Skip to main content

Every risky permission in your org. Traced to its source.

Most Salesforce orgs run with 26% of users as System Administrators, 234 unused permission sets, and integration users holding admin profiles. Find every one in 10 minutes. Free, read-only, with a 24-hour fix plan.

Last updated
Written by
Reviewed by Saahil Dhaka
Clientell · Permissions & Users
app.clientell.ai/audit/permissions

Acme Corp · Permissions Health

178 active users · 36 flagged · 234 unused permsets

At risk
47SysAdmins
14Risky integrations
234Unused permsets
62Inactive licensed
Top Risky UsersScore > 70
1Sarah Chen · Integration User · Modify All Data96
2Daniel Park · Former Admin · Inactive 127d89
3svc_dataloader · Service · API Enabled + Bulk84

Trusted by leaders at

Client logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logoClient logo
Permissions Data · 202604 / 04 findings

What we find on the first scan of a typical org

Drawn from 1,000+ permission audits across mid-market and enterprise. Numbers are typical patterns, not guarantees.

FINDING 01Critical
26% typical

System Administrator overuse

In a healthy org, fewer than 5% of users hold System Administrator. Most orgs we scan are at 20–30% because nobody ever ratcheted down. Each one is a compliance gap.

FINDING 02Critical
14 typical

Integration users with admin access

Service accounts that need API access but received the full Administrator profile because it was easier than scoping. Each is a permanent backdoor with no audit trail.

FINDING 03Critical
234 typical

Stale permission sets

Sets created during a 2022 project, abandoned in Q4, never cleaned up. Each one is a future "where did this access come from" question waiting to happen.

FINDING 04Critical
62 typical

Inactive users still licensed

Users who have not logged in for 90+ days but still consume a paid license, still hold their permissions, and still appear in role hierarchies. License waste + compliance risk.

Orgs analyzed
1,000+
Segment
Mid-market + Enterprise
Method
Read-only OAuth scan
Period
2024–2026
The Risk Matrix36 / users flagged

See every risky permission. Trace the source.

Click a profile to see its risk profile, then click a user to trace exactly which profile or permission set granted each permission. Sample data from a typical mid-market org.

Clientell · Permissions & Users
47
SysAdmins
26% of users
234
Unused permsets
Last assigned 12+ mo ago
36
High-risk users
Score ≥ 70
62
Inactive · licensed
127+ days no login
Profile coverage (click to inspect)
Risky Users · sorted by score
5 of 36
Permission Sets · 234 unused
5 of 287
CPQ_Admin_Override
Last assigned: 2023-Q4
0 usersUnused
Legacy_DataLoader
Last assigned: 14 mo ago
2 usersStale
Manager_Override_2022
Last assigned: Never
0 usersUnused
Sales_Admin_Tools
Last assigned: Current
12 usersActive
Setup_Audit_Read
Last assigned: Current
34 usersRisky
Effective Access
Sarah Chen · Integration User
Score 96
Permissions inherited
  • Modify All Data
  • View All Data
  • API Enabled
  • Author Apex
SourceInherited from profile + 2 permission sets1-click fix
Live · re-scan on demand

The 24-hour remediation plan ships with every audit. Free, read-only, SOC 2.

Get my audit
Risk score0–100, weighted
High-risk band≥ 70
Source visibilityProfile + permset
Sample org178 active users
n = 1,000+ scans · 2024–2026
Coverage Areas06 / 06 areas

What a Salesforce permissions audit actually covers

Six dimensions. Every finding traces back to its source profile or permission set. Every fix ships sandbox-tested.

01

Per-user risk scoring

Every active user gets a risk score from 0 to 100 based on the permissions they hold, the recency of their login, and the sensitivity of the data they can touch. Sorted by score, filterable by role, exportable for compliance review. A typical mid-market org has 36 users scoring above 70 on first scan.

02

Effective access drill-down

Pick any user. See exactly which permissions they hold. Trace each permission back to the specific profile or permission set that granted it. No more 'I do not know where this access came from' moments during an audit. Source attribution per permission, in plain English.

03

Profile consolidation map

Most orgs have 25+ profiles, each a copy of one above it with a slight modification. We map the overlap, propose the consolidation set, and show which profiles can collapse without removing any user's actual access. Sandbox-tested before you apply.

04

Stale permission set detector

234 unused permission sets is the typical pattern in a 4-year-old org. We find every one: never-assigned sets, sets where the last user was removed 12+ months ago, sets that duplicate a profile permission. Each ships with a safe-to-remove status.

05

Integration user least-privilege audit

Integration users running with System Administrator are the single most common compliance finding. We list every integration user, the access they actually use (from API call logs), and the scoped permission set that would substitute for SysAdmin without breaking anything.

