Salesforce environments are generally well protected from external attacks. However, internal activity, compromised user credentials, or poorly configured integrations can still expose sensitive CRM data.
Even a small mistake, such as an employee accessing the wrong report or a third-party application querying data incorrectly, can create a security risk.
Salesforce provides powerful monitoring tools such as Event Monitoring and Transaction Security, which are part of Salesforce Shield. These tools allow administrators to monitor activity and apply policies that stop suspicious behaviour.
However, organizations can strengthen their security further by implementing canary records and canary fields. These mechanisms act as hidden detection tools that alert administrators when unusual data access occurs.
Canaries vs. Honeypots
Many cybersecurity professionals compare canaries with honeypots because both are security techniques designed to detect attackers. However, they serve different purposes.
Honeypots are decoy systems designed to attract attackers. They mimic real systems so that security teams can observe attacker behaviour and collect information about their methods.
Canaries, on the other hand, are embedded within real production systems. They are not designed to attract attention. Instead, any interaction with them automatically signals suspicious activity.
This makes canaries particularly effective for detecting unauthorized access within existing business systems such as Salesforce.
A Brief History of the Term
The term “canary” comes from coal mining.
In the past, miners carried canary birds into underground mines. These birds were extremely sensitive to toxic gases like carbon monoxide.
If the canary stopped singing, it warned miners of danger before the gas could harm them.
Cybersecurity uses the same concept. A canary mechanism silently signals danger the moment it is accessed.
Detecting Suspicious Activity
Canary records help identify threats that may bypass normal security controls.
These threats usually fall into three main categories.
iBirds Services offers Salesforce Community Cloud Services that help businesses build secure customer and partner portals while maintaining strict access control and data protection.
Internal Staff Activity
If a user accesses a canary record or includes a canary field in a report, it may indicate unauthorized exploration of data.
Compromised Accounts
Attackers using stolen credentials often scan Salesforce objects or run automated queries. Canary data appearing in those queries can reveal the intrusion quickly.
Third-Party Applications
Connected apps and external integrations sometimes access more data than intended. Canary records help detect such unexpected behaviour.
Improve Salesforce Security with Expert Services
Organizations handling large volumes of sensitive data often require advanced monitoring and security controls.
iBirds Services provides Salesforce Security and Compliance Services to help businesses monitor threats, protect CRM data, and strengthen Salesforce security architecture.
Creating Canary Records
A canary record is a Salesforce record that exists only for security detection. It looks like a normal record but has no business purpose.
These records are placed within sensitive objects and act as hidden detection triggers.
When someone accesses them directly or indirectly through reports, list views, or API queries, the system logs the activity.
iBirds Services provides Salesforce Marketing Cloud Services to help businesses manage customer journeys, marketing automation, and data security within Salesforce ecosystems.
Event Monitoring captures such interactions through events like:
- API Events
- List View Events
- Report Events
- Lightning URI Events
Administrators can then review the events and investigate suspicious behaviour.
Key Design Guidelines
Implementing canary records effectively requires careful planning.
Placement in Sensitive Objects
Canary records should be created in both standard and custom objects that contain sensitive data.
Avoid creating a separate object specifically for canaries. Attackers typically explore business-related objects, so embedding canaries within them increases detection probability.
Baiting Record Access
Organizations may intentionally give canary records appealing names. For example, records referencing executives or well-known individuals may attract attention.
This technique helps identify unauthorized internal exploration.
Discrete Identification Fields
Avoid obvious identifiers like IsCanary__c.
Instead, use unique fields or unusual values that only administrators understand.
Exclusion From Normal Operations
Canary records should not appear in:
- List views
- Reports
- Automation processes
- Integration queries
This ensures they remain hidden during normal business activity.
Freshness and Archival
New canary records should be created regularly. This ensures they remain distributed across both current and historical datasets.
Scheduled Flows or Apex automation can help maintain these records automatically.
Strengthen Your CRM With Salesforce Managed Services
Maintaining a secure Salesforce environment requires continuous monitoring and management.
iBirds Services offers Salesforce Managed Services that help organizations monitor system activity, maintain configurations, and improve CRM security.
Creating Canary Fields
In addition to records, organizations can implement canary fields.
These fields appear valuable but contain no real data.
Examples include field names such as:
- Salary_Info__c
- Credit_Card_Token__c
- SSN__c
These fields should not appear on record pages, reports, or list views. However, administrators should provide read access through field-level security.
If an attacker queries the field using an API or reporting tool, Event Monitoring logs the activity.
iBirds Services offers Salesforce Education Cloud Service to help educational organizations manage student data, recruitment processes, and engagement securely within Salesforce.
Recommended Configuration
Canary fields should be configured carefully to maximize detection effectiveness.
Important recommendations include:
- Use field names that appear realistic
- Ensure the fields are excluded from page layouts
- Remove them from reports and automation logic
- Provide read-only field-level access so monitoring events are generated
These steps ensure that any attempt to access the field will be captured.
Integration With Event Monitoring and Transaction Security
Canary mechanisms become far more powerful when combined with Salesforce monitoring tools.
Salesforce Event Monitoring records user activity, while Transaction Security policies can automatically respond when suspicious behaviour occurs.
Event Streams
Event Monitoring produces detailed activity events that can be streamed to external monitoring systems.
Security teams can forward these events to their Security Information and Event Management (SIEM) platforms.
This allows security analysts to investigate suspicious activity quickly and respond before data exposure escalates.
Build Advanced Monitoring With Salesforce Development
Security monitoring often requires custom integrations, automation logic, and event handling.
iBirds Services provides Salesforce Development Services to build custom monitoring solutions, automation workflows, and integrations for secure CRM environments.
Transaction Security Policies
Transaction Security allows administrators to automatically respond to suspicious actions.
Possible responses include:
- Blocking access requests
- Requiring multi-factor authentication
- Sending alerts to security teams
- Triggering notifications
These policies help organizations respond immediately when a canary field or record is accessed.
Canary Field Example Using Transaction Security
You can create your own canary field using Transaction Security in a Trailhead Playground Org to see how it works. In this example, a custom text field named NextOneTimePasscode__c is created to act as the canary field.
Next, open Setup and search for Transaction Security Policies using Quick Find, or navigate to Security → Event Monitoring → Transaction Security Policies. Make sure Transaction Security is enabled before creating a new policy.Click New, where you will see two options: Clicks or Code. For this example, the Condition Builder using clicks is selected. Apex should only be used when identifying advanced conditions for the policy.

