YOU’RE IN!
Â
Welcome to the SOC 2 Open Source Project
Â
In a moment, you’ll receive an email from us with full instructions for accessing the SOC 2 Open Source Project as well as a way to reach out to us with any questions. You can also see below for all the details:
Â
Here’s How to Access It:
- Go to trello.com and log in or click "get Trello for free" to sign up
- Once you log in, create and name your free workspace
- Go to add workspace members and add my user, [email protected]. You will need to add this account to the workspace, not a specific board.
- Once you do that I will be notified and will log in, create a board and add the template.
- Once I have added the board template, you can remove my user from the workspace and board and begin using it
- Once you have access to the Trello Board, please begin by reading the first card labeled README: How to Use This Trello Board.
Â
If you have any questions about using the SOC 2 Open Source Project in Trello, or any further questions regarding SOC 2 compliance or penetrating testing, you can reach us anytime at [email protected]. Happy compliance preparations!Â
About company
Our unique combination of expert security and compliance consulting and penetration testing will ensure you’re prepared in the most practical and quickest way possible.
Services
Services