{"id":67520,"date":"2025-07-02T11:57:48","date_gmt":"2025-07-02T01:57:48","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=67520"},"modified":"2025-07-02T12:13:28","modified_gmt":"2025-07-02T02:13:28","slug":"security-management-at-scale-with-security-center-extension-package","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/","title":{"rendered":"Security Management at Scale with Security Center Extension Package"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.salesforce.com\/news\/press-releases\/2024\/09\/05\/salesforce-signs-definitive-agreement-to-acquire-own-company\/\" target=\"_blank\" rel=\" noopener\">Salesforce completed our acquisition of Own<\/a> and not longer after, we started bringing key functionality from Own products into Salesforce existing solutions.<\/p>\n\n\n\n<p>One of key additions to our already comprehensive Trusted services and security portfolio was the Security Center extension package which is free to use for all existing Security Center customers and is available as a managed package. As we continue the integration of Own products into Salesforce you can expect functionality added to our native solutions.<\/p>\n\n\n\n<p>In this article, we will explore how you can <a href=\"https:\/\/www.salesforce.com\/au\/platform\/security-center\/\">utilise the new Security Center<\/a> features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control. Based on experience interacting with customers across the globe from different industries and with varied security maturity levels, the features covered in this article are crucial to implement successful security management policies and scale.<\/p>\n\n\n\n<div class=\"layout-one wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Learn about Security Center<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Keen to learn more about Security Center? We have a trail all about it, jump in to learn more including how to identify main use cases that Security Center is designed for.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/security-center\/learn-about-security-center\">Take the Trail<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-one.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-one.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-one.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-installing-security-center-extension-packages\">Installing Security Center extension packages<\/h2>\n\n\n\n<p>To get started, we need to install the extension package on the Salesforce you plan to use the new features. In a future release, we plan to incorporate more of these capabilities in the native application for an improve customer experience. As many other Salesforce managed packages, the installation process is quite simple and well documented.<\/p>\n\n\n\n<p>You can find a step by step guide to install your Security Center extension package <a href=\"https:\/\/support.owndata.com\/s\/article\/Getting-Started-with-Security-Center-Extension-68547\" target=\"_blank\" rel=\" noopener\">here<\/a>. Once you complete the installation steps, a new application, Security Center Extension, will be available via application picker menu.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d399a9d8804&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d399a9d8804\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"988\" height=\"950\" data-attachment-id=\"67521\" data-permalink=\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/screenshot\/\" data-orig-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg\" data-orig-size=\"988,950\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Screenshot&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;Screenshot&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Screenshot\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Screenshot&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg?w=520\" data-large-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg?w=988\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg?strip=all&#038;quality=95\" alt=\"\" class=\"wp-image-67521\" srcset=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg 988w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg?w=520&amp;h=500 520w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg?w=768&amp;h=738 768w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Security-Center.jpg?w=150&amp;h=144 150w\" sizes=\"auto, (max-width: 988px) 100vw, 988px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-you-can-t-protect-what-you-don-t-know-data-classification\">You can\u2019t protect what you don\u2019t know &#8211; data classification<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.salesforce.com\/au\/news\/stories\/it-security-stats-2025\/\">When discussing security improvement strategies<\/a>, our customers quickly realise how essential is to have objects and fields identified, classified and labeled correctly. From creating specific metadata labels to understanding and managing data effectively, Salesforce provides tools to help customers better understand and organise their data, ensuring they can meet their customers&#8217; needs efficiently. Data classification in Salesforce allows customers to gain deeper insights into their data through three key features: Data Owner Field, Field Usage, and Data Sensitivity.<\/p>\n\n\n\n<p>Once your organisation defines and implements a correct data classification implementation, the information captured in then used in a multitude of security policies from field-level encryption to transaction security policies and data masking job configuration. You really need to focus in identifying <a href=\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\">sensitive information so you can more effectively protect it<\/a>.<\/p>\n\n\n\n<p><strong>Data Owner Field<\/strong> &#8211; indicates which group or user owns a particular field. If your organisation has multiple groups modifying fields in the Salesforce instance, it can be unclear why a field exists or how it should be used. By clearly defining ownership, you can streamline data management, ensure accountability, and apply the necessary security controls.<\/p>\n\n\n\n<p><strong>Field Usage<\/strong> &#8211; another component in your data security strategy. It helps reduce the risk footprint by eliminating unnecessary data. The usage label declares fields based on their current status\u2014whether they are in use, hidden, or are up for deprecation. This categorisation aids in maintaining a lean and efficient data structure, minimising unnecessary data storage, and reducing potential security risks.<\/p>\n\n\n\n<p><strong>Data Sensitivity<\/strong> &#8211; this classification indicates the level of sensitivity of the data typically stored in a field. It enables customers to make informed decisions about how and in what way data can be used. By classifying data sensitivity, organisations can implement appropriate security measures and compliance protocols. This ensures that sensitive information is adequately protected and handled according to regulatory requirements, thereby enhancing overall data security.