``A former sales rep who left the company still had access to HubSpot,'' ``An intern exported all his contacts and took them outside,'' and ``A workflow accidentally sent an email to all customers.'' These are real-life examples of HubSpot incidents. Customer data stored in CRM is an organization's most important asset.Appropriate authority design, maintenance of audit logs, response to GDPR/personal information protection, incident response proceduresIt should not be used in production without it. This chapter systematically explains the overall picture of governance design.
HubSpot permission management isWhat you can do (role)」「Which team's data is it (team)?」「What range of records (data scope)” Designed in three layers. By combining these three, it is possible to achieve detailed control such that ``Members of the East Japan sales team can only view and edit contacts and companies for which they are responsible, but cannot export all contacts.''
The basic principle of authority design is"Grant only the minimum authority necessary for that person's work."is. Designs such as ``leaving it as Admin for now'' or ``giving export privileges to everyone because it would be inconvenient not to be able to export'' become hotbeds for security incidents.
| Common patterns of excessive privileges | risk | Correct action |
|---|---|---|
| Make everyone an admin | Anyone can change or delete workflows. Risk of email being sent to all customers due to incorrect operation | Admins are limited to 2 to 3 people. Set appropriate custom roles for general users |
| All export permissions for everyone | Retired employees or internal fraudsters can take all customer data outside. May be a violation of GDPR | Export privileges are limited to managers and above. General users are responsible only for themselves |
| Retirement account neglect | Former employees who left the company can still access the CRM at any time. | Process account deactivation and owner reassignment on the day of retirement |
| Share API keys and reuse them across multiple systems | If one system is compromised, all systems using that key are at risk. | Issue dedicated private app tokens for each system and set minimum scope |
With HubSpot's Teams feature,Users in which teams can work with which recordscan be precisely controlled. The design allows the East Japan sales team to only view and edit contacts, companies, and transactions in the East Japan area.
| Function/Object | Sales person | Sales MG | marketer | CSM | CS MG | RevOps | management team |
|---|---|---|---|---|---|---|---|
| Contact View | ○In charge | ◎Team | ◎All items | ○In charge | ◎Team | ◎All items | △View |
| Contact Edit | ○In charge | ◎Team | ◎All items | ○In charge | ◎Team | ◎All items | ✗ |
| Contact export | ✗ | ○My team | ○ Own segment | ✗ | ○My team | ◎All items | ✗ |
| View deals | ○In charge | ◎Team | △View | △View | △View | ◎All items | △View |
| Workflow creation/editing | ✗ | ✗ | △View only | ✗ | ✗ | ◎All items | ✗ |
| Report Dashboard | △Specification only | ◎For teams | ◎Can be created | △Specification only | ◎For CS | ◎All items | △View |
| User/authority settings | ✗ | ✗ | ✗ | ✗ | ✗ | ◎Admin | ✗ |
Organizational changes, personnel transfers, retirements, new employees, additions and terminations of external partners—it is necessary to confirm that authority is optimal each time these occur.Export the "all users' permission list" once a quarter and review whether the current roles and permissions match.Incorporate this into your cadence. You can export from HubSpot's Settings → Users & Permissions → Users.
HubSpot has built-in functions that support compliance with GDPR and the Personal Information Protection Act. however,There is a difference between having functionality and being legally compliant.is. Compliance can only be achieved when the functions are properly configured and operated. Below is a list of key things HubSpot needs to cover.
On the Enterprise planAll operation logs of “who did what, when, and what.”is recorded as an audit log. You can later check who changed the workflow and when, who exported the data, and who added or deleted users. This function is essential for compliance response, incident cause investigation, and fraud detection.
| API token scoping rules | Setting example |
|---|---|
| Read-only systems (analytics/BI tools) | crm.objects.contacts.read / crm.objects.deals.read only. Never give Write scope |
| CRM update system (external enrichment) | crm.objects.contacts.write only. Delete/Settings scope is not assigned |
| Fully integrated system (Salesforce two-way synchronization) | Only read/write required objects. Does not grant access to all objects |
| Token rotation | Reissue tokens every 90 days and invalidate old tokens. Tokens for systems involving retired employees will be rotated on the same day |
The majority of password leaks are credential stuffing attacks, in which ``even if the password is set correctly, that password is used from another service's leak.''Turn on MFA enforcement for all users in HubSpot Settings → Security → Multi-Factor AuthenticationThis is the most cost-effective security measure. Enforced MFA prevents most unauthorized access even if passwords are compromised.
“Admin for now” and “Export permission for everyone” are typical patterns of excessive privileges. It is designed with three layers: role, team, and data scope, and general users start with ``only those in charge cannot view, edit, or export.'' Incorporate quarterly entitlement reviews into your process.
Simply forcing MFA for all users from the settings screen can prevent most credential stuffing attacks. Measures that provide maximum effectiveness at zero cost. If you haven't installed it yet, enable it now. Super Admin should set MFA as a top priority.
Merely enabling HubSpot's GDPR functionality does not ensure legal compliance. Document the procedures for responding to deletion requests, the management of consent records, and the data deletion process when collaborating with DWH, and establish a system that actually functions. A legal review once a year is recommended.
Old API keys are obsolete. Private app talk