Booking Q3 2026 · 2 retainer slots open · Direct or via SI Paris ·Seoul
Sébastien Tang SALESFORCE SOLUTION ARCHITECT
No. 049 Org Health & Recovery 7 min read · May 4, 2026

Salesforce Project Rescue: 90-Day Framework

Distressed Salesforce projects share predictable failure patterns. This 90-day rescue framework maps the architecture decisions that stop the bleeding.

scroll to read ↓
Salesforce Project Rescue: 90-Day Framework: hero image
salesforce project rescue framework 90 days
TL;DR

Read this if

you are inheriting a broken Salesforce org, managing a stalled implementation, or trying to understand why previous recovery attempts failed to hold past the six-month mark.

01
Distressed orgs fail in predictable structural clusters, not random events.
Three patterns appear together in nearly every distressed org: a data model that drifted from its original design, automation layers that compounded without governance, and a deployment pipeline that collapsed into manual changes months before anyone noticed.
02
Competing automation on the same object trigger causes non-deterministic failures.
Two Flows updating Opportunity Stage on the same trigger event produce race conditions that look like intermittent bugs. The fix is architectural consolidation to a single entry point per object per trigger, not additional debugging cycles on symptoms.
03
Scope gates and documentation are non-negotiable recovery deliverables.
Orgs that exit recovery without a current-state architecture document and automation inventory accumulate the same hidden risks within 18 months, because the next team inherits an undocumented system and the cycle restarts from the same structural conditions.

Distressed Salesforce projects don’t fail randomly. They fail in clusters, and the clusters are predictable. A salesforce project rescue framework 90 days long is enough to stabilize most of them, but only if you sequence the interventions correctly. Most recovery attempts fail because they treat symptoms rather than the structural causes underneath.

Why Distressed Projects Look Different Than They Are

The presenting complaint is almost never the real problem. Stakeholders say “the deployment broke production” or “the consultant went dark.” What they mean is that the architecture accumulated enough hidden risk that a single trigger event caused cascading failure.

In practice, distressed Salesforce projects share three structural characteristics. First, the data model drifted from the original design as requirements changed, leaving orphaned objects, redundant fields, and lookup relationships that no longer reflect business logic. Second, automation layers compounded on each other without governance: Flow triggering Apex triggering Platform Events triggering more Flow, with no documented execution order and no circuit breakers. Third, the deployment pipeline collapsed into manual changes, meaning the org and the version control system diverged months ago and nobody knows the current state of truth.

The recovery architecture has to address all three simultaneously, not sequentially. Fixing automation while the data model is still broken just moves the failure point.

The 90-Day Sequence That Actually Works

The framework divides into three phases of roughly 30 days each. The phases are not arbitrary. They map to a dependency chain: you cannot stabilize automation until you understand the data model, and you cannot restore deployment confidence until automation is stable.

Three-phase 90-day recovery timeline: diagnosis, stabilization, confidence restoration with key deliverables per phase.
Three-phase 90-day recovery timeline: diagnosis, stabilization, confidence restoration with key deliverables per phase.

Phase 1: Diagnosis and Containment (Days 1-30)

The first priority is stopping the bleeding, not fixing anything. That distinction matters. Recovery teams that start building in week one almost always make the situation worse because they’re building on an unaudited foundation.

The diagnostic work here is specific. Run a full metadata audit using the Salesforce CLI to extract the complete org configuration. Map every active Flow, Apex trigger, and Process Builder remnant against the objects they touch. (Yes, Process Builder is deprecated, but distressed orgs almost always have legacy automation that was never migrated.) Cross-reference that map against recent debug logs to identify which automations are actually executing in production versus which are dormant.

Simultaneously, audit the data model for referential integrity violations. In orgs that have been running for 3+ years without governance, it’s common to find 15-20% of custom fields with zero population, lookup relationships pointing to record types that no longer exist, and validation rules that contradict each other across object hierarchies.

The containment action from this phase is a freeze on net-new configuration changes, enforced through a change advisory board process, however lightweight. Nothing goes to production without documented impact assessment. This is politically difficult but architecturally non-negotiable.

Phase 2: Structural Stabilization (Days 31-60)

With a clear picture of the current state, the second phase addresses the automation layer. The sequencing rule here is: resolve conflicts before optimizing performance.

The most dangerous pattern in distressed orgs is competing automation on the same object. Two Flows both updating Opportunity Stage on the same trigger event, with no bulkification and no defined execution order, will produce non-deterministic behavior that looks like intermittent bugs. These are not bugs. They’re race conditions baked into the architecture.

Resolve these by consolidating to a single automation entry point per object per trigger event. In practice, this means migrating to record-triggered Flows with explicit before/after save separation, and moving any cross-object logic into invocable actions that can be called from a single orchestration layer. Apex should handle only what Flow genuinely cannot: complex SOQL with dynamic binding, callouts with retry logic, or bulk operations above Flow’s governor limit thresholds.

Data model remediation runs in parallel. The priority order is: fix relationships that break reporting first, then address field-level issues, then clean up validation logic. Reporting breakage has the highest stakeholder visibility and the fastest path to rebuilding trust.

This is also the phase where you establish the deployment pipeline. A distressed org almost always needs a scratch org strategy or at minimum a dedicated full-copy sandbox that reflects production. The salesforce technical debt assessment framework maps the metadata categories that need version control coverage first, which is a useful starting point for prioritizing what gets into source control before anything else.

