Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Recent activity by Jonathan van Driessen-
Describe the release management process you use?
Release Processes and Management DESelect maintains a formal Change Management process that outlines the requirements for making application and infrastructure changes and is planned by respective ...
-
What does the Salesforce Security Review entail?
Before accepting applications on the AppExchange, Salesforce does a thorough security review of each application. During this review, they scan the app for security vulnerabilities. Besides the ini...
-
Do you support role-based access control (RBAC) for end-users / administrators?
There are two types of users in DESelect: Administrators and Users. Administrators can decide which Salesforce Marketing Cloud users can have access to DESelect.
-
Are upgrades or system changes installed during off-peak hours or in a manner that does not impact the customer?
Though customers typically don't notice when updates occur, for safety reasons releases are always done 7-8 AM Brussels time and on weekends.
-
Do you use an automated source code analysis tool to detect security defects in code prior to production?
Yes, we use several tools to analyse security defects before releasing to production.
-
Do you review your applications for security vulnerabilities and address any issues prior to deployment to production?
Yes, all code changes are reviewed by 3 other developers and a product manager before deployment to production.
-
Are all identified security, contractual, and regulatory requirements for customer access contractually addressed and remediated prior to granting customers access to data, assets, and information systems?
Yes.
-
Do you conduct network penetration tests of your cloud service infrastructure at least annually?
Yes.
-
Do you conduct application penetration tests of your cloud infrastructure regularly?
Yes.
-
Are controls in place to prevent unauthorized access to your application, program, or object source code, and assure it is restricted to authorized personnel only?
Yes.