FAQ-000405 - Community and Experience Cloud Security / Security Review and Compliance

Current Status:VALID_RESPONSEErrorUnable to AnswerSuggests Case

Current FAQ

Question
How should community-developed applications handle security review requirements?
Answer
Community-developed applications must follow Salesforce's security review requirements to ensure they meet industry best practices. Here's how to handle these requirements: 1. **Secure Development**: Adhere to industry best practices for securing the application and ensure it is Lightning Ready. 2. **Testing**: Use both automated security scanning tools and manual testing throughout the development lifecycle to identify vulnerabilities. 3. **Submission Materials**: Provide all required materials during submission, including: - Test environments - Documentation - Security scan reports (with explanations for any false positives) 4. **External Components**: If the application includes external components, provide access credentials and URLs for testing. 5. **Mobile Apps**: Meet platform-specific requirements, such as provisioning test versions for iOS or Android. 6. **Security Review Process**: The review evaluates the application's ability to protect customer data and identify vulnerabilities. Collaborate with a designated security expert during development to prevent security violations. 7. **Addressing Vulnerabilities**: Fix any identified vulnerabilities before resubmitting the application. 8. **Partner Security Portal**: Use tools like the Source Code Scanner and attend office hours for guidance on addressing security issues. These steps help ensure your application meets Salesforce's security standards.
Enhancing FAQ...

Enhancing FAQ with AI recommendations...

AI Recommended Enhancement

Related Security Rules (click to view)
ApexBadCryptoApexCRUDViolationApexCSRFApexSOQLInjectionApexXSSFromEscapeFalseApexXSSFromURLParamApexSharingViolationsAvoidHardcodedCredentialsInFieldDeclsAvoidHardcodedCredentialsInVarDeclsAvoidInsecureHttpRemoteSiteSettingApexSuggestUsingNamedCredVfCsrfVfUnescapeEl
Question
How should community-developed applications handle security review requirements?
Recommended Answer Update
Community-developed applications must follow Salesforce's security review requirements to ensure they meet industry best practices. Here's how to handle these requirements: 1. **Secure Development**: Follow industry best practices for securing your application and ensure it's Lightning Ready. 2. **Testing**: Use both automated security scanning tools and manual testing throughout the development lifecycle to identify vulnerabilities. 3. **Submission Materials**: Provide all required materials during submission, including: - Test environments - Documentation - Security scan reports (with explanations for any false positives) 4. **External Components**: If your application includes external components, provide access credentials and URLs for testing. 5. **Mobile Apps**: Meet platform-specific requirements, such as provisioning test versions for iOS or Android. 6. **Security Review Process**: The review evaluates your application's ability to protect customer data and identify vulnerabilities. Collaborate with a designated security expert during development to prevent security violations. 7. **Addressing Vulnerabilities**: Fix any identified vulnerabilities before resubmitting your application. 8. **Partner Security Portal**: Use tools like the Source Code Scanner and attend office hours for guidance on addressing security issues. These steps help ensure your application meets Salesforce's security standards.
Reasoning
The FAQ content is solid and comprehensive. I made minor wording improvements for clarity and conciseness: changed 'Adhere to' to 'Follow' for simpler language, and 'the application' to 'your application' for a more conversational tone that aligns with the brand guidelines. The technical content is current and accurate. For security rules, I selected rules that directly relate to the common vulnerabilities and secure development practices this FAQ addresses: - ApexBadCrypto: The FAQ mentions secure development and protecting customer data, which includes proper cryptographic practices - ApexCRUDViolation: Secure development includes proper CRUD/FLS enforcement - ApexCSRF: CSRF protection is a fundamental security practice for applications - ApexSOQLInjection: SOQL injection prevention is critical for data protection - ApexXSSFromEscapeFalse and ApexXSSFromURLParam: XSS prevention relates to protecting customer data - ApexSharingViolations: Proper sharing model implementation is essential for data security - AvoidHardcodedCredentialsInFieldDecls and AvoidHardcodedCredentialsInVarDecls: The FAQ mentions security best practices, which includes avoiding hardcoded credentials - AvoidInsecureHttpRemoteSiteSetting: Secure endpoints are part of industry best practices - ApexSuggestUsingNamedCred: Proper credential management is a security best practice - VfCsrf and VfUnescapeEl: For applications using Visualforce, these are important security considerations
Reasoning References