Salesforce Dictionary - Free Salesforce GlossarySalesforce Dictionary
Full Encrypted Data at Rest entry
How-to guide

Roll out Shield Platform Encryption

Encrypted data at rest is on by default. Configuration only applies when you choose to layer Shield Platform Encryption, BYOK, or Cache-Only Keys on top. The steps below cover that customer-control rollout.

By Dipojjal Chakrabarti · Founder & Editor, Salesforce DictionaryLast updated May 19, 2026

Encrypted data at rest is on by default. Configuration only applies when you choose to layer Shield Platform Encryption, BYOK, or Cache-Only Keys on top. The steps below cover that customer-control rollout.

  1. Confirm Shield license

    Check that your org has the Shield Platform Encryption license added. Without the license, Encryption Settings shows only the default platform encryption status.

  2. Identify fields and files to encrypt

    Work with security and business teams to list which fields are sensitive enough to require Shield. PII, financial data, and protected health information are typical candidates.

  3. Audit downstream impact

    For each candidate field, check if SOQL queries filter or sort by it, if validation rules reference it, and if reports group by it. Encryption may break these patterns; refactor before encrypting.

  4. Generate the tenant secret

    Setup > Encryption Settings > Key Management > Generate Tenant Secret. The platform creates a new key under Salesforce-managed mode; for BYOK, upload your own key material instead.

  5. Enable field-level encryption

    For each target field, click Edit in Encryption Settings and check Encrypted. Choose Probabilistic or Deterministic per field based on the query patterns you identified.

  6. Wait for encryption to apply

    The platform encrypts existing data asynchronously. For large orgs this takes hours; query the status from Encryption Statistics to confirm completion before declaring rollout complete.

  7. Plan key rotation cadence

    Add a quarterly or annual key rotation to your security calendar. Rotation is non-disruptive but produces audit log entries that compliance teams expect to see.

Key options
Salesforce-Managed Keyremember

Default. Salesforce generates and rotates keys. No customer key access. Baseline compliance.

BYOK (Bring Your Own Key)remember

Customer generates and uploads key material. Customer can destroy the key to revoke all access permanently.

Cache-Only Key Serviceremember

Customer hosts key in external KMS. Salesforce fetches on demand and discards. Strongest control; adds latency.

Probabilistic Encryptionremember

Per-record random IV. Strongest security; blocks SOQL filters, sorts, GROUP BY on the field.

Deterministic Encryptionremember

Fixed IV per field. Allows exact-match SOQL filters; blocks LIKE wildcards and full-text search.

Gotchas
  • Probabilistic encryption breaks any SOQL query that filters, sorts, or groups by the encrypted field. Audit query patterns before encrypting; pivots like dashboards may fail.
  • BYOK key destruction is irreversible. Destroying the key permanently removes access to all encrypted data, including by Salesforce. Plan key custody and destruction process with extreme care.
  • Not every standard field is supported by Shield. The supported field list is published and updated each release; confirm your target fields are on it before promising encryption.
  • Cache-Only Keys add latency to every encrypted-field operation. Heavy reports filtering encrypted fields can run noticeably slower; benchmark before production rollout.
  • Validation rules and Flow logic that compare encrypted field values may stop working. The platform supports limited operations; complex business logic referencing encrypted fields needs review.

See the full Encrypted Data at Rest entry

Encrypted Data at Rest includes the definition, worked example, deep dive, related terms, and a quiz.