System Administrator overuse
In a healthy org, fewer than 5% of users hold System Administrator. Most orgs we scan are at 20–30% because nobody ever ratcheted down. Each one is a compliance gap.
Most Salesforce orgs run with 26% of users as System Administrators, 234 unused permission sets, and integration users holding admin profiles. Find every one in 10 minutes. Free, read-only, with a 24-hour fix plan.
Acme Corp · Permissions Health
178 active users · 36 flagged · 234 unused permsets
Trusted by leaders at
Drawn from 1,000+ permission audits across mid-market and enterprise. Numbers are typical patterns, not guarantees.
In a healthy org, fewer than 5% of users hold System Administrator. Most orgs we scan are at 20–30% because nobody ever ratcheted down. Each one is a compliance gap.
Service accounts that need API access but received the full Administrator profile because it was easier than scoping. Each is a permanent backdoor with no audit trail.
Sets created during a 2022 project, abandoned in Q4, never cleaned up. Each one is a future "where did this access come from" question waiting to happen.
Users who have not logged in for 90+ days but still consume a paid license, still hold their permissions, and still appear in role hierarchies. License waste + compliance risk.
Click a profile to see its risk profile, then click a user to trace exactly which profile or permission set granted each permission. Sample data from a typical mid-market org.
The 24-hour remediation plan ships with every audit. Free, read-only, SOC 2.
Get my auditSix dimensions. Every finding traces back to its source profile or permission set. Every fix ships sandbox-tested.
Every active user gets a risk score from 0 to 100 based on the permissions they hold, the recency of their login, and the sensitivity of the data they can touch. Sorted by score, filterable by role, exportable for compliance review. A typical mid-market org has 36 users scoring above 70 on first scan.
Pick any user. See exactly which permissions they hold. Trace each permission back to the specific profile or permission set that granted it. No more 'I do not know where this access came from' moments during an audit. Source attribution per permission, in plain English.
Most orgs have 25+ profiles, each a copy of one above it with a slight modification. We map the overlap, propose the consolidation set, and show which profiles can collapse without removing any user's actual access. Sandbox-tested before you apply.
234 unused permission sets is the typical pattern in a 4-year-old org. We find every one: never-assigned sets, sets where the last user was removed 12+ months ago, sets that duplicate a profile permission. Each ships with a safe-to-remove status.
Integration users running with System Administrator are the single most common compliance finding. We list every integration user, the access they actually use (from API call logs), and the scoped permission set that would substitute for SysAdmin without breaking anything.
Visual map of your role hierarchy with user counts per node. Sharing rules listed with their effective scope. OWD configuration summarized. Spot phantom roles, empty branches, and sharing rules that quietly grant access through inheritance.
| Score | Band | What it means | Recommended action |
|---|---|---|---|
| 85–100 | Critical | Modify All Data + Manage Users on a user who does not need them. Compliance violation in regulated industries. | Downgrade within 24h. Scope to a least-privilege permset. |
| 70–84 | High | Over-permissioned. User has View All Data or admin rights they do not actively use. | Review and scope within 1 week. |
| 50–69 | Medium | Mild over-permission. View All Data on a sales rep who does not need cross-territory visibility. | Review next quarter. |
| Below 50 | Clean | Least-privilege baseline. User has only the permissions their role actually requires. | No action needed. |
Permission cleanup is faster before the auditor or the agent or the breach forces it.
The auditor will ask: who has access to customer data, how do you know, and how often do you review it? If your answer involves a manual spreadsheet last updated 8 months ago, you are about to fail. Our audit ships every finding mapped to the SOC 2 control it touches.
Their user is technically deactivated, but their permissions remain in the permsets and profiles. If anyone re-activates the account or reuses the email, the access returns. Our audit surfaces deactivated users whose permission assignments need cleanup.
Profile count correlates almost perfectly with permission leakage. Above 25, you have a permissions sprawl problem and nobody knows the full picture anymore. Our audit maps the overlap and proposes the consolidation set.
The agent inherits whatever runtime user permissions you give it. If that user can Modify All Data because nobody got around to scoping it, the agent can too. Permission hygiene is one of the four dimensions our AI Readiness score measures.
You do not actually know who has access to what. Before you build anything new on top, you need a map. Our audit reads the org directly and produces the map in 10 minutes.
Five deliverables. Designed for compliance review, audit prep, and internal action.
Every active user scored, ranked, and filterable. Includes login recency, profile assignment, permission set assignment, and data access scope. Sorted worst-first so the urgent fixes land at the top.
Pick any user, see every permission they hold and the exact profile or permission set that granted it. The report your compliance team has been asking for. Available as PDF and XLSX.
Mapped overlap between your existing profiles, proposed consolidation set, and per-user impact preview. Sandbox-safe, one-click apply when ready.
Every unused permission set, every set with no current users, every set that duplicates a profile permission. Each tagged with safe-to-remove status and dependency check.
Every finding mapped to the SOC 2, ISO 27001, GDPR, or HIPAA control it touches. Audit-evidence ready. Hand it to your auditor without translating.
Trace every permission a user holds back to the exact profile or permission set that granted it. SF Optimizer lists permsets but does not trace inheritance. Strongpoint focuses on change tracking, not permission source. Field Trip audits field usage, not access source. We tell you where every permission came from in plain English.
Score every user 0–100 weighted by permission sensitivity, login recency, and data access scope. Map each finding to SOC 2, ISO 27001, GDPR, HIPAA, or NIST CSF controls. Audit-evidence-ready exports.
