Important Update: New Usage Policies for Salesforce Connected Apps
With the upcoming security update for ‘Connected Apps’, Salesforce is taking an important step to counter social engineering. In our main article, we explained which actions you need to take now to prepare for this.
Still, you might be wondering: “Have we already been vulnerable in the past?” In this guide, we’ll take away that uncertainty. Here, we’ll show you exactly how you can check if your organization has been the victim of a hack.
Here is a step-by-step plan, from the most direct to more general investigative methods:
This is the most direct way to investigate this specific vulnerability. An attacker leaves the clearest tracks here.
If an attacker gains access via an app, it is often logged as a normal login.
This is a more advanced step that often requires extra tools, but it can reveal the impact of an attack.
The goal of this step-by-step plan is to give you an overview and, above all, certainty. As you can see, an effective audit always starts with the Connected Apps OAuth Usage page. From there, you use the login history and other tools to get a complete picture.
Whether you have confirmed that everything is in order, or you’ve encountered something unexpected, the most important recommendation is to make this check a routine, for example, on a semi-annual basis. This way, security becomes a regular part of your management, rather than a reaction to an incident.
Are you still left with questions after this check, or did you see something you’re unsure about? Don’t hesitate to get in touch. We are happy to review the situation with you, without obligation, and help you further.
You can reach us via support or by calling +31 85 130 49 35.