You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: sources/platform/security.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ slug: /security
12
12
13
13
---
14
14
15
-
## SOC 2 Type II Compliance
15
+
## SOC 2 type II compliance
16
16
17
17
The Apify platform is SOC 2 Type II compliant. This means that we have undergone an independent audit to ensure that our information security practices, policies, procedures, and operations comply with SOC 2 standards for security, availability, and confidentiality of customer data.
18
18
@@ -22,7 +22,7 @@ The Apify platform is SOC 2 Type II compliant. This means that we have undergone
22
22
23
23
To learn more, read the [announcement](https://blog.apify.com/apify-soc2/) and visit our [Trust Center](https://trust.apify.com) for additional information or to request a copy of our SOC 2 Type II report.
24
24
25
-
## Trust Center
25
+
## Trust center
26
26
27
27
To learn more about Apify's security practices, data protection measures, and compliance certifications, please visit our [Trust Center](https://trust.apify.com). The Trust Center includes:
28
28
@@ -40,11 +40,11 @@ Read the Apify Security Whitepaper for a comprehensive description of Apify's se
We invite security researchers, ethical hackers, and the broader community to help us keep Apify safe by reporting any potential security vulnerabilities or weaknesses. Your responsible disclosure helps protect our users and strengthen our platform.
45
+
We invite security researchers, ethical hackers, and the broader community to help us keep Apify safe by reporting any potential security vulnerabilities or weaknesses. Your responsible disclosure helps protect our users and strengthen the Apify platform.
46
46
47
-
**Scope:**
47
+
_Scope:_
48
48
The following Apify services and domains are eligible for security research and responsible reporting:
49
49
50
50
-[apify.com](https://apify.com)
@@ -53,7 +53,7 @@ The following Apify services and domains are eligible for security research and
53
53
54
54
Please use your own test account for research purposes. Free accounts are sufficient for most testing.
55
55
56
-
**Out-of-scope:**
56
+
_Out-of-scope:_
57
57
58
58
- Issues with third-party systems
59
59
- Clickjacking on non-sensitive pages
@@ -63,7 +63,7 @@ Please use your own test account for research purposes. Free accounts are suffic
63
63
- Social engineering, phishing, or physical attacks
64
64
- Attacks requiring MITM or stolen credentials
65
65
66
-
**We are especially interested in reports that demonstrate:**
66
+
_We are especially interested in reports that demonstrate:_
0 commit comments