We are excited to announce Trustpage has been acquired by Vanta!

Read the press release →
Company logo


Personalize every experience along the customer journey with the Customer 360. Unify marketing, sales, service, commerce, and IT on the world’s #1 CRM.
  • Website

This information was sourced from publicly available content and is not actively maintained by Salesforce.

Claim this Trust Center

  • Compliance
  • Product Security
  • Privacy
  • Business Continuity
  • Threat Management
  • Subprocessors
  • Compliance

    • C5
    • CCPA
    • 15 more topics

  • Product Security

    • Multi-Factor Authentication

      As cyberattacks grow more common, passwords no longer provide sufficient safeguards against unauthorized account access. Multi-factor authentication (or MFA) adds an extra layer of protection against threats like phishing attacks, increasing security for your business and your customers. That’s why, effective February 1, 2022, Salesforce requires customers to use MFA when accessing Salesforce products. Use the MFA Requirement Checker to see if your implementation satisfies this requirement.

    • SSO

      Single sign-on (SSO) is an authentication method that enables users to access multiple applications with one login and one set of credentials. For example, after users log in to your org, they can automatically access all apps from the App Launcher. You can set up your Salesforce org to trust a third-party identity provider to authenticate users. Or you can configure a third-party app to rely on your org for authentication.

  • Privacy

    • Privacy Policy
    • Data Processing Addendum
  • Business Continuity

    • Business Continuity Plan
    • Disaster Recovery Plan

      Salesforce maintains a Disaster Recovery plan that supports a robust business continuity strategy for the production services and platforms. This plan has been developed from industry-accepted methodologies and encompasses principles of high-availability engineering. The Disaster Recovery plan is constantly measured against strict regulatory and governance requirements, and is a crucial part of the acceptance plan when making changes or additions to the production environment. More information on Site Switching is available in this knowledge article.

  • Threat Management

    • Penetration Testing
    • Responsible Disclosure
  • Subprocessors

    • Sign up to view Salesforce's Subprocessors

Sign up to see the rest of Salesforce's posture and unlock unlimited access.

Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.

Sign Up
Join the community:
Copyright © 2023 Trustpage. All rights reserved.
Logos provided in part by Clearbit.