# Salesforce Best Practices When using S-Docs

#### Salesforce Access & Security Best Practices

| **Best Practice**                     | **Core Details**                                                                                                                                                                                                                 | **Official Documentation**                                                                                                                                                                                                                                                                                                                         |
| ------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Use Profiles for Baseline Permissions | <p>• Assign profiles to define a user's absolute minimum baseline access.</p><p><br></p><p>• Limit permissions strictly based on core job roles.</p><p><br></p><p>• Apply the "Least Privilege" principle.</p>                   | [User Profiles](https://help.salesforce.com/s/articleView?id=ind.tpm_user_profiles.htm\&language=en_US\&type=5)                                                                                                                                                                                                                                    |
| Utilize Permission Sets & Groups      | <p>• Assign permission sets to grant extra access without modifying profiles.</p><p><br></p><p>• Helps avoid messy and excessive profile creation.</p>                                                                           | [Create, Edit, Delete, and Assign a Permission Set](https://help.salesforce.com/s/articleView?id=000386289\&language=en_US\&type=1)                                                                                                                                                                                                                |
| Leverage Role Hierarchies             | <p>• Define roles to control record visibility vertically.</p><p><br></p><p>• Higher roles inherit access from lower roles, but do not override object-level security.</p>                                                       | [Add Roles to the Role Hierarchy](https://help.salesforce.com/s/articleView?id=000384747\&language=en_US\&type=1)                                                                                                                                                                                                                                  |
| Implement OWD & Sharing Rules         | <p>• Set Organization-Wide Defaults (OWD) to restrict baseline access (e.g., Private).</p><p><br></p><p>• Use Sharing Rules to grant additional access laterally.</p>                                                            | [Organization-Wide Sharing Defaults](https://help.salesforce.com/s/articleView?id=platform.security_sharing_owd_about.htm\&language=en_US\&type=5)                                                                                                                                                                                                 |
| Enforce Field-Level Security (FLS)    | <p>• Restrict the visibility and edibility of sensitive fields at the profile or permission set level.</p><p><br></p><p>• Prevent unauthorized viewing of critical data.</p>                                                     | <p><a href="https://help.salesforce.com/s/articleView?id=platform.users_fields_fls.htm&#x26;language=en_US&#x26;type=5">Set Field-Level Security for a Field</a></p><p><br></p><p><a href="https://help.salesforce.com/s/articleView?id=platform.users_fields_fls_permsets.htm&#x26;language=en_US&#x26;type=5">Set FLS on Permission Sets</a></p> |
| Separate Object & Record Access       | <p>• <em>Object-level:</em> Determines if a user can see/edit the object at all (Profiles/Perm Sets).</p><p><br></p><p>• <em>Record-level:</em> Determines <em>which</em> specific records they can see (OWD/Roles/Sharing).</p> | [Data Access and Security Overview](https://help.salesforce.com/s/articleView?id=platform.security_owd_external.htm\&language=en_US\&type=5)                                                                                                                                                                                                       |
| Audit & Monitor System Usage          | <p>• Use Setup Audit Trail and Field History Tracking.</p><p><br></p><p>• Review user access and system changes periodically.</p>                                                                                                | [Setup Audit Trail](https://help.salesforce.com/s/articleView?id=xcloud.admin_monitorsetup.htm\&type=5)                                                                                                                                                                                                                                            |
| Mandate Multi-Factor Auth (MFA)       | • Enforce Multi-Factor Authentication (MFA) to add an essential extra security layer.                                                                                                                                            | [Verification Methods for Multi-Factor Authentication](https://help.salesforce.com/s/articleView?id=xcloud.mfa_supported_verification_methods.htm\&language=en_US\&type=5)                                                                                                                                                                         |
| Minimize System Admins                | <p>• Limit the System Administrator role strictly to essential personnel.</p><p><br></p><p>• Audit users with “Modify All Data” permissions (Consider Delegated Admins</p>                                                       | [Define Delegate Administrators](https://help.salesforce.com/s/articleView?id=platform.delegating_user_administration.htm\&language=en_US\&type=5)                                                                                                                                                                                                 |


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.sdocs.com/sdocs/administration/landing-page-for-admin/security/salesforce-best-practices-when-using-s-docs.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