06

Role hierarchy + sharing review

Visual map of your role hierarchy with user counts per node. Sharing rules listed with their effective scope. OWD configuration summarized. Spot phantom roles, empty branches, and sharing rules that quietly grant access through inheritance.

How to read your risk score

Salesforce permissions audit risk score bands and remediation action.
ScoreBandWhat it meansRecommended action
85–100CriticalModify All Data + Manage Users on a user who does not need them. Compliance violation in regulated industries.Downgrade within 24h. Scope to a least-privilege permset.
70–84HighOver-permissioned. User has View All Data or admin rights they do not actively use.Review and scope within 1 week.
50–69MediumMild over-permission. View All Data on a sales rep who does not need cross-territory visibility.Review next quarter.
Below 50CleanLeast-privilege baseline. User has only the permissions their role actually requires.No action needed.
Warning Signs05 / 05

Run the audit before any of these.

Permission cleanup is faster before the auditor or the agent or the breach forces it.

01

Your SOC 2 audit is in 60 days

The auditor will ask: who has access to customer data, how do you know, and how often do you review it? If your answer involves a manual spreadsheet last updated 8 months ago, you are about to fail. Our audit ships every finding mapped to the SOC 2 control it touches.

02

An admin or contractor just left

Their user is technically deactivated, but their permissions remain in the permsets and profiles. If anyone re-activates the account or reuses the email, the access returns. Our audit surfaces deactivated users whose permission assignments need cleanup.

03

Your org has 25+ profiles

Profile count correlates almost perfectly with permission leakage. Above 25, you have a permissions sprawl problem and nobody knows the full picture anymore. Our audit maps the overlap and proposes the consolidation set.

04

You are planning an Agentforce deployment

The agent inherits whatever runtime user permissions you give it. If that user can Modify All Data because nobody got around to scoping it, the agent can too. Permission hygiene is one of the four dimensions our AI Readiness score measures.

05

You inherited the org from a previous admin

You do not actually know who has access to what. Before you build anything new on top, you need a map. Our audit reads the org directly and produces the map in 10 minutes.

Deliverables05 / 05

What ships with the audit

Five deliverables. Designed for compliance review, audit prep, and internal action.

01

Risk Score per user (0–100)

Every active user scored, ranked, and filterable. Includes login recency, profile assignment, permission set assignment, and data access scope. Sorted worst-first so the urgent fixes land at the top.

02

Effective access report per user

Pick any user, see every permission they hold and the exact profile or permission set that granted it. The report your compliance team has been asking for. Available as PDF and XLSX.

03

Profile consolidation plan

Mapped overlap between your existing profiles, proposed consolidation set, and per-user impact preview. Sandbox-safe, one-click apply when ready.

04

Stale permset cleanup queue

Every unused permission set, every set with no current users, every set that duplicates a profile permission. Each tagged with safe-to-remove status and dependency check.

05

Compliance framework mapping

Every finding mapped to the SOC 2, ISO 27001, GDPR, or HIPAA control it touches. Audit-evidence ready. Hand it to your auditor without translating.

Three things no other permissions tool does

03 / 03
01

Effective access source attribution per permission

Trace every permission a user holds back to the exact profile or permission set that granted it. SF Optimizer lists permsets but does not trace inheritance. Strongpoint focuses on change tracking, not permission source. Field Trip audits field usage, not access source. We tell you where every permission came from in plain English.

SF Optimizer
Strongpoint
Field Trip
Clientell
02

Per-user risk scoring with compliance mapping

Score every user 0–100 weighted by permission sensitivity, login recency, and data access scope. Map each finding to SOC 2, ISO 27001, GDPR, HIPAA, or NIST CSF controls. Audit-evidence-ready exports.

SF Optimizer
Strongpoint½
Field Trip
Clientell
03

Sandbox-tested one-click fix per finding

Every risky permission ships with a proposed fix: scoped substitute permset, downgrade path, profile consolidation. Dry-run in sandbox, review the diff, apply with one click. Diagnosis-only tools stop at the report.

SF Optimizer
Strongpoint
Field Trip
Clientell
FAQ10 / 10

You have
questions,
we have
answers.

Everything compliance, security, and admin teams ask before running a permissions audit.

01

What is a Salesforce permissions audit?

A Salesforce permissions audit is a diagnostic that surfaces over-permissioned users, stale permission sets, integration users with excessive access, and the gap between what users have access to versus what they actually need. The audit reads your org directly (read-only OAuth), scores each user on a 0–100 risk scale, and traces every permission back to the profile or permission set that granted it. Clientell offers a free version that returns results in 10 minutes with a 24-hour remediation plan.

02

How much does a Salesforce permissions audit cost?

Consulting partners charge $5,000 to $25,000 for a manual permissions review. Big-4 SOC 2 audit firms add another $20,000 to $50,000 to map permissions against the SOC 2 control framework. Clientell runs the equivalent audit for free, returns results in 10 minutes, ships the compliance mapping included, and produces evidence-ready exports for ISO 27001, GDPR, HIPAA, and NIST CSF in addition to SOC 2.

