For applications that integrate with external services and API connectors, the following security considerations and review process apply:
**Security Considerations:**
1. **Third-Party SSO**: If using a third-party Single Sign-On (SSO) provider, both the application and the provider will be reviewed for secure implementation.
2. **Credential Storage**:
- **Client Applications**: Credentials must not be stored in clear text or insecure locations (e.g., property files or logs). Use vendor-provided keychains or keystores.
- **Server Applications**: Encrypt credentials using AES-128 or higher, and store encryption keys securely, separate from the database layer.
3. **Secure Communication**: All callouts to external services must use HTTPS to ensure secure data transmission.
4. **Sensitive Data Handling**: Avoid writing sensitive data, including authentication credentials, to debug logs or storing them in unencrypted form.
5. **Static and Dynamic Resources**: Store static resources in the static resources folder. Ensure dynamic resources loaded from third parties do not result in dynamic content.
6. **Session Management and Secure Coding**: Follow proper session management and secure coding practices to prevent vulnerabilities like SOQL injection or insecure data storage.
**Review Process:**
1. **Full Scope Testing**: The review covers the entire solution, including external endpoints interacting with Salesforce data.
2. **Secure Data Transfer**: External endpoints must securely transfer credentials and data, adhering to security guidelines.
3. **Penetration Testing and Scans**: These endpoints undergo penetration testing and automated security scans.
4. **Partner Testing**: Partners must conduct their own testing, document false positives, and resolve vulnerabilities before submission.
5. **Third-Party Permissions**: Permissions must be obtained for testing any third-party endpoints.
6. **Submission and Feedback**: Applications are submitted via the AppExchange Partner Console, where the status can be tracked, and feedback addressed.
7. **Vulnerability Remediation**: Any identified vulnerabilities must be fixed, and a follow-up review may be required.
These measures are critical to maintaining the security of applications with external integrations and ensuring the protection of customer data.