This lab explains how secret exposure occurs in Salesforce integrations and how to implement secure storage, transmission, rotation, and operational controls for credentials and tokens.
Executive Summary
Secrets management failures happen when API keys, client secrets, tokens, or certificates are embedded, logged, or stored in weak locations. In Salesforce ecosystems, this commonly affects callout integrations and custom auth workflows.
Salesforce Attack Surface
Hardcoded credentials in Apex classes and metadata
Secrets stored in non-protected custom fields or settings
Debug logs and error traces leaking tokens
Deployment artifacts and repositories containing secret values
Integration flows without key rotation or revocation process
Business Impact
Unauthorized third-party access: attacker-controlled API usage
Data breach risk: secrets enable lateral access to downstream services
Fraud and cost impact: abuse of paid APIs and service quotas
Compliance exposure: inability to demonstrate key governance controls