To prepare composite applications with external integrations for security review, follow these steps:
1. **Access and Components**: Provide access to all environments, packages, and external components, including web applications, services, client/mobile apps, and any Apex or Visualforce in the solution.
2. **Security Scans**: Submit security scan reports, such as Dynamic Application Security Test (DAST) reports, and document any false positives with explanations.
3. **Permissions**: Enforce CRUD/FLS permissions, especially for custom objects and protected custom settings. Use "user mode" and proper permission sets for access control.
4. **Testing**: Conduct thorough testing using manual methods and automated security scanners. Include all external endpoints that operate independently of Salesforce.
5. **Authentication**: Provide URLs and login credentials for components requiring authentication. If third-party SSO providers are used, ensure their security is reviewed.
6. **Vulnerability Mitigation**: Address common vulnerabilities like CSRF, XSS, and insecure data storage. Follow secure coding practices and the security review guide.
7. **Tools**: Use tools like Salesforce Code Analyzer and Source Code Scanner from the Partner Security Portal to identify and fix vulnerabilities.
8. **Documentation**: Include detailed solution documentation, security policies, and any required credentials or installation links for external components.
By adhering to these guidelines, your composite application will be well-prepared for the security review process.