Now configure the policy conditions. Select the Report Event where the Queried Entities contain the Account Object, and the Name of Columns or Grouped Columns includes the canary field NextOneTimePasscode__c. This setup allows the system to detect when someone tries to access the protected field in a report.

Next, define the action that should occur when the policy is triggered. In this case, a custom message is displayed to the user stating that access to the field is blocked. At the same time, an in-app notification is sent to the security team so they can review the activity.

When a user attempts to add this field to a report, Salesforce displays the custom warning message that was configured in the policy. This helps alert both the user and the security team that a restricted field has been accessed.

A similar policy can also be created for List View access. In this case, use a List View Event where the Queried Entities include the Account Object, and the Name of Columns contains the canary field NextOneTimePasscode__c. This ensures the same protection is applied to list views as well.

iBirds Services delivers a Salesforce Solution for Hospitality designed to help hotels and hospitality businesses manage guest relationships, reservations, and service operations securely.
Best Practices
Organizations implementing canary detection should follow several best practices.
- Implement canary records gradually
- Place them across sensitive objects
- Use subtle identification methods
- Provide read-only access to canary fields
- Exclude canaries from business workflows
- Monitor activity continuously through Event Monitoring
- Filter backup accounts from alert triggers
Security teams should also maintain documentation of their canary strategy, but access to that documentation should remain restricted.
Optimize Salesforce Security Architecture
A secure Salesforce environment requires proper architecture, monitoring, and governance.
iBirds Services offers Salesforce Consulting Services to design secure, scalable CRM environments aligned with business and compliance requirements.
Final Thoughts
Canary records and canary fields provide an additional layer of protection for Salesforce environments.
When implemented correctly, they allow organizations to detect unauthorized access attempts that might otherwise remain hidden.
Combined with Salesforce Event Monitoring and Transaction Security, canary mechanisms create a proactive security system that alerts administrators to suspicious behaviour before it escalates into a serious threat.
Organizations that integrate these mechanisms into their CRM security strategy gain greater visibility and faster incident response across their Salesforce environments.
Frequently Asked Questions
1. What are Salesforce canary records?
Salesforce canary records are specially created records placed inside Salesforce objects to detect unauthorized access. These records do not serve any business purpose and exist only as security detection mechanisms. If someone accesses or queries these records, it immediately indicates suspicious activity that should be investigated.
2. What are canary fields in Salesforce?
Canary fields are hidden fields added to Salesforce objects that appear valuable but contain no real business data. These fields are intentionally designed to detect unauthorized queries or suspicious reporting attempts. When someone attempts to access or query a canary field, the activity is captured through Event Monitoring.
3. How do canary records improve Salesforce security?
Canary records act like silent security tripwires within Salesforce data. When accessed through reports, APIs, or direct record queries, they generate monitoring events that alert security teams. This allows administrators to detect potential security breaches earlier and respond quickly before sensitive data is compromised.
4. Which Salesforce tools support canary detection?
Salesforce Event Monitoring and Transaction Security are the main tools used to detect canary interactions. Event Monitoring captures detailed user activities, while Transaction Security policies can automatically block suspicious actions or trigger alerts. Together, these tools provide strong monitoring and protection for Salesforce environments.
5. Can canary records detect compromised credentials?
Yes, canary records can help detect compromised credentials. Attackers using stolen login details often explore Salesforce objects and run automated queries to extract data. If their queries interact with a canary record, the activity becomes visible to administrators through monitoring logs and alerts.
6. Should canary records appear in reports or automation?
No, canary records should remain hidden from normal business operations. They should be excluded from reports, list views, automation processes, and integrations. Keeping them hidden ensures that any interaction with them is likely suspicious and worth investigating.
7. How does Event Monitoring help detect suspicious activity?
Event Monitoring records detailed information about user actions within Salesforce. This includes API calls, report access, login activity, and data queries. When a canary record or field appears in these events, security teams can quickly identify unusual behavior and investigate the potential threat.
