Record Level Security in Salesforce
Chapter Topics
- Data Security and Level of Data Access in Salesforce
- User Management (Control Access to the Organization)
- Managing Salesforce Password Policies (Control Access to Organization)
- Restrict Login Access by IP Address in Salesforce
- Restrict Login Access by Time
- Object Level Security in Salesforce
- Permission Sets in Salesforce
- Field Level Security in Salesforce
- Record Level Security in Salesforce
- Organization Wide Default (OWD) in Salesforce
- Role Hierarchy And Public Group In Salesforce
- Sharing Rules in Salesforce
- Manual Sharing in Salesforce
Record-level security in Salesforce is a powerful tool for controlling exactly which data individual users can access within the platform. It goes beyond the primary object and field-level permissions by allowing you to grant or restrict access to specific records within an object, ensuring sensitive information stays in the right hands.
Here is why you should use it:
- Increased data security and compliance.
- Improved data hygiene and accuracy.
- Enhanced user experience by showing only relevant data.
- More granular control over data access.
The implementation of Record Level Security in Salesforce is especially important, as it enhances data confidentiality and privacy by restricting access to sensitive information. It reduces the risk of data breaches or misuse while improving data integrity by ensuring users can only see and modify data relevant to their roles.
What is Salesforce Record Level Security?
Record Level Security in Salesforce determines which individual records in each object can be viewed and edited by users who have access to it in their profile.
The permission on a record is always evaluated based on a combination of object, field, and record-level security permissions. When object-level permissions conflict with record-level permissions, the most restrictive setting wins.
To implement it, the administrator needs to answer the following questions:
- Should users have open access to every record, or only to a subset?
- If it’s a subset, then what rules should determine whether the user can access it?
Types of Implementing Salesforce Record-Level Security
Salesforce presents four distinct strategies for implementing Record-Level Security. They provide varying levels of data access tailored to an organization’s specific needs. Let’s delve deeper into each method to better understand how they contribute to your overall data security in Salesforce:

1. Organization-Wide Defaults
OWD sets the baseline access level for all users to all records within an object. Options include Public Read/Write, Public Read Only, or Private. Public Read/Write grants everyone read and write access, while Public Read Only allows viewing but not editing. Private restricts access to the owner and those above them in the role hierarchy.
2. Role Hierarchies
Role hierarchy Salesforce is a fundamental feature that defines a user’s level of access to records. It’s based on the organization’s hierarchy, where higher-level users can access records owned by their subordinates. Role hierarchy is beneficial for scenarios where an organizational structure influences data visibility.
Unless your sharing settings are set to “Private,” when you build up role hierarchies, users at a higher hierarchy level always have the same access permissions (as defined by your sharing settings) to data records as those below them. Make sure the Grant Access Using Hierarchy checkbox is checked in order to grant users access to higher levels of the hierarchy.
Setup->Sharing Settings->Edit-> Grant access Using Hierarchies on targeted objects.
3. Sharing Rules
This method creates exceptions to OWDs and grants access to specific groups or users based on defined criteria. These are useful for situations where specific user groups need access to records outside their usual permissions.
There are two types of sharing rules in Salesforce:
- Based on record ownership.
- Based on criteria.
Setup->Sharing Settings->Go to Object Related List->Click New-> Create
4. Manual Sharing
Manual sharing allows record owners to directly share individual records with specific users or groups, even if those users or groups wouldn’t otherwise have access. It provides granular access control for specific situations or collaborations. However, the user we are sharing the record with must be active. If the owner changes, the manual sharing entries are automatically removed.
By utilizing these methods, you can create a data access strategy that aligns with your organization’s unique needs and protects your sensitive data.
How to Implement Record-Level Security?
Here’s a step-by-step guide on how to implement record-level security:
Set Organization-Wide Defaults
- Define the default sharing setting for an object.
- Go to Setup > Sharing Settings.
- Choose the desired sharing setting (Private, Public Read-Only, Public Read/Write, or Public Full Access) for the object.
- These settings establish the baseline for record access.
Role Hierarchy
- Leverage the role hierarchy to grant access to records based on an individual’s position within the organization.
- Users higher in the hierarchy can access records owned by users below them.
- Set up roles in Setup > Users > Roles.
Set Sharing Rules
- Create sharing rules to extend access based on record criteria.
- Go to Setup > Sharing Settings > Sharing Rules.
- Define rules to share records that meet specific criteria with a group of users, either based on ownership or on criteria.
Manual Sharing
- Allow record owners to manually share individual records with other users.
- Users can manually share records they own with specific individuals or groups.
Monitor and Audit
Now, you just need to regularly review and audit record access settings. You can utilize Salesforce’s built-in tools like Salesforce Security Health Check, Login history, Field audit trail, and ‘View all users’ reports to monitor user activity and security settings.

To Keep In Mind
Profiles and Permission Sets are a prerequisite that you must take care of before setting any record-level security in Salesforce.
- Assign profiles to users based on their job roles.
- Profiles control object and field-level permissions.
- Use permission sets to extend permissions beyond what profiles grant.
By combining these strategies, you can create a robust record-level security model in Salesforce that aligns with your organization’s structure and ensures that users have the appropriate level of access to records.
Next TopicNeed more support?
Get a head start with our FREE study notes!
Learn more and get all the answers you need at zero cost. Improve your skills using our detailed notes prepared by industry experts to help you excel.