Skip to content

Commit d22d18e

Browse files
terezavrchovinovaTC-MOBraniganLee
authored
Apply suggestions from code review
Co-authored-by: Michał Olender <92638966+TC-MO@users.noreply.github.com> Co-authored-by: Daniel Lee <daniel.lee@apify.com>
1 parent cc78fe1 commit d22d18e

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

sources/platform/security.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ slug: /security
1212

1313
---
1414

15-
## SOC 2 Type II Compliance
15+
## SOC 2 type II compliance
1616

1717
The Apify platform is SOC 2 Type II compliant. This means that we have undergone an independent audit to ensure that our information security practices, policies, procedures, and operations comply with SOC 2 standards for security, availability, and confidentiality of customer data.
1818

@@ -22,7 +22,7 @@ The Apify platform is SOC 2 Type II compliant. This means that we have undergone
2222

2323
To learn more, read the [announcement](https://blog.apify.com/apify-soc2/) and visit our [Trust Center](https://trust.apify.com) for additional information or to request a copy of our SOC 2 Type II report.
2424

25-
## Trust Center
25+
## Trust center
2626

2727
To learn more about Apify's security practices, data protection measures, and compliance certifications, please visit our [Trust Center](https://trust.apify.com). The Trust Center includes:
2828

@@ -40,11 +40,11 @@ Read the Apify Security Whitepaper for a comprehensive description of Apify's se
4040
<img src={require("./images/security/whitepaper-cover.png").default} width="50%" title="Apify Security Whitepaper" />
4141
</a>
4242

43-
## Vulnerability Disclosure Policy
43+
## Vulnerability disclosure policy
4444

45-
We invite security researchers, ethical hackers, and the broader community to help us keep Apify safe by reporting any potential security vulnerabilities or weaknesses. Your responsible disclosure helps protect our users and strengthen our platform.
45+
We invite security researchers, ethical hackers, and the broader community to help us keep Apify safe by reporting any potential security vulnerabilities or weaknesses. Your responsible disclosure helps protect our users and strengthen the Apify platform.
4646

47-
**Scope:**
47+
_Scope:_
4848
The following Apify services and domains are eligible for security research and responsible reporting:
4949

5050
- [apify.com](https://apify.com)
@@ -53,7 +53,7 @@ The following Apify services and domains are eligible for security research and
5353

5454
Please use your own test account for research purposes. Free accounts are sufficient for most testing.
5555

56-
**Out-of-scope:**
56+
_Out-of-scope:_
5757

5858
- Issues with third-party systems
5959
- Clickjacking on non-sensitive pages
@@ -63,7 +63,7 @@ Please use your own test account for research purposes. Free accounts are suffic
6363
- Social engineering, phishing, or physical attacks
6464
- Attacks requiring MITM or stolen credentials
6565

66-
**We are especially interested in reports that demonstrate:**
66+
_We are especially interested in reports that demonstrate:_
6767

6868
- Unauthorized access to data
6969
- Elevation of privileges

0 commit comments

Comments
 (0)