<\/p>\n\n\n\n<p>But you might be asking yourself where to start your data classification efforts. Salesforce offers a great solution as part of our Security Centre add-on, embedding data classification best practices directly into org. You can get immediate access to pre-built classification templates that help you identify common field types, such as public fields, system fields, high-risk fields, and others. It can save a lot of time and provide a more accurate assessment of fields where sensitive data might be stored.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d399a9d9adf&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d399a9d9adf\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1608\" height=\"548\" data-attachment-id=\"67523\" data-permalink=\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/security-center_data-classification\/\" data-orig-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg\" data-orig-size=\"1608,548\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"security center_data classification\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg?w=1467\" data-large-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg?w=1608\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg?strip=all&#038;quality=95\" alt=\"\" class=\"wp-image-67523\" srcset=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg 1608w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg?w=1467&amp;h=500 1467w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg?w=768&amp;h=262 768w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg?w=1536&amp;h=523 1536w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security-center_data-classification.jpg?w=150&amp;h=51 150w\" sizes=\"auto, (max-width: 1608px) 100vw, 1608px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>Once you&#8217;ve identified those target fields, classify them in bulk \u2013 with a single click. Classifying your data is crucial; it allows you to understand its risk and compliance impact, and then enforce least-privileged access \u2013 a key step in securing Salesforce<\/p>\n\n\n\n<p>By leveraging these data classification features, Salesforce customers can significantly enhance their data management practices. These tools ensure that data is organised, secure, and used effectively to meet business objectives while maintaining compliance with security standards.<\/p>\n\n\n\n<div class=\"layout-five wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">State of IT: Security<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Discover how AI innovation and security go hand-in-hand. Check out these insights from 2,000+ security experts.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/www.salesforce.com\/au\/form\/platform\/4th-state-of-it-security\/?d=701ed00000W8rvxAAB&#038;nc=701ed00000W8Lw7AAF\">Download now<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-five.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-five.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-five.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-who-sees-what-explorer\">Who Sees What Explorer<\/h2>\n\n\n\n<p>How would you answer today to questions like \u201cWhich users have access to this record?\u201d or \u201cWhat permission set should you add so one user can read this highly sensitive information?\u201d. For a long time, security professionals have designed access control frameworks based on principle of least privilege but with Salesforce approach to data access and its different layers of access control &#8211; Org, object, record, field, sharing rules &#8211; administrators and security teams can find challenging to report on users and they different access levels.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\">We believe that securing your sensitive data requires a well define access management process so only authorised users can access information<\/a>. With the addition of \u201cWho Sees What Explorer\u201d module, you can now view your security authorisation model across your Salesforce organisation.<\/p>\n\n\n\n<p>Using this Security Center module, the permissions associated with objects, fields, records can be more easily described. It also helps you ensure that your current permissions and permission sets have been configured and deployed in the way they have been designed.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d399a9daf86&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d399a9daf86\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"3372\" height=\"1562\" data-attachment-id=\"67524\" data-permalink=\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/permissions_security\/\" data-orig-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png\" data-orig-size=\"3372,1562\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Permissions_security\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?w=1079\" data-large-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?w=3372\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?strip=all&#038;quality=95\" alt=\"\" class=\"wp-image-67524\" srcset=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png 3372w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?w=1079&amp;h=500 1079w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?w=768&amp;h=356 768w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?w=1536&amp;h=712 1536w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?w=2048&amp;h=949 2048w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Permissions_security.png?w=150&amp;h=69 150w\" sizes=\"auto, (max-width: 3372px) 100vw, 3372px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-security-insights\">Security Insights<\/h2>\n\n\n\n<p>The ability to track changes across your Salesforce environment and quantify and manage risks associated with it can be a difficult task to manage. Every organisation using applicable risk management processes and its own tolerance priorities and mitigation strategies, Security Center now provides Security Insights to help your organisation meet its risk management goals. It&#8217;s like having a risk expert right inside your Salesforce environment.<\/p>\n\n\n\n<p>Automated risk assessments identify and prioritise threats based on out of the box recommended thresholds and your organisation&#8217;s specific risk tolerance, providing prescriptive guidance for risk management and mitigation strategies.