03

How long does the permissions audit take?

The scan runs in roughly 10 minutes against a read-only OAuth user. The full report, including per-user risk roster, effective-access drill-downs, profile consolidation proposal, and stale-permset cleanup queue, is delivered in 24 hours. Manual consulting audits typically take 2 to 6 weeks.

04

Is the permissions audit free?

Yes. The scan, the risk roster, the effective-access reports, the consolidation plan, the stale-permset queue, and the compliance framework mapping are all free with no paid engagement required. The free version is the same product paid customers use, just without the ongoing monitoring layer.

05

What is "effective access" in a Salesforce permissions audit?

Effective access is the union of every permission a user actually has, regardless of whether it came from a profile, a permission set, a permission set group, or a role hierarchy. Most audits stop at "this user has X profile and Y permission sets". Effective access goes further: for each individual permission the user holds, it traces back the exact assignment source. This is what auditors actually want to see during a SOC 2 or ISO 27001 review.

06

How is this different from Salesforce Optimizer?

Salesforce Optimizer is a free Salesforce-native tool that produces a static PDF of generic recommendations. It does not score per-user risk, does not benchmark against industry, does not produce effective-access reports, and does not propose sandbox-tested fixes. Our audit scores 0–100 per user, benchmarks against 1,000+ scanned orgs, traces every permission to its source, and ships a one-click fix per finding.

07

How many profiles should a Salesforce org have?

In a clean org, fewer than 25. Above 25 and you almost certainly have profile sprawl: each profile is a near-copy of one above it with a small modification, and nobody knows the full picture. Our audit maps the overlap between your profiles, proposes a consolidation set (typically reducing 30+ profiles to 8–12), and shows the per-user access impact before you apply.

08

What percentage of users should hold System Administrator?

Healthy benchmark is under 5%. The orgs we scan typically run at 20–30%, often because the original 'temporary' admin grant from a 2021 project was never revoked. Each SysAdmin user is a permanent backdoor with broad Modify All Data and Manage Users rights. Our audit flags every SysAdmin user, proposes a scoped substitute permission set, and lets you downgrade them with one click in sandbox.

09

Does the audit work for integration users?

Yes, and integration users are usually the worst-performing user class in the audit. Service accounts created in 2020 with full Administrator profile because it was easier than scoping. Our audit lists every integration user, the API call patterns they actually use, and proposes the least-privilege permission set that would let them keep working without the SysAdmin breadcrumbs.

10

What permissions does the audit need to scan my org?

A read-only OAuth user with API access plus Setup Audit Trail read permission. We do not write to your org during the scan. We do not export PII. The OAuth connection can be revoked at any time. The audit is SOC 2 Type II compliant and the entire scan happens in our customer-isolated infrastructure.

Customer Reviews

What teams found with the Permissions Audit

The audit surfaced 78 unused permission sets and 11 integration users with admin rights in under 10 minutes. What our consulting partner quoted six weeks to deliver, this returned overnight.
SC
Sarah Chen
RevOps Director, Mid-market SaaS
Effective-access drill-down is the feature I have been asking auditors to give us for three years. Now I can answer “where did this access come from” in a single click instead of a half-day investigation.
MW
Marcus Webb
Salesforce Architect, FinServ
We went from failing SOC 2 access control criteria to passing on the first attempt after running the audit and applying the remediation plan. The compliance mapping was audit-evidence ready.
PI
Priya Iyer
CISO, Healthcare Network
References

References & Authority Sources

Every claim on this page is anchored to a primary source. The references below cite official standards bodies, Salesforce documentation, and peer-reviewed industry research.

  1. [1]
    User Permissions and Access — Salesforce HelpSalesforce

    Supports: Profile and permission set fundamentals

  2. [2]
    NIST SP 800-53 Rev. 5 — Access Control (AC) FamilyNational Institute of Standards and Technology

    Supports: Least-privilege baseline (AC-2, AC-3, AC-6)

  3. [3]
    SOC 2 Trust Services Criteria — Logical and Physical Access (CC6.1-CC6.8)AICPA

    Supports: Access control compliance mapping

  4. [4]
    OWASP Access Control Cheat SheetOWASP Foundation

    Supports: Authorization best practices

  5. [5]
    Salesforce Permission Set License ReferenceSalesforce

    Supports: Permission Set License taxonomy

Getting Started

Get your free
Salesforce permissions audit.

Per-user risk scoring. Effective-access drill-down. Compliance framework mapping. 24-hour remediation plan with sandbox-tested one-click apply. Free, no install.

Unlimited messages  ·  No credit card required

SOC 2
HIPAA
GDPR
Salesforce Partner