Creating secure integrations : case of Salesforce integrations
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Organisation's demand for digital transformation is increasing. These days organisations are seeking ways to centralise their systems and operations. The need for cloud-based Customer Relationship Management (CRM) systems is, without a doubt increasing. These cloud-based systems offer many benefits like security by design and cost efficiency. Salesforce is the world's leading CRM platform, and it offers a high level of security and a large variety of functionalities to extend security even further. However, integrations between Salesforce and third-party software create vulnerabilities that organisations and developers creating integrations need to consider. Organisations need to implement integration security into their information security policy (ISP) and obligate those creating integrations to follow security standards and best practices. Increasing security knowledge and resources will help transition towards more secure integrations. This research finds out whether organisations and developers are considering security while creating integrations. The research includes a case study where organisations and developers were asked about their integration security expertise and where they think the responsibility of secure integrations lies. The research aimed to provide security best practices for integration creation and insight into sharing responsibilities between different stakeholders. Research showed that the size of the organisation and the developer's information technology experience correlate with their security knowledge. However, results also show that organisations and developers do not focus on integration security as much as needed. This research recognised a need for further research due to the significant lack of research on the topic. ...
vulnerabilities integrations integration security secure development security responsibilities Salesforce cloud security tietoturva organisaatiot turvallisuus kyberturvallisuus pilvipalvelut hyvät käytännöt tietotekniikka digitalisaatio turvallisuuspolitiikka tietojärjestelmät data security organisations (systems) safety and security cyber security cloud services best practices information technology digitalisation security policy data systems
MetadataShow full item record
- Pro gradu -tutkielmat 
Showing items with similar title or keywords.
Information Technology–Supported value Co-Creation and Co-Destruction via social interaction and resource integration in service systems Li, Mengcheng; Tuunanen, Tuure (Elsevier BV, 2022)The paper develops a conceptual framework to study the constructs of information technology (IT)-supported value co-creation and co-destruction through shared processes of social interaction and resource integration as ...
Hirvonen, Pauliina (2016)Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ...
Lönnqvist, Irina; Moilanen, Panu (Jyväskylän yliopisto, 2018)
Karisaari, Jussi-Pekka (2022)Digitalisaatio on tehnyt tietojärjestelmistä ja IT-laitteista yhä yleisempiä työkaluja pienten yritysten liiketoiminnassa. Erityisesti älylaitteiden lukumäärän kasvu on edesauttanut tätä kehitystä. Tämä asettaa kuitenkin ...
Yang, Yaping (2018)The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics ...