Creating secure integrations : case of Salesforce integrations
Tekijät
Päivämäärä
2022Tekijänoikeudet
Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.
Organisation's demand for digital transformation is increasing. These days organisations are seeking ways to centralise their systems and operations. The need for cloud-based Customer Relationship Management (CRM) systems is, without a doubt increasing. These cloud-based systems offer many benefits like security by design and cost efficiency. Salesforce is the world's leading CRM platform, and it offers a high level of security and a large variety of functionalities to extend security even further. However, integrations between Salesforce and third-party software create vulnerabilities that organisations and developers creating integrations need to consider.
Organisations need to implement integration security into their information security policy (ISP) and obligate those creating integrations to follow security standards and best practices. Increasing security knowledge and resources will help transition towards more secure integrations.
This research finds out whether organisations and developers are considering security while creating integrations. The research includes a case study where organisations and developers were asked about their integration security expertise and where they think the responsibility of secure integrations lies. The research aimed to provide security best practices for integration creation and insight into sharing responsibilities between different stakeholders.
Research showed that the size of the organisation and the developer's information technology experience correlate with their security knowledge. However, results also show that organisations and developers do not focus on integration security as much as needed. This research recognised a need for further research due to the significant lack of research on the topic.
...
Asiasanat
vulnerabilities integrations integration security secure development security responsibilities Salesforce cloud security tietoturva organisaatiot turvallisuus kyberturvallisuus pilvipalvelut hyvät käytännöt tietotekniikka digitalisaatio turvallisuuspolitiikka tietojärjestelmät data security organisations (systems) safety and security cyber security cloud services best practices information technology digitalisation security policy data systems
Metadata
Näytä kaikki kuvailutiedotKokoelmat
- Pro gradu -tutkielmat [29561]
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Information Technology–Supported value Co-Creation and Co-Destruction via social interaction and resource integration in service systems
Li, Mengcheng; Tuunanen, Tuure (Elsevier BV, 2022)The paper develops a conceptual framework to study the constructs of information technology (IT)-supported value co-creation and co-destruction through shared processes of social interaction and resource integration as ... -
The determinants affecting on the investment proposals adoption
Hirvonen, Pauliina (2016)Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ... -
Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle
Lönnqvist, Irina; Moilanen, Panu (Jyväskylän yliopisto, 2018) -
Keskisuomalaisten mikrokokoisten tilitoimistojen kyberturvallisuuskompetenssi
Karisaari, Jussi-Pekka (2022)Digitalisaatio on tehnyt tietojärjestelmistä ja IT-laitteista yhä yleisempiä työkaluja pienten yritysten liiketoiminnassa. Erityisesti älylaitteiden lukumäärän kasvu on edesauttanut tätä kehitystä. Tämä asettaa kuitenkin ... -
Literature review of information security practice survey reports
Yang, Yaping (2018)The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.