Data Security in Salesforce — The Full Architecture Explained Deeply
The Full Architecture Before touching any configuration, understand one fundamental principle: Salesforce security is layered and sequential. Access is not decided in one place. It is evaluated step by step. If access fails at any layer, the user stops there — even if other layers would allow access. Think of it like passing through four security checkpoints. These four levels are: Organization Level Object Level Field Level Record Level Each level answers a different question. Let’s go deeper. ──────────────────────── Organization-Level Security — “Can You Enter the System?” This is the outer boundary. It controls authentication and access to the org itself, not data visibility. Configured in: Setup → Password Policies Setup → Login Access Setup → Network Access What you control here: • Who is an active user • Password strength rules • Login hours • IP address restrictions • Multi-factor authentication Important clarification: This level do...