{"id":351,"date":"2021-06-01T16:31:00","date_gmt":"2021-06-01T12:31:00","guid":{"rendered":"https:\/\/spoonconsulting.com\/?p=351"},"modified":"2025-08-22T16:36:44","modified_gmt":"2025-08-22T12:36:44","slug":"salesforce-security-review-can-be-intimidating","status":"publish","type":"post","link":"https:\/\/spoonconsulting.com\/fr\/salesforce-security-review-can-be-intimidating\/","title":{"rendered":"Salesforce Security Review can be intimidating"},"content":{"rendered":"<h3 class=\"wp-block-heading\">What is a Security&nbsp;Review?<\/h3>\n\n\n\n<p>When you want to make a Salesforce solution publicly available on the AppExchange, your application needs to undergo a Security Review. Salesforce experts will dive deep into your application to make sure that your solution does not have any security flaws and vulnerabilities whereby checking how well your application conforms to security standards and protects sensitive customer data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What you need to know to pass the Security\u00a0Review?<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">Testing your Application<\/h4>\n\n\n\n<p>Before submitting for Security Review, assess your Solution on your side first to make sure that your architecture is secure. This includes permissions given to objects, components included, custom code, webservices, third party services being used. For short, ensure that hackers will not be able to exploit any entry points or vulnerabilities to access data.<\/p>\n\n\n\n<p>Your application should also be robust and Salesforce best practices must be applied such as bulkifying your apex code when dealing with records in Triggers, avoid code injection either in SOQL, apex or cross-scripting.<\/p>\n\n\n\n<p>If your solution involves third parties, it is good practice to test them as well. Test the endpoint to see if it contains any leaks in the headers or request being transmitted. One common tool is OWASP ZAP which provides a list of vulnerabilities and their severities. From my experience, every high and medium issues deserve consideration. Furthermore, a good SSL certificate goes a long way to make your endpoint more secure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Salesforce Code&nbsp;Scan<\/h4>\n\n\n\n<p>Other than manual testing, Salesforce provides a static code analysis tool, developed by Checkmarx, which scans the code from your package. It can detect a lot of issues such as Create-Read-Update-Delete (CRUD), Sharing, Cross-Scripting (XSS), SOQL Injection, Field Level Security (FLS).<\/p>\n\n\n\n<p>These errors are categorized into groups:&nbsp;<strong>Apex Critical Security Risk<\/strong>,&nbsp;<strong>Javascript Low Visibility<\/strong>,&nbsp;<strong>Javascript High Risk<\/strong>,&nbsp;<strong>Apex Serious Security Risk<\/strong>,&nbsp;<strong>Apex Code Quality<\/strong>.<\/p>\n\n\n\n<p>Here is a sample code for CRUD and FLS check. These need to be performed each time your code is manipulating records.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"790\" height=\"257\" src=\"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCK5ZI5UES4JFD3PVITFC6DII5KI.jpg\" alt=\"\" class=\"wp-image-352\" srcset=\"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCK5ZI5UES4JFD3PVITFC6DII5KI.jpg 790w, https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCK5ZI5UES4JFD3PVITFC6DII5KI-300x98.jpg 300w, https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCK5ZI5UES4JFD3PVITFC6DII5KI-768x250.jpg 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/figure>\n\n\n\n<p>Cross-Scripting in Visualforce pages can be resolved by using formula such as&nbsp;<strong>JSENCODE<\/strong>&nbsp;et&nbsp;<strong>HTMLENCODE<\/strong>&nbsp;to prevent&nbsp;<strong>XSS<\/strong>&nbsp;injection.<\/p>\n\n\n\n<p>var ids = JSON.parse(\u201c{!JSENCODE(recordIds)}\u201d);<\/p>\n\n\n\n<p>SOQL Injection is another common issue which arises when user input is passed into dynamic SOQL queries. To protect yourself against such issue, you can sanitize the user inputs. A common method available to resolve such issue is&nbsp;<strong>String.escapeSingleQuotes<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">External Application Scan<\/h4>\n\n\n\n<p>If you have an external application which is connected to the Salesforce solution or if you are using a third-party service, you require this scan also.<\/p>\n\n\n\n<p>All endpoints being used must be secured and each connection must be authenticated. If you are storing Salesforce credential such as&nbsp;<strong>Refresh Token&nbsp;<\/strong>et&nbsp;<strong>Access Token<\/strong>, these must be saved in encrypted database.<\/p>\n\n\n\n<p>Salesforce encourages you to scan your application with OWASP ZAP application.&nbsp;<a target=\"_blank\" href=\"https:\/\/owasp.org\/www-project-zap\/\" rel=\"noreferrer noopener\">https:\/\/owasp.org\/www-project-zap\/<\/a><\/p>\n\n\n\n<p>You should review all high and medium issues resulting from the ZAP scan. If some of them are false positive, you need to document them and provide necessary details as to why this is not a threat.