Tl security icon.png Security Resources
The platform and Salesforce CRM suite of applications include a wide variety of security features and configuration settings. This page introduces Secure Cloud Development, a new suite of tools, training and processes to help all developers get started building trusted applications. Get started below by taking our training and following it up by assessing your knowledge with our developer security quiz.

Grn arrow.gif Introduction to Security
Grn arrow.gif Security Cheat Sheet
Grn arrow.gif Writing Secure Apps Training
Grn arrow.gif Developer Security Quiz
Grn arrow.gif Whitepaper: Secure, private, and trustworthy: enterprise cloud computing with Secure Cloud Development: Design > Development > Testing > Release

55X55-Architect.png  Design 55X55-Logic.png  Development
Catching security flaws at this stage will save your company serious time and effort in the future.

Setting strong requirements or guidelines at this stage will help to ensure that your development team has written code with security in mind.

Grn arrow.gif Security Design Resources Grn arrow.gif Secure Coding Guidelines
Grn arrow.gif Self Assessment Tool Grn arrow.gif Security Coding Library
Grn arrow.gif Book Office Hours
55X55-Tools.png  Testing 55X55-AppDistribution.png  Release
Focus your efforts on ensuring that the requirements have been followed and nothing slipped through the cracks.

Now that you’re ready to release, you’ll need a plan to address any security flaws found internally and externally.

Grn arrow.gif Security Source Scanner Grn arrow.gif ISV Partner Security Review Process
Grn arrow.gif Web Application Security Scanner Grn arrow.gif Incident Response (Coming Soon)

Administration More Help
Security Implementation Guide
Security in the Cloud: Protecting Your Business Security Discussion Board
Security Health Check About Secure Cloud Development
Security Audit Guide Salesforce Security For IT Execs
Securing Salesforce Portals CRM Security Cheat Sheet
Secure Cloud Development FAQ

Other Articles and Resources
Implementing Single Sign-On Across Multiple Organizations
Single Sign-On for Desktop and Mobile Applications using SAML and OAuth
Single Sign-On with SAML on
How to Implement Single Sign-On with
Single Sign-On for Salesforce Clients
Single Sign-On Implementation Guide
Single Sign On for Composite Apps

Blogs tagged "security"