Shield Platform Encryption Checklist 

The Ultimate Guide for Determining What Fields Can Be Encrypted and Why Some Can’t

Salesforce Shield Platform Encryption has a large set of rules regarding what fields can and cannot be encrypted. Digging through Salesforce's 96 page implementation guide and manually encrypting your fields can be very complicated and time-consuming.

Use this guide to streamline the encryption process and determine:

  • What fields can be encrypted
  • Why some can't
  • The latest updates to Platform Encryption rules
  • How to mitigate downstream business impacts

About  rev-cult-2020-logo

RevCult is a world-class services and software company that helps businesses achieve break-through results on the Salesforce platform with elegantly simple security and data governance solutions that give our clients confidence that their data is protected. We focus on GDPR, HIPAA and FINRA needs across industries including Healthcare & Life Sciences, Financial Services and Retail. 
Customers include:

logos.

5-star-reviews-appexchange-1030x272

⭐⭐⭐⭐⭐ Intuitive, Simple to use, Powerful

"I think the title says it all. Never had to look at the documentation as it is that easy to use. However, don't let the simplicity fool you. It is a very powerful tool. I spent about 4 weeks trying to classify and evaluate/encrypt 3000+ fields in our org. Once I installed this tool, I was able to evaluate and encrypt, start to finish, in one day." - Joey Rubino

Get Your Checklist

 

Other RevCult Resources

Salesforce security experts list of must-have resources:

Encryption made simple with Shield Security Cockpit® which is now available on the AppExchange

If you're looking for an easy solution to encrypt today, learn more about Shield Security Cockpit®, and request a FREE Trial. See how it can help you quickly:

  • Assess: Instantly conduct a Business Impact Assessment to see the downstream impact of encrypting fields (before encrypting).
  • Encrypt: Initiate the encryption process within the context of the results, and see when Probabilistic and Deterministic encryption options are allowed.
  • Report: Produce evidence-based compliance reports.