Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)
 
FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)
 
AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages
 
ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)
 
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
 
FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1
 

Recently uploaded

The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 

Recently uploaded (20)

The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 

Building Secure Apps in the Cloud - Dreamforce - 9/20

  • 1. Building Secure Applications in the Cloud James Dolph, Salesforce.com, Product Security Senior Manager @SecureCloudDev
  • 2. Safe harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of intellectual property and other litigation, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10- Q for the most recent fiscal quarter ended July 31, 2012. This documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 3. Agenda •  Philosophy and overview •  Resources and tips •  Collaborate and get help •  Takeaways
  • 5. Nothing is more important to our company than the privacy of our customer's data -Parker Harris Executive VP, Technology Salesforce.com
  • 6. In the news 1.5 Million Hotel chain BitCoin bank credit card multiple hacked numbers stolen compromises •  $250K stolen •  Stock dropped •  $10.6m in Fraud •  Suspended operations •  Visa dropped from •  FTC fine compliant list •  600k+ accounts
  • 7. Security Review •  Mandatory •  Enterprise level •  Application Focused
  • 8. What’s in scope Force.com Native: Apex, Visualforce, Anything in a package. Web Apps: Application or web service hosted on Heroku, other PAAS or hosting provider. PAAS Web Client and Applications Mobile Apps Client and Mobile: Apps installed on customer computers, mobile devices or data center.
  • 9. What we test •  Automated code scan •  Manual code review and black box testing •  Client side components (Flash. JavaScript) •  Integrations and web services •  Automated testing and manual black box testing Web •  Client side components (Flash, JavaScript) Applications •  Integrations and web services •  Architecture review and web server testing •  Manual hands on testing of the application Client and •  Integrations and web services Mobile Apps •  Architecture review and web server testing
  • 10. OWASP Top 10 (2010) 1.  Injection (SQLi, XML, LDAP etc.) 2.  Cross Site Scripting (XSS) 3.  Broken Authentication and Session Management 4.  Insecure Direct Object References 5.  Cross Site Request Forgery (CSRF) 6.  Security Misconfiguration 7.  Insecure Cryptographic Storage 8.  Failure to Restrict URL Access (e.g. admin pages) 9.  Insufficient Transport Layer Protection (SSL, Config) 10.  Unvalidated Redirects and Forwards
  • 11. ISV Security Review Outcomes Approved: •  Meets our requirements •  Offering can be listed on the AppExchange •  Subsequent review is scheduled Provisionally Approved (very rarely issued): •  Meets our requirements but may have very low risk issues as determined by review team •  The offering can be temporarily listed on the AppExchange •  Failure to remedy issues in a timely manner results in removal from the AppExchange Not Approved: • Does not meet our requirements • New Partners are not permitted to list on AppExchange until all issues are fixed • Existing offerings are delisted from the AppExchange if they fail to remediate issues
  • 12. Why do offerings pass or fail Why offerings pass Why offerings don’t pass • Early testing and prep • Lack of testing and prep • Understanding • Misunderstanding requirements requirements • Understanding scope • Limiting scope • Use ISV resources • Not using ISV resources
  • 14. Secure Cloud Development http://developer.force.com/security • Secure Coding Guidelines • Secure Coding Library • Security Self-Assessment • Partner security office hours • Force.com Security Code Scanner • ISV program partners receive a free web application scanning tool license
  • 15. Native app security tips •  Business logic issues •  Client side issues •  Flash and Silverlight •  Merge fields in JavaScript blocks or on* methods •  S-Controls and custom buttons/links •  Secure callouts / secure JS includes Native •  Secure storage of data
  • 16. Web app and client app tips •  Business logic issues •  Multitenancy access control enforcement •  CSRF •  Client side issues •  Flash and Silverlight issues •  Secure JS includes Composite and Client •  Secure storage of credentials, tokens, and keys
  • 18. Collaborate and get help •  Secure Cloud Development •  Force.com discussion boards •  Partner Portal •  Twitter @SecureCloudDev •  ISV Office hours •  Email
  • 19. ISV Office Hours http://bit.ly/ISVSecurityOfficeHours
  • 21. Takeaways •  We want you to succeed •  Preparation is key •  Take advantage of our resources •  Give yourself time •  We’re here to help
  • 23. DF12 ISV Success Sessions Great sessions for each phase of the lifecycle Plan Build Distribute Sell Support ISV Kickoff: Getting Started Distributing & Licensing Your App How to Support Your Customers How to Architect & Design Your App Automate Your App Sales ISV PM Product Roadmap Designing Social Apps (Workshop) Extend Your Commercial Force.com App Expanding Your Marketing Reach with AppExchange Team Development and Release Mgmt Marketing Best Practices in the Social Era Building Secure Applications in the Cloud Mastering the Direct Sales Model Selling Social Apps Follow sessions and join the Partner Success Group on
  • 24. A Few Reminders. . . Why Work With a PDO Partner Success Experts Innovation Theater and Lounge 1:1 Success Clinics Innovation Theater and Lounge Need to relax? Have a massage! Check out the Partner Hub 540 Howard Street Survey (Session Record) Cloud Crawl (Thursday Night) Follow us on Twitter @partnerforce
  • 25. Partner Hub – Speaker Debrief Why Work With a PDO Partner Success Clinics Welcome Desk Speaker Debrief Area