Creating secure integrations case of Salesforce integrations

Organisation's demand for digital transformation is increasing. These days organisations are seeking ways to centralise their systems and operations. The need for cloud-based Customer Relationship Management (CRM) systems is, without a doubt increasing. These cloud-based systems offer many bene...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Jallow, Musa
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:eng
Julkaistu: 2022
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/83815
_version_ 1826225743974105088
author Jallow, Musa
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Jallow, Musa Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Jallow, Musa Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Jallow, Musa
datasource_str_mv jyx
description Organisation's demand for digital transformation is increasing. These days organisations are seeking ways to centralise their systems and operations. The need for cloud-based Customer Relationship Management (CRM) systems is, without a doubt increasing. These cloud-based systems offer many benefits like security by design and cost efficiency. Salesforce is the world's leading CRM platform, and it offers a high level of security and a large variety of functionalities to extend security even further. However, integrations between Salesforce and third-party software create vulnerabilities that organisations and developers creating integrations need to consider. Organisations need to implement integration security into their information security policy (ISP) and obligate those creating integrations to follow security standards and best practices. Increasing security knowledge and resources will help transition towards more secure integrations. This research finds out whether organisations and developers are considering security while creating integrations. The research includes a case study where organisations and developers were asked about their integration security expertise and where they think the responsibility of secure integrations lies. The research aimed to provide security best practices for integration creation and insight into sharing responsibilities between different stakeholders. Research showed that the size of the organisation and the developer's information technology experience correlate with their security knowledge. However, results also show that organisations and developers do not focus on integration security as much as needed. This research recognised a need for further research due to the significant lack of research on the topic.
first_indexed 2022-11-08T21:00:34Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Jallow, Musa", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-11-08T08:32:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-11-08T08:32:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/83815", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Organisation's demand for digital transformation is increasing. These days organisations are seeking ways to centralise their systems and operations. The need for cloud-based Customer Relationship Management (CRM) systems is, without a doubt increasing. These cloud-based systems offer many benefits like security by design and cost efficiency. Salesforce is the world's leading CRM platform, and it offers a high level of security and a large variety of functionalities to extend security even further. However, integrations between Salesforce and third-party software create vulnerabilities that organisations and developers creating integrations need to consider.\nOrganisations need to implement integration security into their information security policy (ISP) and obligate those creating integrations to follow security standards and best practices. Increasing security knowledge and resources will help transition towards more secure integrations.\nThis research finds out whether organisations and developers are considering security while creating integrations. The research includes a case study where organisations and developers were asked about their integration security expertise and where they think the responsibility of secure integrations lies. The research aimed to provide security best practices for integration creation and insight into sharing responsibilities between different stakeholders.\nResearch showed that the size of the organisation and the developer's information technology experience correlate with their security knowledge. However, results also show that organisations and developers do not focus on integration security as much as needed. This research recognised a need for further research due to the significant lack of research on the topic.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-11-08T08:32:54Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-11-08T08:32:55Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "108", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "vulnerabilities", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "integrations", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "integration security", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "secure development", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "security responsibilities", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Salesforce", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cloud security", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Creating secure integrations : case of Salesforce integrations", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202211085117", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pilvipalvelut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hyv\u00e4t k\u00e4yt\u00e4nn\u00f6t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "digitalisaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuuspolitiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisations (systems)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "safety and security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cloud services", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "best practices", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "information technology", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "digitalisation", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "security policy", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data systems", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_83815
language eng
last_indexed 2025-02-18T10:56:06Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/c116e08f-ede8-4b0e-833c-e61196154e27\/download","text":"URN:NBN:fi:jyu-202211085117.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Jallow, Musa Creating secure integrations : case of Salesforce integrations vulnerabilities integrations integration security secure development security responsibilities Salesforce cloud security Kyberturvallisuus 601 tietoturva organisaatiot turvallisuus kyberturvallisuus pilvipalvelut hyvät käytännöt tietotekniikka digitalisaatio turvallisuuspolitiikka tietojärjestelmät data security organisations (systems) safety and security cyber security cloud services best practices information technology digitalisation security policy data systems
title Creating secure integrations : case of Salesforce integrations
title_full Creating secure integrations : case of Salesforce integrations
title_fullStr Creating secure integrations : case of Salesforce integrations Creating secure integrations : case of Salesforce integrations
title_full_unstemmed Creating secure integrations : case of Salesforce integrations Creating secure integrations : case of Salesforce integrations
title_short Creating secure integrations
title_sort creating secure integrations case of salesforce integrations
title_sub case of Salesforce integrations
title_txtP Creating secure integrations : case of Salesforce integrations
topic vulnerabilities integrations integration security secure development security responsibilities Salesforce cloud security Kyberturvallisuus 601 tietoturva organisaatiot turvallisuus kyberturvallisuus pilvipalvelut hyvät käytännöt tietotekniikka digitalisaatio turvallisuuspolitiikka tietojärjestelmät data security organisations (systems) safety and security cyber security cloud services best practices information technology digitalisation security policy data systems
topic_facet 601 Kyberturvallisuus Salesforce best practices cloud security cloud services cyber security data security data systems digitalisaatio digitalisation hyvät käytännöt information technology integration security integrations kyberturvallisuus organisaatiot organisations (systems) pilvipalvelut safety and security secure development security policy security responsibilities tietojärjestelmät tietotekniikka tietoturva turvallisuus turvallisuuspolitiikka vulnerabilities
url https://jyx.jyu.fi/handle/123456789/83815 http://www.urn.fi/URN:NBN:fi:jyu-202211085117
work_keys_str_mv AT jallowmusa creatingsecureintegrationscaseofsalesforceintegrations