How do you connect to my data in Salesforce.com?
Madison Logic connects to Salesforce.com using publicly documented REST APIs provided by Salesforce.com.
We authenticate to Salesforce.com using one username and one password provided by you when you configure our Salesforce.com integration module.
What data do you retrieve and store from Salesforce.com?
- Authentication: Madison Logic use OAuth2 flow to enable login and get the API access token from clients. This token is stored in AWS DynamoDB with encryption at Rest using AWS KMS.
- Meta Data: Madison Logic has clients choose which SFDC fields they would like to map during the integration process in ActivateABM™. Fields are only selected from SFDC Accounts, Contacts and Opportunities objects. Madison Logic stores additional meta data consisting of client’s predefined set of Opportunity stage names and probability.
- Record Data: Madison Logic stores SFDC AccountId, Name and Domain (this is extracted from Client Email or Account Website field). This data is encrypted at rest using AWS KMS and stored in AWS S3.
For each of the following objects, Madison Logic stores the following:
Object | Data Stored | Storage |
---|---|---|
Account | ID Name Domain (from website field) | AWS S3, encrypted at Rest |
Contact | AccountID Name Domain (from email) | AWS S3, encrypted at Rest |
Campaign | Name Domain (from Campaign member Email) | AWS S3, encrypted at Rest |
Opportunity | Opportunity id AccountId Name Domain (from Account Website) Stage name Close date Amount | AWS S3, encrypted at Rest and PostgreSql DB – AWS RDS in a private network. |
Where do you physically store my data?
Madison Logic stores your CRM data in the United States, in the state of Virginia, within the Amazon Web Services region us-east-1.
How is my data secured in transit?
When Madison Logic retrieves your data from Salesforce APIs, it is secured in transit by encryption using Transport Layer Security (TLS) version 1.2.
When your CRM data is transferred within Madison Logic systems, it is also secured in transit by encryption using TLS 1.2.
How is my data secured at rest?
Your data is secured at rest by encrypting it using AWS Key Management Service APIs.
AWS KMS uses the Advanced Encryption Standard (AES) algorithm in Galois/Counter Mode (GCM), known as AES-GCM. AWS KMS uses this algorithm with 256-bit secret keys.
Is my data isolated from other customers? If so, how?
Yes. Your CRM credentials and data are stored within a service dedicated to managing CRM data. Our "crm-api" functions as a lockbox for your data, to ensure that only you are permitted access to your data.
The only data we copy out of the "crm-api" lockbox into other Madison Logic systems is the list of target domains required to execute a campaign.
Access to your data is programmatically restricted by customer via a third party authentication & entitlements service (Okta).
Is there a process in place for removing our content and data at the end of the use agreement?
Yes. We can ensure that your content is securely removed from Madison Logic systems. Contact us for more information.
What type of compliance and controls are in place?
Security and quality controls in Amazon Web Services have been validated and certified by the following compliance schemes:
- AWS Service Organization Controls (SOC 1, SOC 2, and SOC 3) Reports. You can request a copy of these reports from AWS Compliance.
- PCI DSS Level 1. For more details on PCI DSS compliant services in AWS, you can read the PCI DSS FAQs.
- ISO 27017. For more details on ISO 27017 compliant services in AWS, you can read the ISO-27017 FAQs.
- ISO 27018. For more details on ISO 27018 compliant services in AWS, you can read the ISO-27018 FAQs.
- ISO 9001. For more details on ISO 9001 compliant services in AWS, you can read the ISO-9001 FAQs.
- In evaluation for FIPS 140-2. For more details, you can view the FIPS 140-2 Implementation Under Test List.
What are the minimum requirements needed for the SFDC admin user that is used to authenticate?
- Organization should have API feature enabled.
- User permissions: API Access (Read-only)
References
Salesforce Developer Documentation
Amazon Web Services Documentation
- AWS Key Management Services
- KMS - Cryptography Basics describes the cipher used: Advanced Encryption Standard (AES) algorithm in Galois/Counter Mode (GCM), known as AES-GCM. AWS KMS uses this algorithm with 256-bit secret keys.
AWS KMS uses the Advanced Encryption Standard (AES) algorithm in Galois/Counter Mode (GCM), known as AES-GCM. AWS KMS uses this algorithm with 256-bit secret keys.