To scan external endpoints that integrate with Salesforce applications, you must:
1. Include all external endpoints in the security testing scope, especially those that authenticate users or transfer Salesforce data.
2. Obtain permission from third-party owners before testing external endpoints you do not own.
3. Use Dynamic Application Security Test (DAST) tools like ZAP, Burp Suite, HCL AppScan, or WebInspect to identify vulnerabilities.
4. Include the scan reports in your security review submission.
5. Document any false positives and ensure all code complies with Salesforce security guidelines.
6. Obtain Permissions: Get consent from third-party owners if the endpoints are not owned by you, allowing you to conduct security assessments.
7. Exercise Endpoints: Ensure the endpoints are fully exercised during the scan to uncover the complete attack surface. This includes routing traffic through the scanner's proxy and performing active scans.
8. Generate a Report: Export a detailed report after the scan, including the scan date, targeted endpoints, and findings.
9. Endpoint Control: If the endpoint is part of the security review, ensure you have control over it or that the owner consents to the review and commits to addressing any issues found.
10. Follow Guidelines: Adhere to Salesforce's external security testing guidelines, such as using TLS v1.2 or above and securely handling session IDs.
These steps are essential to meet security review requirements and maintain the application's security integrity.