Skip Nav
Search Results
    Request a Demo

    What Recent Breaches Teach Us About Data Sovereignty and Trustworthy Architectures

    Raju Malhotra – Chief Product & Technology Officer – at Certinia
    Raju Malhotra

    For many of our peers in the technology and services community, this has been a difficult few weeks. The news regarding the data theft involving Gainsight and the subsequent precautionary measures taken by Salesforce is the kind of event that keeps every CIO, CISO, and business leader awake at night.

    If you are a leader currently navigating the uncertainty of this breach, verifying your logs, or worrying about the sanctity of your customer data—we see you. The anxiety is real, and the disruption to your teams and your business is significant.

    While it is easy to focus on the specific names in the headlines, I believe we need to take a step back and look at the broader architectural reality this incident has exposed. We are seeing a significant uptick in integrations being exploited across the SaaS landscape. The sophistication of these supply chain attacks is evolving, and they are specifically targeting the "bridges" that are built between systems.

    This latest instance is a stark reminder that the era of "connect everything" comes with a hidden tax: Risk.

    The External Connection Vulnerability

    In the rush to build "best-of-breed" tech stacks, our industry normalized the practice of moving data. Many accepted that to get value from customer data, they had to pipe it out of their system of record (CRM), send it across an API bridge to an external server, process it, and send it back.

    As we are seeing now, that movement equals risk.

    The vulnerability often isn't the platform itself, but the connection—specifically the reliance on persistent OAuth tokens that act as keys to the kingdom. When those keys are compromised, or when that external "bridge" is breached, your data is exposed, regardless of how secure your core CRM might be.

    This forces us to have a difficult, but necessary, conversation about our tech stacks. We have to ask: Why are we moving this data in the first place?

    9 Reasons Services Delivery Works Better on the Salesforce Platform

    AI Raises the Stakes Even Further

    This conversation is urgent today, but it will be critical tomorrow. As we race toward an AI-driven future, the control over data becomes paramount.

    When we introduce AI agents into our workflows, they require access to vast amounts of context to be effective. If your architecture relies on external integrations, you aren't just giving an API token to a software application; you are potentially giving an external AI model access to your customer’s most sensitive information.

    If we cannot guarantee the security of a standard integration today, how can we ensure the safety of autonomous AI agents operating outside our trust boundary tomorrow?

    A Path Forward: Security by Inheritance

    For those of you re-evaluating your architecture in light of this news, I offer a guiding principle: Simplicity is security.

    The safest bridge is the one you never have to build.

    We need to evolve our thinking from "managing" integration risk to eliminating it. This is why I am such a staunch advocate for the Native Model.

    • Data Residency: When your applications live on the platform, critical data never leaves the Salesforce Trust Domain. There is no "commute" where data can be intercepted or mishandled.
    • Access Credentials: Native apps inherit the existing Salesforce session. There are no high-risk, external OAuth tokens to be stolen or exploited.
    • Business Continuity: As we saw this week, when a breach occurs, the immediate remediation is often to sever the connection. For integrated apps, this means operations grind to a halt. Native apps are immune to API-token revocation, ensuring stability even during security events.

    We Are Here to Help

    If you are currently using an integrated solution and feeling the weight of this uncertainty, know that you are not alone. Security Inheritance—knowing that your native applications automatically benefit from the billions of dollars Salesforce invests in enterprise security—is the ultimate peace of mind.

    Maximize your Salesforce investment with Certinia

    See the impact Certinia + Salesforce could have on your services business.
    Certinia dashboards give real-time visibility into project actuals, expenses, and resource requests