Salesforce’s Role Hierarchy and standard sharing methods function properly at a moderate scale. However, in large enterprise organisations where core objects grow into tens or hundreds of millions of rows, these same mechanisms often become a primary source of latency, lock contention, and deployment instability.
Architects usually encounter the problem indirectly: overnight sharing recalculations that fail to complete, high-volume data loads that time out due to CPU pressure, or CI/CD pipelines repeatedly blocked by UNABLE_TO_LOCK_ROW errors on share tables. At this point, record count alone is no longer the constraint; the platform is limited by how frequently and how broadly visibility must be recomputed.
When this threshold is crossed, the organisation enters a state of architectural insolvency where the operational cost of recalculating security visibility outweighs the business value it provides. Recovering from this state requires a shift away from dynamically computed access models and toward materialised, deterministic visibility architectures designed explicitly for scale.
The Benchmark: Identifying the Failure Point
Architectural insolvency is not defined solely by record volume, but by contention density. The following benchmarks, drawn from large-scale Sales and Service Cloud implementations, can help determine when a decoupled security model should be considered:
| Metric | Warning Zone | Insolvency Point |
|---|---|---|
| Sharing recalculation time | 4–8 hours (overnight) | >12 hours, overlapping business hours |
| Save latency (DML) | 200–500 ms overhead | >2 seconds, leading to CPU timeouts |
| Deployment stability | Occasional locking errors | Persistent UNABLE_TO_LOCK_ROW, CI/CD blocked |
When these conditions appear together, optimising the existing sharing model rarely produces meaningful gains.
The Advocacy: Moving to Materialised Security
In a standard Salesforce implementation, sharing is computed. Every SOQL query cross-references core object data with Share tables and group or role hierarchies. At a very large scale, these joins become the dominant performance cost.
Materialised security reverses this model. Instead of calculating visibility at query time, access metadata is stamped onto the record at ingestion or update time. Visibility becomes a deterministic attribute rather than a derived outcome.
Three Strategies for High-Scale Deterministic Security
1. The Security-Stamped Flat Model
This approach materialises access tokens directly onto high-volume records, transforming recursive joins into flat, indexed reads.
Execution pattern
- Maintain a hidden field (for example, Security_Tag__c) containing a flattened representation of authorised public groups.
- Populate the field during ingestion or ownership changes via controlled processes.

Benefits
- Eliminates Share table joins
- Avoids hierarchy traversal
- Reduces visibility checks to a single indexed filter, Architectural guardrails
- Field selectivity and indexing must be actively managed
- Token design must avoid skewed distributions
- This pattern is suited to high-volume, low-mutation objects
2. Cursor-Based Just-in-Time Resolution (Emerging Pattern)
Standard Apex collections do not scale to extreme data volumes. Cursor-based access enables incremental traversal of large datasets without maintaining state.
Pattern
- Use cursor-based navigation to process records in controlled batches
- Enforce visibility via explicit access checks rather than implicit sharing joins
As this capability matures, it offers a path to applying security logic without exhausting heap limits or triggering broad recalculations. Until general availability, fallback strategies should remain in place for mission-critical workloads.
3. Federated Security via Zero-Copy Architecture
At extreme scale, the most effective way to manage visibility is often to avoid storing the data in the CRM core entirely.
Strategy
- Retain high-volume or historical datasets in Data Cloud or an external data lake
- Surface records through zero-copy federation
- Enforce security upstream, before data is rendered in Salesforce
Outcome
Legacy Share tables are bypassed entirely, and visibility is governed by modern, distributed security models rather than recursive recalculation.
When This Architecture Is Not Appropriate
Materialised security patterns are not a universal replacement for Salesforce sharing. They are generally unsuitable when:
- Data volumes are moderate, and recalculation completes reliably
- Record-level access changes frequently and unpredictably
- The operational cost of maintaining security stamps outweighs the recalculation overhead
In such cases, standard sharing remains the more appropriate choice.
Conclusion: The Architect as a Performance Engineer
At extreme scale, Salesforce’s security architecture becomes a performance engineering discipline. Role Hierarchies and standard sharing continue to serve many organisations well. Still, they were not designed for environments where visibility recalculation directly competes with transaction throughput, data ingestion, and deployment velocity.
The responsibility of the enterprise architect is to recognize when default mechanisms shift from enabling to constraining and to respond with patterns that reduce computational volatility. Materialised security, cursor-based processing, and federated access are not replacements for Salesforce sharing; they are targeted interventions for scenarios where deterministic performance is non-negotiable.
Architectural maturity is not measured by adherence to defaults, but by the precision with which they are applied and the discipline to step beyond them when scale demands it.
Most Reads:
- Agentforce for Flow: A Hands-On Guide to the AI Features Changing How We Automate
- Salesforce Business Rules Engine (BRE) Explained: Smarter Decisioning Beyond Apex & Custom Metadata
- Salesforce Deployment Explained: Packaging vs CI/CD (When to Use Each and Why It Matters)
- TDX 2026 Call for Participation Is Live: Everything you Need to know
Resources
- [Salesforce Developer]- (Join Now)
- [Salesforce Success Community] (https://success.salesforce.com/)
For more insights, trends, and news related to Salesforce, stay tuned with Salesforce Trail

Bhumika Udani
Bhumika Udani is a Salesforce Platform Architect specialising in translating governance and policy intent into operational reality for enterprise-scale Salesforce implementations. She advocates for architectural accountability and deterministic platform design as a driver of enterprise transformation.
- This author does not have any more posts.