<\/p>\n\n\n\n<p>Common issues that can be identified with ZAP are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sensitive data exposure<\/li>\n\n\n\n<li>Missing security headers<\/li>\n\n\n\n<li>Security misconfiguration<\/li>\n\n\n\n<li>Broken Access control<\/li>\n\n\n\n<li>Components with known vulnerabilities (javascript libraries)<\/li>\n\n\n\n<li>Insecure Deserialization<\/li>\n\n\n\n<li>Cross Site Scripting (XSS)<\/li>\n<\/ul>\n\n\n\n<p>Note: You need to scan third party that your application is using even if it is hosting your documentation.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">False Positives<\/h4>\n\n\n\n<p>Sometimes the security-scanning tool or code reviewer will flag code that can pose a security vulnerability. However, the flagged issue is not really one or is a non-exploitable or has already been catered for elsewhere. Thus, these kinds of issues can be considered as false positives.<\/p>\n\n\n\n<p>To address these, you need to provide a document specifying why these are false positives. Explain what your code is doing and how it is not related to the issue given by the scanning tool. Also give examples and use cases to properly explain it. This will avoid the Security Review team from asking for more information which may delay the processing time of your Solution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Submitting for Security&nbsp;Review<\/h3>\n\n\n\n<p>Now that all security concerns on the Application have been considered, we can submit for the Salesforce team to start the Security Review. You are almost ready to submit your application.<\/p>\n\n\n\n<p>Next step will be to document how to test the application. This includes the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>a Salesforce environment with the Package Installed<\/li>\n\n\n\n<li>Admin level credential to the Salesforce Security team<\/li>\n\n\n\n<li>populate the Salesforce environment with sample data<\/li>\n\n\n\n<li>provide a thorough documentation of how your app will be used and how to use it so that it makes it easier to test and review.<\/li>\n<\/ul>\n\n\n\n<p>Salesforce provides a&nbsp;<a target=\"_blank\" href=\"https:\/\/partners.salesforce.com\/s\/education\/appinnovators\/Security_Review#z\" rel=\"noreferrer noopener\">checklist builder<\/a>&nbsp;depending on what your solution contains. You can use it as a guideline to what is missing before submitting for the security review.&nbsp;<\/p>\n\n\n\n<p>To complete the review, you need to log into your partner portal to fill in your app details and upload necessary documents. There is a fee that will be required at the end of the process.<\/p>\n\n\n\n<p>There is an annual listing fee of $150 USD and a one-time upfront fee of $2,700 USD for a paid app submitted for security review (no fee for free apps).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Consult the&nbsp;Experts<\/h4>\n\n\n\n<p>If you have any question regarding the process, you can book&nbsp;<a target=\"_blank\" href=\"https:\/\/security.secure.force.com\/sourcescanner\/\" rel=\"noreferrer noopener\">office hours to speak directly with the team<\/a>&nbsp;or even post your questions in the&nbsp;<a target=\"_blank\" href=\"https:\/\/partners.salesforce.com\/_ui\/core\/chatter\/groups\/GroupProfilePage?g=0F9300000001s8Y\" rel=\"noreferrer noopener\">Security Review Group in the Partner Community<\/a>.<\/p>\n\n\n\n<p>You want assistant building your Salesforce Solution,&nbsp;<a target=\"_blank\" href=\"https:\/\/spoonconsulting.com\/fr\/s\/\" rel=\"noreferrer noopener\">Spoon Consulting<\/a>&nbsp;is the right fit. We have accompanied numerous clients in building their Salesforce solution and making sure they passed the Security Review.<\/p>\n\n\n\n<p>One of our most successful ISVs application is&nbsp;<a target=\"_blank\" href=\"https:\/\/appexchange.salesforce.com\/appxListingDetail?listingId=a0N3000000Dq45IEAR?utm_source=blog&amp;utm_medium=organic&amp;utm_campaign=blog_kevan\" rel=\"noreferrer noopener\">SharinPix<\/a>&nbsp;(An Image-Management Solution built for Salesforce) which is available on any Salesforce cloud solution. We continue to add new features, maintain and update the application (Salesforce, Heroku and Mobile app).<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>What is a Security&nbsp;Review? When you want to make a Salesforce solution publicly available on the AppExchange, your application needs to undergo a Security Review. Salesforce experts will dive deep into your application to make sure that your solution does not have any security flaws and vulnerabilities whereby checking how well your application conforms to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":353,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9],"tags":[],"content-type":[],"industry":[],"offer":[],"technology":[],"class_list":["post-351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Salesforce Security Review can be intimidating - Spoon Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/spoonconsulting.com\/fr\/salesforce-security-review-can-be-intimidating\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Salesforce Security Review can be