Every risky permission ships with a proposed fix: scoped substitute permset, downgrade path, profile consolidation. Dry-run in sandbox, review the diff, apply with one click. Diagnosis-only tools stop at the report.
Everything compliance, security, and admin teams ask before running a permissions audit.
A Salesforce permissions audit is a diagnostic that surfaces over-permissioned users, stale permission sets, integration users with excessive access, and the gap between what users have access to versus what they actually need. The audit reads your org directly (read-only OAuth), scores each user on a 0–100 risk scale, and traces every permission back to the profile or permission set that granted it. Clientell offers a free version that returns results in 10 minutes with a 24-hour remediation plan.
Consulting partners charge $5,000 to $25,000 for a manual permissions review. Big-4 SOC 2 audit firms add another $20,000 to $50,000 to map permissions against the SOC 2 control framework. Clientell runs the equivalent audit for free, returns results in 10 minutes, ships the compliance mapping included, and produces evidence-ready exports for ISO 27001, GDPR, HIPAA, and NIST CSF in addition to SOC 2.
The scan runs in roughly 10 minutes against a read-only OAuth user. The full report, including per-user risk roster, effective-access drill-downs, profile consolidation proposal, and stale-permset cleanup queue, is delivered in 24 hours. Manual consulting audits typically take 2 to 6 weeks.
Yes. The scan, the risk roster, the effective-access reports, the consolidation plan, the stale-permset queue, and the compliance framework mapping are all free with no paid engagement required. The free version is the same product paid customers use, just without the ongoing monitoring layer.
Effective access is the union of every permission a user actually has, regardless of whether it came from a profile, a permission set, a permission set group, or a role hierarchy. Most audits stop at "this user has X profile and Y permission sets". Effective access goes further: for each individual permission the user holds, it traces back the exact assignment source. This is what auditors actually want to see during a SOC 2 or ISO 27001 review.
Salesforce Optimizer is a free Salesforce-native tool that produces a static PDF of generic recommendations. It does not score per-user risk, does not benchmark against industry, does not produce effective-access reports, and does not propose sandbox-tested fixes. Our audit scores 0–100 per user, benchmarks against 1,000+ scanned orgs, traces every permission to its source, and ships a one-click fix per finding.
In a clean org, fewer than 25. Above 25 and you almost certainly have profile sprawl: each profile is a near-copy of one above it with a small modification, and nobody knows the full picture. Our audit maps the overlap between your profiles, proposes a consolidation set (typically reducing 30+ profiles to 8–12), and shows the per-user access impact before you apply.
Healthy benchmark is under 5%. The orgs we scan typically run at 20–30%, often because the original 'temporary' admin grant from a 2021 project was never revoked. Each SysAdmin user is a permanent backdoor with broad Modify All Data and Manage Users rights. Our audit flags every SysAdmin user, proposes a scoped substitute permission set, and lets you downgrade them with one click in sandbox.
Yes, and integration users are usually the worst-performing user class in the audit. Service accounts created in 2020 with full Administrator profile because it was easier than scoping. Our audit lists every integration user, the API call patterns they actually use, and proposes the least-privilege permission set that would let them keep working without the SysAdmin breadcrumbs.
A read-only OAuth user with API access plus Setup Audit Trail read permission. We do not write to your org during the scan. We do not export PII. The OAuth connection can be revoked at any time. The audit is SOC 2 Type II compliant and the entire scan happens in our customer-isolated infrastructure.
Audits, playbooks, and adjacent services for teams running permission cleanup, preparing for compliance review, or rolling out Agentforce safely.
Long-form: profile sprawl, permission sets, integration users, compliance mapping. 22-min read.
Read moreChecklist38-point checklist for running a permissions review yourself, before booking the audit.
Read moreServiceBroader org audit pairing permissions with flows, data quality, and technical debt.
Read moreAuditPermission Hygiene is 1 of the 4 AI Readiness dimensions. Score your org before you deploy.
Read moreAuditMap every Salesforce setting to the control framework your auditor cares about.
Read moreAuditSister audit on the automation side. 282 automations on Opportunity is the typical pattern.
Read moreProductThe agent that applies the fixes the audit surfaces. From $99/month.
Read moreServiceContinuous permissions monitoring instead of point-in-time audits.
Read moreProofHow real teams used Clientell to lift permission hygiene before their SOC 2 audit.
Read more“The audit surfaced 78 unused permission sets and 11 integration users with admin rights in under 10 minutes. What our consulting partner quoted six weeks to deliver, this returned overnight.”
“Effective-access drill-down is the feature I have been asking auditors to give us for three years. Now I can answer “where did this access come from” in a single click instead of a half-day investigation.”
“We went from failing SOC 2 access control criteria to passing on the first attempt after running the audit and applying the remediation plan. The compliance mapping was audit-evidence ready.”
Trust + security posture
Map every permission finding to SOC 2, ISO 27001, HIPAA, NIST CSF, and GDPR controls.
Inactive users hold permissions AND licenses. Run alongside for the full cleanup.
Track who modified which permission set, when, and why. SetupAuditTrail decoded.
Permission Hygiene is 1 of 4 dimensions in the AI Readiness score.
Every claim on this page is anchored to a primary source. The references below cite official standards bodies, Salesforce documentation, and peer-reviewed industry research.
Supports: Profile and permission set fundamentals
Supports: Least-privilege baseline (AC-2, AC-3, AC-6)
Supports: Access control compliance mapping
Per-user risk scoring. Effective-access drill-down. Compliance framework mapping. 24-hour remediation plan with sandbox-tested one-click apply. Free, no install.
Unlimited messages · No credit card required