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d399a9dc030&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d399a9dc030\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"3342\" height=\"1478\" data-attachment-id=\"67525\" data-permalink=\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/data-protection_classification\/\" data-orig-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png\" data-orig-size=\"3342,1478\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"data protection_classification\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?w=1131\" data-large-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?w=3342\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?strip=all&#038;quality=95\" alt=\"\" class=\"wp-image-67525\" srcset=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png 3342w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?w=1131&amp;h=500 1131w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?w=768&amp;h=340 768w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?w=1536&amp;h=679 1536w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?w=2048&amp;h=906 2048w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/data-protection_classification.png?w=150&amp;h=66 150w\" sizes=\"auto, (max-width: 3342px) 100vw, 3342px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>The Security Insights module in Salesforce offers a comprehensive overview of your organisation&#8217;s security posture, allowing for rapid assessment and review of key security metrics through six distinct lenses. It enables users to compare current security settings against best practice recommendations and customise risk ratings and scoring to fit organisational needs.<\/p>\n\n\n\n<p>The Security Insights module categorises Salesforce security into six critical lenses, each essential for comprehensive risk management.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Protection<\/strong> is used to highlight sensitive information and its classification as well as access controls, permissions and profiles that may pose as risk to unauthorised access and breaches.<\/li>\n\n\n\n<li><strong>Integration<\/strong> focuses on the secure connection of Salesforce with other systems, such as Connect Apps and HTTP Callouts, preventing vulnerabilities during data exchange and external access to data stored in Salesforce<\/li>\n\n\n\n<li><strong>Data Loss Prevention<\/strong> aims to protect against accidental or malicious data leaks, identifying users with high privilege access (i.e Modify All) and untracked fields containing sensitive information<\/li>\n\n\n\n<li><strong>Access Control<\/strong> (Authentication) shows the user authentication methods utilised and information about password policies.<\/li>\n\n\n\n<li><strong>The Security Model<\/strong> (Authorisation) provides a risk-driven view of user permissions, profiles and entitlements configured in your org.<\/li>\n\n\n\n<li><strong>Monitoring<\/strong> continuously tracks and analyses security events and objects that should be monitored in the environment in order to quickly detect and respond to potential threats.<\/li>\n<\/ul>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d399a9dd334&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d399a9dd334\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"3318\" height=\"752\" data-attachment-id=\"67526\" data-permalink=\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/security_monitoring\/\" data-orig-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png\" data-orig-size=\"3318,752\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"security_monitoring\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png?w=2206\" data-large-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png?w=3318\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png?strip=all&#038;quality=95\" alt=\"\" class=\"wp-image-67526\" srcset=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png 3318w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png?w=768&amp;h=174 768w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png?w=1536&amp;h=348 1536w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png?w=2048&amp;h=464 2048w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/security_monitoring.png?w=150&amp;h=34 150w\" sizes=\"auto, (max-width: 3318px) 100vw, 3318px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>Users can exclude specific items or entire graphs to better align with their security requirements. Additionally, the module provides actionable insights for enhancing security scores through configuration updates. It also provides historical results that can be accessed via the Time Machine feature. Action Plans can then be printed as a PDF so you have detailed steps to follow for security improvement plan.<\/p>\n\n\n\n<p>Security Center converts point in time assessments into one-click security posture reports, simplifying communication for audit, compliance, and security stakeholders. This allows you to expand your Salesforce ecosystem with confidence.<\/p>\n\n\n\n<p>Whether you are already leveraging Security Center to manage your security posture and operational risks across your environment or a customer looking for ways to improve the ability to control your Salesforce rollout, the new Security Center extension package should be part of your strategy. <\/p>\n\n\n\n<div class=\"layout-five wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">State of IT: Security<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Discover how AI innovation and security go hand-in-hand. Check out these insights from 2,000+ security experts.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/www.salesforce.com\/au\/form\/platform\/4th-state-of-it-security\/?d=701ed00000W8rvxAAB&#038;nc=701ed00000W8Lw7AAF\">Download now<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-five.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-five.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-five.png\" alt=\"\">\n\t\t\n\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Explore how you can utilise the new Security Center features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control. <\/p>\n","protected":false},"author":415,"featured_media":67527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"68636f5c63f502087604c2b6","post_meta_title":"","ai_synopsis":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[2744,2504,3171,3162],"sf_content_type":[],"coauthors":[3322],"class_list":["post-67520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-salesforce-platform","sf_topic-it","sf_topic-architect","sf_topic-data-security-standards"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Management at Scale with Security Center Extension Package | Salesforce<\/title>\n<meta name=\"description\" content=\"Explore how you can utilise the new Security Center features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Management at Scale with Security Center Extension Package\" \/>\n<meta property=\"og:description\" content=\"Explore how you can utilise the new Security Center