Phase 3: Confidence Restoration (Days 61-90)

The third phase is about proving the stabilization held and building the governance structures that prevent regression.

The proof mechanism is a controlled deployment cycle. Take a meaningful but bounded change, run it through the full pipeline (scratch org development, sandbox validation, production deployment with rollback plan), and document the outcome. Do this three times with increasing complexity. By the third cycle, the team has demonstrated that the pipeline works and has built the muscle memory to use it.

Governance structures at this stage should be minimal and durable. A heavyweight CoE model is the wrong answer for a recovering org. What works is a lightweight architecture decision record (ADR) process, a defined metadata ownership matrix (who owns which objects and automation layers), and a monthly technical review cadence. The goal is preventing the next accumulation of hidden risk, not creating bureaucracy.

What Most Recovery Attempts Get Wrong

The single most common failure mode in project rescue is scope creep driven by stakeholder pressure. Once the org is stable enough to function, business stakeholders start requesting new features. The recovery team, eager to demonstrate value, starts building. The underlying structural issues never get fully resolved, and 18 months later the org is distressed again.

2x2 matrix showing recovery failure modes: scope creep, timeline compression, and documentation gaps versus successful recove
2x2 matrix showing recovery failure modes: scope creep, timeline compression, and documentation gaps versus successful recove

The architectural discipline required here is explicit scope gates. Phase 1 and Phase 2 are recovery-only. No net-new features. Phase 3 can include one or two high-visibility quick wins, chosen specifically because they exercise the new deployment pipeline and demonstrate that the org can deliver again. But the selection criteria is “proves the pipeline works,” not “highest business value.”

A second failure mode is treating the 90-day framework as a fixed timeline rather than a phase-gate model. If the diagnostic work in Phase 1 reveals a data model problem more severe than expected (say, Identity Resolution mismatches in a Data Cloud-connected org, or a unified profile architecture that’s fundamentally broken), Phase 2 needs to extend. Compressing the timeline to hit an arbitrary date produces a superficially stable org that fails again under load.

The third failure mode is under-investing in documentation. Distressed projects are almost always documentation deserts. The recovery effort needs to produce a current-state architecture document, an automation inventory, and a data dictionary as explicit deliverables. These aren’t nice-to-haves. They’re the institutional memory that prevents the next team from inheriting the same hidden risks.

Measuring Recovery Progress

Qualitative assessments of “the org feels better” are not sufficient. Recovery progress needs quantitative markers at each phase gate.

Three-phase stacked metrics visualization showing Phase 1-3 success criteria for org recovery measurement.
Three-phase stacked metrics visualization showing Phase 1-3 success criteria for org recovery measurement.

At the end of Phase 1, the target metrics are: complete metadata inventory exists, all active automation is documented with execution order, and zero unplanned production changes in the last two weeks of the phase.

At the end of Phase 2, the targets are: automation conflict count reduced to zero, deployment pipeline executes end-to-end without manual intervention, and data model referential integrity violations resolved for all objects in scope.

At the end of Phase 3, the targets are: three successful controlled deployments completed, ADR process has at least two documented decisions, and stakeholder confidence survey (simple, five-question) shows improvement from baseline.

These metrics are deliberately operational rather than business-outcome focused. Business outcomes take longer than 90 days to manifest. What you’re measuring at this stage is whether the structural conditions for reliable delivery have been restored. For orgs operating at scale, where a single automation failure can corrupt records across millions of unified profiles or break integrations touching dozens of external systems, that structural reliability is the prerequisite for everything else. (The /services/org-health-recovery practice covers the full diagnostic and recovery architecture for orgs at that scale.)

Key Takeaways

  • Sequence matters more than speed: diagnosis and containment must precede any structural changes, or recovery efforts compound the existing risk.
  • Competing automation on the same object trigger is the most common root cause of “intermittent” production failures in distressed orgs, and it requires architectural consolidation, not debugging.
  • A 90-day rescue framework is a phase-gate model, not a fixed calendar. If Phase 1 reveals deeper structural damage, Phase 2 extends. Compressing to hit a date produces a fragile org.
  • Documentation is a recovery deliverable, not an afterthought. Orgs that exit recovery without a current-state architecture document and automation inventory will accumulate the same hidden risk within 18 months.
  • Governance structures post-recovery should be minimal and durable: ADRs, a metadata ownership matrix, and a monthly review cadence. Heavyweight CoE models collapse under their own weight in recovering orgs.
Want this for your org?

A 1–2 week confidential program review. Independent read on a program your SI won't give you.

Independent technical and architectural read, delivery risk assessment, steering-committee-ready briefing pack, recovery options ranked by cost, time, and political damage. NDA-led.

Duration 1–2 weeks · From €12,000 · Reply SLA < 24 h · NDA-default
Architecture Notes · monthly

One piece a month. No filler.

The notes I send to CTOs and SI partners. Architecture patterns, post-mortems, and the occasional opinion that will not make it into a proposal.

~1,200 readers · GDPR-default · unsubscribe in one click
Sébastien Tang

Sébastien Tang

Independent Senior Salesforce Solution Architect. Agentforce, Data 360, multi-cloud systems that hold up in production. 14+ years across European enterprises. EN · FR.

Booking Q3 2026 · 2 retainer slots open · Paris · Seoul
Book a Discovery Call