From c66e952400e275c61ae7c90dd60d545d05ba3265 Mon Sep 17 00:00:00 2001 From: Michael Ferranti Date: Wed, 11 Dec 2024 11:08:08 +0100 Subject: [PATCH 1/2] Update soc2 doc to point to Unleash Enterprise Was not clear that the Soc2 controls listed require Unleash Enterprise. --- website/docs/using-unleash/compliance/soc2.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/website/docs/using-unleash/compliance/soc2.mdx b/website/docs/using-unleash/compliance/soc2.mdx index 4148af8de109..69d36d1c6291 100644 --- a/website/docs/using-unleash/compliance/soc2.mdx +++ b/website/docs/using-unleash/compliance/soc2.mdx @@ -9,7 +9,7 @@ description: 'SOC2-compliant feature flags at scale with Unleash.' To get SOC2 certified and maintain your compliance, you must ensure that any system you integrate with, including feature flagging solutions, are also SOC2 certified. Using a homegrown or third-party feature flagging system without SOC2 compliance can compromise your certification and introduce unnecessary risks. -This guide provides an overview of how Unleash features align with SOC2 Type II controls, helping your organization meet its compliance requirements. +This guide provides an overview of how [Unleash Enterprise](https://www.getunleash.io/enterprise-feature-management-platform) features align with SOC2 Type II controls, helping your organization meet its compliance requirements. ## How Unleash features map to SOC2 Type II controls @@ -29,4 +29,4 @@ This guide provides an overview of how Unleash features align with SOC2 Type II | CC 6.1, CC 6.6 Remote access MFA enforced | The company's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method. | You can enable MFA through your identity provider, such as Okta or Microsoft Entra ID, after implementing [single sign-on](/reference/sso). | | CC 6.1, CC 6.6 Remote access encrypted and enforced | The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection. | Unleash is secured by enforcing TLS 1.2. | | CC 6.7 Data transmission encrypted | The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks. | Unleash is secured by enforcing TLS 1.2. | -| SD SOC 2 System Description | The company has completed a description of its systems for Section III of the audit report. | This documentation is available in the SOC 2 report in the Trust Center. The report is performed by an external auditor and renewed annually. | \ No newline at end of file +| SD SOC 2 System Description | The company has completed a description of its systems for Section III of the audit report. | This documentation is available in the SOC 2 report in the Trust Center. The report is performed by an external auditor and renewed annually. | From 7b29b55d4d0f113914867c4dfa967611939a836e Mon Sep 17 00:00:00 2001 From: Melinda Fekete Date: Wed, 11 Dec 2024 13:59:05 +0100 Subject: [PATCH 2/2] Update website/docs/using-unleash/compliance/soc2.mdx --- website/docs/using-unleash/compliance/soc2.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/docs/using-unleash/compliance/soc2.mdx b/website/docs/using-unleash/compliance/soc2.mdx index 69d36d1c6291..d715672f5364 100644 --- a/website/docs/using-unleash/compliance/soc2.mdx +++ b/website/docs/using-unleash/compliance/soc2.mdx @@ -9,7 +9,7 @@ description: 'SOC2-compliant feature flags at scale with Unleash.' To get SOC2 certified and maintain your compliance, you must ensure that any system you integrate with, including feature flagging solutions, are also SOC2 certified. Using a homegrown or third-party feature flagging system without SOC2 compliance can compromise your certification and introduce unnecessary risks. -This guide provides an overview of how [Unleash Enterprise](https://www.getunleash.io/enterprise-feature-management-platform) features align with SOC2 Type II controls, helping your organization meet its compliance requirements. +This guide provides an overview of how [Unleash Enterprise](https://www.getunleash.io/pricing) features align with SOC2 Type II controls, helping your organization meet its compliance requirements. ## How Unleash features map to SOC2 Type II controls