dc.contributor.advisor | Frantti, Tapio | |
dc.contributor.author | Jallow, Musa | |
dc.date.accessioned | 2022-11-08T08:32:55Z | |
dc.date.available | 2022-11-08T08:32:55Z | |
dc.date.issued | 2022 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/83815 | |
dc.description.abstract | Organisation's demand for digital transformation is increasing. These days organisations are seeking ways to centralise their systems and operations. The need for cloud-based Customer Relationship Management (CRM) systems is, without a doubt increasing. These cloud-based systems offer many benefits like security by design and cost efficiency. Salesforce is the world's leading CRM platform, and it offers a high level of security and a large variety of functionalities to extend security even further. However, integrations between Salesforce and third-party software create vulnerabilities that organisations and developers creating integrations need to consider.
Organisations need to implement integration security into their information security policy (ISP) and obligate those creating integrations to follow security standards and best practices. Increasing security knowledge and resources will help transition towards more secure integrations.
This research finds out whether organisations and developers are considering security while creating integrations. The research includes a case study where organisations and developers were asked about their integration security expertise and where they think the responsibility of secure integrations lies. The research aimed to provide security best practices for integration creation and insight into sharing responsibilities between different stakeholders.
Research showed that the size of the organisation and the developer's information technology experience correlate with their security knowledge. However, results also show that organisations and developers do not focus on integration security as much as needed. This research recognised a need for further research due to the significant lack of research on the topic. | en |
dc.format.extent | 108 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.subject.other | vulnerabilities | |
dc.subject.other | integrations | |
dc.subject.other | integration security | |
dc.subject.other | secure development | |
dc.subject.other | security responsibilities | |
dc.subject.other | Salesforce | |
dc.subject.other | cloud security | |
dc.title | Creating secure integrations : case of Salesforce integrations | |
dc.identifier.urn | URN:NBN:fi:jyu-202211085117 | |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.type.ontasot | Master’s thesis | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.laitos | Informaatioteknologia | fi |
dc.contributor.laitos | Information Technology | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.oppiaine | Kyberturvallisuus | fi |
dc.contributor.oppiaine | Kyberturvallisuus | en |
dc.rights.copyright | Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty. | fi |
dc.rights.copyright | This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited. | en |
dc.type.publication | masterThesis | |
dc.contributor.oppiainekoodi | 601 | |
dc.subject.yso | tietoturva | |
dc.subject.yso | organisaatiot | |
dc.subject.yso | turvallisuus | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | pilvipalvelut | |
dc.subject.yso | hyvät käytännöt | |
dc.subject.yso | tietotekniikka | |
dc.subject.yso | digitalisaatio | |
dc.subject.yso | turvallisuuspolitiikka | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | data security | |
dc.subject.yso | organisations (systems) | |
dc.subject.yso | safety and security | |
dc.subject.yso | cyber security | |
dc.subject.yso | cloud services | |
dc.subject.yso | best practices | |
dc.subject.yso | information technology | |
dc.subject.yso | digitalisation | |
dc.subject.yso | security policy | |
dc.subject.yso | data systems | |
dc.format.content | fulltext | |
dc.type.okm | G2 | |