Salesforce Project Management Software by Aprika

Mission Control Security and Compliance

Mission Control Security and Compliance

Security is at the core of Mission Control’s application development. This is why our products are designed to run exclusively on the Salesforce platform. Our key information security principles include:

  • Confidentiality: Protecting information from unauthorized access or disclosure.
  • Integrity: Ensuring data accuracy and consistency throughout its lifecycle.
  • Availability: Providing reliable access to information whenever it’s needed.


Mission Control is dedicated to upholding these principles and earning the trust of our customers. Central to our commitment is a comprehensive security and privacy program that carefully addresses security and data protection across all services, including data submitted by customers to our platform (“customer data”). Our customers span diverse industries, some with rigorous security needs, including financial services, healthcare, technology, energy, and government sectors.

Salesforce ISV Partner

Mission Control is built on the Salesforce Platform, a trusted and mature platform for cloud applications. Mission Control undergoes a rigorous qualitative and quantitative security review by Salesforce, ensuring it meets essential security standards and best practices. By leveraging this robust, cloud-based platform, Mission Control and its customers gain access to a suite of security features, including user management, data visibility protection, disaster recovery and backups, as well as physical and network security. Hosted on the Salesforce Platform, Mission Control consistently meets the highest data security requirements and complies with major security, privacy, and data protection laws and standards worldwide.

Salesforce AppExchange Security Review

In order to be listed on the Salesforce AppExchange, Mission Control has to go through a rigorous security review by Salesforce. Further information on this process can be found here: https://developer.salesforce.com/docs/atlas.en-us.packagingGuide.meta/packagingGuide/security_review_guidelines.htm

Salesforce Security

Mission Control is built natively on the Salesforce Platform. All data is stored within Salesforce, therefore please refer to the Salesforce Security documentation: https://security.salesforce.com/

Salesforce Compliance

Since Mission Control operates within the Salesforce Platform, both Mission Control and its customers benefit from the robust security measures and certifications maintained by Salesforce. Salesforce undergoes extensive privacy and security evaluations and holds certifications from numerous independent auditors and certifying bodies. These include:

Geographical Recognition:

  • EU / EEA Binding Corporate Rules for Processors
  • EU / EEA and Switzerland Safe Harbor self-certification through the U.S. Department of Commerce
  • TRUSTe Certified Privacy Seal


Global Audit Compliance:

  • ISO 27001
  • SSAE 16/ISAE 3402 SOC-1
  • SOC 2
  • SOC 3
  • FedRAMP
  • PCI-DSS
  • TÜV Rheinland Certified Cloud Service


HIPAA Compliance:

As Mission Control is built natively on the Salesforce Platform, HIPAA Compliance is achieved through the various security and administration features available on the Salesforce Platform. Please refer to the document available on this Salesforce Page: https://compliance.salesforce.com/en/documents/a005A00000qtPpiQAE. Beyond the various security controls Salesforce provides, you can control access to Mission Control data using Salesforce Profiles, Permission Sets, Sharing Rules and Field Level Security. You’re also able to leverage Salesforce Field History Tracking to maintain an audit trail of key data points.

For a complete and current list of Salesforce’s security and privacy assessments and certifications, visit Salesforce Trust.

Disaster Recovery

As Mission Control is built natively on the Salesforce Platform, all of your Mission Control data resides within Custom Objects inside your own Salesforce Org. Therefore, your Mission Control data will be stored wherever your Salesforce Org Data Center is located. Salesforce does provide disaster recovery and failover. Mission Control does not have access to your data.

Incident Response Plan

Being built natively on the Salesforce Platform, Mission Control resides inside your own Salesforce Org. In order to access Mission Control, you need to authenticate with the Salesforce Security Layer. A Data Breach would occur at the Salesforce layer, and Salesforce would be responsible for communicating such a breach with you directly.

Data Encryption

Mission Control relies on the Salesforce Platform’s encryption capabilities to secure data in transit. Salesforce utilizes industry-standard encryption technologies to protect customer data and communications during transmission between a customer’s network and Mission Control applications, including 128-bit Advanced Encryption Standard (AES) and PCI-DSS Level 1 Compliance. Additionally, customer data is encrypted during transmission between data centers for replication purposes. Further security features are available through the Salesforce Shield program, offered directly by Salesforce.

Data / User Access Management

Mission Control does not have any access to your data. The only visibility we have is the number of licenses you have assigned to your Salesforce Users. We do not have visibility of the User’s details. Your Users will access Mission Control by logging into Salesforce, which supports single-sign on. Once they are logged into Salesforce, if they have a Mission Control license assigned to their User, they will have access to Mission Control.

Get your 14 Day FREE TRIAL

Simply enter your email address below, and we will set you on your way to your Free Trial. Enjoy the ride!

This field is for validation purposes and should be left unchanged.

Discover the business and economic impacts of Mission Control

Our clients have achieved an average 6,000% ROI on their Mission Control investment, click below to read more and the opportunity to download the full report. 

Sign up to our newsletter