Information security expert Stephane Nappo famously once said “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it.”

Cybercrime and security threats are by far the greatest downsides of online shopping. Scammers across the globe are constantly trying to hack into our online accounts and businesses’ databases. The year 2020 recorded some of the biggest data breaches in history. Fortunately, e-commerce solutions like Salesforce Commerce Cloud (SFCC) come with security best practices to provide a safe and secure shopping environment for users.

Let’s have a look at six pertinent questions on preventing security breaches and how you, as a Salesforce Commerce Cloud administrator, can address them.

1. How to prevent hackers from trying to access your Salesforce e-commerce instance over the internet?

Restrict network access on SFCC through two mechanisms: storefront and Business Manager network access

  • Restrict storefront access by enabling embedded Content Delivery Network (eCDN) by contacting Salesforce customer care.
  • Restrict access for business managers by authorizing IP addresses of authenticated business managers and blocking access to unauthorized or threatful IP addresses.

2. How to ensure that the communication between you and your customers is secure?

Secure communication channels are key to protecting any sensitive information such as credit card data or Personally Identifiable Information (PII) and other information that is exchanged. Such important data shouldn’t be read or modified by unauthorized people.

Salesforce e-commerce recommends security protocols for all forms of communication:

  • Hypertext Transfer Protocol Secure(HTTPS) is recommended for interaction between shoppers and storefront and for interaction between different SFCC users and the Business Manager. HTTPS is a combination of Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS)/Secure Socket Layer (SSL). TLS and LLS are secure protocols that are widely used in web servers and browsers.
  • For calling web services, Salesforce e-commerce recommends using HTTPS, Secure File Transfer Protocol (SFTP), and Simple Object Access Protocol (SOAP) over TLS.
  • For file upload between your instance and an external system, Salesforce Commerce Cloud recommends using WebDAV over TLS. This way, only authenticated sources can upload custom code/cartridges to your instance.

3. How to ensure data protection?

Countries across the world have regulations and protocols such as California Consumer Privacy Act (CCPA); General Data Protection Regulation (GDPR); Personal Information Protection Act (PIPA), Japan; Privacy Act, Australia; and Personal Information Protection and Electronic Documents Act (PIPEDA) forcing companies to implement data protection solutions in their e-commerce systems. Whenever new data protection systems are introduced, Salesforce e-commerce helps merchants with documentation by clearly explaining how the new features help with compliance policies.

4. How to ensure that shoppers visiting the site are genuine and whether they are trying to perform authorized actions?

Salesforce e-commerce’s Business Manager allows you to set the terms of authorization for different users. This way, admins have complete control over which user has access to what information. For example, only admins are allowed to manage storefronts such as adding or modifying a product, and customers are only allowed to browse and purchase from the storefront.

5. How to prevent hackers from trying to limit or deny access to genuine shoppers?

Hackers try to deny access to genuine shoppers by bombarding the system with unauthorized resources. This is called a denial-of-service (DoS) attack. When multiple hackers send unauthorized requests the attack is called distributed denial-of-service (DDoS). Salesforce Commerce Cloud provides protection against DoS and DDoS by enabling eCDN, which in turn offers protection against TCP floods.

6. How to audit hacking events in the case of any?

Salesforce Cloud Commerce provides a detailed security log for Business Manager logins. Log files are captured daily and stored for 30 days. In case you are using Salesforce systems such as network switches, firewalls, operating systems, and routers to support the Salesforce e-commerce services a centralized log collection server is available, which, in the event of any security breach, will provide details of the cyber attack such as when what, and how exactly it occurred. With such comprehensive reports, you can implement better security practices and prevent any form of fraud or cybercrimes.

Assure your customers hassle-free and secure online marketplace by implementing Salesforce Commerce Cloud best practices.

Get in touch with us to help you build a business that is not just popular but credible too.

Follow us on Aspire Systems Retail to get detailed insights and updates about Retail!!!

Recommended Blogs

  1. How to choose the right E-commerce platform for your business?

  2. Six Reasons Why You Should Use Salesforce Commerce Cloud to Launch Your Global Stores