{"version":"1.0","provider_name":"Blog | GitProtect.io","provider_url":"https:\/\/gitprotect.io\/blog","author_name":"Michal Zbyl","author_url":"https:\/\/gitprotect.io\/blog\/author\/michal-zbyl\/","title":"Git Backup for SOC 2 Compliance - Blog | GitProtect.io","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"gSJJNdQ033\"><a href=\"https:\/\/gitprotect.io\/blog\/git-backup-for-soc-2-compliance\/\">Git Backup for SOC 2 Compliance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/gitprotect.io\/blog\/git-backup-for-soc-2-compliance\/embed\/#?secret=gSJJNdQ033\" width=\"600\" height=\"338\" title=\"&#8220;Git Backup for SOC 2 Compliance&#8221; &#8212; Blog | GitProtect.io\" data-secret=\"gSJJNdQ033\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2021\/07\/soc-2.png","thumbnail_width":1200,"thumbnail_height":600,"description":"Audits and standards are everywhere, but you know what? This is excellent news for you and your repositories, and your company. Thanks to these control procedures, you can confidently assume that your company is safe and prepared for the threats resulting from ever-increasing attacks. So let&#8217;s talk about SOC 2, the big five!"}