intimidating\" \/>\n<meta property=\"og:description\" content=\"What is a Security&nbsp;Review? When you want to make a Salesforce solution publicly available on the AppExchange, your application needs to undergo a Security Review. Salesforce experts will dive deep into your application to make sure that your solution does not have any security flaws and vulnerabilities whereby checking how well your application conforms to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/spoonconsulting.com\/fr\/salesforce-security-review-can-be-intimidating\/\" \/>\n<meta property=\"og:site_name\" content=\"Spoon Consulting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/spoonconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-01T12:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-22T12:36:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1139\" \/>\n\t<meta property=\"og:image:height\" content=\"759\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Soubham Ramdhany\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Soubham Ramdhany\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/\"},\"author\":{\"name\":\"Soubham Ramdhany\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#\\\/schema\\\/person\\\/8d990e0b28bf7517bc18d0b31eecd75b\"},\"headline\":\"Salesforce Security Review can be intimidating\",\"datePublished\":\"2021-06-01T12:31:00+00:00\",\"dateModified\":\"2025-08-22T12:36:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/\"},\"wordCount\":1002,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/spoonconsulting.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/\",\"url\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/\",\"name\":\"Salesforce Security Review can be intimidating - Spoon Consulting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/spoonconsulting.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg\",\"datePublished\":\"2021-06-01T12:31:00+00:00\",\"dateModified\":\"2025-08-22T12:36:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#primaryimage\",\"url\":\"https:\\\/\\\/spoonconsulting.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg\",\"contentUrl\":\"https:\\\/\\\/spoonconsulting.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg\",\"width\":1139,\"height\":759},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/salesforce-security-review-can-be-intimidating\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/spoonconsulting.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Salesforce Security Review can be intimidating\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#website\",\"url\":\"https:\\\/\\\/spoonconsulting.com\\\/\",\"name\":\"Spoon Consulting\",\"description\":\"Proximity. Innovation. Solution.\",\"publisher\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/spoonconsulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#organization\",\"name\":\"Spoon Consulting\",\"url\":\"https:\\\/\\\/spoonconsulting.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/spoonconsulting.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Logo-Spoon-Spoon-Consulting-2024-scaled.webp\",\"contentUrl\":\"https:\\\/\\\/spoonconsulting.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Logo-Spoon-Spoon-Consulting-2024-scaled.webp\",\"width\":2560,\"height\":1071,\"caption\":\"Spoon Consulting\"},\"image\":{\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/spoonconsulting\",\"https:\\\/\\\/instagram.com\\\/spoonconsulting\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/spoonconsulting\",\"https:\\\/\\\/www.tiktok.com\\\/@spoonconsulting\"],\"email\":\"contact@spoonconsulting.com\",\"legalName\":\"Spoon Consulting Ltd\",\"foundingDate\":\"2005-08-01\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"201\",\"maxValue\":\"500\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/spoonconsulting.com\\\/#\\\/schema\\\/person\\\/8d990e0b28bf7517bc18d0b31eecd75b\",\"name\":\"Soubham Ramdhany\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fdadcbd522da0626d64c5185a989f9fdb5ea31ae568ca3772dfec9ab25a106fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fdadcbd522da0626d64c5185a989f9fdb5ea31ae568ca3772dfec9ab25a106fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fdadcbd522da0626d64c5185a989f9fdb5ea31ae568ca3772dfec9ab25a106fe?s=96&d=mm&r=g\",\"caption\":\"Soubham Ramdhany\"},\"url\":\"https:\\\/\\\/spoonconsulting.com\\\/fr\\\/author\\\/soubham-ramdanyspoonconsulting-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Salesforce Security Review can be intimidating - Spoon Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/spoonconsulting.com\/fr\/salesforce-security-review-can-be-intimidating\/","og_locale":"fr_FR","og_type":"article","og_title":"Salesforce Security Review can be intimidating","og_description":"What is a Security&nbsp;Review? When you want to make a Salesforce solution publicly available on the AppExchange, your application needs to undergo a Security Review. Salesforce experts will dive deep into your application to make sure that your solution does not have any security flaws and vulnerabilities whereby checking how well your application conforms to [&hellip;]","og_url":"https:\/\/spoonconsulting.com\/fr\/salesforce-security-review-can-be-intimidating\/","og_site_name":"Spoon Consulting","article_publisher":"https:\/\/facebook.com\/spoonconsulting","article_published_time":"2021-06-01T12:31:00+00:00","article_modified_time":"2025-08-22T12:36:44+00:00","og_image":[{"width":1139,"height":759,"url":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg","type":"image\/jpeg"}],"author":"Soubham Ramdhany","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Soubham Ramdhany","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#article","isPartOf":{"@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/"},"author":{"name":"Soubham Ramdhany","@id":"https:\/\/spoonconsulting.com\/#\/schema\/person\/8d990e0b28bf7517bc18d0b31eecd75b"},"headline":"Salesforce Security Review can be intimidating","datePublished":"2021-06-01T12:31:00+00:00","dateModified":"2025-08-22T12:36:44+00:00","mainEntityOfPage":{"@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/"},"wordCount":1002,"commentCount":0,"publisher":{"@id":"https:\/\/spoonconsulting.com\/#organization"},"image":{"@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#primaryimage"},"thumbnailUrl":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/","url":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/","name":"Salesforce Security Review can be intimidating - Spoon Consulting","isPartOf":{"@id":"https:\/\/spoonconsulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#primaryimage"},"image":{"@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#primaryimage"},"thumbnailUrl":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg","datePublished":"2021-06-01T12:31:00+00:00","dateModified":"2025-08-22T12:36:44+00:00","breadcrumb":{"@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#primaryimage","url":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg","contentUrl":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg","width":1139,"height":759},{"@type":"BreadcrumbList","@id":"https:\/\/spoonconsulting.com\/salesforce-security-review-can-be-intimidating\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/spoonconsulting.com\/"},{"@type":"ListItem","position":2,"name":"Salesforce Security Review can be intimidating"}]},{"@type":"WebSite","@id":"https:\/\/spoonconsulting.com\/#website","url":"https:\/\/spoonconsulting.com\/","name":"Spoon Consulting","description":"Proximit\u00e9. Innovation. Solution.","publisher":{"@id":"https:\/\/spoonconsulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/spoonconsulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/spoonconsulting.com\/#organization","name":"Spoon Consulting","url":"https:\/\/spoonconsulting.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/spoonconsulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/Logo-Spoon-Spoon-Consulting-2024-scaled.webp","contentUrl":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/Logo-Spoon-Spoon-Consulting-2024-scaled.webp","width":2560,"height":1071,"caption":"Spoon Consulting"},"image":{"@id":"https:\/\/spoonconsulting.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/spoonconsulting","https:\/\/instagram.com\/spoonconsulting","https:\/\/www.linkedin.com\/company\/spoonconsulting","https:\/\/www.tiktok.com\/@spoonconsulting"],"email":"contact@spoonconsulting.com","legalName":"Spoon Consulting Ltd","foundingDate":"2005-08-01","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"}},{"@type":"Person","@id":"https:\/\/spoonconsulting.com\/#\/schema\/person\/8d990e0b28bf7517bc18d0b31eecd75b","name":"Soubham Ramdhany","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/fdadcbd522da0626d64c5185a989f9fdb5ea31ae568ca3772dfec9ab25a106fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fdadcbd522da0626d64c5185a989f9fdb5ea31ae568ca3772dfec9ab25a106fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdadcbd522da0626d64c5185a989f9fdb5ea31ae568ca3772dfec9ab25a106fe?s=96&d=mm&r=g","caption":"Soubham Ramdhany"},"url":"https:\/\/spoonconsulting.com\/fr\/author\/soubham-ramdanyspoonconsulting-com\/"}]}},"jetpack_featured_media_url":"https:\/\/spoonconsulting.com\/wp-content\/uploads\/2025\/08\/MCPNVLNJ36DVAXDCFFXKR4DCERMA.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/posts\/351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":1,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/posts\/351\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/posts\/351\/revisions\/354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/media\/353"}],"wp:attachment":[{"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/media?parent=351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/categories?post=351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/tags?post=351"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/content-type?post=351"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/industry?post=351"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/offer?post=351"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/spoonconsulting.com\/fr\/wp-json\/wp\/v2\/technology?post=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}