From 81148988f8deca490972e87ec187961caf5f55d8 Mon Sep 17 00:00:00 2001 From: Nnenna Ndukwe Date: Wed, 29 Jan 2025 23:20:19 -0500 Subject: [PATCH] Update website/docs/feature-flag-tutorials/use-cases/security-compliance.md Co-authored-by: Michael Ferranti --- .../feature-flag-tutorials/use-cases/security-compliance.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/docs/feature-flag-tutorials/use-cases/security-compliance.md b/website/docs/feature-flag-tutorials/use-cases/security-compliance.md index e067e1e144..030182421c 100644 --- a/website/docs/feature-flag-tutorials/use-cases/security-compliance.md +++ b/website/docs/feature-flag-tutorials/use-cases/security-compliance.md @@ -9,7 +9,7 @@ Enterprise organizations face the challenge of balancing innovative technology w Unleash is designed to support critical enterprise compliance standards such as: -[FedRAMP](/using-unleash/compliance/fedramp): For government and highly regulated sectors, Unleash's security controls are designed to meet the rigorous requirements of the Federal Risk and Authorization Management Program (FedRAMP). +[FedRAMP](/using-unleash/compliance/fedramp): For organizations listing their software on the FedRAMP marketplace, Unleash's security controls are designed to meet the rigorous requirements of the Federal Risk and Authorization Management Program (FedRAMP). [SOC 2 Type II](/using-unleash/compliance/soc2): Our architecture provides the necessary controls and audit trails to meet stringent SOC 2 requirements, ensuring your feature flag management processes are transparent, secure, and verifiable.