FAQ-000942 - External Service Security Testing / Specific Security Testing Requirements

Current Status:VALID_RESPONSEErrorUnable to AnswerSuggests Case

Current FAQ

Question
Are security scans required for Salesforce-based APIs versus external website scans?
Answer
Yes, security scans are required for both Salesforce-based APIs and external website scans: - **Salesforce-based APIs**: Tools like the Source Code Scanner (Checkmarx) are used to identify vulnerabilities in Apex, Visualforce, and Lightning code. - **External Websites or Endpoints**: Dynamic Application Security Test (DAST) scanners such as ZAP, Burp Suite, or similar tools are required to ensure secure data transfer and endpoint security. Both types of scans are necessary to meet Salesforce's security review standards.
Enhancing FAQ...

Enhancing FAQ with AI recommendations...

AI Recommended Enhancement

Related Security Rules (click to view)
ApexInsecureEndpointApexSuggestUsingNamedCredAvoidHardcodedCredentialsInHttpHeaderUseHttpsCallbackUrlConnectedAppAvoidInsecureHttpRemoteSiteSetting
Question
Are security scans required for Salesforce-based APIs versus external website scans?
Recommended Answer Update
Yes, security scans are required for both Salesforce-based APIs and external website scans: - **Salesforce-based APIs**: Tools like the Source Code Scanner (Checkmarx) are used to identify vulnerabilities in Apex, Visualforce, and Lightning code. - **External Websites or Endpoints**: Dynamic Application Security Testing (DAST) scanners such as ZAP, Burp Suite, or similar tools are required to ensure secure data transfer and endpoint security. Both types of scans are necessary to meet Salesforce's security review standards.
Reasoning
The FAQ content is accurate and well-structured, so minimal changes are needed. The answer clearly addresses both Salesforce-based API scanning and external endpoint scanning requirements. I selected five related security rules that directly relate to the technical content: 1. **ApexInsecureEndpoint** - This rule directly relates to the FAQ's discussion of Salesforce-based API security scanning, as it detects insecure HTTP endpoints in Apex code, which would be caught by the Source Code Scanner mentioned. 2. **ApexSuggestUsingNamedCred** - This rule relates to the API security aspects discussed in the FAQ, as it promotes secure credential management for API connections, which is part of what security scans evaluate. 3. **AvoidHardcodedCredentialsInHttpHeader** - This rule directly connects to the FAQ's mention of secure data transfer and endpoint security, as it prevents hardcoded credentials in HTTP headers during API communications. 4. **UseHttpsCallbackUrlConnectedApp** - This rule relates to the FAQ's emphasis on secure endpoint security and the requirement for HTTPS in API communications. 5. **AvoidInsecureHttpRemoteSiteSetting** - This rule connects to the FAQ's discussion of external endpoint security, ensuring that remote site settings use secure HTTPS protocols. The original answer effectively covers both scanning requirements without being overly verbose, and maintains the appropriate level of technical detail for the target audience.
Reasoning References