features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-02T01:57:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-02T02:13:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leo da Silva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforce\" \/>\n<meta name=\"twitter:site\" content=\"@salesforce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leo da Silva\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/8cb08476f4c81d866c6c3c050685063b\"}],\"headline\":\"Security Management at Scale with Security Center Extension Package\",\"datePublished\":\"2025-07-02T01:57:48+00:00\",\"dateModified\":\"2025-07-02T02:13:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/\"},\"wordCount\":1366,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/\",\"name\":\"Security Management at Scale with Security Center Extension Package | Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg\",\"datePublished\":\"2025-07-02T01:57:48+00:00\",\"dateModified\":\"2025-07-02T02:13:28+00:00\",\"description\":\"Explore how you can utilise the new Security Center features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg\",\"width\":2048,\"height\":1152,\"caption\":\"security management\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"name\":\"Salesforce\",\"description\":\"Learn how to get ahead of trends and supercharge professional relationships\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\",\"https:\/\/x.com\/salesforce\",\"https:\/\/instagram.com\/salesforce\",\"http:\/\/www.linkedin.com\/company\/salesforce\",\"http:\/\/www.youtube.com\/Salesforce\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/8cb08476f4c81d866c6c3c050685063b\",\"name\":\"Leo da Silva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/c23696051739f0eece9b2d1c635188e6\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Leo_daSilva_Salesforce.jpeg?w=128&h=96&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Leo_daSilva_Salesforce.jpeg?w=128&h=96&crop=1\",\"width\":128,\"height\":96,\"caption\":\"Leo da Silva\"},\"description\":\"Over the years, Leo has had the opportunity to work in large, complex environments, designing, architecting, and implementing highly scalable and secure solutions for global companies.\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/author\/leo-da-silva\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Management at Scale with Security Center Extension Package | Salesforce","description":"Explore how you can utilise the new Security Center features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/","og_type":"article","og_title":"Security Management at Scale with Security Center Extension Package","og_description":"Explore how you can utilise the new Security Center features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control.","og_url":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce","article_published_time":"2025-07-02T01:57:48+00:00","article_modified_time":"2025-07-02T02:13:28+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg","type":"image\/jpeg"}],"author":"Leo da Silva","twitter_card":"summary_large_image","twitter_creator":"@salesforce","twitter_site":"@salesforce","twitter_misc":{"Written by":"Leo da Silva","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/8cb08476f4c81d866c6c3c050685063b"}],"headline":"Security Management at Scale with Security Center Extension Package","datePublished":"2025-07-02T01:57:48+00:00","dateModified":"2025-07-02T02:13:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/"},"wordCount":1366,"commentCount":0,"publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg","inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/","url":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/","name":"Security Management at Scale with Security Center Extension Package | Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg","datePublished":"2025-07-02T01:57:48+00:00","dateModified":"2025-07-02T02:13:28+00:00","description":"Explore how you can utilise the new Security Center features across key areas of an effective security management and observability strategy that involves data classification, operational risk assessment with clear strategies to manage risks and data access control.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/security-management-at-scale-with-security-center-extension-package\/#primaryimage","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg","width":2048,"height":1152,"caption":"security management"},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/au\/blog\/#website","url":"https:\/\/www.salesforce.com\/au\/blog\/","name":"Salesforce","description":"Learn how to get ahead of trends and supercharge professional relationships","publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce","https:\/\/x.com\/salesforce","https:\/\/instagram.com\/salesforce","http:\/\/www.linkedin.com\/company\/salesforce","http:\/\/www.youtube.com\/Salesforce"]},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/8cb08476f4c81d866c6c3c050685063b","name":"Leo da Silva","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/c23696051739f0eece9b2d1c635188e6","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Leo_daSilva_Salesforce.jpeg?w=128&h=96&crop=1","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/Leo_daSilva_Salesforce.jpeg?w=128&h=96&crop=1","width":128,"height":96,"caption":"Leo da Silva"},"description":"Over the years, Leo has had the opportunity to work in large, complex environments, designing, architecting, and implementing highly scalable and secure solutions for global companies.","url":"https:\/\/www.salesforce.com\/au\/blog\/author\/leo-da-silva\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/au\/blog","push-errors":false,"primary_topic":{"term_id":2744,"name":"Salesforce Platform","slug":"salesforce-platform","term_group":0,"term_taxonomy_id":2744,"taxonomy":"sf_topic","description":"","parent":0,"count":11,"filter":"raw"},"featured_image_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/07\/AdobeStock_528922878.jpeg?w=2048","_links":{"self":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/67520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/users\/415"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/comments?post=67520"}],"version-history":[{"count":2,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/67520\/revisions"}],"predecessor-version":[{"id":67529,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/67520\/revisions\/67529"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media\/67527"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media?parent=67520"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_topic?post=67520"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_content_type?post=67520"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/coauthors?post=67520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}