Security Details

Description

The security details component renders text from a data file into an informational table. The data is filtered by a tag, and can be found here: `src/_data/security-detail-section.yml`. It takes few inputs.

Sample Security Details

Rendered


Business Practices

Personnel & Processors
Background checks
All CircleCI employees and contractors must pass a background check and sign confidentiality agreements.
Employee security awareness
CircleCI mandates that new employees attend classes covering security best practices.
Engineer security education
Engineers are required to attend an additional technical security workshop.
Policies
CircleCI maintains various security policies which are maintained and communicated by our security management team.
Partner management
CircleCI requires all partners and third-party vendors to fill out a security questionnaire. Those which handle PII are also required to sign a Data Processing Addendum.
Security Hall of Fame
CircleCI maintains a security hall of fame which lists persons who have helped CircleCI to identify a security vulnerability. Report a security concern
Security incident response
Response team
CircleCI maintains a dedicated Incident Response Team.
Response policy + plan
CircleCI maintains an Incident Response Policy and Runbook to facilitate decision making during critical situations.
Communication
Network and security incidents are published at https://status.circleci.com/

Options

classes : string

filter : string


Sample Security Details

Code


{% include components/security-details.html filter="Business Practices" %}

Rendered


Business Practices

Personnel & Processors
Background checks
All CircleCI employees and contractors must pass a background check and sign confidentiality agreements.
Employee security awareness
CircleCI mandates that new employees attend classes covering security best practices.
Engineer security education
Engineers are required to attend an additional technical security workshop.
Policies
CircleCI maintains various security policies which are maintained and communicated by our security management team.
Partner management
CircleCI requires all partners and third-party vendors to fill out a security questionnaire. Those which handle PII are also required to sign a Data Processing Addendum.
Security Hall of Fame
CircleCI maintains a security hall of fame which lists persons who have helped CircleCI to identify a security vulnerability. Report a security concern
Security incident response
Response team
CircleCI maintains a dedicated Incident Response Team.
Response policy + plan
CircleCI maintains an Incident Response Policy and Runbook to facilitate decision making during critical situations.
Communication
Network and security incidents are published at https://status.circleci.com/