Group8 CRM Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

CRM TOOLS

DATA SECURITY


By Group 8
Abhishek Srivastava(9030241301)
Shalini Mulchandani(9030241321)
Swanand Shende(9030241327)
Threat Points

 59 % caused by Hardware/System Malfunction

 26 % caused by Human Error

 9 % caused by Software Malfunction

 4 % caused by Viruses

 2 % caused by natural disaster


12/08/2021 CRM TOOLS: Data Security. 2
Security Implementation

o Policies & Procedures (Internal Threat Neutralization)
 Identify when changes have been made to the system
 Who should be notified for breach, data loss and actions to be
taken
o Monitoring (Continuous Improvement)
 Internal / Outsourced
 Critical services, abnormalities, changes.
o Backup Schedule (Ensuring Maximum Availability)
 Frequency of backup
 Chain of command for data recovery/restoration

12/08/2021 CRM TOOLS: Data Security. 3


Security Implementation

 Physical security of the server rooms. Use of latest biometric security
systems.

 Role based access: Strong user authentication and different logon


levels to restrict visibility.

 Network perimeter defense: Using latest and appropriately


configured hardware and software firewalls.

 Operating System security: Use a minimal number of access points to


all production servers. Disabling and/or removing any unnecessary
users, protocols, and processes.
12/08/2021 CRM TOOLS: Data Security. 4
Security Implementation
Continued…

 Database Security: Whenever possible, database access is controlled at the operating
system and database connection level for additional security. Access to production
databases is restricted to a limited number of points, and production databases do not
share a master password database.

 Reliability & Backup: When selecting the actual backup medium and storage of that
medium, a company's RTO must be considered. Back-up duplicated and duplicate
backup must be stored off-site. Remote backup through web interface without any
agent installation

 Data Encryption: Encryption using valid digital certificates while the storing data as
well as when the data is on the move.

 Application Security: Remove underlying system (vulnerabilities) through flaws in the


design, development, deployment, upgrade, or maintenance of the application.

12/08/2021 CRM TOOLS: Data Security. 5


References

 http://
www.salesforce.com/assets/pdf/datasheets/securit
y.pdf
 http://www.insidecrm.com/features/hosted-crm-d
ata-safety-091307
/
 http://
www.crm-software-guide.com/web-based-crm-solu
tions.htm
 http://findarticles.com/p/articles/mi_qa3995/is_20
0605/ai_n17187719
12/08/2021 CRM TOOLS: Data Security. 6
/
Thank You

CRM TOOLS
DATA SECURITY
By Group 8
Abhishek Srivastava(9030241301)
Shalini Mulchandani(9030241321)
Swanand Shende(9030241327)

12/08/2021 CRM TOOLS: Data Security. 7

You might also like