Summary
In this chapter, we've seen how we can enhance security by using the features listed in the who sees what pyramid. At first, we defined the permissions each user needs to be allowed to access objects and their fields, using profiles and permission sets.
Then, we leveraged the sharing model, configuring the baseline sharing level with the OWD sharing settings, and then we learned how role hierarchy, sharing rules, and manual sharing can spread record access through our CRM's user base. We saw that role hierarchies allow records to be automatically shared to the record owner's managers, sharing rules allow us to expand record access to groups of users based on the current owner (owner-based rule) or based on record fields (criteria-based rule), and how manual sharing allows any user to share a record with any other user, thus increasing the number of users that can help manage the record.
All these features combine to deliver safer and more efficient access...