🔐 Security & Data Governance

Enterprise-Ready Architecture for Specification Data Management

Built on Salesforce. Integrated via MuleSoft. Connected with Microsoft 365.


Overview

Dazmii’s Specification Data Management solution is built on Salesforce and powered by MuleSoft to ensure secure, scalable, and compliant data workflows for enterprise clients. We support deep integrations with platforms like SharePoint and Office 365 while maintaining strict access control, encryption standards, and governance protocols.

This page is intended to address common IT and InfoSec concerns regarding authentication, data protection, system integrations, and platform trust.


🔐 Identity & Access Control

  • Single Sign-On (SSO):

    Supports SAML 2.0 and OpenID Connect with Azure AD, Okta, Google Workspace, and other identity providers.

  • Multi-Factor Authentication (MFA):

    Enforced across all user types—internal, vendor, partner, and community—for all Salesforce and portal logins.

  • Role-Based Access Controls:

    Permissions are scoped by user type and function (e.g., Viewer, Editor, Admin), with record-, field-, and object-level controls.

  • Session & IP Controls:

    Login hours, session timeouts, and IP whitelisting protect user sessions and reduce unauthorized access.


🔗 System Integrations & API Security

  • MuleSoft + Salesforce Integration:

    API communication is authenticated via OAuth 2.0 using named credentials with scoped access tokens and IP restrictions.

  • Microsoft 365 & SharePoint Integration:

    Seamless access to file repositories (spec sheets, artwork, regulatory documentation) using Microsoft Graph API with user-based or app-based permissions.

  • Mutual TLS (mTLS) Support:

    Available for outbound MuleSoft integrations requiring certificate-based authentication.

  • Audit-Ready Logging:

    API activity is logged and optionally retained via custom objects or Shield Event Monitoring for auditability.


🔒 Data Protection & Encryption

  • Field-Level Encryption:

    Supports Salesforce Shield Platform Encryption for encrypting sensitive fields such as pricing, formulas, or compliance values.

  • Data Masking in Lower Environments:

    Sensitive fields are masked in non-production environments during sandbox refreshes or dev/test cycles.

  • Secure File Handling:

    Files are stored in Salesforce Files, SharePoint, or OneDrive with access controlled by user role and record context.


📊 Data Management Practices

  • Controlled Vocabularies & Picklists:

    Standardized global value sets for UOM, material types, regulatory tags, and dimensional descriptors.

  • Validation Rules & Governance Checks:

    Prevent incomplete or invalid data from being saved—whether entered manually or via integration.

  • Data Normalization & Cleaning:

    MuleSoft pipelines normalize data before entry into Salesforce, using mappings aligned with customer-specific logic.

  • Automated Duplicate Detection:

    Matching rules and deduplication logic prevent redundancies in vendor, material, and specification records.


🧾 Audit, Monitoring & Compliance

  • Field History Tracking:

    Change history is retained on key objects (e.g., Packaging Spec, BOM, Vendor) for regulatory traceability.

  • Event Monitoring (Salesforce Shield):

    Capture user and API events such as exports, logins, report access, and more.

  • Login & Setup Audit Trails:

    Administrative changes are logged for transparency and audit readiness.

  • Data Classification Tags:

    Sensitive fields are tagged for data governance, compliance filtering, and policy enforcement.


🔎 Summary

We take a layered, proactive approach to platform security and data governance:

  • 🔐 Strong identity, access, and encryption controls

  • 🔗 Secure, traceable integrations with MuleSoft and Microsoft 365

  • 📊 Structured data management and normalization

  • 🧾 Robust auditability and compliance tools

 

Whether you’re protecting sensitive regulatory content, engineering drawings, or packaging BOMs, our architecture supports IT’s need for control while empowering business teams to manage data at scale.


🚨 Incident Response Overview

Dazmii follows a structured incident response protocol aligned with NIST and Salesforce security best practices. This protocol includes:

  • 24/7 event monitoring (via Salesforce & MuleSoft logs)

  • Defined escalation paths for severity levels (data exposure, access breach, integration failure, etc.)

  • Customer notification within defined SLAs

  • Root cause analysis and remediation tracking

  • Audit-ready incident documentation

We treat all security-related anomalies with urgency and transparency.

View Full Incident Response Policy →